• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.029 seconds

Distributed Dynamic Lighting Energy Management System based on Zigbee Mesh Network (지그비 메쉬망 기반 분산형 동적 에너지 관리 시스템)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.85-91
    • /
    • 2014
  • Nowadays, Dynamic lighting control and management skills are studied and used. If the system which is to manage multiple intelligent spot applied ubiquitous service technology is built with decision making and used in the complex intelligent space like a apartment then will improve energy efficiency and provide comfortability in optimal conditions. To solve this problem distributed autonomous control middleware and energy management system which process data gathering by zigbee mesh network and search proper services to save energy by the existing state of things is necessary. In paper we designed DDLEMS (Distributed Dynamic Lighting Energy Management System) that is to service duplex communication embedded by software based home server platform to provide mobile services in the smart place and support decision making about energy saving to the best use of wireless censor node and controled network, energy display devices.

Information System of Smart u-LED Lighting Energy based on Zigbee Mesh Network (지그비 메쉬 망 기반 스마트 u-LED 전력제어 시스템)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.77-83
    • /
    • 2013
  • Nowadays, the limitation of Lighting control and management skills is the excessive cost of equipments, the operational difficulties and wasting energy. To solve this problem is in need of communication and management S/W that is worked out complexly well as a information system of smart lighting energy, which is loaded wireless network facility. This paper made a study od the energy saving technology through energy monitoring and we developed LEIS(Lighting Energy Information Sysem) to converge this one. LEIS is monitoring and control lighting energy data that is collelcted from sensors by Zigbee mesh network and shows lighting use information by visualization to users. It is consists of lighting energy information data base based on LEM(Lighting Energy Metering) information and LEIS Web application, provide function scenario to manage energy optimization through LEIS.

An improvement of Medium Access Control Protocol in Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크의 매체 접근 제어 기법에 대한 개선 방안)

  • Jang, Ho;Lee, Myung-Sub;Jeon, Woo-Sang
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.373-382
    • /
    • 2009
  • we present more efficient method of a medium access for real-time ubiquitous sensor networks. Proposed MAC protocol is like the randomized CSMA/CA protocol, but unlike previous legacy protocols, it does not use a time-varying contention window from which a node randomly picks a transmission slot. To reduce the latency for the delivery of event reports from sensor nodes, we carefully decide to select a fixed-size contention window with non-uniform probability distribution of transmitting in each slot. We show that the proposed method can offer up to several times latency reduction compared to legacy of IEEE 802.11 as the size of the sensor network scales up to 256 nodes using a widely-used network simulation package, NS-2. We finally show that proposed MAC scheme comes close to meet bounds on the best latency being achieved by a decentralized CSMA-based MAC protocol for real-time ubiquitous sensor networks which is sensitive to latency.

Adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles

  • Surzhik, Dmitry I.;Kuzichkin, Oleg R.;Vasilyev, Gleb S.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.23-28
    • /
    • 2021
  • The article discusses the features of adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles operating in the conditions of "smart cities". The concept of cities of this type is defined, the historical path of formation, the current state and prospects for further development in the aspect of transition to "smart cities" of the third generation are shown. Cities of this type are aimed at providing more comfortable and safe living conditions for citizens and autonomous automated work of all components of the urban economy. The perspective of the development of urban mobile automated technical means of infocommunications is shown, one of the leading directions of which is the creation and active use of wireless self-organizing networks based on unmanned aerial vehicles. The advantages of using small-sized unmanned aerial vehicles for organizing networks of this type are considered, as well as the range of tasks to be solved in the conditions of modern "smart cities". It is shown that for the transition to self-organizing networks in the conditions of "smart cities" of the third generation, it is necessary to ensure the adaptation of various levels of OSI network models to dynamically changing operating conditions, which is especially important for the physical layer. To maintain an acceptable level of the value of the bit error probability when transmitting command and telemetry data, it is proposed to adaptively change the coding rate depending on the signal-to-noise ratio at the receiver input (or on the number of channel decoder errors), and when transmitting payload data, it is also proposed to adaptively change the coding rate together with the choice of modulation methods that differ in energy and spectral efficiency. As options for the practical implementation of these solutions, it is proposed to use an approach based on the principles of neuro-fuzzy control, for which examples of determining the boundaries of theoretically achievable efficiency are given.

A study on protection technology and scope about information Privacy in ubiquitous Sensing Network Environment (A focus on context awareness system and personal information) (유비쿼터스 센싱 네트워크 환경 하에서 정보 프라이버시의 보호 기술과 영역에 관한 연구 (상황인식시스템과 개인정보를 중심으로))

  • Kang, Jang-Mook;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.7 no.4
    • /
    • pp.301-308
    • /
    • 2006
  • There are some technologies such as USN, RFID, Home-network to advance the ubiquitous era. Those technologies embody Context-Awareness System. To Context-Awareness System is that human, objects and environment supply information with cable and wireless at real time. So private information, information privacy, a wide sense privacy will be faced on serious menace. In this article, I analyze threat of private information in Context-Awareness System under USN(ubiquitous Sensing Network) surroundings and present technology to protect private information. Each technology can apply subdivided protection province information privacy. I expect definition of information privacy, insight through technological presentation and total solution in this article.

  • PDF

Security Characteristics of D-MAC in Convergence Network Environment (융합망 환경에서 D-MAC의 보안 특성)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.323-328
    • /
    • 2014
  • D-MAC protocol is used convergence network, which is designed to connect wireless link between things. This protocol is supported to local data exchange and aggregation among neighbor nodes, and distributed control packet from sink to sensor node. In this paper, we analysis about efficiency of power consumption according to whether or not security authentication of D-MAC in convergence network. If authentication scheme is applied to MAC communication, it is related to power consumption of preamble whether or not with and without authentication process. It is reduced to energy consumption against denial attack of service, when it is applied to authentication. Future work will take the effort to deal with security authentication scheme.

Feasibility Study of IEEE 802.15.4 LR-WPAN to the Real-time Voice Application (IEEE 802.15.4 LR-WPAN의 실시간 음성 데이터 응용에 대한 적용 가능성 연구)

  • Hur, Yun-Kang;Kim, You-Jin;Huh, Jae-Doo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.82-94
    • /
    • 2007
  • Wireless sensor networking technology is one of the basic infrastructures for ubiquitous environment. It enables us to gather various sensory data such as temperature, humidity, gas leakage, and speed from the remote sensor devices. To support these networking functions, IEEE WPAN working group makes standards for PHY and MAC, while ZigBee Alliance defines the standards for the network, security, and applications. The low-rate WPAN was emerged to have the characteristics of network resilience, low cost, and low power consumption. It has a broad range of applications including, but not limit to industrial control and monitoring, home automation, disaster forecast and monitoring, health care. In order to provide more intelligent and robust services, users want voice-based solutions to accommodate to low-rate WPAN. In this paper, we have evaluated voice quality of an IEEE 802.15.4 standard compliant voice node. Specifically, it includes the design of a voice node and experiments based on the prediction of voice quality using the E-model suggested by ITU-T G.107, and the network communication mechanisms considering beacon-enabled and nonbeacon-enabled networks for real-time voice communications.

  • PDF

DLMS SCADA System based on TETRA (TETRA 기반 DLMS 원방감시 시스템)

  • Song, Byung-Kwen;Lee, Suk-Hee
    • Journal of IKEEE
    • /
    • v.13 no.3
    • /
    • pp.95-102
    • /
    • 2009
  • TETRA(TErrestrial Trunked RAdio) is wireless communication system generally adopted to public network and backbone network, as the technology of Trunked Radio System specified by ETSI(European Telecommunications Standards Institute) and currently adopted to the Electric Power IT Backbone Network in Korea. DLMS(Device Language Message Specification) is used in order to meter an electric measuring instrument value. In this paper, DLMS Server and Client simulator are used based on Window operating system. The multi-functional gateway, which transforms the communications based on RS-232C between DLMS Server Simulator and Client Simulator to the one based on TETRA PEI(Peripheral Equipment Interface), is developed such that DLMS SCADA(Supervisory Control And Data Acquisition) system is constructed based on TETRA.

  • PDF

A Study on the Effective Routing Algorithm for Mobile Ad-hoc Wireless Program Developed Network (Ad-hoc 이동 통신망에서의 무료통신이 가능한 라우팅 알고리즘 프로그램 개발 연구)

  • Lee, Dong chul;Oh, Goo Young;You, Sung-Pil;Lee, Hye soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.601-603
    • /
    • 2013
  • The nodes of Ad-hoc network are made up of location registration for sending informations and a great number of packet transmissions to maintain routing route among the nodes. Under this environment, a huge number of traffics would be generated as mobility variable occurs more than in physical network. Hence, in this paper, focused on to study the relationship of nodes to analyze the extent of the traffic in order to control the traffics of the multi-hop in Ad-hoc.

  • PDF

A Study on the Effective Routing Algorithm for Mobile Ad-hoc Wireless Program Develop Network (Ad-hoc 통신망에서 요구되는 라우팅 알고리즘 프로그램 개발연구)

  • Lee, Dong chul;Kim, Sung gwun;Cho, Se hyun;Lee, Hye soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.623-625
    • /
    • 2012
  • The nodes of Ad-hoc network are made up of location registration for sending informations and a great number of packet transmissions to maintain routing route among the nodes. Under this environment, a huge number of traffics would be generated as mobility variable occurs more than in physical network. Hence, in this paper, focused on to study the relationship of nodes to analyze the extent of the traffic in order to control the traffics of the multi-hop in Ad-hoc.

  • PDF