• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.028 seconds

HDF: Hybrid Debugging Framework for Distributed Network Environments

  • Kim, Young-Joo;Song, Sejun;Kim, Daeyoung
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.222-233
    • /
    • 2017
  • Debugging in distributed environments, such as wireless sensor networks (WSNs), which consist of sensor nodes with limited resources, is an iterative and occasionally laborious process for programmers. In sensor networks, it is not easy to find unintended bugs that arise during development and deployment, and that are due to a lack of visibility into the nodes and a dearth of effective debugging tools. Most sensor network debugging tools are not provided with effective facilities such as real-time tracing, remote debugging, or a GUI environment. In this paper, we present a hybrid debugging framework (HDF) that works on WSNs. This framework supports query-based monitoring and real-time tracing on sensor nodes. The monitoring supports commands to manage/control the deployed nodes, and provides new debug commands. To do so, we devised a debugging device called a Docking Debug-Box (D2-Box), and two program agents. In addition, we provide a scalable node monitor to enable all deployed nodes for viewing. To transmit and collect their data or information reliably, all nodes are connected using a scalable node monitor applied through the Internet. Therefore, the suggested framework in theory does not increase the network traffic for debugging on WSNs, and the traffic complexity is nearly O(1).

A Frame Collision Reduction Method for Safety Message Broadcasting in IEEE1609.4/IEEE802.11p based VANETs

  • Wang, Lei;Jing, Weiping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1031-1046
    • /
    • 2018
  • Vehicular ad hoc network (VANET) is a dedicated network to connect vehicles without any centralized administration or infrastructure. The wireless access in vehicular environments (WAVE) protocol leveraging IEEE 1609/802.11p is widely implemented for VANETs. However, in congested traffic situation, the performance of the WAVE system degrades significantly due to serious collision, especially for safety related broadcast services on the control channel (CCH) interval due to the inherent drawback of its collision avoidance mechanisms called carrier sense multiple access with collision avoidance (CSMA/CA). In this paper, we propose a method that can decrease the number of frame collisions in CCH with a few modifications to the IEEE 802.11p protocol. In the paper, vehicles still employ CSMA/CA to compete for the channel access opportunity. However, by taking advantage of periodicity of synchronization interval, a two-state switching scheme introducing two new inter frame space (IFS) is proposed to reduce the number of competing vehicles substantially and as a result, the collision probability is significantly decreased. The simulation results demonstrate the superiority of the proposed method in packet collision rate.

Development of Wireless Diagnostic System for Substation Equipments Using SMS Mode of Mobile Communication Network (이동통신망의 SMS방식을 이용한 변전기기 무선진단 시스템 개발)

  • Kim, Jin-Cheol;Kim, Ji-Ho;Yun, Man-Sik;Song, Ho-Jun;Lee, Hyang-Beom
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.259-261
    • /
    • 2003
  • This paper suggests wireless diagnosis and monitoring system using SMS mode of mobile communication network for distribution transformer which could prevent electrical accident in the near future. Data are acquired by measuring the temperature of insulator oil in the distribution transformer and load current. Data acquisition of sensor using mobile communication network carried out filtering of sensor's output to optimize the size of send data Merit of this inspection method is that management, control and monitoring some transformers can be carried out using only one server. This inspection method will be the way of inspection to be worth spotlight in the near future because it is able to solve easily with the minimum facility inspection about state of transformer which is operating, to wide coverage about machine's wrong operation in other field.

  • PDF

CFP Scheduling for Real-Time Service and Energy Efficiency in the Industrial Applications of IEEE 802.15.4

  • Ding, Yuemin;Hong, Seung Ho
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.87-101
    • /
    • 2013
  • In industrial applications, sensor networks have to satisfy specified time requirements of exchanged messages. IEEE 802.15.4 defines the communication protocol of the physical and medium access control layers for wireless sensor networks, which support real-time transmission through guaranteed time slots (GTSs). In order to improve the performance of IEEE 802.15.4 in industrial applications, this paper proposes a new traffic scheduling algorithm for GTS. This algorithm concentrates on time-critical industrial periodic messages and determines the values of network and node parameters for GTS. It guarantees real-time requirements of periodic messages for industrial automation systems up to the order of tens to hundreds of milliseconds depending on the traffic condition of the network system. A series of simulation results are obtained to examine the validity of the scheduling algorithm proposed in this study. The simulation results show that this scheduling algorithm not only guarantees real-time requirements for periodic message but also improves the scalability, bandwidth utilization, and energy efficiency of the network with a slight modification of the existing IEEE 802.15.4 protocol.

The Study of MAC Algorithm Based on EDCF to Increase Throughput and Provide Fairness (Throughput 향상과 Fairness 보장을 위한 EDCF 기반의 MAC 알고리즘 연구)

  • Kim, Moon;Ye, Hwi-Jin;Roh, Jae-Sung;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.578-582
    • /
    • 2005
  • This paper describes MAC schemes for QoS enhancement taking into account the traffic characteristics and network states over IEEE 802.11 wireless networks. Our approach uses AR as a Backoff parameter and to slide IFS adaptively for increasing the medium utilization ratio and throughput, and providing fairness. In addition, we evaluate through simulations using NS-2 the performance of proposed MAC scheme and compare it with other MAC schemes.

  • PDF

Optimal LEACH Protocol with Improved Bat Algorithm in Wireless Sensor Networks

  • Cai, Xingjuan;Sun, Youqiang;Cui, Zhihua;Zhang, Wensheng;Chen, Jinjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2469-2490
    • /
    • 2019
  • A low-energy adaptive clustering hierarchy (LEACH) protocol is a low-power adaptive cluster routing protocol which was proposed by MIT's Chandrakasan for sensor networks. In the LEACH protocol, the selection mode of cluster-head nodes is a random selection of cycles, which may result in uneven distribution of nodal energy and reduce the lifetime of the entire network. Hence, we propose a new selection method to enhance the lifetime of network, in this selection function, the energy consumed between nodes in the clusters and the power consumed by the transfer between the cluster head and the base station are considered at the same time. Meanwhile, the improved FTBA algorithm integrating the curve strategy is proposed to enhance local and global search capabilities. Then we combine the improved BA with LEACH, and use the intelligent algorithm to select the cluster head. Experiment results show that the improved BA has stronger optimization ability than other optimization algorithms, which the method we proposed (FTBA-TC-LEACH) is superior than the LEACH and LEACH with standard BA (SBA-LEACH). The FTBA-TC-LEACH can obviously reduce network energy consumption and enhance the lifetime of wireless sensor networks (WSNs).

Dynamism Competent LEACH Replication Deliberate for Wireless Sensor Network

  • KONDA HARI KRISHNA;TAPSI NAGPAL;Y. SURESH BABU
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.7-12
    • /
    • 2023
  • Remote sensor systems are utilized in a few applications, including military, restorative, ecological and family unit. In every one of these applications, vitality use is the deciding component in the execution of wireless sensor systems. Thusly, strategies for information steering and exchanging to the base station are critical in light of the fact that the sensor hubs keep running on battery control and the vitality accessible for sensors is constrained. There are two explanations for the various leveled directing Low Energy Adaptive Clustering Hierarchy convention be in investigated. One, the sensor systems are thick and a considerable measure of excess is engaged with correspondence. Second, with a specific end goal to build the versatility of the sensor arrange remembering the security parts of correspondence. In this exploration paper usage of LEACH steering convention utilizing NS2 test system lastly upgraded vitality productive EE-LEACH directing convention guarantees that the chose cluster heads will be consistently conveyed over the system with a specific end goal to enhance the execution of the LEACH convention. EE-LEACH enhances vitality utilization by around 43%.

A Study on Wireless Network Management for Security Enhancement (보안강화를 위한 무선 네트워크 관리 방안에 관한 연구)

  • Lee, Eun-Sub;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.195-200
    • /
    • 2020
  • Wireless LANs are being used in many fields due to their ease of use. The biggest advantage of the WLAN can be said above all mobility. Domestic wired internet service has been saturated since 2006, but wireless internet users have been steadily increasing. However, WLAN has many advantages and characteristics of wireless service. It has a number of security vulnerabilities, and various security related technologies have been developed and applied to solve these problems. On the other hand, security awareness of WLAN users is still insufficient, and security accidents such as personal information leakage occur repeatedly every year. We will study the main weaknesses that can occur in WLAN and suggest security measures from the management level.

The Development of Measuring, Monitoring and Control System for Large Bridge Using Ubiquitous Computing Technology (유비쿼터스 컴퓨팅 기술을 활용한 대형교량의 계측, 모니터링, 통제시스템)

  • Lee Seung-Jae;Lim Jong-Kwon;Min Dae-Hong;Hwang Kyung-Hun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.182-187
    • /
    • 2004
  • Recently the application area of wireless LAN has been increased, rapidly. The application area was limited in indoor, but as the data throughput and performance of wireless LAN becomes better the application is to extend to the Internet connection and wireless(Ubiqitous) bridge in outdoor. In this paper, In this paper, the data throughput of wireless LAN in mobile environment is measured, and the usability of wireless LAN for develop bridge health monitoring system is confirmed.

  • PDF

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.