• Title/Summary/Keyword: 노드 이동성

Search Result 1,065, Processing Time 0.028 seconds

Location based Ad-hoc Network Routing Protocol for Ubiquitous Port (지능형 항만을 위한 위치기반 Ad-hoc 네트워크 라우팅 프로토콜)

  • Lee, Bong-Hee;Choi, Young-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.65-71
    • /
    • 2011
  • In this paper, the RFID / USN-based ad-hoc network structure is presented for efficient operation of a container terminal yard. Communication between fixed or mobile devices in the container terminal yard is accomplished through the ad-hoc node, to collect the status information of a container in real time. Any outside shipper of the container as well as central server allows to share the status information of a container through ad-hoc communication. In addition, to predict the maximum wireless transmission range of nodes by RFID tag position in the yard, LAODV (Location based AODV) routing protocol is proposed. The validity is proved by performance evaluation via computer simulation.

Design and Analysis of Reliable Multicast Protocol using Meta-Groups (메타 그룹을 이용한 신뢰성 있는 멀티캐스트 프로토콜의 설계 및 분석)

  • 이동춘;김배현;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1A
    • /
    • pp.104-113
    • /
    • 2000
  • In this paper, we propose a protocol that makes use of a concept of a meta-group based on propagation trees to deal with duplicated members of the same multicast group. It is shown that, if multicast tree is composed ofthese meta-groups, the depth of the tree can be shortened and the ordering of the multicast that communicatesbetween multiple senders and receivers can be easier. In the protocol, we assign a Designated Manager(DM) toeach meta-group and make each DM do the role of the representative receiver of the meta group. In this Paper,the DM's are supposed to handle ACK and retransmission for the members in the same meta group. Hence, theDM's distribute the ACK from senders, and they can reduce the burden of senders by shortening commit delaytime. We also show, through a simulation analysis, that the new multicast protocol outperforms the existing onesnot only in message costs but also in commit delay times.

  • PDF

Monitoring of Strength Development in Concrete Using Wireless Impedance Measurements (무선 임피던스 계측을 이용한 콘크리트 강도 발현 모니터링 기법)

  • Kim, Dong-Jin;Chang, Ha-Joo;Park, Jun-Hyun;Park, Seung-Hee;Park, Sun-Kyu
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2010.04a
    • /
    • pp.339-342
    • /
    • 2010
  • 본 논문에서는 유/무선 임피던스 계측을 통하여 현장 타설 콘크리트의 강도 발현 모니터링 기법을 개발하였다. 최근 많이 사용되고 있는 고강도 콘크리트의 경우 강도 발현이 제대로 되지 않으면 건설 중 취성 파괴가 일어날 우려가 있으므로 현장에서의 강도 발현 모니터링이 중요시 되고 있다. 하지만 기존의 콘크리트 강도 평가 방법은 고가의 장비가 필요하거나 복잡한 수학식을 통하여 이루어 졌기에 현장에서는 효율적으로 사용되기 힘들었다. 이에 압전 센서 기반 임피던스 측정을 통하여 콘크리트의 강도 발현을 모니터링하는 기법을 제안하였다. 구조물의 임피던스는 구조물 손상이나 강도 변화와 같은 구조물의 물성 변화 발생 시 공진주파수가 이동하는 특징이 있다. 이를 기반으로 콘크리트 구조물의 공진주파수 변화를 관찰하여 대상 구조물의 강도를 모니터링하는 기법을 개발하였으며 유/무선 임피던스 계측을 동시에 실시하여 무선 임피던스 측정의 유효성을 평가하였다. 그리고 고강도 콘크리트에서의 적용을 평가하기 위하여 설계 강도 30MPa, 100MPa의 콘크리트에 대하여 유/무선 임피던스 측정을 실시하였다. 이를 통해 본 논문에서는 무선 임피던스 계측을 이용하여 접근하기 어려운 곳이나 케이블 연결이 어려운 곳에서도 실시간으로 구조물의 강도 발현 모니터링이 가능한 시스템을 제안하였다.

  • PDF

Maintaining Robust Spanning Tree in Wireless Ad-hoc Network Environments (무선 Ad-hoc 네트워크 환경에서 강건한 신장 트리를 유지하는 기법)

  • 강용혁;엄영익
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10C
    • /
    • pp.902-911
    • /
    • 2002
  • A wireless ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized adminstration or standard support services. Wireless ad-hoc networks may be quite useful in that they can be instantly deployable and resilient to change. In this environment, for many crucial distributed applications, it is necessary to design robust virtual infrastructures that are fault-tolerant, self-stabilized, and resource-efficient. For this task this paper proposes a scheme of maintaining robust spanning trees which are little affected by topological changes. By maintaining such a spanning tree and adapting it to the environments with frequent topological changes, one can improve the reliability and efficiency of many applications that use the spanning tree.

A QoS Improved MAC Protocol for UWASN with Multi-Gateway (다수의 게이트웨이를 갖는 수중 센서네트워크환경에서 QoS향상을 위한 MAC 프로토콜)

  • Lee, Dong-Won;Kim, Sun-Myeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.250-253
    • /
    • 2010
  • Underwater sensor network has attracted more and more attention from the networking research community recently. Most of traditional studies focus on the topology with a single gateway. Underwater sensor network consists of a variable number of sensors and multi-gateway to ensure the reliability of the network. In this paper, we propose a new MAC protocol that can reduce collisions among sensor nodes and improve QoS(Quality of Service) for underwater sensor network with multi-gateway. We evaluate the performance of the proposed scheme through simulation. Simulation results show that the proposed scheme outperforms the existing MAC protocol.

  • PDF

Implementation of Image Transmission System in Ad-Hoc Network Using AODV Routing Protocol (Ad hoc 네트워크에서 AODV 라우팅 프로토콜을 이용한 영상 전송 시스템 구현)

  • Lee, Sung-Hun;Lee, Hyung-Keun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.6
    • /
    • pp.92-100
    • /
    • 2008
  • Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or reliable support services such as wired network and base stations. Recently, Ad-hoc networks are evolving to support multimedia contents according to expansion of ad hoc multi-hop communication system. Wireless ad-hoc network is different from the conventional wired network by frequent changes in network topology, number of routers and resources, there are a number of problems in applying conventional routing protocol to ad-hoc network. The AODV routing protocol is proposed for mobile node in ad-hoc networks. AODV protocol that provides to guarantee QoS for data transmission in ad hoc networks that link break frequently occurs. In this paper, AODV routing protocol based NDIS(Network Driver Interface Specification) is implemented. We design high performance image transmission that can operate with software(AODV) for ad-hoc networks without degradation. and verify operation of AODV routing protocol on the test bed.

  • PDF

Secure routing security algorithm S-ZRP used Zone Routing Protocol in MANET (MANET환경에서 Zone Routing Protocol을 이용한 안전한 경로설정 보안 알고리즘 S-ZRP)

  • Seo Dae-Youl;Kim Jin-Chul;Kim Kyoung-Mok;Oh Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.4 s.346
    • /
    • pp.13-21
    • /
    • 2006
  • An mobile ad hoc network(MANET) is a collection of wireless computers (nodes), communicating among themselves over multi-hop paths, without the help of any infrastructure such as base stations or access points. Prior research in MANET has generally studied the routing problem in a non-adversarial setting, assuming a trusted environment. In this paper, we design and evaluate the Secure Zone Routing Protocol(T-ZRP), a secure ad hoc network routing protocol is based on the design of the hash chain. In order to support use with nodes of limited CPU processing capability, and to guard against Denial-of-Service attacks in which an attacker attempts to cause other nodes to consume excess network bandwidth or processing time, we use efficient one-way hash functions and don't use asymmetric cryptographic operations in the protocol. Proposed algorithm can safely send to data through authentication mechanism and integrity about routing establishment.

Secure Routing with Time-Space Cryptography for Mobile Ad-Hoc Networks (이동 애드혹 망을 위한 시공간 방식의 보안 라우팅 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.11-16
    • /
    • 2007
  • This paper describes the design and performance of a secure routing protocol with time-space cryptography for mobile ad-hoc networks. The proposed time-space scheme works in the time domain for key distribution between source and destination as well as in the space domain for intrusion detection along the route between them. For data authentication, it relies on the symmetric key cryptography due to high efficiency and a secret key is distributed using a time difference from the source to the destination. Also, a one-way hash chain is formed on a hop-by-hop basis to prevent a compromised node or an intruder from manipulating the routing information. In order to evaluate the performance of our routing protocol, we compare it with the existing AODV protocol by simulation under the same conditions. The proposed protocol has been validated using the ns-2 network simulator with wireless and mobility extensions.

Performance Analysis of Transport in MANET including Interworking Functionality using the Edge Cost Based Modeling Method (에지코스트기반 모델링 방법에 의한 연동기능이 포함된 MANET의 전달성능 분석)

  • Song, Sang-Bok;Lee, Kyou-Ho;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2593-2600
    • /
    • 2010
  • A growth of mobile and wireless networking technologies have enabled mobile ad hoc networks applicable to a wide range of areas. This paper analyzes dynamics of network transport performance with respect to dynamics of network states especially for the mobile ad hoc networks called MANET. The edge cost based modeling methodology is adopted for the analysis, which can express well the characteristics of MANET. In this methodology the network state at arbitrary time can be specified as one of four edge states. We extracts ten target network scenarios for the simulation analysis by employing not only the Real Edge/Infinity Edge concept but also interworking functionality between different transport protocols. Then we could acquire from simulation of them with the DEVSim++ engine that the more sorts of transport protocols and the more number of interworking nodes are included in the network, the more contribution is for improving network transport performance.

A Study on Data Movement Method between For for Cloud Computing (클라우드를 위한 포그 간의 데이터 이동 기법에 관한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo;Lee, Hae-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.294-296
    • /
    • 2017
  • Cloud computing is a computing technique that uploads all the data from a cloud node to a cloud server and provides it to users as a service. This is difficult to provide services in real time depending on the network conditions. This is because it is necessary to download information to the remote site through the network, not the local area, and to download additional services to provide services in the cloud. So fog computing has been proposed as an alternative. In this paper, we propose an efficient data exchange technique between cloud, fog and user. The proposed fog provides services to users and collects and processes data. The cloud is responsible for the flow of data exchange and control between the fog. We propose a standard method for data exchange. The application for this is to process and service the information generated by the BAN (Body Area Network) in the fog, and the cloud serves as a mediator. This can resolve data heterogeneity between devices or services and provide efficient data movement.

  • PDF