• Title/Summary/Keyword: 노드 이동성

Search Result 1,064, Processing Time 0.026 seconds

Analysis of Beam Discovery and Link setup for MXN based mmWave (mmWave기반의 MXN 빔 탐색 및 링크설정 방식 분석)

  • Baek, Seungkwon;Han, Kijun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.381-388
    • /
    • 2019
  • In this paper, we propose a new wireless transport network, which is named as Mobile Xhaul Network(MXN), that is enable to bring cost efficiency of fronthaul, midhaul and backhaul and to make easy installation of 5G Radio Access Network(RAN). For this purpose, we design XDU discovery and xhaul link setup mechanism with MXN architecture and operational procedure. Especially, in this paper, we propose various types of beam discovery mechanisms for mmWave based radio access on XDU and evaluate proposed schemes. The Simulation result shows that threshold based scheme and information based scheme have less than about 50% beam discovery latency compared to full search scheme.

Hierarchical Mesh-based Multicast Routing Protocol for Ad-Hoc Networks (에드 혹 네트워크를 위한 계층적인 메쉬 기반 멀티캐스트 라우팅 프로토콜)

  • Kim, Ye-Kyung;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.586-601
    • /
    • 2001
  • We propose a mesh based multicast routing protocol referred to as HMMRP for ad-hoc networks. In HMMRP, a limited number of sources are selected as core sources, and the rest of the sources of a multicast group are connected to one of those core sources. The sources and the receivers of a multicast group are also connected through per source trees. In HMMRP, the data delivery mesh of a multicast group are composed of the nodes on these paths, and are reconfigured at regular intervals. Furthermore, each mesh member that lies on the paths between the sources and the core sources as well as be-tween the core sources and the receivers keeps checking if there is a symptom of mesh separation around itself. When a mesh member finds such symptom, it tries to patch itself to the mesh with a local flooding. As a result, the part of the data delivery mesh on those paths are kept connected with a lot higher probability than the rest of the data delivery mesh. That is, for a certain source receiver pair, it is very likely that at least there exists a data delivery path that route from the source to a core source and then to the receiver. Therefore, HMMRP may provide very high data delivery ratio without frequent entire data delivery mesh reconfiguration even when the nodal mobility is high. Simulation results show that HMMRP shows relatively little performance degradation with respect to mobility. Furthermore, the performance degradation with respect to mobility is even smaller when the size of the multicast group becomes larger.

  • PDF

A Message Priority-based TCP Transmission Algorithm for Drone Systems (드론 시스템을 위한 메시지 우선순위 기반 TCP 통신 알고리즘)

  • Choi, Joon-Hyuck;Kim, Bo-Ram;Lee, Dong-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.509-516
    • /
    • 2018
  • TCP is a well-known communication protocol which is widely used for reliable message transmissions. The urgent mechanism of TCP plays a key role to transmit messages with a high priority. If a high priority message occurs at the transmitting node, the urgent mechanism informs the receiving node about the presence of a high priority message prior to its transmission so that the receiving node can be prepared for handling this message in advance. This implies that the existing urgent mechanism of TCP does not guarantee an immediate or faster delivery of the high priority message itself. Therefore, the ability of priority-based transmission is required on TCP not only to ensure reliable transmissions of normal messages but also to offer a differentiated service according to the priority of message. This paper presents a priority-based transmission algorithm over TCP using a priority queue in a multi-threaded environment. The effectiveness of the proposed algorithm is explored using an experimental setup in which various messages with different priority levels are transmitted.

Load Balancing Schemes in the MANET with Multiple Internet Gateways (다중 인터넷 게이트웨이를 갖는 MANET의 부하 균등화 기법)

  • Kim, Young-Min;Lim, Yu-Jin;Yu, Hyun;Lee, Jae-Hwoon;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.621-626
    • /
    • 2006
  • A mobile ad hoc network (MANET) is an infrastructureless network that supports multi-hop communication. For the MANET nodes wishing to communicate with nodes in the wired Internet, the global Internet connectivity is required and this functionality can be achieved with the help of the Internet gateway. For the support of reliability and flexibility, multiple Internet gateways can be provisioned for a MANET. In this case, load-balancing becomes one of the important issues since the network performance such as the network throughput can be improved if the loads of the gateways are well-balanced. In this paper, we categorize the load-balancing mechanisms and propose a new metric for load-balancing. Simulation results show that our proposed mechanism using the hop distance and the number of routing table entries as a load-balancing metric enhances the overall network throughput.

Real-time Locating Method Applicable to the Mobile Node Partially Out of Communication Reachability (통신 도달성이 결여된 이동노드의 실시간 위치인식 방법)

  • Lee, Kyou-Ho;Jang, Won-Ick
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2463-2470
    • /
    • 2010
  • In some cases of u-health services, it is important and then required to pursue the location of users in real time because users could occasionally be in the situation beyond self-regulation. Location positioning has used two such typical techniques as trilateration and fingerprinting. A trilateration technique is usually based on three resident coordinates to identify the location of the target node. Ranging that measures distances between coordinates and the node is essential for applying the trilateration technique. Users especially in u-health services could be out of reachability in any such reasons as out of propagation ranges, fault of a communication counterpart, non-existence of possible communication facility, etc. This paper proposes a real-time locating method which can improve to identify and track the location of mobile objects. The method is based on references of identified mobile nodes as well as resident coordinates even though they may be partially out of communication reachability.

Cluster-based Continuous Object Prediction Algorithm for Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율성을 위한 클러스터 기반의 연속 객체 예측 기법)

  • Lee, Wan-Seop;Hong, Hyung-Seop;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8C
    • /
    • pp.489-496
    • /
    • 2011
  • Energy efficiency in wireless sensor networks is a principal issue to prolong applications to track the movement of the large-scale phenomena. It is a selective wakeup approach that is an effective way to save energy in the networks. However, most previous studies with the selective wakeup scheme are concentrated on individual objects such as intruders and tanks, and thus cannot be applied for tracking continuous objects such as wild fire and poison gas. This is because the continuous object is pretty flexible and volatile due to its sensitiveness to surrounding circumferences so that movable area cannot be estimated by the just spatiotemporal mechanism. Therefore, we propose a cluster-based algorithm for applying the efficient and more accurate technique to the continuous object tracking in enough dense sensor networks. Proposed algorithm wakes up the sensors in unit cluster where target objects may be diffused or shrunken. Moreover, our scheme is asynchronous because it does not need to calculate the next area at the same time.

Wireless Security Transmission Using Algorithm of Multiple-Key Exchange (다중 키 교환 알고리즘을 이용한 무선 보안 전송 기법)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Noh, Bong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.807-810
    • /
    • 2005
  • Constructed network test environment of wireless base for confidentiality guarantee of data and safe transmission that is transmited at Mobile node of Wireless Network environment in this paper. And, progressed research about IKEv2's Multiple-Key Exchange mechanism for efficient security transmission that use IPSec that is built-in to basis to IPv6 of Mobile environment. Have several key to single terminal to solve that is seam at hand off packet transmission process of Mobile Node in Wireless Network and Re-setting for Key and Re-exchange problem that happen frequently and studied technology that move. Key exchange protocol that is used for an experiment loads basically in MIPv6 and used IKEv2 protocol that is used for management and distribution of reliable encryption key between both end. Using network simulator of SSFNet(Scalable Simulation Framework Network Models) in this paper Key exchange delay value of IKEv2's security transmission analyzing comparison Performance measure and studied about problem and improvement way accordingly.

  • PDF

A Light-weight PKM Mutual Authentication Protocol for Improving Initial Authentication in WiMAX (WiMAX 초기 인증을 향상시킨 경량화된 PKM 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.257-266
    • /
    • 2009
  • Now a days, as increased the use of mobile units like a laptop computer and PDA, the demand for high speed internet service is increasing. On the other hand, PKMv2 which is provided from IEEE 802.16e cannot support fully on the security of high speed internet service. This paper proposes light-weight mutual authentication protocol which solved security problem of PKMv2 related to integrity of mobile node for transmission of safe high speed data of mobile node operating in mobile WiMAX environment. Proposed mutual authentication protocol increases the efficiency as the user in network can move in network safely without additional procedure of authentication between subscriber and base station after user's initial authentication. Also, the proposed mutual authentication protocol is safe from the security attack (the man-in-the-middle attack and reply attack) between subscriber and base station by generating a key adopt to PRF() function using random number and secret value in order to secure certification.

Effective Streaming of XML Data for Wireless Broadcasting (무선 방송을 위한 효과적인 XML 스트리밍)

  • Park, Jun-Pyo;Park, Chang-Sup;Chung, Yon-Dohn
    • Journal of KIISE:Databases
    • /
    • v.36 no.1
    • /
    • pp.50-62
    • /
    • 2009
  • In wireless and mobile environments, data broadcasting is recognized as an effective way for data dissemination due to its benefits to bandwidth efficiency, energy-efficiency, and scalability. In this paper, we address the problem of delayed query processing raised by tree-based index structures in wireless broadcast environments, which increases the access time of the mobile clients. We propose a novel distributed index structure and a clustering strategy for streaming XML data which enable energy and latency-efficient broadcast of XML data. We first define the DIX node structure to implement a fully distributed index structure which contains tag name, attributes, and text content of an element as well as its corresponding indices. By exploiting the index information in the DIX node stream, a mobile client can access the wireless stream in a shorter latency. We also suggest a method of clustering DIX nodes in the stream, which can further enhance the performance of query processing over the stream in the mobile clients. Through extensive performance experiments, we demonstrate that our approach is effective for wireless broadcasting of XML data and outperforms the previous methods.

A Performance Analysis of Routing Protocols Avoiding Route breakages in Ad hoc Networks (애드 흑 네트워크에서 경로 손실 회피 라우팅 프로토콜의 성능평가)

  • Wu Mary;Jung Sang Joon;Jung Youngseok;Kim Chonggun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.49-58
    • /
    • 2006
  • When the movement of a node breaks the route in ad-hoc network, on-demand routing protocol performs the local route recovery or a new route search for the route maintenance. And when it performs the new route search or the local search, the packet which is transmitted can be delayed. There are ARMP and RPAODV as the methods reducing the delay resulted from the route-breakage. They predict the route-breakage and construct an alterative local route before the occurrence of the route-breakage. When the link state is unstable, the success rate of the alternative local route that can avoid the route-breakage can give a direct effect on the route-breakage and the transmission delay, To estimate the performance of routing protocols avoiding route-breakage, we suggest the numerical formulas of AODV, the representative on-demand routing protocol, and ARMP, RPAODV. To verify the efficiency and accuracy of the proposed numerical formulas, we analysis and compare with the results of the computer simulation and that of the numerical formulas.