• Title/Summary/Keyword: 데이터 전송 프로토콜

Search Result 1,488, Processing Time 0.034 seconds

Power Consumption Analysis of Sensor Node According to Beacon Signal Interval in IEEE 802.15.4 Wireless Star Sensor Network (IEEE 802.15.4 무선 스타 센서 네트워크에서 비콘 신호 주기에 따른 센서 노드 전력소모량 분석)

  • Yoo Young-Dae;Choi Jung-Han;Kim Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9B
    • /
    • pp.811-820
    • /
    • 2006
  • In this paper, The correlation of the power consumption of sensor node is analyzed according to the analyze parameter in IEEE 802.15.4 star sensor network. And It is studied the influence on analysis parameter. The power consumption of sensor network in transmission process and average transmission power consumption drives to numerical formula. And CSEM WiseNET system measurement value is used. As a simulation result, The power consumption of sensor node in star network consist of 10 sensor nodes is more than 20 % that in single network in average. When beacon signal interval is 0.1 second in all frequency bands, the power consumption of sensor node in up-link is more than 2.5 times that in down-link in average. When beacon signal interval is 1 second and the number of sensor nodes increases to 100 and sensing data increases to 100 byte, the power consumption of sensor node increases to 2.3 times. And The superior performance of 2.4 GHz frequency band has than 868/915 MHz frequency band up to $6{\sim}12$ times.

An Energy Efficient Cluster-based Scheduling Scheme for Environment Information Systems (환경정보 시스템에 적합한 클러스터 기반 에너지 효율적인 스케줄링 기법)

  • An, Sung-Hyun;Kim, Seung-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.5
    • /
    • pp.633-640
    • /
    • 2008
  • Sensor node clustering is one of the most popular research topics to reduce the energy of sensor nodes in wireless sensor networks. Previous researches, however, did not consider prediction effects of sensed environment information on TDMA scheduling of a cluster, resulting energy inefficiency. In this paper, we suggest an energy efficient cluster-based scheduling scheme that can be applied flexibly to many environment information systems. This scheme reflects the environment information obtained at the application layer to the MAC layer to set up the schedule of a cluster. The application layer information sets up the scheduling referring to the similarity of sensed data of cluster head. It determines the data transmission considering the result of similarity. We show that our scheme is more efficient than LEACH and LEACH-C in energy, which are popular clustering schemes, through simulation.

  • PDF

Design and Implementation of IoT Terminal Equipment for Vessels using Thuraya Geo-stationary Orbit Satellite (Thuraya 정지궤도 위성을 이용한 선박용 IoT 단말 장치 설계 및 구현)

  • Jang, Won-Chang;Lee, Myung-Eui
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.2
    • /
    • pp.67-72
    • /
    • 2020
  • Satellite communication is not used by many people like mobile communication, but it is a necessary technology for public service and communication services, such as providing the Internet in military, disaster, remote education and medical services, island areas, and infrastructure vulnerable areas. However, on ships and aircraft, mobile communications requiring base stations are either unavailable or restricted in their use. In this paper, we used a Raspberry Pi board as the terminal device to communicate network through satellite modem and PPP protocol, and implemented two-way data link using the text message of the modem to connect to the Thuraya geo-stationary orbit network. In addition, I/O devices were connected to the controller of the terminal equipment to design and implement an IoT device system for ships that can remotely access the system under control and control I/Os and transmit measured data through various sensors.

MPTCP based Handover Scheme in PMIPv6 domain (PMIPv6 도메인에서 MPTCP 기반 Handover 기법)

  • Youn, Joo-Sang;Choi, Hun;Heo, Gyeong-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.71-80
    • /
    • 2014
  • Recently, most mobile nodes, such as smartphones, will have multiple wireless radio interfaces. This feature allows a mobile node to access a multi-network through multiple wireless radio interfaces simultaneously. Accordingly, various networking technology has been studied to use wireless multi-interface more efficiently. In this paper, MPTCP based handover scheme is proposed to reduce data loss and end-to-end latency during the handover in PMIPv6 domain. The proposed scheme performs 2-step flow mobility on the multi-path established through the multi-interface of mobile node in the handover procedure and uses MPTCP subflow function to overcome end-to-end disconnection during the handover. Therefore, the proposed scheme takes the advantage of being able to minimize data loss and a latency generated during performing the handover of mobile node.

A Study on protocol analysis between KTX control system and sub-devices (고속열차(KTX)제어시스템과 하부장치간 프로토콜 분석연구)

  • Kim, Hyeong-In;Jung, Sung-Youn;Kim, Hyun-Shik;Jung, Do-Won;Kim, Chi-Tae;Kim, Dong-Hyun
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.179-186
    • /
    • 2007
  • KTX control systems mutually control OBCS, ATC, MBU, TECA, MDT, ABU, HVAC, TRAE, PID and FDTR, KTX OBCS as master, and controls other sub-control devices as slave, using various serial lines. In order to analyze physical structure of various serial link lines and mutual data transmission structure, serial line analyzer is used in many ways. To use serial line analyzer, prior and professional technics about High Speed Train and experience of using device are necessary. In spite of difficult situation of space and environment where we work for maintenance of High Speed Train, in presenting basic structure about physical connection method aquired by sub-device serial line data collection and about communication data analysis, I hope that this research will be helpful for the person who work for similar area. Also, I hope that this research will help diagnostic work of High Speed Train, which is necessary for test run of independently developed High Speed Train.

  • PDF

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.

Ad-hoc Security Authentication Technique based on Verifier (검증자 기반 Ad-hoc 보안 인증기법)

  • Lee, Cheol-Seung;Hong, Seong-Pyo;Lee, Ho-Young;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.713-716
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on Ad-hoc Networks and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier.

  • PDF

An Enhanced Data Communication Protocol based on HF Radios for supporting Naval Operations (해상작전 지원을 위한 HF 무전기 기반 개선된 데이터 통신 프로토콜)

  • Lee, Seung Gu;Kang, Seung Nam;Lee, Soon Bok;So, Eul-Deuk;Lim, Jae Sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1990-1998
    • /
    • 2017
  • The success of naval operation prioritizes the implementation of a robust communication network that delivers accurate and prompt communications to one another. The satellite, which is the main communication network of the military, is required to construct a preliminary communication network because of the enemy radio disturbance and weak point of fixed antenna. The military operational communication network has been in transition from voice-centered wireless communication network to text message-based communication network. In this paper we suggest an enhanced communication method built on Roll Call, the main communication method of ROK Navy operating tactical data link called Link-11. Simulation results display that the proposed method reduces the transmission time per unit frame by 4.3 times compared to the Roll Call and 6.3 times compared with the Round Robin & Broadcasting; it is also proved that the higher the direct reception rate, the shorter the transmission time required by 1.6 times maximum.

Applying TIPC Protocol for Increasing Network Performance in Hadoop-based Distributed Computing Environment (Hadoop 기반 분산 컴퓨팅 환경에서 네트워크 I/O의 성능개선을 위한 TIPC의 적용과 분석)

  • Yoo, Dae-Hyun;Chung, Sang-Hwa;Kim, Tae-Hun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.351-359
    • /
    • 2009
  • Recently with increase of data in the Internet, platform technologies that can process huge data effectively such as Google platform and Hadoop are regarded as worthy of notice. In this kind of platform, there exist network I/O overheads to send task outputs due to the MapReduce operation which is a programming model to support parallel computation in the large cluster system. In this paper, we suggest applying of TIPC (Transparent Inter-Process Communication) protocol for reducing network I/O overheads and increasing network performance in the distributed computing environments. TIPC has a lightweight protocol stack and it spends relatively less CPU time than TCP because of its simple connection establishment and logical addressing. In this paper, we analyze main features of the Hadoop-based distributed computing system, and we build an experimental model which can be used for experiments to compare the performance of various protocols. In the experimental result, TIPC has a higher bandwidth and lower CPU overheads than other protocols.

Cluster-head-selection-algorithm in Wireless Sensor Networks by Considering the Distance (무선 센서네트워크에서 거리를 고려한 클러스터 헤드 선택 알고리즘)

  • Kim, Byung-Joon;Yoo, Sang-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.127-132
    • /
    • 2008
  • Wireless sensor network technologies applicable to various industrial fields are rapidly growing. Because it is difficult to change a battery for the once distributed wireless sensor network, energy efficient design is very critical. In order to achieve this purpose in network design, a number of studies have been examining the energy efficient routing protocol. The sensor network consumes energy in proportion to the distance of data transmission and the data to send. Cluster-based routing Protocols such as LEACH-C achieve energy efficiency through minimizing the distance of data transmission. In LEACH-C, however, the total distance between the nodes consisting the clusters are considered important in constructing clustering. This paper examines the cluster-head-selection-algorithm that reflect the distance between the base station and the cluster-head having a big influence on energy consumption. The Proposed method in this paper brought the result that the performance improved average $4{\sim}7%$ when LEACH-C and the base station are located beyond a certain distance. This result showed that the distance between cluster-head and the base station had a substantial influence on lifetime performance in the cluster-based routing protocol.

  • PDF