• Title/Summary/Keyword: Access Node

Search Result 671, Processing Time 0.025 seconds

A Study on Making use of Multiple Interfaces with Mobile Node Simultaneously (이동 단말의 다중 인터페이스 동시 사용에 관한 고찰)

  • You Tae-wan;Lee Seung-yun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1412-1418
    • /
    • 2005
  • Recently, more and more portable terminals probably have multiple interfaces to be connected to different access technologies. Each technology has its specific characteristics in terms of coverage area, bandwidth, reliability, etc. For example, the mobile node is equipped with three heterogeneous interfaces; IEEE 802.1lb MLAM link, CDMA Cellular link, and 802.16 WiMAX link These mobile nodes may be reachable through different links at the same time or use each interface alternately depending on the network environment. As like this, the portable terminal equipped multiple interfaces can have many benefits; it should be connect to Internet through other interface in case of occurring to failure for currently activate interface, and it should share a mount of traffic efficiently per interface etc. This environment is called end node Multihoming. However, current most Internet protocols are designed originally with single interface in mind. So these potocols do not provide methods for supporting simultaneous diffentiated use of multiple access technologies. In this paper, firstly we have to refer technical consideration items to use multiple interfaces based on IPv6 simultaneously. And we should propose extended registration mechanism for multiple addresses being acquired from interfaces to support reliable accessibility and vertical handover.

Interference and Sink Capacity of Wireless CDMA Sensor Networks with Layered Architecture

  • Kang, Hyun-Duk;Hong, Heon-Jin;Sung, Seok-Jin;Kim, Ki-Seon
    • ETRI Journal
    • /
    • v.30 no.1
    • /
    • pp.13-20
    • /
    • 2008
  • We evaluate the sink capacity of wireless code division multiple access (CDMA) sensor networks with layered architecture. We introduce a model of interference at a sink considering two kinds of interference: multiple access interference (MAI) and node interference (NI). We also investigate the activity of sensor nodes around the sink in relation to gathering data under a layered architecture. Based on the interference model and the activity of sensor nodes around the sink, we derive the failure probability of the transmission from a source node located one hop away from the sink using Gaussian approximation. Under the requirement of 1% failure probability of transmission, we determine the sink capacity, which is defined as the maximum number of concurrent sensor nodes located one hop away from the sink. We demonstrate that as the node activity of the MAI decreases, the variation of the sink capacity due to the node activity of the NI becomes more significant. The analysis results are verified through computer simulations.

  • PDF

EEPB-MAC: Energy Efficient & Priority-Based MAC Protocol for Energy Harvesting Wireless Sensor Networks (에너지 수확 무선 센서 네트워크에서 에너지 효율 및 우선순위 기반의 MAC 프로토콜)

  • Kim, Seong-Cheol;Jeon, Jun-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.755-761
    • /
    • 2013
  • Medium access control (MAC) protocols for wireless sensor networks make sensor nodes on state for energy-efficiency only when necessary. In this paper we present an energy efficient priority-based MAC protocol for energy-harvesting Wireless Sensor Networks (WSNs). For support priority-based packet transmission the proposed EEPB-MAC protocol uses the modified IEEE 802.15.4 beacon frames including priority bit, sender node address, and NAV value fields. A receiver node periodically wakes up, receives sender beacon frames, selects data sending sender, and broadcasts a beacon frame containing the selected sender's address. A receiver node selects sender node according to sender's data priority. A receiver nodes also adjust wake up period based on their energy states. Hence, the energy consumption of receiver node can be minimized. Through simulations and analytical analysis, we evaluate the performance of our proposed the EEPB-MAC protocol and compare it against the previous MACs. Results have shown that our protocol outperforms other MAC in terms of energy consumption, higher priority packet delivery delay.

Design of QoS based MAC protocol considering data urgency for Energy harvesting wireless sensor networks (에너지 하베스팅 센서네트워크에서 데이터의 긴급성을 고려한 QoS기반 MAC프로코콜 설계)

  • Park, Gwanho;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.8
    • /
    • pp.1004-1010
    • /
    • 2019
  • In the EH-WSN (Energy harvesting wireless sensor network), a MAC (medium access control) protocol is required to select a relay node considering the power status of a node. Existing EH-WSN studies emphasize the power aspect, so it does not consider the QoS like the urgency of the sensed data. The required power and transmission delay must be changed according to the urgency so that the medium access control according to the data QoS can be performed. In case of relay node, relaying data without consideration of data urgency and node power may cause delay due to power shortage in case of urgent data. In this paper, we designed a MAC protocol that minimizes the power shortage that can occur during emergency data generation. For this, relay node requirements are set differently according to the urgency of data. The performance was analyzed through simulation. Simulation results show the reduced latency and improved reliability of urgent data transmission.

Buffer Invalidation Schemes for High Performance Transaction Processing in Shared Database Environment (공유 데이터베이스 환경에서 고성능 트랜잭션 처리를 위한 버퍼 무효화 기법)

  • 김신희;배정미;강병욱
    • The Journal of Information Systems
    • /
    • v.6 no.1
    • /
    • pp.159-180
    • /
    • 1997
  • Database sharing system(DBSS) refers to a system for high performance transaction processing. In DBSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory, a separate copy of operating system, and a DBMS. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. However, since multiple nodes may be simultaneously cached a page, cache consistency must be ensured so that every node can always access the latest version of pages. In this paper, we propose efficient buffer invalidation schemes in DBSS, where the database is logically partitioned using primary copy authority to reduce locking overhead. The proposed schemes can improve performance by reducing the disk access overhead and the message overhead due to maintaining cache consistency. Furthermore, they can show good performance when database workloads are varied dynamically.

  • PDF

A Study on Intelligent Edge Computing Network Technology for Road Danger Context Aware and Notification

  • Oh, Am-Suk
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.3
    • /
    • pp.183-187
    • /
    • 2020
  • The general Wi-Fi network connection structure is that a number of IoT (Internet of Things) sensor nodes are directly connected to one AP (Access Point) node. In this structure, the range of the network that can be established within the specified specifications such as the range of signal strength (RSSI) to which the AP node can connect and the maximum connection capacity is limited. To overcome these limitations, multiple middleware bridge technologies for dynamic scalability and load balancing were studied. However, these network expansion technologies have difficulties in terms of the rules and conditions of AP nodes installed during the initial network deployment phase In this paper, an intelligent edge computing IoT device is developed for constructing an intelligent autonomous cluster edge computing network and applying it to real-time road danger context aware and notification system through an intelligent risk situation recognition algorithm.

A Performance Modeling of Wireless Sensor Networks as a Queueing Network with On and Off Servers

  • Ali, Mustafa K. Mehmet;Gu, Hao
    • Journal of Communications and Networks
    • /
    • v.11 no.4
    • /
    • pp.406-415
    • /
    • 2009
  • In this work, we consider performance modeling of a wireless sensor network with a time division multiple access (TDMA) media access protocol with slot reuse. It is assumed that all the nodes are peers of each other and they have two modes of operation, active and sleep modes. We model the sensor network as a Jackson network with unreliable nodes with on and off states. Active and sleep modes of sensor nodes are modeled with on and off states of unreliable nodes. We determine the joint distribution of the sensor node queue lengths in the network. From this result, we derive the probability distribution of the number of active nodes and blocking probability of node activation. Then, we present the mean packet delay, average sleep period of a node and the network throughput. We present numerical results as well as simulation results to verify the analysis. Finally, we discuss how the derived results may be used in the design of sensor networks.

A Token-Ring-Based MAC Protocol in IEEE 802.11 WLANs (IEEE 802.11 무선 랜에서의 토큰링 기반의 매체 접속 제어 프로토콜)

  • Lee, Eun Guk;Rhee, Seung Hyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.38-40
    • /
    • 2014
  • In this paper, proposed method achieves delay reduction and throughput improvement by utilizing token-ring method in infrastructure network. Access Point gives token passing effect by successively transmitting ACK frame including a node's Association ID. Not only can this method considerably reduce time for medium access, but also improve throughput. Furthermore, AP offers more frequent medium access opportunity to node having highest data queue among nodes associated by AP. these method can evenly offer medium access opportunity according to Queue's volumes.

Performance analysis of BTB-TDMA considering asymmetry of propagation delays in UANets (수중 네트워크의 전파 비대칭성을 고려한 BTB-TDMA 성능 분석)

  • Cho, A-Ra;Yun, Changho;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.50-60
    • /
    • 2015
  • A Block-Time-Bounded Time Division Multiple Access (BTB-TDMA) medium access control protocol, which estimates the propagation delay of nodes according to their location and moving velocity information, has been proposed for underwater acoustic networks. BTB-TDMA provides nodes with their transmission schedules by a time block that is a time unit, newly designed for BTB-TDMA. In this paper, we investigate how the receiver collision, that is induced by the asymmetry between node's uplink and downlink propagation delay due to its mobility, affects the performance of BTB-TDMA. To do this, we analytically obtain the collision rate, the channel access delay, and the channel utilization by considering the asymmetry of propagation delay. Then, simulations are extensively performed with respect to the length of a time block by varying the number of nodes, the network range, and the node's velocity. Thus, the simulation results can suggest performance criteria to determine the optimal length of a time block which minimizes the collision rate and concurrently maximizes the channel access delay and the channel utilization.

A Multi-hop routing protocol for bluetooth devices (블루투스 멀티 홉 라우팅 프로토콜)

  • Yang, Il-Sik;Kim, Myung-Gyu;Son, Ji-Yeon;Park, Jun-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.448-450
    • /
    • 2005
  • A ubiquitous network allows all users to access and exchange information of any kind freely at any time, from anywhere, and from any appliance through the use of broadband and mobile access. Bluetooth commincation can provide the missing wireless extension to the heterogeneous network, allowing a more ubiquitous access. In this point of view, the BT specifications define ways for which each BT device can set up multiple connections with neighboring devices to communicate in a multi-hop fashion. this paper provides insights on the Bluetooth technology and on some limitations of the scatternet formations. so that, we describe a new multi-hop routing protocol for the establishment of scatternets. this protocol defines rules for forming a multi-hop topology in two phases. the first phase, topology discovery, concerns the discovery of the node's depth from a root node initiating inquiry process. the second phase forms scatternet topology based on the result of topology discovery.

  • PDF