• Title/Summary/Keyword: Beacon Interval

Search Result 31, Processing Time 0.039 seconds

An Empirical Study of the Beacon Interval based on Mobility in Sensor Network Localization System (센서 네트워크 기반의 위치 인식 시스템에서 이동성을 고려한 비콘 주기에 관한 실험 연구)

  • Kim, Jong-Hyun;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.449-452
    • /
    • 2007
  • 센서네트워크 기반의 위치 인식 시스템은 주변 센서 노드들로부터 거리 정보를 받아 위치를 산출한다. 현재 위치 인식 시스템에서 비콘 주기는 이동성을 고려하지 않고 있다. 본 논문에서는 비콘 주기에 따른 수신 데이터양과 이동성에 따른 거리 산출 성능을 실험을 통해 분석하였다. 이러한 실험을 통해 짧은 비콘 주기에서는 수신 데이터가 증가하지만 고속의 이동 환경에서는 에러율이 급격히 증가함을 확인 할 수 있었다. 이동성에 따라 비콘 주기를 변화시켜 실험을 수행하고, 수신된 데이터의 에러율과 유효 데이터를 근거로 속도에 따라 비콘 주기를 조절할 필요성이 있음을 확인 하였다.

  • PDF

Dynamic Adjustment of Ad hoc Traffic Indication Map(ATIM) window to save Power in IEEE 802.11 DCF

  • Nam, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.3
    • /
    • pp.343-347
    • /
    • 2008
  • Wakeup schemes that turn off sensors' radio when communication is not necessary have great potential in energy saving. At the start of each beacon interval in the IEEE 802.11 power saving mode specified for DCF, each node periodically wakes up for duration called the ATIM Window. However, in the power saving mechanism specified in IEEE 802.11, all nodes use the same ATIM window size. Since the ATIM window size critically affects throughput and energy consumption, a fixed ATIM window does not perform well in all situations. This paper proposes an adaptive mechanism to dynamically choose an ATIM window size according to network condition. Simulation results show that the proposed scheme outperforms the IEEE 802.11 power saving mechanism in terms of the amount of power consumed and the packet delivery ratio.

The Probability Based Ordered Media Access (IEEE 802-15.4에서 우선순위 IFS를 이용한 확률기반 매체 접근 방법)

  • Jean, Young-Ho;Kim, Jeong-Ah;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.321-323
    • /
    • 2006
  • The IEEE 802.15.4 uses a CSMA/CA algorithm on access of media. The CSMA/CA algorithm does Random Backoff before the data is transmitted to avoid collisions. The random backoff is a kind of unavoidable delays and introduces the side effect of energy consumptions. To cope with those problems we propose a new media access algorithm, the Priority Based Ordered Media Access (PBOMA) algorithm, which uses different IFSs. The PBOMA algorithm uses Sampling Rate and Beacon Interval to get a different access probability(or IFS). The access probability is higher, the IFS is shorter. Note that The transfer of urgent data uses tone signal to transmit it immediately. The proposed algorithm is expected to reduce the energy consumptions and the delay.

  • PDF

A Study on Optimizing IEEE 802.15.4 Cluster-Tree Topology for Real-Time Wireless Sensor Networks (실시간 무선 센서 네트워크에서 IEEE 802.15.4 클러스터 트리 기반의 토폴로지 최적화에 관한 연구)

  • Park, Myung-Gon;Kim, Kang-Wook;Lee, Chang-Gun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.231-235
    • /
    • 2010
  • IEEE 802.15.4 무선 센서 네트워크는 표적 추적, 재난 관리 등의 실시간 시스템 구축을 위한 기술로써 그 수요가 증가하고 있다. 전체 네트워크의 수명을 최대화하기 위해서 네트워크 토폴로지, 각 노드의 Beacon Interval(BI)과 Superframe Duration(SD), 그리고 송신 출력을 고려해야한다. 본 논문에서는 클러스터 트리 기반의 IEEE 802.15.4 무선 센서 네트워크에서 실시간성 데이터의 종단간 데드라인을 결정적으로 보장하고 각 노드의 전력 소모량을 줄여 전체 네트워크의 수명을 최대화하기 위해 고려해야할 파라미터를 소개하고 이에 대해 논의한다.

  • PDF

Real-time Alert Service for Infant Location Management Using Beacon Technology (비콘 기술을 적용한 유아 위치관리 실시간 알림 서비스)

  • Baek, Yu-Jin;Lee, Hyo-Seung;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.205-210
    • /
    • 2020
  • Children should be provided with the right to be protected by adults, related organizations, or countries because they lack power, situation recognition ability, and situation judgment ability compared to adults. Also, children's accidents and accidents caused by neglect of management occur every year. Currently, there are about 3 to 20 children managed by one teacher in a daycare center, and it is very difficult for teachers to care for all children as many children have to be managed. Especially, when outdoor activities are conducted in open space, children's activities are expanded compared to the in-house, and children who do not follow the control of the in-house teacher may occur, so there is a limit to the control and management of children depending on the viewpoint of teachers. In this study, we designed and implemented IoT terminal and system to provide safety to children and to provide convenience to guardians and teachers by systemizing the location or interval between children and in-service teachers using portable devices that can communicate with each other. It is hoped that this will contribute to the safety of infants.

Frame/Slot Allocation Method for Real-time Traffic in IEEE 802.15.4 Wireless Sensor Networks (IEEE 802.15.4 무선센서네트워크의 실시간 트래픽 처리를 위한 프레임/슬롯 할당방법)

  • Kim, Hyung-Seok
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.3
    • /
    • pp.49-56
    • /
    • 2007
  • The IEEE 802.15.4 low rate wireless personal area network is a protocol suitable for wireless sensor networks. Thus there has been growing interest in the IEEE 802.15.4 protocol in the home automation networks. This paper proposes a scheduling scheme obtaining optimal parameters regarding the IEEE 802.15.4 frame and subframes in the home automation networks. Guaranteed time slots (GTS) are exploited for the delivery of real-time traffic. Given a set of the requirements for bandwidths and periods assigned to nodes in the network, the beacon interval and the active/inactive subframe duration satisfying the requirements are selected considering the low duty cycle by the proposed scheme. Based on these parameters, analytic results provide the way to efficient use of network resources including energy.

Real Time Linux System Design (리얼 타임 리눅스 시스템 설계)

  • Lee, Ah Ri;Hong, Seon Hack
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.13-20
    • /
    • 2014
  • In this paper, we implemented the object scanning with nxtOSEK which is an open source platform. nxtOSEK consists of device driver of leJOS NXJ C/Assembly source code, TOPPERS/ATK(Automotive real time Kernel) and TOPPERS/JSP Real-Time Operating System source code that includes ARM7 specific porting part, and glue code make them work together. nxtOSEK can provide ANSI C by using GCC tool chain and C API and apply for real-time multi tasking features. We experimented the 3D scanning with ultra sonic and laser sensor which are made directly by laser module diode and experimented the measurement of scanning the object by knowing x, y, and z coordinates for every points that it scans. In this paper, the laser module is the dimension of $6{\times}10[mm]$ requiring 5volts/5[mW], and used the laser light of wavelength in the 650[nm] range. For detecting the object, we used the beacon detection algorithm and as the laser light swept the objects, the photodiode monitored the ambient light at interval of 10[ms] which is called a real time. We communicated the 3D scanning platform via bluetooth protocol with host platform and the results are displayed via DPlot graphic tool. And therefore we enhanced the functionality of the 3D scanner for identifying the image scanning with laser sensor modules compared to ultra sonic sensor.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

Design of Scheduling Superframe based on IEEE 802.15.4 MAC using LQI (LQI를 이용한 IEEE 802.15.4 MAC 기반의 스케줄링 슈퍼프레임 설계)

  • Chon, Young-Jo;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.159-164
    • /
    • 2016
  • This paper proposes an improved superframe structure with one : N situation of the network as a target for efficiency battery and communication performance used in the existing standard IEEE 702.15.4 MAC layer. The proposed superframe transforms and adds a two structures. First, we add the proposed scheduling interval after the arrival of the beacon. Second, we change to a structure in which one of the contention access period is divided into two. The contention access period and the contention-free access period of active portion are divided according to the LQI value of the device. Through this system-level simulation written by $c{^+^+}$, as a results show that the battery consumption and transmission performance has been increased.

Improved MAC Protocol Synchronization Algorithm using Compensating value in Wireless Mesh Networks (무선메쉬네트워크환경에서 보정계수를 이용한 MAC프로토콜 동기화 개선 알고리즘)

  • Yun, Sang-Man;Lee, Soon-Sik;Lee, Sang-Wook;Jeon, Seong-Geun;Lee, Woo-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2218-2226
    • /
    • 2009
  • TDMA based MAC protocol supporting wireless mesh network has many advantage rather than 802.11 DCF/EDCA protocol based on packet. But TDMA based MAC protocol require new synchronization method because of mobile point oscillator's difference, and distributed environments. This thesis propose synchronization method for TDMA based MAC protocol. It divides MP(Mobile Points) states into 4 types. If MP is in sync mode, it schedules TDMA local start time in time skew interval using beacon. It proposes compensation algorithms to compensate time skew caused by clock drift. This proposal show that general time error and clock drift rate value reduced and get synchronized result.