• Title/Summary/Keyword: Beacon Mode

Search Result 55, Processing Time 0.029 seconds

Three-Dimensional Location Tracking System for Automatic Landing of an Unmanned Helicopter (무인 헬기 자동 착륙을 위한 3차원 위치 추적 시스템)

  • Choo, Young-Yeol;Kang, Seong-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.6
    • /
    • pp.608-614
    • /
    • 2008
  • This paper describes a location tracking system to guide landing process of an Unmanned Helicopter(UMH) exploiting MIT Cricket nodes. For automatic landing of a UMH, a precise positioning system is indispensable. However, GPS(Global Positioning System) is inadequate for tracking the three dimensional position of a UMH because of large positioning errors. The Cricket systems use Time-Difference-of-Arrival(TDoA) method with ultrasonic and RF(Radio Frequency) signals to measure distances. They operate in passive mode in that a listener attached to a moving device receives distance signals from several beacons located at fixed points on ground. Inevitably, this passive type of implementation causes large disturbances in measuring distances between beacons and the listener due to wind blow from propeller and turbulence of UMH body. To cope with this problem, we proposed active type of implementation for positioning a UMH. In this implementation, a beacon is set up at UMH body and four listeners are located at ground area at least where the UMH will land. A pair of Ultrasonic and RF signals from the beacon arrives at several listeners to calculate the position of the UMH. The distance signals among listeners are synchronized with a counter value appended to each distance signals from the beacon.

Low Power Wireless Interfacing Scheme Controlling Virtual Bitmap in IEEE 802.11b (IEEE 802.11b에서 가상비트맵을 제어하는 저전력 무선 접속 기법)

  • Song Myong-Lyol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1A
    • /
    • pp.65-71
    • /
    • 2006
  • In IEEE 802.11b wireless network, the access point(AP) sends beacons periodically to manage stations when they are running in low power mode. Stations contend for the transmission medium after they receive a beacon and continuously check its state until it becomes available. Thus the energy consumption of each station increases as the load of wireless network. In this paper, we propose a method to reduce energy consumption controlling virtual bitmap in wireless network with multiple stations. The problems of low power mode in IEEE 802.11b wireless interface are described and a new method to reduce energy consumption is proposed. The proposed method is simulated with the network simulator, ns2, and compared with the low power mode of the IEEE 802.11b. The result measured in terms of station's wakeup time shows some enhancement in energy consumption when multiple stations are communicating through the AP in wireless network.

SB-MAC : Energy efficient Sink node Based MAC protocol for Wireless Sensor Networks (무선 센서 네트워크 에서 에너지 효율적인 싱크노드 기반 MAC 프로토콜)

  • Jeon, Jun-Heon;Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.177-182
    • /
    • 2014
  • In this paper, we propose an energy efficient sink node based MAC protocol for Wireless Sensor Networks (WSNs). The proposed sink node-based MAC (SB-MAC) protocol uses a RB(rapid beacon) frame to save sender's energy consumption and to reduce transmission delay. The RB frame is a modified IEEE 802.15.4 beacon frame. The RB frame contains the length of the sender nodes data. Using this information other nodes except sender and receiver nodes can be stay sleep mode long time to reduce energy consumption. Results have shown that the SB-MAC protocol outperformed other protocols like X-MAC and RI-MAC in terms of packet delivery delay and energy consumption. The SB-MAC protocol is especially energy efficient for the networks with one sink node and many senders.

An Transmission Time Allocation Scheme in ZigBee Network (지그비 네트워크에서의 전송 시간 할당 방법)

  • Choi, Hyo-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.119-126
    • /
    • 2011
  • When ZigBee network supports beacon transmission mechanism, ZigBee devices have the restriction of the transmission range from the coordinator. On the contrary, when it does not support beacon transmission, it is not easy to save the energy through turning into sleep mode. This paper proposes active slot allocation method that allocates a transmission time and does not use the beacon transmission mechanism. It is based on the ZigBee's distributed address assignment mechanism and supports the scalability. This paper explains the active slot structure and the allocation order and describes the operation of ZigBee devices. We verify the proposed mechanism through the simulation and show the performance evaluation. It can be useful on the industrial automation and the environmental surveillance.

Implementation of Indoor Positioning System using Raspberry Pi and RSSI Scanner (라즈베리파이와 RSSI 스캐너를 활용한 실내측위 시스템 구현)

  • Lee, Sung-jin;Choi, Jun-hyeong;Choi, Byeong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.640-642
    • /
    • 2021
  • In order to collect a lot of data clearly and efficiently, it is essential to know the locations of the current facilities and analyze the movement data. The current location collection technology can collect data using a GPS (Global Positioning System) sensor, but in the case of GPS, it has strong straightness and low diffraction and reflectivity, making it difficult to position indoors. It is impossible to measure the distance between the server and the client because the signal sensitivity cannot be received. This paper implements an indoor positioning system using beacons and scanners in Raspberry Pi 3 B+. It controls Advertise Mode and Connection Mode at the same time using the scanner algorithm.

  • PDF

A Warning System Using Marker Beacon to Avoid Hazardous Area in VFR Mode (마커를 이용한 시계비행 항공기의 비행 위험지역 회피용 경보장치)

  • Seo, B.S.;Kim, Y.M.;Kang, J.Y.;Yun, T.W.;Hwang, B.W.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.12 no.3
    • /
    • pp.1-12
    • /
    • 2004
  • When a straight-in landing from an instrument approach using ILS or VOR/DME is not possible or desirable because of topographical reason or bad weather, a circling approach maneuver is initiated by the pilot to align the aircraft with a runway for landing. Visual contact with the runway is necessary while conducting a circle to land maneuver. This research is to develop a new warning system based on a conventional marker system which alerts pilots to watch out for exceeding the circling approach area. The airborne system also uses the same receiver unit without any new installations. The objective of this research is to design and develop a Yagi antenna in a special form. The research includes computer simulations to determine the size of antenna radiation pattern and to compute an expected flight path in case of alarm to validate effectiveness of the system.

  • PDF

A new MAC protocol to improve a performance in IEEE 802.11 wireless LANs (IEEE 802.11 무선 랜의 성능 향상을 위한 새로운 MAC프로토콜)

  • Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.759-764
    • /
    • 2009
  • A new backoff scheme for infrastructure mode in IEEE 802.11 wireless LANs is proposed to improve a performance. Each station generates a unique backoff number using total number of stations, fairness parameter included in beacon frame and an user's ID that is assigned by AP. The station sends a packet after its own backoff number of idle slots, which makes a collision free access among stations within AP's coverage. The proposed method shows better performance in the view of channel utilization and packet delay than an original IEEE 802.11 CSMA/CA backoff scheme.

Design and Implementation of Low Power Container Security Device based on IEEE 802.15.4 (IEEE 802.15.4 기반 저전력 컨테이너 보안장치의 설계 및 구현)

  • Park, Se-Young;Kim, Taek-Hyun;Choi, Hoon;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.215-224
    • /
    • 2010
  • A container security device (CSD) monitors intrusions through the cargo door; it is a reduced function device that uses IEEE 802.15.4 with a beacon mode. However, in the beacon mode, the CSD consumes too much battery power in periodical idle listening and sensing trials. Moreover, the CSD cannot send the message to the CSD reader actively, and it makes big latency problem. Therefore, we propose a low-power CSD to reduce the unnecessary power consumption. The proposed CSD follows the requirements of the U.S. Department of Homeland Security, and reduces battery consumption through a power-efficient hardware design, a night-watch mechanism for low-power operation and low-power sensing to reduce unnecessary monitoring. And the CSD sends alert message to the CSD reader. Simulation results show that our CSD reduces battery consumption by over 70% through the night-watch mechanism and by approximately 80% through the low-power sensing. And the CSD can send the alert message to the remote CSD reader by over 94%.

Combination-mode BLE Device Profile for Connection & Non-connection Methods

  • Jiang, Guangqiu;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.897-899
    • /
    • 2016
  • In recent years, BLE technology has received extensive attention and has been applied to all aspects of life. The existing BLE device has two methods, one is the connection method, and the other is a non-connection method. The representative profile of the connection method is the proximity file. The most typical example of Non-connection method BLE device is a beacon. However, they are both independent and have their own shortcomings. Connection method device can provide service for only one user, others can't use. Security performance of Non-connection method BLE device is poor and the device can't be controlled by the user. In this paper, a combination-mode BLE device profile design scheme is presented, which combines with the previous two methods, and solves the defaults. And We define a dual purpose advertising package that can be used in a normal environment as well as in a disaster environment. Finally, a unidirectional Control idea is proposed. Through performance evaluation, we found that the device has strong stability and low power consumption.

Relaying Protocols and Delay Analysis for Buffer-aided Wireless Powered Cooperative Communication Networks

  • Zhan, Jun;Tang, Xiaohu;Chen, Qingchun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3542-3566
    • /
    • 2018
  • In this paper, we investigate a buffer-aided wireless powered cooperative communication network (WPCCN), in which the source and relay harvest the energy from a dedicated power beacon via wireless energy transfer, then the source transmits the data to the destination through the relay. Both the source and relay are equipped with an energy buffer to store the harvested energy in the energy transfer stage. In addition, the relay is equipped with a data buffer and can temporarily store the received information. Considering the buffer-aided WPCCN, we propose two buffer-aided relaying protocols, which named as the buffer-aided harvest-then-transmit (HtT) protocol and the buffer-aided joint mode selection and power allocation (JMSPA) protocol, respectively. For the buffer-aided HtT protocol, the time-averaged achievable rate is obtained in closed form. For the buffer-aided JMSPA protocol, the optimal adaptive mode selection scheme and power allocation scheme, which jointly maximize the time-averaged throughput of system, are obtained by employing the Lyapunov optimization theory. Furthermore, we drive the theoretical bounds on the time-averaged achievable rate and time-averaged delay, then present the throughput-delay tradeoff achieved by the joint JMSPA protocol. Simulation results validate the throughput performance gain of the proposed buffer-aided relaying protocols and verify the theoretical analysis.