• Title/Summary/Keyword: Broadcasting Protocol

Search Result 492, Processing Time 0.026 seconds

Middleware API Design for CoAP Usage (CoAP 사용을 위한 미들웨어 API 설계)

  • Kwon, Hak;Ra, Younggook;Jo, JaeDeok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.119-126
    • /
    • 2017
  • Developing the TCP/IP standard IBA which is higher organization of IETF decided to attach the TCP/IP protocol stack to small things, such as sensor. This means small object is also considered as on of the communication node, it has symbolic meaning that expand smart object has all five layer. Under this background, IoT/WoT configure the intelligent network between objects based on the internet to communication was introduced. Things has own IP address on IoT environment and are smart object that a lot of people communicate over the internet on Application Layer. In other words, IoT is that smart object are commercialized space. According to the interest of IoT, IETF establish CoAP for use as IoT protocol. CoAP is expected that standard protocols created by things is connected to the Internet protocol that can be used within a constrained environment. Accordingly, in this paper, we proposed Middleware API that can manage and collect the data of objects that connected CoAP network.

A Performance Comparison of Flooding Schemes in Wireless Sensor Networks (무선센서네트워크에서 플러딩 기법의 성능평가)

  • Kim, Kwan-Woong;Cho, Juphil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.153-158
    • /
    • 2016
  • Broadcasting in multi-hop wireless sensor networks is a basic operation that supports many applications such as route search, setting up addresses and sending messages from the sink to sensor nodes. The broadcasting using flooding causes problems that can be mentioned as a broadcasting storm such as redundancy, contention and collision. A variety of broadcasting schemes using wireless sensor networks have been proposed to achieve superior performance rather than simple flooding scheme. Broadcasting algorithms in wireless sensor networks can be classified into six subcategories: flooding scheme, probabilistic scheme, counter-based scheme, distance-based scheme, location-based schemes, and neighbor knowledge-based scheme. This study analyzes a simple flooding scheme, probabilistic scheme, counter-based scheme, distance-based scheme, and neighbor knowledge-based scheme, and compares the performance and efficiency of each scheme through network simulation.

A Scheduling System for MPEG-2 Digital Broadcasting (MPEG-2 디지털 방송을 위한 송출 스케줄링 시스템)

  • Bang, Jin-Suk;Hwang, Kyung-Min;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.240-246
    • /
    • 2008
  • It has able to be possible that expression and store visual image from analog to digital without picture quality damaged via improvement of video compression technology. And also, It is possible to broadcasting digital image via transmission of digital image on MPEG-2 standardization. For this reason, the broadcasting business owners have converted broadcasting service from analog to digital. But, local SO(System Operator) has a difficult point which secure HD(High Definition) broadcasting program. In this paper, we designed and implemented Scheduling System for MPEG-2 Digital Broadcasting which gather HD broadcasting program from major broadcasting business owners and broadcast them.

An Enhanced WLAN MAC Protocol for Directional Broadcast (지향성 브로드캐스트를 위한 무선 LAN MAC 프로토콜)

  • Cha, Woo-Suk;Cho, Gi-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.16-27
    • /
    • 2006
  • The wireless transmission medium inherently broadcasts a signal to all neighbor nodes in the transmission range. Existing asynchronous MAC protocols do not provide a concrete solution for reliable broadcast in link layer. This mainly comes from that an omni-directional broadcasting causes to reduce the network performance due to the explosive collisions and contentions. This paper proposes a reliable broadcast protocol in link taller based on directional antennas, named MDB(MAC protocol for Directional Broadcasting). This protocol makes use of DAST(Directional Antennas Statement Table) information and D-MACA(Directional Multiple Access and Collision Avoidance) scheme through 4-way handshake to resolve the many collision problem wit]1 omni-directional antenna. To analyze its performance, MDB protocol is compared with IEEE 802.11 DCF protocol [9] and the protocol 2 of reference [3], in terms of the success rate of broadcast and the collision rate. As a result of performance analysis through simulation, it was confirmed that the collision rate of the MDB protocol is lower than those of IEEE 802.11 and the protocol 2 of reference [3], and that the completion rate of broadcast of MDB protocol is higher than those of IEEE 802.11 and the protocol 2 of reference [3].

Power of a Defer Timer for the design of broadcasting protocol in Wireless Sensor Networks

  • Kim, Bo-Nam;Lee, In-Sung;Yang, Jun-Mo;Lee, Jin-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.470-473
    • /
    • 2007
  • Wireless Sensor Networks (WSNs) have merged to become one of the most promising applications of wireless ad hoc networks. A defer timer has been used in some of existing network protocols to solve a set of problems in WSNs. We first investigate the use of a defer timer to fully take the advantage of it in WSNs. We demonstrate that by properly setting up the defer timers, many difficult issues in sensor networks, such as power limitation, the broadcast storm problem, and the construction of the virtual backbone, can be easily tackled with only the help of simple localized information at each node. In this paper, we present the power of a defer timer in the design of dominating set construction protocol for broadcasting. The ns 2 computer simulations are carried out for performance study.

  • PDF

Development of Verification and Interface Application for Interactive Data Broadcasting Middleware (양방향 데이터 방송 미들웨어를 위한 검증 및 정합 애플리케이션 개발)

  • Lee, Won-Joo;Lee, Ju-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.55-64
    • /
    • 2009
  • In this paper, we design and implement verification and interface application for interactive data broadcasting middleware. This application implements ACAP and OCAP verification item according to their types (format, protocol. resource, presentation). Therefore, using this application, we can verify whether digital settop-boxes used in digital terrestrial television and digital cable television conforms to the ACAP and OCAP standards. In this paper, we evaluate our proposed application using TVPLUSiTM verifier which can verify interactive TV application in real broadcasting environment. Through performance evaluation, we show that the DTB-H650F set-top-box supports OCAP and ACAP standard 80% and 95%, respectively.

Channel Coding Based Physical Layer Security for Wireless Networks (채널 부호화를 통한 물리계층 무선네트워크 보안기술)

  • Asaduzzaman, Asaduzzaman;Kong, Hyung Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.57-70
    • /
    • 2008
  • This paper introduces a new paradigm of physical layer security through channel coding for wireless networks. The well known spread spectrum based physical layer security in wireless network is applicable when code division multiple access (CDMA) is used as wireless air link interface. In our proposal, we incorporate the proposed security protocol within channel coding as channel coding is an essential part of all kind of wireless communications. Channel coding has a built-in security in the sense of encoding and decoding algorithm. Decoding of a particular codeword is possible only when the encoding procedure is exactly known. This point is the key of our proposed security protocol. The common parameter that required for both encoder and decoder is generally a generator matrix. We proposed a random selection of generators according to a security key to ensure the secrecy of the networks against unauthorized access. Therefore, the conventional channel coding technique is used as a security controller of the network along with its error correcting purpose.

  • PDF

A Study on NEMO-partially DMM based E2E Seamless Data Integration Transmission Scheme in SOC Public Infrastructures

  • Ryu, Wonmo;Caytiles, Ronnie D.;Park, Byungjoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.33-41
    • /
    • 2020
  • Nowadays, distributed mobility management (DMM) approaches have been widely adopted to address the limitations of centralized architectural methods to support seamless data transmission schemes in wireless sensor networks. This paper deals with the end-to-end (E2E) integration of Network Mobility (NEMO) basic support protocol in distributed wireless sensor network systems in structural health and environmental monitoring of social overhead capital (SOC) public infrastructures such as bridges, national highways, tunnels, and railroads. The proposed scheme takes advantage of the features of both the NEMO basic support protocol and partially distributed network-based DMM framework in providing seamless data transmission and robust mobility support. The E2E seamless data transmission scheme allows mobile users to roam from fixed-point network access locations and mobile platforms (i.e., vehicles such as cars, buses, and trains) without disconnecting its current sessions (i.e., seamless handover).

Proxy-AAA Authentication Scheme with Forwarding Mode Supporting in PMIPv6 Networks

  • Han, JeongBae;Jeong, Jongpil;Jo, Jun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.2
    • /
    • pp.18-22
    • /
    • 2013
  • Mobile IPv6 (MIPv6) is a host-based protocol supporting global mobility while Proxy Mobile IPv6 (PMIPv6) is a network-based protocol supporting localized mobility. This paper makes its focus on how to reduce the longer delay and extra cost arising from the combination of authentication, authorization and accounting (AAA) and PMIPv6 further. Firstly, a novel authentication scheme (Proxy-AAA) is proposed, which supports fast handover mode and forwarding mode between different local mobility anchors (LMAs). Secondly, a cost analysis model is established based on Proxy-AAA. From the theoretical analysis, it could be noted that the cost is affected by average arrival rate and residence time.

Improvement of cluster head selection method in L-SEP

  • Jin, Seung Yeon;Jung, Kye-Dong;Lee, Jong-Yong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.51-58
    • /
    • 2017
  • This paper deals with the improvement of cluster head selection method in L-SEP for heterogeneous nodes among hierarchical routing protocols of wireless sensor network. Wireless sensor networks are classified into homogeneous and heterogeneous network. In heterogeneous network, SEP, L-SEP are mainly used because cluster head selection probability is different depending on node type. But, since protocol based on SEP has different cluster head selection probabilities depending on the node type, clusters that transmit data inefficiently can be formed. to improve this, it is necessary to select the cluster head that minimizes the transmission distance of member node and the cluster head. Therefore, we propose a protocol that improve the cluster head selection method.