• Title/Summary/Keyword: Critical Node

Search Result 284, Processing Time 0.026 seconds

Overhearing Energy Efficient Wakeup Schemes in Wireless Sensor Networks (무선 센서 네트워크에서 엿듣기 에너지 효율을 위한 기동 방식)

  • Lee, Byoung-Yong;Moon, Phil-Joo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.131-136
    • /
    • 2010
  • Reducing the energy consumed by sensor node is a critical issue in wireless sensor networks. In particular, energy in each sensor node is too limited to waste on overhearing of packets that are not relevant. In this paper, we propose a wakeup scheme to reduce overhearing energy through the wakeup time difference between neighboring nodes. Other research papers on wakeup schemes usually focus on decreasing the latency. We propose a technique to reduce wasted energy for overhearing using the wakeup scheme. Simulation results indicate that our proposed wakeup scheme improves the sensor network lifetime.

A Data Burst Assembly Algorithm in Optical Burst Switching Networks

  • Oh, Se-Yoon;Hong, Hyun-Ha;Kang, Min-Ho
    • ETRI Journal
    • /
    • v.24 no.4
    • /
    • pp.311-322
    • /
    • 2002
  • Presently, optical burst switching (OBS) technology is under study as a promising solution for the backbone of the optical Internet in the near future because OBS eliminates the optical buffer problem at the switching node with the help of no optical/electro/optical conversion and guarantees class of service without any buffering. To implement the OBS network, there are a lot of challenging issues to be solved. The edge router, burst offset time management, and burst assembly mechanism are critical issues. In addition, the core router needs data burst and control header packet scheduling, a protection and restoration mechanism, and a contention resolution scheme. In this paper, we focus on the burst assembly mechanism. We present a novel data burst generation algorithm that uses hysteresis characteristics in the queueing model for the ingress edge node in optical burst switching networks. Simulation with Poisson and self-similar traffic models shows that this algorithm adaptively changes the data burst size according to the offered load and offers high average data burst utilization with a lower timer operation. It also reduces the possibility of a continuous blocking problem in the bandwidth reservation request, limits the maximum queueing delay, and minimizes the required burst size by lifting up data burst utilization for bursty input IP traffic.

  • PDF

Equilibrium Point and Stability of Double-Free-Nodes Space Truss Under Symmetric Condition (대칭 조건을 갖는 2-자유절점 공간 트러스의 평형점과 안정성)

  • Ha, Junhong;Shon, Sudeok;Lee, Seungjae;Hwang, Kyung-Ju
    • Journal of Korean Association for Spatial Structures
    • /
    • v.19 no.4
    • /
    • pp.69-76
    • /
    • 2019
  • A stadium roof that uses the pin-jointed spatial truss system has to be designed by taking into account the unstable phenomenon due to the geometrical non-linearity of the long span. This phenomenon is mainly studied in the single-free-node model (SFN) or double-free-node model (DFN). Unlike the simple SFN model, the more complex DFN model has a higher order of characteristic equations, making analysis of the system's stability complicated. However, various symmetric conditions can allow limited analysis of these problems. Thus, this research looks at the stability of the DFN model which is assumed to be symmetric in shape, and its load and equilibrium state. Its governing system is expressed by nonlinear differential equations to show the double Duffing effect. To investigate the dynamic behavior and characteristics, we normalize the system of the model in terms of space and time. The equilibrium points of the system unloaded or symmetrically loaded are calculated exactly. Furthermore, the stability of these points via the roots of the characteristic equation of a Jacobian matrix are classified.

A Flexible Branch and Bound Method for the Job Shop Scheduling Problem

  • Morikawa, Katsumi;Takahashi, Katsuhiko
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.4
    • /
    • pp.239-246
    • /
    • 2009
  • This paper deals with the makespan minimization problem of job shops. The problem is known as one of hard problems to optimize, and therefore, many heuristic methods have been proposed by many researchers. The aim of this study is also to propose a heuristic scheduling method for the problem. However, the difference between the proposed method and many other heuristics is that the proposed method is based on depth-first branch and bound, and thus it is possible to find an optimal solution at least in principle. To accelerate the search, when a node is judged hopeless in the search tree, the proposed flexible branch and bound method can indicate a higher backtracking node. The unexplored nodes are stored and may be explored later to realize the strict optimization. Two methods are proposed to generate the backtracking point based on the critical path of the current best feasible schedule, and the minimum lower bound for the makespan in the unexplored sub-problems. Schedules are generated based on Giffler and Thompson's active schedule generation algorithm. Acceleration of the search by the flexible branch and bound is confirmed by numerical experiment.

A Process Management Framework for Design and Manufacturing Activities in a Distributed Environment (분산 환경하의 설계 및 제조활동을 위한 프로세스관리기법 연구)

  • Park, Hwa-Kyu;Kim, Hyun;Oh, Chi-Jae;Jung, Moon-Jung
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.21-37
    • /
    • 1997
  • As the complexity in design and manufacturing activities of distributed virtual enterprises rapidly increases, the issue of process management becomes more critical to shorten the time-to-market, reduce the manufacturing cost and improve the product quality. This paper proposes a unified framework to manage design and manufacturing processes in a distributed environment. We present a methodology which utilizes process flow graphs to depict the hierarchical structure of workflows and process grammars to represent various design processes and design tools. To implement the proposed concept, we develop a process management system which mainly consists of a cockpit and manager programs, and we finally address a preliminary implementation procedure based on the Object Modeling Technique. Since the proposed framework can be a formal approach to the process management by providing formalism, parallelism, reusability, and flexibility, it can be effectively applied to further application domains of distributed virtual enterprises.

  • PDF

Clustering Ad hoc Network Scheme and Classifications Based on Context-aware

  • Mun, Chang-Min;Lee, Kang-Whan
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.475-479
    • /
    • 2009
  • In ad hoc network, the scarce energy management of the mobile devices has become a critical issue in order to extend the network lifetime. Current research activity for the Minimum Energy Multicast (MEM) problem has been focused on devising efficient centralized greedy algorithms for static ad hoc networks. In this paper, we consider mobile ad hoc networks(MANETs) that could provide the reliable monitoring and control of a variety of environments for remote place. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. In this paper, we propose a new method, the CACH(Context-aware Clustering Hierarchy) algorithm, a hybrid and clustering-based protocol that could analyze the link cost from a source node to a destination node. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. The proposed CACH could use localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient. As a result, our simulation results would show that CACH could find energy efficient depth of hierarchy of a cluster.

Design and Verification using Energy Consumption Model of Low Power Sensor Network for Monitoring System for Elderly Living Alone (독거노인 모니터링 시스템을 위한 저전력 센서 네트워크 설계 및 에너지 소모 모델을 이용 검증)

  • Kim, Yong-Joong;Jung, Kyung-Kwon
    • Journal of IKEEE
    • /
    • v.13 no.3
    • /
    • pp.39-46
    • /
    • 2009
  • Wireless sensor networks consist of small, autonomous devices with wireless networking capabilities. In order to further increase the applicability in real world applications, minimizing energy consumption is one of the most critical issues. Therefore, accurate energy model is required for the evaluation of wireless sensor networks. In this paper we analyze the power consumption for wireless sensor networks. To develop the power consumption model, we have measured the power characteristics of commercial Kmote node based on TelosB platforms running TinyOS. Based on our model, the estimated lifetime of a battery powered sensor node can use about 6.9 months for application of human detection using PIR sensors. This result indicates that sensor nodes can be used in a monitoring system for elderly living alone.

  • PDF

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

Static Worst-Case Energy and Lifetime Estimation of Wireless Sensor Networks

  • Liu, Yu;Zhang, Wei;Akkaya, Kemal
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.2
    • /
    • pp.128-152
    • /
    • 2010
  • With the advance of computer and communication technologies, wireless sensor networks (WSNs) are increasingly used in many aspects of our daily life. However, since the battery lifetime of WSN nodes is restricted, the WSN lifetime is also limited. Therefore, it is crucial to determine this limited lifetime in advance for preventing service interruptions in critical applications. This paper proposes a feasible static analysis approach to estimating the worstcase lifetime of a WSN. Assuming known routes with a given sensor network topology and SMAC as the underlying MAC protocol, we statically estimate the lifetime of each sensor node with a fixed initial energy budget. These estimations are then compared with the results obtained through simulation which run with the same energy budget on each node. Experimental results of our research on TinyOS applications indicate that our approach can safely and accurately estimate worst-case lifetime of the WSN. To the best of our knowledge, our work is the first one to estimate the worst-case lifetime of WSNs through a static analysis method.

LOCATION UNCERTAINTY IN ASSET TRACKING USING WIRELESS SENSOR NETWORKS

  • Jo, Jung-Hee;Kim, Kwang-Soo;Lee, Ki-Sung;Kim, Sun-Joong
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.357-360
    • /
    • 2007
  • An asset tracking using wireless sensor network is concerned with geographical locations of sensor nodes. The limited size of sensor nodes makes them attractable for tracking service, at the same time their size causes power restrictions, limited computation power, and storage restrictions. Due to such constrained capabilities, the wireless sensor network basically assumes the failure of sensor nodes. This causes a set of concerns in designing asset tracking system on wireless sensor network and one of the most critical factors is location uncertainty of sensor nodes. In this paper, we classify the location uncertainty problem in asset tracking system into following cases. First, sensor node isn't read at all because of sensor node failure, leading to misunderstanding that asset is not present. Second, incorrect location is read due to interference of RSSI, providing unreliable location of asset. We implemented and installed our asset tracking system in a real environment and continuously monitored the status of asset and measured error rate of location of sensor nodes. We present experimental results that demonstrate the location uncertainty problem in asset tracking system using wireless sensor network.

  • PDF