• Title/Summary/Keyword: Data Link Message

Search Result 89, Processing Time 0.023 seconds

Adjacent Matrix-based Hole Coverage Discovery Technique for Sensor Networks

  • Wu, Mary
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.169-176
    • /
    • 2019
  • Wireless sensor networks are used to monitor and control areas in a variety of military and civilian areas such as battlefield surveillance, intrusion detection, disaster recovery, biological detection, and environmental monitoring. Since the sensor nodes are randomly placed in the area of interest, separation of the sensor network area may occur due to environmental obstacles or a sensor may not exist in some areas. Also, in the situation where the sensor node is placed in a non-relocatable place, some node may exhaust energy or physical hole of the sensor node may cause coverage hole. Coverage holes can affect the performance of the entire sensor network, such as reducing data reliability, changing network topologies, disconnecting data links, and degrading transmission load. It is possible to solve the problem that occurs in the coverage hole by finding a coverage hole in the sensor network and further arranging a new sensor node in the detected coverage hole. The existing coverage hole detection technique is based on the location of the sensor node, but it is inefficient to mount the GPS on the sensor node having limited resources, and performing other location information processing causes a lot of message transmission overhead. In this paper, we propose an Adjacent Matrix-based Hole Coverage Discovery(AMHCD) scheme based on connectivity of neighboring nodes. The method searches for whether the connectivity of the neighboring nodes constitutes a closed shape based on the adjacent matrix, and determines whether the node is an internal node or a boundary node. Therefore, the message overhead for the location information strokes does not occur and can be applied irrespective of the position information error.

A Study on the Implementation of the Multi-Process Structured ISDN Terminal Adaptor for Sending the Ultra Sound Medical Images (다중처리 구조를 갖는 초음파 의료영상 전송용 ISDN(Integrated Services Digital Network) TA(Terminal Adaptor) 구현에 관한 연구)

  • 남상규;이영후
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.3
    • /
    • pp.317-324
    • /
    • 1994
  • This paper proposed a new method in the implementation of ISDN (integrated services digital network) LAPD (link access procedure on the D-channel) and LAPB (link access procedure on the B-channel) protocols. The proposed method in this paper implement ISDW LAPD protocol through multi-tasking operating system and adopt a kernel part that is changed operating system to target board. The features of implemented system are (1) the para.llel processing of the events generated at each layer, as follows (2) the supporting necessary timers for the implementation of ISDW LAPD protocol from the kernel part by using software, (3) the recommanded SAP (Service Access Point) from CCITT was composed by using port function in the operating system. With the proposed method, the protocols of ISDH layerl, layer2 and layer3 (call control) were implemented by using the kernel part and related tests were carried out by connecting the ISDH terminal simulator to ISDN S-interface system using the ISDN LAPD protocol The results showed that ISDW S-interface terminals could be discriminated by TEI (Terminal Equipment Identifier) assignment in layer 2 (LAPD) and the message transmission of layer 3 was verified by establishing the multi-frame transmission and then through the path established by the LAPD protocol, a user data was tranfered and received on B-channel with LAPB protocol Thererfore, as new efficient ISDN S-interface environment was implemented in the thesis, it was verified that the implemented system can be utilized by connecting ISDW in the future to transfer a medical image data.

  • PDF

An Efficient Router Assistance Mechanism for Reliable Multicast (신뢰성 보장을 위한 멀티캐스트에서의 효율적인 라우터 지원)

  • 최종원;최인영
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.224-232
    • /
    • 2004
  • To guarantee the reliability in multicast transmission, researches providing reliability through hierarchical control tree which is independent on data channel tree are known to provide high scalability. However, the logical control tree in transport layer constructed without topology information of the corresponding network layer tree may inefficiently use the network resources because the logical control tree is not closely related to the tree topology of the network layer. A router assisted control tree mechanism presented in this paper would improve the efficiency of the link as well as it would remove the replicated data. In addition, it requires to a router a small change which examines the message type of the control tree.

Mesh Routing Algorithm for TDMA Based Low-power and Ad-hoc Networks (TDMA 기반 저전력 애드혹 네트워크를 위한 메쉬 라우팅 알고리즘)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.8
    • /
    • pp.1955-1960
    • /
    • 2014
  • Many routing protocols have been proposed for low-power and ad-hoc networks to deliver command or data among nodes and recently, various researches are carried out about networking scheme considering reliability and scalability. In low-power networking technology, the performance of network layer is closely connected with the operation of data link layer and mesh routing mechanisms based on TDMA MAC are considered for reliability and scalability. This paper proposes mesh routing algorithm utilizing the characteristics of TDMA MAC and topological addressing in TDMA based low-power and ad-hoc networks and implementation results are presented.

A Sensing Radius Intersection Based Coverage Hole Recovery Method in Wireless Sensor Network (센서 네트워크에서 센싱 반경 교차점 기반 홀 복구 기법)

  • Wu, Mary
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.431-439
    • /
    • 2021
  • Since the sensor nodes are randomly arranged in the region of interest, it may happen that the sensor network area is separated or there is no sensor node in some area. In addition, after the sensor nodes are deployed in the sensor network, a coverage hole may occur due to the exhaustion of energy or physical destruction of the sensor nodes. The coverage hole can greatly affect the overall performance of the sensor network, such as reducing the data reliability of the sensor network, changing the network topology, disconnecting the data link, and worsening the transmission load. Therefore, sensor network coverage hole recovery has been studied. Existing coverage hole recovery studies present very complex geometric methods and procedures in the two-step process of finding a coverage hole and recovering a coverage hole. This study proposes a method for discovering and recovering a coverage hole in a sensor network, discovering that the sensor node is a boundary node by itself, and determining the location of a mobile node to be added. The proposed method is expected to have better efficiency in terms of complexity and message transmission compared to previous methods.

LTE Femtocell Network Configuration and an Off-Load Scheme According to Traffic Type within Smart Shipyard Area (스마트 조선소내 LTE 펨토셀 네트워크 구성과 트래픽 종류에 따른 오프로드 방식)

  • Kim, Su-Hyun;Jung, Min-A;Lee, Seong Ro;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.667-673
    • /
    • 2014
  • In a smart shipyard area, it is possible to integrate a variety of ship modules from separate sites into a final ship construction by using mobile applications. In this paper, we proposed the LTE femtocell network configuration which is applicable to sub shipyard, the traffic exchange method with shipyard headquarter and offload method to separate the general traffic. We defined the mode change in a femtocell gateway for supporting offload for general traffic between the main server in shipyard headquarter and sub shipyard, the offload data managements and message definition. We check the transmitted/received message flow in the wireless link, and consider the performance of the proposed method using state the transition diagram. It is expected that our results can improve the productivity within a smart shipyard by mobile communications and LTE femtocell network.

Real-time Intelligent Exit Path Indicator Using BLE Beacon Enabled Emergency Exit Sign Controller

  • Jung, Joonseok;Kwon, Jongman;Jung, Soonho;Lee, Minwoo;Mariappan, Vinayagam;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.82-88
    • /
    • 2017
  • Emergency lights and exit signs are an indispensable part of safety precautions for effective evacuation in case of emergency in public buildings. These emergency sign indicates safe escape routes and emergency doors, using an internationally recognizable sign. However visibility of those signs drops drastically in case of emergency situations like fire smoke, etc. and loss of visibility causes serious problems for safety evacuation. This paper propose a novel emergency light and exit sign built-in with Bluetooth Low Energy (BLE) Beacon to assist the emergency self-guiding evacuation using devices for crisis and emergency management to avoid panic condition inside the buildings. In this approach, the emergency light and exit sign with the BLE beacons deployed in the indoor environments and the smart devices detect their indoor positions, direction to move, and next exit sign position from beacon messages and interact with map server in the Internet / Intranet over the available LTE and/or Wi-Fi network connectivity. The map server generate an optimal emergency exit path according to the nearest emergency exit based on a novel graph generation method for less route computation for each smart device. All emergency exit path data interfaces among three system components, the emergency exit signs, map server, and smart devices, have been defined for modular implementation of our emergency evacuation system. The proposed exit sign experimental system has been deployed and evaluated in real-time building environment thoroughly and gives a good evidence that the modular design of the proposed exit sign system and a novel approach to compute emergency exit path route based on the BLE beacon message, map server, and smart devices is competitive and viable.

A Study on the Implement of Test Bed for Ad-hoc Networks (Ad-hoc 네트워크 테스트 베드 구현에 관한 연구)

  • Lee, Heung-Jae;Ga, Soon-Mo;Choe, Jin-Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1059-1067
    • /
    • 2006
  • AODV(Ad-hoc On-demand Distance Vector) routing protocol was devised for use of mobile nodes in Ad-hoc network. When we use the AODV routing protocol in Ad-hoc networks with high mobility, disturbance of optimized route path and link break occur. In order to solve the shortcomings, this paper proposes a new routing protocol in which new routing control messages are added to the existing AODV. The proposed protocol minimizes link break and transmission delay while is able to secure the optimized route path constantly in changes of network topology The performance of the proposed routing protocol was evaluated by using us2 network simulator. The actual Ad-hoc network test bed provides us the most reliable experimental data for Ad-hoc networks. In order to support this experimental environment, the dissertation also developed an efficient embedded system on which AODV routing protocol, NAT, Netfilter can run and other event message can be verified without declining efficiency. The correct operation of AODV routing protocol has been verified in both the Ad-hoc network test bed in which the embedded system was used, and Ad-hoc networks linked with Ethernet backbone network.

The proposal of a cryptographic method for the communication message security of GCS to support safe UAV operations (안정적인 UAV 운영을 위한 GCS의 통신메시지의 암호화 제안)

  • Kim, Byoung-Kug;Hong, Sung-Hwa;Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1353-1358
    • /
    • 2021
  • IoT (Internet of Things) emerges from various technologies such as communications, micro processors and embedded system and so on. The IoT has also been used to UAV (Unmanned Aerial Vehicle) system. In manned aircraft, a pilot and co-pilot should control FCS (Flight Control System) with FBW(Fly By Wire) system for flight operation. In contrast, the flight operation in UAV system is remotely and fully managed by GCS (Ground Control System) almost in real time. To make it possible the communication channel should be necessary between the UAV and the GCS. There are many protocols between two systems. Amongst them, MAVLink (Macro Air Vehicle Link) protocol is representatively used due to its open architecture. MAVLink does not define any securities itself, which results in high vulnerability from external attacks. This paper proposes the method to enhance data security in GCS network by applying cryptographic methods to the MAVLink messages in order to support safe UAV operations.

A Study on the Linkage Method between Emergency Simulation Model and Other Models (비상대비 시뮬레이션 모델의 타 모델 연동방안 연구)

  • Bang, Sang-Ho;Lee, Seung-Lyong
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.301-313
    • /
    • 2020
  • This study is a study on the interlocking method between emergency preparedness simulation model and military exercise war game model. The national emergency preparedness government exercises are being carried out by a message exercise and technology development for simulation models is being carried out to create a situation similar to the actual practice. In order to create a situation similar to the actual war, the military situation must be reflected and to do so, a link with the military exercise war game model is needed. The military exercise war game model applies HLA/RTI, which is a standardized interlocking method for various models such as Taegeuk JOS, and it is necessary to apply HLA/RTI linkage method to link with these military exercise war game models. In addition, since the emergency preparedness simulation model requires limited information such as enemy location and enemy attack situation on major facilities in the military exercise model, a method of interlocking that can select and link information is required. Therefore, in this study, the interlocking interface design plan is presented in order to selectively link the interlocking method and information between the emergency preparedness simulation model and the military exercise war game model. The main functions of interlocking interface include federation synchronization, storage and recovery, object management service, time management, and data filtering functions.