• Title/Summary/Keyword: Data collection protocol

Search Result 126, Processing Time 0.028 seconds

Implementation of Image Transmission System in Ad-Hoc Network Using AODV Routing Protocol (Ad hoc 네트워크에서 AODV 라우팅 프로토콜을 이용한 영상 전송 시스템 구현)

  • Lee, Sung-Hun;Lee, Hyung-Keun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.6
    • /
    • pp.92-100
    • /
    • 2008
  • Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or reliable support services such as wired network and base stations. Recently, Ad-hoc networks are evolving to support multimedia contents according to expansion of ad hoc multi-hop communication system. Wireless ad-hoc network is different from the conventional wired network by frequent changes in network topology, number of routers and resources, there are a number of problems in applying conventional routing protocol to ad-hoc network. The AODV routing protocol is proposed for mobile node in ad-hoc networks. AODV protocol that provides to guarantee QoS for data transmission in ad hoc networks that link break frequently occurs. In this paper, AODV routing protocol based NDIS(Network Driver Interface Specification) is implemented. We design high performance image transmission that can operate with software(AODV) for ad-hoc networks without degradation. and verify operation of AODV routing protocol on the test bed.

  • PDF

A improved back-off algorithm using the gaussian model in the vehicular networks (차량 간 통신에서 가우시안 모델을 적용한 개선된 백오프 알고리즘)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.225-230
    • /
    • 2012
  • When a car accident happened, the accident vehicle should broadcast a safe message to its neighbors in multi-hop. However, the pure flooding is difficult to protect a chain-reaction collision because of the frequent collision and the communication delay. To solve this problem, we proposes a back-off algorithm applied to the estimation of the neighbor node count using the t-distribution. And we proposes a MAC protocol preventing the communication delay by separating the neighbor's count collection channel and data channel. As a result, we show the frame reception success rate of our protocol improved more 10% than the previous protocol.

A study on the extended TCP/IP protocol for real-time communication (실시간 통신을 위한 확장된 TCP/IP 프로토콜 개발에 관한 연구)

  • Yoon, Young-Chan;Park, Jae-Hyun
    • Journal of IKEEE
    • /
    • v.2 no.1 s.2
    • /
    • pp.42-52
    • /
    • 1998
  • This paper proposes an extended TCP/IP protocol, LAN/TCP, that can be used for the distributed soft real-time systems connected through the Ethernet-based local area network. Since LAN/TCP shows soft real-time performance with keeping compatibility and interoperability with the standard TCP/IP, the existing application software can be used without any modification. LAN/TCP also provides the periodic transmission mode(PTM) with which the periodical data collection and updating the control signals can be efficiently implemented with relatively small traffic overhead. This paper includes the computer simulation and experimental results of the proposed protocol.

  • PDF

Power-efficient MAC protocol for energy harvesting wireless sensor networks (에너지하베스팅 무선센서네트워크를 위한 전력효율적인 매체접근제어 프로토콜)

  • Shim, Kyu-Wook;Park, Hyung-Kun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.580-581
    • /
    • 2018
  • In order to reduce end-to-end delay in EH-WSN (energy harvestin wireless sensor netowk), medium access control protocols using multi-hop routing technique have been studied. In a real environment, there are many situations where it is difficult to harvest enough energy than the energy consumed. Therefore, it is required to design a MAC protocol that allows nodes to reliably relay data without exhausting power in multi-hop transmission. In this paper, we propose a power-efficient MAC protocol that can select the relay node according to the residual power and the energy collection rate to increase network lifetime.

  • PDF

A hybrid-vehicular communication systems using a gaussian model for sending a safe message (안전 메시지 전달을 위해 가우시안 모델을 적용한 하이브리드 차량 통신 시스템)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.161-166
    • /
    • 2012
  • When a car accident happened on a highway, the accident vehicle should broadcast a safe message to its neighbors in order to prevent a chain-reaction collision. Also, there is a problem that the estimation accuracy is low because of the memory limit from increasing the sampling count. In this paper, we proposes a HVC systems using a back-off algorithm applied to a gaussian model. And we proposes a MAC protocol preventing the communication delay by separating the neighbor count collection channel, data channel, and RSU communication channel. As a result, we show the frame reception success rate of our protocol improved about 10% than the previous protocol.

Zone based on Wireless Sensor Network Management Protocol for Smart Home (스마트 홈을 위한 영역기반 무선 센서네트워크 관리 프로토콜)

  • Kim, Gang-Seok;Huh, Jee-Wan;Song, Wang-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.65-71
    • /
    • 2009
  • As a core area of the new computing paradigm, the Ubiquitous Sensor Network Technology utilizes a wireless sensor networking which can be applied to the Context Information Monitoring System. When the technology is used in a poor user-environment for monitoring purposes, it can cost-effectively gather the context data on real-time basis, analyze the information gathered, effectively response to the user situation, and execute orders to create environmental factors desired by the user. This study structures a system able to monitor information in regards to a user-environment based on wireless-node sensor technology coupled with the Ubiquitous Sensor Network Technology. In this paper, the protocol in which it manages the wireless sensor network as the zone based by using the management protocol standardized at the smart home with a profile is proposed. The proposed system requires a minimal collection of data without continuous monitoring. Monitoring periodically, it can sense the user-environment more efficiently than the existing monitoring technologies based on the wire-communication technology.

  • PDF

An Investigation on the Acquisition and Preservation of Online Serials (온라인 연속간행자료수집 및 보존에 관한 연구)

  • Lee, Chi-Ju
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.359-386
    • /
    • 2007
  • This study is to develop the operation models collection and preservation of serials only distributed online. In order to identify all of the requisite items for collection and preservation of the online serials, it conducts Delphi Technique researches with panels of experts from public institutions, organizations, and research institutions. It also deduces the 68 necessary detailed items to develop the operation models for preserving the online serials, and suggests 57 detailed items selected from the compatibility analysis with the investigation and examination of compatibility and urgency. It suggests the automated collection plan of contents with the application of RSS technology of transfer protocol to provide users the updated information from the sites where the contents and data have been constantly and frequently updated. This study strives to design the collection and preservation processes suitable for the online serials.

Performance Analysis for Privacy-preserving Data Collection Protocols (개인정보보호를 위한 데이터 수집 프로토콜의 성능 분석)

  • Lee, Jongdeog;Jeong, Myoungin;Yoo, Jincheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1904-1913
    • /
    • 2021
  • With the proliferation of smart phones and the development of IoT technology, it has become possible to collect personal data for public purposes. However, users are afraid of voluntarily providing their private data due to privacy issues. To remedy this problem, mainly three techniques have been studied: data disturbance, traditional encryption, and homomorphic encryption. In this work, we perform simulations to compare them in terms of accuracy, message length, and computation delay. Experiment results show that the data disturbance method is fast and inaccurate while the traditional encryption method is accurate and slow. Similar to traditional encryption algorithms, the homomorphic encryption algorithm is relatively effective in privacy preserving because it allows computing encrypted data without decryption, but it requires high computation costs as well. However, its main cost, arithmetic operations, can be processed in parallel. Also, data analysis using the homomorphic encryption needs to do decryption only once at any number of data.

Offline Shopping During the COVID-19 Pandemic: Between Need and Fear

  • USMAN, Hardius;PROJO, Nucke Widowati Kusumo;CHAIRY, Chairy
    • Fourth Industrial Review
    • /
    • v.2 no.2
    • /
    • pp.25-37
    • /
    • 2022
  • Purpose - The purposes of this research are: (1) Building and testing a research model that integrates Theory of Reasoned Action (TRA) with fear, perceived risk, and health protocols; (2) Examining the impact of compliance with health protocols on consumer behavior when offline shopping. Research design, data, and methodology - The data collection uses the self-administered survey method, and the questionnaire is distributed online. A total of 504 Indonesian population aged 18 years old or more participate in this research. Data are analyzed using factor analysis, multiple regression, and multiple regression with interaction. Result - This study reveals several findings: (1) Attitude and subjective norm have a significant effect on offline shopping behavior; (2) fear has a direct and indirect effect on offline shopping behavior; (3) the effect of perceived risk on the intensity of offline shopping is determined by compliance with health protocols. Conclusion - This paper discusses the direct influence of attitudes and subjective norms on behavior. This research also integrates fear, perceived risk, and health protocol factors in TRA, which may not have been done much, especially in the COVID-19 pandemic context.

Self-organization Scheme of WSNs with Mobile Sensors and Mobile Multiple Sinks for Big Data Computing

  • Shin, Ahreum;Ryoo, Intae;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.943-961
    • /
    • 2020
  • With the advent of IoT technology and Big Data computing, the importance of WSNs (Wireless Sensor Networks) has been on the rise. For energy-efficient and collection-efficient delivery of any sensed data, lots of novel wireless medium access control (MAC) protocols have been proposed and these MAC schemes are the basis of many IoT systems that leads the upcoming fourth industrial revolution. WSNs play a very important role in collecting Big Data from various IoT sensors. Also, due to the limited amount of battery driving the sensors, energy-saving MAC technologies have been recently studied. In addition, as new IoT technologies for Big Data computing emerge to meet different needs, both sensors and sinks need to be mobile. To guarantee stability of WSNs with dynamic topologies as well as frequent physical changes, the existing MAC schemes must be tuned for better adapting to the new WSN environment which includes energy-efficiency and collection-efficiency of sensors, coverage of WSNs and data collecting methods of sinks. To address these issues, in this paper, a self-organization scheme for mobile sensor networks with mobile multiple sinks has been proposed and verified to adapt both mobile sensors and multiple sinks to 3-dimensional group management MAC protocol. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of the various usage cases. Therefore, the proposed self-organization scheme might be adaptable for various computing and networking environments with big data.