• Title/Summary/Keyword: Data forwarding

Search Result 247, Processing Time 0.045 seconds

A Load Balancing Method Using Ring Network Structure in the Grid Database (그리드 데이터베이스에서 링 기반 연결 구조를 이용한 부하 분산 기법)

  • Jang Yong-Il;Shin Soong-Sun;Park Soon-Young;Bae Hae-Young
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.9
    • /
    • pp.1107-1117
    • /
    • 2006
  • In this paper, a load balancing method using ring network structure in the Grid database is proposed. In the Grid database, generally, data is replicated for performance and availability. And, user's request is transferred to node and processed in that node which has target data. But, in such environment, a decline of performance can be occurred because unbalanced workload. A traditional research is proposed to solve unbalanced load problem. However, the Grid database has a number of systems and user's request always changes dynamically. Therefore, a traditional research can not be applied. The proposed method connects each node which has a same replicated data through ing network structure. If workload is overflowed in some node, user's request is transferred to a linked node which has a target data. And, this node stops another request processing until workload is decreased. Then, it changes the link structure through sending a message to a previous node, to stop request forwarding from a previous node. This paper shows a proposed method increases performance than existing research through performance evaluation and is more suitable for a complex and dynamic environment.

  • PDF

Design of Collaborative System using Message exchange method based on Bridge XMDR (브리지 XMDR 기반의 메시지 교환방식을 이용한 협업 시스템 설계)

  • Moon, Seok-Jae;Lee, Soo-Youn;Choi, Young-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.56-65
    • /
    • 2007
  • Existing application systems of enterprises can process and collect a lot of information within enterprises, but it could be difficult to share validated information with partners and other system in the process of contacting to other legacy systems required in cooperation environment. For solving these problems, EAI systems are introduced in cooperation environment so that data sharing and integration can be achieved. The integration based on EAI is not limited to particular business system but all systems of an enterprise so that standard of suitable metadata level is needed for forwarding consistently between each business of systems. Therefore this paper maintains consistency of data sharing and integrating among legacy systems in cooperative environment for proposing message exchanging based on bridge XMDR.

A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT

  • Tandon, Aditya;Kumar, Pramod;Rishiwal, Vinay;Yadav, Mano;Yadav, Preeti
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1317-1341
    • /
    • 2021
  • Nowadays, the Internet of Things (IoT) is adopted to enable effective and smooth communication among different networks. In some specific application, the Wireless Sensor Networks (WSN) are used in IoT to gather peculiar data without the interaction of human. The WSNs are self-organizing in nature, so it mostly prefer multi-hop data forwarding. Thus to achieve better communication, a cross-layer routing strategy is preferred. In the cross-layer routing strategy, the routing processed through three layers such as transport, data link, and physical layer. Even though effective communication achieved via a cross-layer routing strategy, energy is another constraint in WSN assisted IoT. Cluster-based communication is one of the most used strategies for effectively preserving energy in WSN routing. This paper proposes a Bio-inspired cross-layer routing (BiHCLR) protocol to achieve effective and energy preserving routing in WSN assisted IoT. Initially, the deployed sensor nodes are arranged in the form of a grid as per the grid-based routing strategy. Then to enable energy preservation in BiHCLR, the fuzzy logic approach is executed to select the Cluster Head (CH) for every cell of the grid. Then a hybrid bio-inspired algorithm is used to select the routing path. The hybrid algorithm combines moth search and Salp Swarm optimization techniques. The performance of the proposed BiHCLR is evaluated based on the Quality of Service (QoS) analysis in terms of Packet loss, error bit rate, transmission delay, lifetime of network, buffer occupancy and throughput. Then these performances are validated based on comparison with conventional routing strategies like Fuzzy-rule-based Energy Efficient Clustering and Immune-Inspired Routing (FEEC-IIR), Neuro-Fuzzy- Emperor Penguin Optimization (NF-EPO), Fuzzy Reinforcement Learning-based Data Gathering (FRLDG) and Hierarchical Energy Efficient Data gathering (HEED). Ultimately the performance of the proposed BiHCLR outperforms all other conventional techniques.

Swimming pattern analysis of a Diving beetle for Aquatic Locomotion Applying to Articulated Underwater Robots (다관절 유영로봇에 적용하기 위한 물방개의 유영패턴 분석)

  • Kim, Hee-Joong;Lee, Ji-Hong
    • The Journal of Korea Robotics Society
    • /
    • v.7 no.4
    • /
    • pp.259-266
    • /
    • 2012
  • In these days, researches about underwater robots have been actively in progress for the purposes of ocean detection and resource exploration. Unlike general underwater robots such as ROV(Remotely Operated Vehicle) and AUV(Autonomous Underwater Vehicle) which have propellers, an articulated underwater robot which is called Crabster has been being developed in KORDI(Korea Ocean Research & Development Institute) with many cooperation organizations since 2010. The robot is expected to be able to walk and swim under the sea with its legs. Among many researching fields of this project, we are focusing on a swimming section. In order to find effective swimming locomotion for the robot, we approached this subject in terms of Biomimetics. As a model of optimized swimming organism in nature, diving beetles were chosen. In the paper, swimming motions of diving beetles were analyzed in viewpoint of robotics for applying them into the swimming motion of the robot. After modeling the kinematics of diving beetle through robotics engineering technique, we obtained swimming patterns of the one of living diving beetles, and then compared them with calculated optimal swimming patterns of a robot leg. As the first trial to compare the locomotion data of legs of the diving beetle with a robot leg, we have sorted two representative swimming patterns such as forwarding and turning. Experimental environment has been set up to get the motion data of diving beetles. The experimental equipment consists of a transparent aquarium and a high speed camera. Various swimming motions of diving beetles were recorded with the camera. After classifying swimming patterns of the diving beetle, we can get angular data of each joint on hind legs by image processing software, Image J. The data were applied to an optimized algorithm for swimming of a robot leg which was designed by robotics engineering technique. Through this procedure, simulated results which show trajectories of a robot leg were compared with trajectories of a leg of a diving beetle in desired directions. As a result, we confirmed considerable similarity in the result of trajectory and joint angles comparison.

ndnSIM based NDN Network Implementation and Performance Evaluation (ndnSIM 기반 NDN 네트워크 구현 및 성능 평가)

  • Park, Sanghyeon;Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.725-730
    • /
    • 2022
  • Named Data Networking (NDN) is a representative technology of ICN that realizes the future Internet architecture. NDN searches for data by its content and not by its host IP address. The consumer generates an interest packet and sends it to the NDN network. The NDN network uses three tables such as CS, FIB, and PIT and forwards the received interest packet to the next hop. The producer transmits the data packet to the consumer through a name-based forwarding scheme. In this paper, we design and implement an ndnSIM-based NDN network and perform performance evaluation. We analyze the ndnSIM structure and develop a 6-node congested NDN network and a 9-node grid NDN network using ndnSIM. In the simulation, the performance of latency and throughput of the interest packet rate are measured. We analyze the effect of congestion on the latency and throughput of the NDN network. This approach will help researchers in the future.

Wireless u-PC: Personal workspace on an Wireless Network Storage (Wireless u-PC : 무선 네트워크 스토리지를 이용한 개인 컴퓨팅 환경의 이동성을 지원하는 서비스)

  • Sung, Baek-Jae;Hwang, Min-Kyung;Kim, In-Jung;Lee, Woo-Joong;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.916-920
    • /
    • 2008
  • The personal workspace consists of user- specified computing environment such as user profile, applications and their configurations, and user data. Mobile computing devices (i.e., cellular phones, PDAs, laptop computers, and Ultra Mobile PC) are getting smaller and lighter to provide personal work-space ubiquitously. However, various personal work-space mobility solutions (c.f. VMWare Pocket ACE[1], Mojopac[2], u-PC[3], etc.) are appeared with the advance of virtualization technology and portable storage technology. The personal workspace can be loaded at public PC using above solutions. Especially, we proposed a framework called ubiquitous personal computing environment (u-PC) that supports mobility of personal workspace based on wireless iSCSI network storage in our previous work. However, previous u-PC could support limited applications, because it uses IRP (I/O Request Packet) forwarding technique at filter driver level on Windows operating system. In this paper, we implement OS-level virtualization technology using system call hooking on Windows operating system. It supports personal workspace mobility and covers previous u-PC limitation. Also, it overcomes personal workspace loading overhead that is limitation of other solutions (i.e., VMWare Pocket ACE, Mojopac, etc). We implement a prototype consisting of Windows XP-based host PC and Linux-based mobile device connected via WiNET protocol of UWB. We leverage several use~case models of our framework for proving its usability.

A Tactical Internet Geocasting Protocol for Efficient Message Delivery (효율적인 메시지 전달을 위한 전술인터넷 지오캐스팅 프로토콜)

  • Yoon, Sun-Joong;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.1050-1061
    • /
    • 2009
  • The Tactical Internet(TI) managed by Infantry Brigades is used for the purpose of sharing information of Command Control and Situation Awareness. When there are more than two destinations to transmit data in the TI system, a multicasting is utilized based on pre-defined multicast groups. However even in the case when a source node needs to send some messages like weathercast and attack alarm etc to only a part of Battalion or Brigades in a specific geographical region (destination region), the current TI multicasting protocol is designed to transmit the messages to the pre-defined group or all of the Battalion/Brigade nodes, resulting in inefficiency in terms of end-to-end delay and overhead. In this paper, we propose more efficient protocol for such cases, named as "Tactical Internet Geocasting (TIG)". The proposed scheme firstly checks whether the destination region belongs to one Battalion region or more than two Battalion regions using location information, and then performs a greedy forwarding from the source node to the destination region, followed by a local flooding inside of the destination region. With performance analysis and simulations using NS-2, TIG is compared to the current TI multicasting protocol (i.e., Simplified MDP) and the LBM (Location-based Multicast). The simulation results show that the proposed TIG is more efficient than both in terms of delay and network overhead.

The Mechanism of Proxy Mobile IPv4 to Minimize the Latency of Handover Using MIH Services (MIH 서비스를 활용한 Proxy Mobile IPv4의 핸드오버 지연 최소화 방안)

  • Kim, Sung-Jin;You, Heung-Ryeol;Rhee, Seuck-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.211-217
    • /
    • 2008
  • Recently, there are many efforts to support seamless mobility in 802.11 WLANs using IP Layer mobility protocols. The IP layer mobility protocols are the most efficient mechanism to guarantee the service session continuity when IP subnet is changed during handover. Even if the IP layer mobility protocols are quite efficient, the feature of the protocols that had been designed to consider only L3 layer makes it difficult to improve the performance of hand over more and more. Nowadays, to overcome this limitation of IP mobility protocols, many researchers have worked on the mobility protocols integration of different layers (e.g., L2 layer). In this paper, we propose the enhanced Proxy MIPv4 to minimize the latency of handover using MIH protocol in 802.11 WLANs. The proposed mechanism minimizes the latency of authentication by exchanging security keys between Access Routers during handover. Moreover, it also minimizes packet losses by Inter-AP Tunneling and data forwarding.

  • PDF

An Efficient Transport Protocol for Ad Hoc Networks: An End-to-End Freeze TCP with Timestamps

  • Cho, Sung-Rae;Sirisena, Harsha;Pawlikowski, Krzysztof
    • Journal of Communications and Networks
    • /
    • v.6 no.4
    • /
    • pp.376-386
    • /
    • 2004
  • In ad hoc networks, loss-based congestion window progression by the traditional means of duplicate ACKs and timeouts causes high network buffer utilization due to large bursts of data, thereby degrading network bandwidth utilization. Moreover, network-oriented feedbacks to handle route disconnection events may impair packet forwarding capability by adding to MAC layer congestion and also dissipate considerable network resources at reluctant intermediate nodes. Here, we propose a new TCP scheme that does not require the participation of intermediate nodes. It is a purely end-to-end scheme using TCP timestamps to deduce link conditions. It also eliminates spurious reductions of the transmission window in cases of timeouts and fast retransmits. The scheme incorporates a receiver-oriented rate controller (rater), and a congestion window delimiter for the 802.11 MAC protocol. In addition, the transient nature of medium availability due to medium contention during the connection time is addressed by a freezing timer (freezer) at the receiver, which freezes the sender whenever heavy contention is perceived. Finally, the sender-end is modified to comply with the receiver-end enhancements, as an optional deployment. Simulation studies show that our modification of TCP for ad hoc networks offers outstanding performance in terms of goodput, as well as throughput.

An Efficient Network Management System using The Smart Router (스마트 라우터를 사용한 효율적인 네트워크 관리 시스템)

  • Park Moon-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.253-260
    • /
    • 2005
  • Active networks not only allows the network nodes, switches or routers. to perform routing and forwarding but so allows their users inject customized programs into the nodes of the network or the packets. that may modify, store or redirect the user data flowing through the network. In this paper, we proposed a new network management system built using active network technology, that can solve problems inherent in most of existing legacy centralized network management systems. The main contribution is to present the Smart Router model that can reduce traffics due to managing networks by way of making control packets into simplified patterns. The disadvantages of the centralized network management are presented and the current solution for distributed network management are discussed. The performance improvements that our architecture offers are showed through a service example experiment.

  • PDF