• Title/Summary/Keyword: Direct Routing

Search Result 70, Processing Time 0.022 seconds

Reliable multi-hop communication for structural health monitoring

  • Nagayama, Tomonori;Moinzadeh, Parya;Mechitov, Kirill;Ushita, Mitsushi;Makihata, Noritoshi;Ieiri, Masataka;Agha, Gul;Spencer, Billie F. Jr.;Fujino, Yozo;Seo, Ju-Won
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.481-504
    • /
    • 2010
  • Wireless smart sensor networks (WSSNs) have been proposed by a number of researchers to evaluate the current condition of civil infrastructure, offering improved understanding of dynamic response through dense instrumentation. As focus moves from laboratory testing to full-scale implementation, the need for multi-hop communication to address issues associated with the large size of civil infrastructure and their limited radio power has become apparent. Multi-hop communication protocols allow sensors to cooperate to reliably deliver data between nodes outside of direct communication range. However, application specific requirements, such as high sampling rates, vast amounts of data to be collected, precise internodal synchronization, and reliable communication, are quite challenging to achieve with generic multi-hop communication protocols. This paper proposes two complementary reliable multi-hop communication solutions for monitoring of civil infrastructure. In the first approach, termed herein General Purpose Multi-hop (GPMH), the wide variety of communication patterns involved in structural health monitoring, particularly in decentralized implementations, are acknowledged to develop a flexible and adaptable any-to-any communication protocol. In the second approach, termed herein Single-Sink Multi-hop (SSMH), an efficient many-to-one protocol utilizing all available RF channels is designed to minimize the time required to collect the large amounts of data generated by dense arrays of sensor nodes. Both protocols adopt the Ad-hoc On-demand Distance Vector (AODV) routing protocol, which provides any-to-any routing and multi-cast capability, and supports a broad range of communication patterns. The proposed implementations refine the routing metric by considering the stability of links, exclude functionality unnecessary in mostly-static WSSNs, and integrate a reliable communication layer with the AODV protocol. These customizations have resulted in robust realizations of multi-hop reliable communication that meet the demands of structural health monitoring.

Design and Implementation HDTV Relay Transmission System for Overlay Multicast (오버레이 멀티캐스트를 위한 HDTV 중계전송 시스템 설계 및 구현)

  • Son, Seung-Chul;Kwag, Yong-Wan;Heo, Kwon;Lee, Hyung-Ok;Nam, Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1A
    • /
    • pp.57-65
    • /
    • 2007
  • The overlay multicast that has been recently presented as IP alternative for the IP multicast has been getting much persuasion by the computing power of the hardware and the advancement of the network techniques to enforce Routing in application-level. In an overlay multicast, the system resource and the network bandwidth must be utilized efficiently to service real-time HDTV images. Specifically, the system must consider the delay and the jitter that can be incurred at the application-level. In this paper, we implement a server and a client to broadcast HDTV, in the session composed by the existing overlay multicast protocol. The broadcasting server performs the service using a TV tuner, An HDTV camcorder, and files, clients constituting a multicast group relay the received data to other clients. At this time, the information that the clients report periodically, including their delay and the network state, to the server is used as an important information to maintain an overlay session. The implementation is based on the DirectX and its performance is evaluated by the LAN test bed that has been set.

The Flood Control of the Namgang and Andong Reservoir System by an Optimization Procedure (최적화(最適化) 기법(技法)에 의한 남강(南江)-안동(安東)댐의 홍수조절(洪水調節))

  • Kim, Sheung Kown;Yoon, Yong Nam;Lee, Sung Yoon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.8 no.1
    • /
    • pp.49-60
    • /
    • 1988
  • The use of an Incremental Dynamic Programming (IDP) for real-time flood control operation is investigated. The optimization model has been applied for the Namgang and Andong hypothetical flood control system in the Nakdong river basin. The objective of the operation is defined to minimize the maximum flow at the confluence of downstreams from the two reservoirs. The results are compared to the direct summation of the flood routing results from individual flood control simulation run. It shows that peak flow at the confluence is reduced markedly by reducing peak outflows from individual reservoirs and by balancing the time of the peak release between the two reservoirs.

  • PDF

Rainfall-Runoff Analysis in the Whangryong River Basin Using HEC-HMS and HEC-GeoHMS (HEC-HMS, HEC-GeoHMS를 이용한 황룡강유역의 유출분석)

  • Kim, Chul;Park, Nam-Hee
    • Spatial Information Research
    • /
    • v.10 no.2
    • /
    • pp.275-287
    • /
    • 2002
  • Rainfall-Runoff Analysis in Whangryong River Basin was made using HEC-HMS and HEC-GeoHMS. The Basin was divided into three sub-basins using HEC-CeoHMS and GIS. Then, GIS input data were derived from each sub-basins. SCS CN runoff-volume model, Snyder's UH direct-runoff model, exponential recession baseflow model and Muskingum routing model in HEC-HMS were used to simulate the runoff volume using selected rainfall event and the parameters were optimized. Peak flowrate calculated using optimized parameters was compared to the observed flowrate in the basin. The result proved to be good agreement with each other. Optimized parameters in this local basin can be used to calculate the peak flowrate in the future.

  • PDF

Improving the Kang-Park's Protocol for Securing Binding Update in MIPv6 (Kang-Park의 Mobile IPv6 바인딩 갱신 보안 프로토콜 개선)

  • You, Il-Sun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.148-155
    • /
    • 2007
  • The routing optimization mode, which Mobile IPv6 provides for the direct communication between a mobile node and its correspond node, introduces various security threats, thus causing several protocols to be proposed for the secure binding update procedure. In particular, the Kang-Park protocol, which Kang and Park presented in 2005, achieves the optimized cryptographic operations and the strong security, while based on its unique security proxy structure. In spite of such advantages, it has some drawbacks in terms of security and efficiency. This paper improves the Kang-Park protocol through the strong CoA validation and early binding update methods. Also, we show that the improved protocol is better than others.

Prediction of a research vessel manoeuvring using numerical PMM and free running tests

  • Tiwari, Kunal;Hariharan, K.;Rameesha, T.V.;Krishnankutty, P.
    • Ocean Systems Engineering
    • /
    • v.10 no.3
    • /
    • pp.333-357
    • /
    • 2020
  • International Maritime Organisation (IMO) regulations insist on reduced emission of CO2, noxious and other environmentally dangerous gases from ship, which are usually let out while burning fossil fuel for running its propulsive machinery. Contrallability of ship during sailing has a direct implication on its course keeping and changing ability, and tries to have an optimised routing. Bad coursekeeping ability of a ship may lead to frequent use of rudder and resulting changes in the ship's drift angle. Consequently, it increases vessels resistance and also may lead to longer path for its journey due to zigzag movements. These adverse effects on the ship journey obviously lead to the increase in fuel consumption and higher emission. Hence, IMO has made it mandatory to evaluate the manoeuvring qualities of a ship at the designed stage itself. In this paper a numerical horizontal planar motion mechanism is simulated in CFD environment and from the force history, the hydrodynamic derivatives appearing in the manoeuvring equation of motion of a ship are estimated. These derivatives along with propeller thrust and rudder effects are used to simulate different standard manoeuvres of the vessel and check its parameters against the IMO requirements. The present study also simulates these manoeuvres by using numerical free running model for the same ship. The results obtained from both these studies are presented and discussed here.

Implementation of a Testbed for the Use of Mobile IP in the Campus Network (Mobile IP의 학내망 사용을 위한 테스트베드 구현)

  • 이종민;김성우;김태석
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.64-72
    • /
    • 2004
  • Mobility changes the computing environment of computer users rapidly with the broad use of the Internet. In order to support mobility in the Internet infrastructure, IETF standardized Mobile IP With the use of Mobile IP, the Internet users can use the Internet freely without any change in the IP address configuration when they move from their home networks to foreign networks. In this paper, we implement a test bed for evaluation the performance of Mobile IP to use it in the campus network. By evaluating the effect of the use of Mobile IP on the network performance, we expect that the possible side effect of its direct use in the campus network will be reduced.

  • PDF

Route Optimization in Nested Mobile Network using Sequential Tunneling (순차적 터널링을 이용한 중첩된 이동 네트워크에서의 경로 최적화)

  • Song Jungwook;Han Sunyoung
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.29-33
    • /
    • 2005
  • It is not future story that host mobility in wireless network. We already have many devices which can access network among moving our locations. Internet protocol is extended to support not only host mobility but also network mobility. But nesting mobile networks and mobile hosts, there is a problem that routing path of packet becomes complex. By sequential tunneling on outgoing packet at mobile router and toward mobile network at correspondent node, it can be setting up direct path in nested mobile network environment. In this paper, we propose a method for delivering packet through optimized path by sequential tunneling. And evaluate this method by equations and simulations.

A Study on the USN Zigbee Sensor Node for Transmission to Harmful Gas(CO, CO2) Sensing Data (유해가스(CO, CO2) 감지정보 전송을 위한 USN 지그비센서노드 구현)

  • Cheon, Dong-Jin;Park, Young-Jik;Lee, Seung-Ho;Kim, Jeong-Seop;Kwak, Dong-Kurl;Jung, Do-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.7
    • /
    • pp.1302-1308
    • /
    • 2010
  • In this study, Zigbee Sensor Node to transmit harmful gases CO and $CO_2$ information using wireless communication within the ground and underground structures were developed. Wireless communication protocol was used Zigbee Stack included IEEE 802. 15.4 MAC protocol. For wireless transmission of detected harmful gas signal from ADC of MCU was implemented Zigbee Sensor Node that was developed protocol using Serial-Port-Profile(SPP) here. The proposed Zigbee Sensor Node was verified transmission distance from experiments. Transmission distance was into 90m in experiments. Distance experiments were measured at 10m intervals using sine & pulse wave input signal at indoors. The proposed Route Sensor Node was applied mesh routing protocol. When built up USN(Ubiquitous Sensor Network)using Route Sensor Node, transmission distance was not limited. On the experimental results, harmful gas values between direct measurements and USN measurements were consistent. The semiconductor CO sensor and N-DIR $CO_2$ sensor module as a harmful sensor was used. Therefore, the proposed Zigbee Sensor Node was verified about reliability and validity to build USN for transmission of harmful gas information.

The Design of Secret Multi-Paths on MRNS(Mixed Radix Numbers System) Network for Secure Transmission (안전한 전송을 위한 MRNS(Mixed Radix Number System)네트워크에서의 비밀 다중 경로의 설계)

  • Kim, Seong-Yeol;Jeong, Il-Yong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1534-1541
    • /
    • 1996
  • Routing security is the confidentiality of route taken by the data transmitted over communication networks. If the route is detected by an adversary, the probability is high that the data lost or the data can be intercepted by the adversary. Therefore, the route must be protected. To accomplish this, we select an intermediate node secretly and transmit the data using this intermediate node, instead of sending the data to a destination node using the shortest direct path. Furthermore, if we use a number of secret routes from a node to a destination node, data security is much stronger since we can transmit partial data rather than entire data along a secret route. Finally, the idea above is implemented on MRNS Network.

  • PDF