• Title/Summary/Keyword: Directed message

Search Result 24, Processing Time 0.026 seconds

Fuzzy Logic based Propagation Limiting Method for message routing in Wireless Sensor Networks (무선 센서 네트워크에서 메시지 라우팅을 위한 퍼지로직 기반의 전달 영역 제한 기법)

  • Chi, Sang-Hoon;Cho, Tae-Ho
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.8-12
    • /
    • 2005
  • 최근 마이크로 센서와 무선 통신 기술의 진보는 센서 네트워크의 발전을 가능하게 하였다. 이와 같은 사실은 무선 센서 네트워크를 위한 수많은 라우팅 프로토콜의 개발로 이어졌으며, 다양한 구조의 알고리즘들이 제안되었다. 특히, 디렉티드 디퓨젼(Directed Diffusion; DD)은 데이터 중심 기반의 라우팅 알고리즘으로 속성 칼 쌍을 이용하여 통신하는 센서 네트워크의 한 패러다임이라고 할 수 있다. 그러나 기존의 DD에서는 작업을 요청하는 질의 메시지(interest message)가 전체 센서 네트워크에 플러딩(flooding)되는데, 이러한 과정은 에너지 소비 측면에서 볼 때 매우 비효율적이라고 할 수 있다. 이와 같은 문제를 해결하기 위하여 본 논문에서는 센서 노드의 에너지와 밀도 정보를 고려한 임계값을 이용하여 데이터의 전송 지역을 제한함으로서, 네트워크의 에너지 소비를 줄일 수 있는 새로운 메시지 전달영역 제한기법(propagation limiting method; PLM)을 제안한다. 퍼지 규칙 기반 시스템은 센서 필드에 배치된 노드들의 에너지와 밀도 정보를 입력 파라미터로 사용하여 메시지 라우팅을 위한 임계값 결정에 사용된다 본 연구에서 제안된 기법을 사용하여 센서 네트워크의 에너지 소비를 실험한 결과 기존에 제안되었던 알고리즘들에 비해 상대적으로 높은 효율성을 나타내었으며, 전체적으로 네트워크의 수명도 연장할 수 있었다.

  • PDF

INFRA-RPL to Support Dynamic Leaf Mode for Improved Connectivity of IoT Devices (IoT 디바이스의 연결성 향상을 위한 동적 leaf 모드 기반의 INFRA-RPL)

  • Seokwon Hong;Seong-eun Yoo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.4
    • /
    • pp.151-157
    • /
    • 2023
  • RPL (IPv6 Routing Protocol for Low-power Lossy Network) is a standardized routing protocol for LLNs (Low power and Lossy Networks) by the IETF (Internet Engineering Task Force). RPL creates routes and builds a DODAG (Destination Oriented Directed Acyclic Graph) through OF (Objective Function) defining routing metrics and optimization objectives. RPL supports a leaf mode which does not allow any child nodes. In this paper, we propose INFRA-RPL which provides a dynamic leaf mode functionality to a leaf node with the mobility. The proposed protocol is implemented in the open-source IoT operating system, Contiki-NG and Cooja simulator, and its performance is evaluated. The evaluation results show that INFRA-RPL outperforms the existing protocols in the terms of PDR, latency, and control message overhead.

A Resource Adaptive Data Dissemination Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 자원 적응형 데이터 확산프로토콜)

  • Kim, Hyun-Tae;Choi, Nak-Sun;Jung, Kyu-Su;Jeon, Yeong-Bae;Ra, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2091-2098
    • /
    • 2006
  • In this paper, it proposes a protocol of resource adaptive data dissemination for sensor nodes in a wireless sensor network. In general, each sensor node used in a wireless sensor network delivers the required information to the final destination by conducting cooperative works such as sensing, processing, and communicating each other using the battery power of a independent sensor node. So, a protocol used for transferring the acquired information to users through the wireless sensor network can minimize the power consumption of energy resource given to a sensor node. Especially, it is very important to minimize the total amount of power consumption with a method for handling the problems on implosion. data delivery overlapping, and excessive message transfer caused by message broadcasting. In this paper, for the maintaining of the shortest path between sensor nodes, maximizing of the life time of a sensor node and minimizing of communication cost, it presents a method for selecting the representative transfer node for an event arising area based on the negotiation scheme and maintaining optimal transfer path using hop and energy information. Finally, for the performance evaluation, we compare the proposed protocol to existing directed diffusion and SPIN protocol. And, with the simulation results, we show that the proposed protocol enhances the performance on the power consumption rate when the number of overall sensor nodes in a sensor network or neighbor sensor nodes in an event area are increased and on the number of messages disseminated from a sensor node.

A Survey of Application Layer Protocols of Internet of Things

  • bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.301-311
    • /
    • 2021
  • The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application.

Improvement on The Complexity of Distributed Depth First Search Protocol (분산깊이 우선 탐색 프로토콜의 복잡도 개선을 위한 연구)

  • Choe, Jong-Won
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.926-937
    • /
    • 1996
  • A graph traversal technique is a certain pattern of visiting nodes of a graph. Many special traversal techniques have been applied to solve graph related problems. For example, the depth first search technique has been used for finding strongly onnected components of a directed graph or biconnected components of a general graph. The distributed protocol to implement his depth first search technique on the distributed network can be divided into a fixed topology problem where there is no topological change and a dynamic topology problem which has some topological changes. Therefore, in this paper, we present a more efficient distributed depth first search protocol with fixed topology and a resilient distributed depth first search protocol where there are topological changes for the distributed network. Also, we analysed the message and time complexity of the presented protocols and showed the improved results than the complexities of the other distributed depth first search protocols.

  • PDF

Recent Trend and Issues of International Credit Practice related to Electronic Trade (전자무역(電子貿易)에 관련(關聯)한 국제신용장관습(國際信用狀慣習)의 최근동향(最近動向)과 과제(課題))

  • Seo, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.15
    • /
    • pp.89-116
    • /
    • 2001
  • Throughout the history of UCP, the longest lasting operational rules have been those derived from internationally acceptable best practices. I would propose that the effort to establish best practices be undertaken using four tools the SBPED, ISP98, the Opinions of the Banking Commission, and decisional law by respected courts in jurisdictions that influence letter of credit case law in the various regions. The SBPED and the ISP98 should be used; not only as a model for the drafting of future operational rules, but also as a questionnaire on best practices directed to all the national committees. The Opinions of the Banking Commission and the leading cases should be used to verify the soundness and enforceability of proposed rules. For this reason, I would suggest that the revision wait until the dust settles sometime in 2003 (10 years after the enactment of UCP 500) and we know if it is a good idea to attempt the drafting of new operational rules and whether to merge with closely related sets of rules. To do otherwise may entail a revision of the revision while it is still going on, or worse, discarding it before the ink dries or the electronic message reaches its intended recipient.

  • PDF

Analysis on mathematical behavior characteristics of a mathematically gifted student in independent study (독자적 연구에서 나타난 수학영재의 수학적 행동특성 분석)

  • Jeong, Jin-Yeong;Kang, Soon-Ja
    • The Mathematical Education
    • /
    • v.53 no.4
    • /
    • pp.479-492
    • /
    • 2014
  • According to Krutetskii, the education of mathematically gifted students must be focused on the improvement of creative mathematical ability and the mathematically gifted students need to experience the research process like mathematician. Independent study is highly encouraged as the self-directed activity of highest level in the learning process which is similar to research process used by experts. We conducted independent study as a viable differentiation technique for gifted middle school students in the 3rd grade, which participated in mentorship program for 10 months. Based on the data through the research process, interview with a study participant and his parents, and his blog, we analyzed mathematical behavior characteristics of a study participant. This behavior characteristics are not found in all mathematically gifted students. But through this case study, we understand mathematically gifted students better and furthermore obtain the message for the selection and education of the mathematically gifted students and for the effective method of running mentorship program particularly.

Development of m-Health Application based on Medical Informatics Standards (의료정보 표준에 기반 한 m-Health 어플리케이션 개발)

  • Park, Hyun Sang;Kim, Hwa Sun;Jung, Hyun Jung;Cho, Hune
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.5
    • /
    • pp.640-653
    • /
    • 2014
  • Recently medical consumers pursue high leveled quality of life through active promotion, prevention, management activity of health as the importance of health during home life is emerged to meet the aging society and chronic diseases. In addition, people are directed to the m-Health for managing yourself their health by using smartphone and various personal health devices, if necessary transmits health data to the physician himself. In the previous studies, m-Health Application were developed and applied in the real clinical environment by adopting the medical information standards was rarely conducted. Therefore, in this study, the m-Health application platform was developed. Developed application was communicate with IEEE 11073 standard protocol using the Bluetooth Health Device Profile in personal health device via smart phone to process blood pressure information, and it converted to HL7 V2.6 ORU_R01 message for send to remote medical server. In addition, we tested the interoperability and safety of the developed application for 23 inpatient and 17 outpatient at D University Hospital. As a result, the blood pressure information has been transmitted without error.

A Route Repair Scheme for Reducing DIO Poisoning Overhead in RPL-based IoT Networks (RPL 기반 IoT 네트워크에서 DIO Poisoning 오버헤드를 감소시키는 경로 복구 방법)

  • Lee, Sung-Jun;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1233-1244
    • /
    • 2016
  • In the IoT network environments for LLNs(Low power and Lossy networks), IPv6 Routing Protocol for Low Power and Lossy networks(RPL) has been proposed by IETF(Internet Engineering Task Force). The goal of RPL is to create a directed acyclic graph, without loops. As recommended by the IETF standard, RPL route recovery mechanisms in the event of a failure of a node should avoid loop, loop detection, DIO Poisoning. In this process, route recovery time and control message might be increased in the sub-tree because of the repeated route search. In this paper, we suggested RPL route recovery method to solve the routing overhead problem in the sub-tree during a loss of a link in the RPL routing protocol based on IoT wireless networks. The proposed method improved local repair process by utilizing a route that could not be selected as the preferred existing parents. This reduced the traffic control packet, especially in the disconnected node's sub tree. It also resulted in a quick recovery. Our simulation results showed that the proposed RPL local repair reduced the recovery time and the traffic of control packets of RPL. According to our experiment results, the proposed method improved the recovery performance of RPL.

A Study on Storing Node Addition and Instance Leveling Using DIS Message in RPL (RPL에서 DIS 메시지를 이용한 Storing 노드 추가 및 Instance 평준화 기법 연구)

  • Bae, Sung-Hyun;Yun, Jeong-Oh
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.590-598
    • /
    • 2018
  • Recently, interest in IoT(Internet of Things) technology, which provides Internet services to objects, is increasing. IoT offers a variety of services in home networks, healthcare, and disaster alerts. IoT with LLN(Low Power & Lossy Networks) feature frequently loses sensor node. RPL, the standard routing protocol of IoT, performs global repair when data loss occurs in a sensor node. However, frequent loss of sensor nodes due to lower sensor nodes causes network performance degradation due to frequent full path reset. In this paper, we propose an additional selection method of the storage mode sensor node to solve the network degradation problem due to the frequent path resetting problem even after selecting the storage mode sensor node, and propose a method of equalizing the total path resetting number of each instance.