• Title/Summary/Keyword: Low-power protocol communication

Search Result 172, Processing Time 0.032 seconds

The Low Power Algorithm of ZigBee Router for Non Beacon Enabled PAN (Non Beacon Enabled PAN 환경에서 ZigBee Router의 저전력 알고리즘)

  • Yoon, Sung-Kun;Park, Su-Jin;Lee, Ho-Eung;Park, Hyun-Ju
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.280-285
    • /
    • 2008
  • ZigBee is Low Power and Low Data Rate Wireless Communication protocol. It apply to much Ubiquitous Sensor Network. ZigBee PAN is two type PAN. One is Beacon Enabled PAN, the other is Non Beacon Enabled PAN. To support Low Power in Non Beacon Enabled PAN, End-Device enter Active status at End-Device's wishing time and send a data. So, Router does not know End-Device sends a data time. To solving this problem, Router must always exist to Active status. In this case, Router receive a power supply always in Non Beacon Enabled PAN. But Router does not receive a power supply always, Router can not normal operation, such as Router use a battery. To solve this problem, Router will be support low power. In this paper, we will present Router's Low Power Algorithm. And we suggest 'PAN Time'. Device use 'PAN Time' for PAN synchronous. Router using Low Power Algorithm can be enter to inactive status. So Non Beacon Enabled PAN of Router support the low power mode Therefore Router does not receive a power supply always, Router can normal operation.

  • PDF

Performance Improvement of STAC Protocol by Grouping the Number of Tags (태그 수 그룹화를 통한 STAC 프로토콜의 성능 개선)

  • Lim, Intaek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.807-812
    • /
    • 2015
  • In RFID system, when multiple tags respond simultaneously, a collision can occur. A method that solves this collision is referred as anti-collision algorithm. In 13.56MHz RFID system of Auto-ID center, STAC protocol is defined as an anti-collision algorithm for multiple tag reading. The PS algorithm divides the tags within the identification range of reader into smaller groups by increasing the transmission power incrementally and identifies them. In this paper, we propose a STAC/PS algorithm that the PS algorithm is applied in the STAC protocol. Through simulations, it is demonstrated that the collision rate for the proposed algorithm is about 50% lower than STAC protocol. Therefore, the STAC/PS algorithm can achieve faster tag identification speed compared with STAC protocol due to the low collision rate.

Improving the Reliability of IEEE 802.11s Based Wireless Mesh Networks for Smart Grid Systems

  • Kim, Jaebeom;Kim, Dabin;Lim, Keun-Woo;Ko, Young-Bae;Lee, Sang-Youm
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.629-639
    • /
    • 2012
  • A challenge faced by smart grid systems is providing highly reliable transmissions to better serve different types of electrical applications and improve the energy efficiency of the system. Although wireless networking technologies can provide high-speed and cost-effective solutions, their performance may be impaired by various factors that affect the reliability of smart grid networks. Here, we first suggest the use of IEEE 802.11s-based wireless LAN mesh networks as high-speed wireless backbone networks for smart grid infrastructure to provide high scalability and flexibility while ensuring low installation and management costs. Thereafter, we analyze some vital problems of the IEEE 802.11s default routing protocol (named hybrid wireless mesh protocol; HWMP) from the perspective of transfer reliability, and propose appropriate solutions with a new routing method called HWMP-reliability enhancement to improve the routing reliability of 802.11s-based smart grid mesh networking. A simulation study using ns-3 was conducted to demonstrate the superiority of the proposed schemes.

Routing and Medium Access Control Interactions for Internet of Things (사물인터넷을 위한 라우팅과 매체접근제어의 상호작용)

  • Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2465-2472
    • /
    • 2015
  • Wireless Medium Access Control (MAC) and routing technologies are the basic building blocks making it possible the Internet of Things (IoT). These technologies have been the focus of substantial research in the last decade. Nevertheless, as new networking standards for IoT are being proposed and different solutions are patched together, evaluating the performance of the network becomes unclear. In this paper, a new overview of MAC and routing protocols for IoT and new interactions are given. The IEEE 802.15.4 MAC and Routing Protocol for Low-power Lossy Network (RPL) routing protocols are taken as reference to exemplify and illustrate the discussion. Experimental results show that contention-based access MACs may hurt the routing, unless these two are carefully designed together.

Implementation of Temperature and Humidity Sensor Module Based on Z-wave (Z-Wave 기반의 온습도 센서 모듈 구현)

  • Weon, La kyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.157-166
    • /
    • 2022
  • The most commonly used wireless communication technologies in IoT technology include ZigBee, WiFi, Bluetooth, and Z-Wave. In particular, Z-Wave is currently one of the preferred wireless communication technologies, with a global market share of 60 % of these technologies. In this research, a temperature and humidity sensor module using a Z-wave protocol was designed and manufactured by referring to the data sheet. Subsequently, the Z-Wave protocol was analyzed during the operation of the sensor module, and the firmware of the controller module was mounted and implemented. In addition, a program for monitoring the temperature and humidity information from the sensor module was developed and validated. Finally, the performance of the sensor module was validated through master distance and low power tests on it and its reception data success rate.

Design of Vehicle Safety Protocol on Visible Light Communication using LED (LED 가시광 통신을 이용한 자동차 안전 프로토콜 설계)

  • Kim, Ho-Jin;Kong, In-Yeup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.563-565
    • /
    • 2010
  • LED is low power and pro-environment semiconductor element. That can be used not only as the lighting function but also for Visible Light Communication(VLC). The VLC is the communication technology that can send data by blinking a fluorescent or LED using visible spectrum. That velocity of blinking can not be usually recognized by eyesight. Visible Light Communication using LED can be used in many fields. In the field of ITS(Intelligent Transportation System), Under construction on the road, Emitting traffic signs can be applied to transfer the vehicle information. In this paper, Emitting traffic signs in addition to the VLC give information about road condition, safety distance and the lane change. We design Communication protocol to provide safety service and verify protocol by experiment.

  • PDF

A Study of Multiplex RE Monitoring Method of Low-Price for Stand-Alone PV Power Generation System (독립형 태양광 발전 시스템을 위한 저가의 다중 무선 모니터링 기법에 관한 연구)

  • Oh Jin-Seok;Kwak Jun-Ho
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.29 no.5
    • /
    • pp.579-586
    • /
    • 2005
  • Recently, it has demanded to the wireless monitoring system in stand-alone PV power generation system. We propose the multiplex monitoring method using RF unit of low-price. RF unit consists of RF modem and communication controller. It is also able to use by repeater to communicate long distance. In this paper. two algorithms were programmed by CCS-C and C++ for multiplex monitoring method, The algorithm of choosing unit was used 'select and poll method' and the course assignment algorithm was embodied with 'Bellman-Ford algorithm'. The good result was achieved in the actual test without communication-data lose. The proposed method will be applied such as monitoring system of PV light on the wayside, monitoring system of unmanned lighthouse, monitoring system of refrigeration container on vessel and so on. It can be applied in the field that various ocean energy system.

Elliptic Curve Signcryption Based Security Protocol for RFID

  • Singh, Anuj Kumar;Patro, B.D.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.344-365
    • /
    • 2020
  • Providing security has been always on priority in all areas of computing and communication, and for the systems that are low on computing power, implementing appropriate and efficient security mechanism has been a continuous challenge for the researchers. Radio Frequency Identification (RFID) system is such an environment, which requires the design and implementation of efficient security mechanism. Earlier, the security protocols for RFID based on hash functions and symmetric key cryptography have been proposed. But, due to high strength and requirement of less key size in elliptic curve cryptography, the focus of researchers has been on designing efficient security protocol for RFID based on elliptic curves. In this paper, an efficient elliptic curve signcryption based security protocol for RFID has been proposed, which provides mutual authentication, confidentiality, non-repudiation, integrity, availability, forward security, anonymity, and scalability. Moreover, the proposed protocol successfully provides resistance from replay attack, impersonation attack, location tracking attack, de-synchronization attack, denial of service attack, man-in-the-middle attack, cloning attack, and key-compromise attack. Results have revealed that the proposed protocol is efficient than the other related protocols as it takes less computational time and storage cost, especially for the tag, making it ideal to be used for RFID systems.

Lightweight Protocol for Low Power and Reliability Improvement Based on CoAP in the Internet of Things(IoT) Environment (사물인터넷 환경에서 CoAP 기반의 저전력, 신뢰성 향상을 위한 경량 프로토콜)

  • Seo, Doook;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.21-28
    • /
    • 2019
  • Internet of Things(IoT) is a technology or environment that collects data by attaching sensors to objects and transmits the collected information to each other through wired / wireless communication in real time. It is expected that when the Internet of objects is activated, many objects can identify and recognize each other by themselves and provide various services to facilitate our lives through mutual information exchange. In addition, the internet market for things is growing rapidly each year, and various IT technologies are expected to converge. In the Internet environment of objects, data exchange technology between object devices, that is, message protocol, is classified as one of important technologies. In this paper, we examine various lightweight message protocols suitable for the Internet environment of objects, and compare the reliability of the CoAP protocol structure with the MQTT protocol for a limited environment. Finally, we confirm the reliability of TCP / TLS and WebSockets-based CoAP transmission protocol of IETF's CoRE WG that can use various transport layers other than UDP in Internet environment including cloud infrastructure.

Implementation of IEEE 802.15.4 Protocol Stack on the Texas Instrument CC2530 (텍사스 인스트루먼트의 CC2530 상에 IEEE 802.15.4 프로토콜 스택 구현)

  • Kim, Byung-Soon
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.353-358
    • /
    • 2012
  • Wireless sensor networks consist of resource constraint devices which typically send data measured by sensors attached to the end devices towards a coordinator. The most often used medium access control protocol used in wireless sensor networks is the standard IEEE 802.15.4, where it is wireless standard introduced for low power, low cost wireless communication with moderate data rates. In this paper, we present implementation of both the IEEE 802.15.4 protocol stack and UART interface on the TI CC2530. We show that data via UART of our implemented IEEE 802.15.4 board are transmitted correctly in terms of captured frames.