• Title/Summary/Keyword: Message transmission

Search Result 611, Processing Time 0.026 seconds

Real-Time Transmission Method of wireless Control Network Using Zigbee Networks (지그비 망 기반의 무선 제어망 설계를 위한 실시간 전송 기법에 대한 연구)

  • Lee, Jung-Il;Jung, Ji-Won;Kim, Dong-Sung
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.39-40
    • /
    • 2007
  • In this Paper a transmission algorithm based on Zigbee Networks is proposed. The superframe of IEEE 802. 15.4 is applied to the transmission method of real-time mixed data (periodic data, sporadic data, and non real-time message). The simulation results show the real-time performance of sporadic data is improved by using the proposed transmission algorithm.

  • PDF

Wireless Networked Control Systems Using IEEE 802.15.4 (IEEE 802.15.4기반의 제어용 무선 네트워크에 대한 연구)

  • Lee, Jung-Il;Choi, Dong-Hyuk;Kim, Dong-Sung
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.289-292
    • /
    • 2006
  • In this paper, a wireless control network based on IEEE 802.15.4 MAC protocol is proposed. The superframe of IEEE 802.15.4 is applied to the proposed wireless control network. The transmission and bandwidth management method are proposed for efficient transmission in the superframe. By these methods, the proposed wireless control network protocol is able to transmit three types of data (periodic data, sporadic data, and non real-time message), and guarantee real-time transmission within deadline.

  • PDF

Packet Data Performance Measurement in D-TRS Wireless Network Environment (D-TRS 무선망 환경에서의 패킷 데이터 성능 측정)

  • Song, Byung-Kwen;Jin, Myung-Suk
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.6
    • /
    • pp.902-908
    • /
    • 2009
  • TETRA is the standard of Digital Trunked Radio System developed by the ETSI (European Telecommunications Standards Institute). It is currently adopted as Electric Power IT Wireless Backbone Network in Korea, and a national enterprise is going on for versatile utilization of TETRA. To use TETRA wireless network, TETRA modem is very necessary such that performance measurements are very crucial for each TETRA modem by various manufacturers. In this paper, PED (Protocol Evaluation Data) is suggested for PD performance measurement in D-TRS wireless network environment. The performance measurements for different data lengths and transmission intervals are done using TG (Traffic Generator) on Test Bed. The data size is increased by 10 bytes from 10-byte to 400-byte, and it is measured 1,000 times for each transmission interval of 0.5, 1.0, and 1.5 seconds. Based on the transmission time measured, average transmission speed and MER (Message Error Rate) are derived for TETRA Modem performance measurement. Two TMR880i's of EADS are used for TETRA modem, and SwMI (Switching and Management Infrastructure) of EADS is used for switching system in this paper.

Design of A-GBSR Protocol Using Beacon Message in 802.11p WAVE (802.11p WAVE에서 비콘메시지를 이용한 A-GBSR 프로토콜 설계)

  • Jeong, Seon-Mi;Kim, Hyun-Ju;Kim, Chang-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1554-1560
    • /
    • 2015
  • 802.11p WAVE is the next-generation wireless communication that can make Ad-hoc network communication possible for Vehicle-to-Vehicle. GBSR protocol, one of the 802.11p WAVE protocols, mainly focuses on improvements in networks that have a tendency to disconnect. However, it does not consider the transmission time and velocity of a packet thus, there is a disadvantage of there being a delay in the transmission velocity, in urgent situations like car accidents, emergency patients transportation and crimes. In this paper, we proposed A-GBSR protocol for transmission of a packet to mobile node which has a high speed through the improved beacon message and Adaptive Neighbor list Management that are considering of the GBSR protocol transmission velocity.

Proposed Message Transit Buffer Management Model for Nodes in Vehicular Delay-Tolerant Network

  • Gballou Yao, Theophile;Kimou Kouadio, Prosper;Tiecoura, Yves;Toure Kidjegbo, Augustin
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.153-163
    • /
    • 2023
  • This study is situated in the context of intelligent transport systems, where in-vehicle devices assist drivers to avoid accidents and therefore improve road safety. The vehicles present in a given area form an ad' hoc network of vehicles called vehicular ad' hoc network. In this type of network, the nodes are mobile vehicles and the messages exchanged are messages to warn about obstacles that may hinder the correct driving. Node mobilities make it impossible for inter-node communication to be end-to-end. Recognizing this characteristic has led to delay-tolerant vehicular networks. Embedded devices have small buffers (memory) to hold messages that a node needs to transmit when no other node is within its visibility range for transmission. The performance of a vehicular delay-tolerant network is closely tied to the successful management of the nodes' transit buffer. In this paper, we propose a message transit buffer management model for nodes in vehicular delay tolerant networks. This model consists in setting up, on the one hand, a policy of dropping messages from the buffer when the buffer is full and must receive a new message. This drop policy is based on the concept of intermediate node to destination, queues and priority class of service. It is also based on the properties of the message (size, weight, number of hops, number of replications, remaining time-to-live, etc.). On the other hand, the model defines the policy for selecting the message to be transmitted. The proposed model was evaluated with the ONE opportunistic network simulator based on a 4000m x 4000m area of downtown Bouaké in Côte d'Ivoire. The map data were imported using the Open Street Map tool. The results obtained show that our model improves the delivery ratio of security alert messages, reduces their delivery delay and network overload compared to the existing model. This improvement in communication within a network of vehicles can contribute to the improvement of road safety.

Wireless Data Transmission for WAP Message Management (WAP 메시지관리를 위한 데이터전송에 관한 연구)

  • 김송강;신승중
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.329-336
    • /
    • 2000
  • 본 논문은 이동통신기기를 이용한 무선 데이터 서비스에 관해 분석 고찰하고, 현존하는 무선통신기기를 이용한 비즈니스 모델을 도출 하였으며, 우리생활을 보다 편리하게 할 수 있는 intelligent 공간 관리시스템과 이동통신 기기를 이용한 무선 인터넷 광고 등을 중심으로 한 무선 멀티미디어 서비스의 구현에 관하여 기술하였다.

  • PDF

TPC-BS: Transmission Power Control based on Binary Search in the Wireless Sensor Networks (TPC-BS: 센서 네트워크에서 이진검색 방법을 이용한 빠른 전송전력 결정 방법)

  • Oh, Seung-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.11
    • /
    • pp.1420-1430
    • /
    • 2011
  • This paper proposes a new method to optimize energy consumption in a wireless modem by setting up a transmission power value according to the distance between nodes and circumstance in the MAC layer of IEEE 802.15.4. The proposed method can dynamically find an optimal transmission power range using the binary search scheme and minimize overhead caused by multiple message transmissions when determining the optimal transmission power. The determined transmission power is used for transmitting data packets and can be modified dynamically depending on the changes in a network environment when exchanging data packets and acknowledgement signals. The results of the simulations show 30% reduction in energy consumption while 2.5 times increase in data transmission rate per unit of energy comparing with IEEE 802.15.4 standard.

Implementation of network architecture for a humanoid robot (휴머노이드 로봇의 네트워크 구조 구현)

  • Sung, Yu-Kyoung;Kong, Jung-Shik;Lee, Bo-Hee;Kim, Jin-Geol
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2397-2399
    • /
    • 2004
  • This paper deals with the messages scheduling of a CAN (Controller Area Network), based on the distributed control scheme to integrate actuators and sensors in a humanoid robot. In order to supply the distributed processing for a humanoid robot, each control unit should have the efficient control method, fast calculation and valid data exchange. The preliminary study has concluded that the performance of CAN is better and easier to implement than other network such as FIP (Factory Instrumentation Protocol), VAN (Vehicle Area Network), etc. Since humanoid robot has to treat the significant control signals from many actuators and sensors, the communication time limitation could be critical according to the transmission speed and data length of CAN specification. In this paper, the CAN message scheduling in humanoid robot was suggested under the presence of Jitter in the message group, the existence of high load of messages over the network and the presence of transmission errors. In addition, the response time under the worst case is compared with the simulation by using the simulation algorithm. As a result, the suggested messages scheduling can guarantee our CAN limitation, and utilized to generate the walking patterns for the humanoid.

  • PDF

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.

Broadcasting Message Reduction Methods in VANET

  • Makhmadiyarov, Davron;Hur, Soojung;Park, Yongwan
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.1
    • /
    • pp.42-49
    • /
    • 2009
  • Most Vehicular Ad hoc Network (VANET) applications rely heavily on broadcast transmission of traffic related information to all reachable nodes within a certain geographical area. Among various broadcast approaches, flooding is the first broadcasting technique. Each node rebroadcasts the received message exactly once, which results in broadcast storm problems. Some mechanisms have been proposed to improve flooding in Mobile Ad hoc Networks (MANET), but they are not effective for VANET and only a few studies have addressed this issue. We propose two distance-based and timer-based broadcast suppression techniques: 15P(15percent) and slotted 15P. In the first (distance based) scheme, node's transmission range is divided into three ranges (80%,15%and5%). Only nodes within 15% range will rebroadcast received packet. Specific packet retransmission range (15%) is introduced to reduce the number of messages reforwarding nodes that will mitigate the broadcaststorm. In the second (timer-based) scheme, waiting time allocation for nodes within 15% range isused to significantly reduce the broadcaststorm. The proposed schemes are distributed and reliedon GPS information and do not requireany other prior knowledge about network topology. To analyze the performance of proposed schemes, statistics such as link load and the number of retransmitted nodes are presented. Our simulation results show that the proposed schemes can significantly reduce link load at high node densities up to 90 percent compared to a simple broadcast flooding technique.

  • PDF