• Title/Summary/Keyword: Message transmission

Search Result 611, Processing Time 0.026 seconds

Real-Time Transmission Method of Wireless Control Network using IEEE 802.15.4 Protocol (IEEE 802.15.4 기반의 무선 제어 망을 위한 실시간 전송기법에 대한 연구)

  • Lee, Jung-Il;Chol, Dong-Hyuck;Kim, Dong-Sung
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.178-180
    • /
    • 2007
  • In this paper, a real-time transmission algorithm based on IEEE 802.15.4 is proposed. The superframe of IEEE 802.15.4 is applied to the transmission method of real-time mixed data (periodic data, sporadic data, and non real-time message). The simulation results show the real-time performance of sporadic data is improved by using the proposed transmission algorithm.

  • PDF

DTN Routing for Improving Transmission Efficiency in a Destroyed Environment of Communication Infrastructure (통신 인프라가 파괴된 환경에서 전송 효율 향상을 위한 DTN 라우팅)

  • Jang, Sung-Jin;Lee, Won-Hui
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.37-41
    • /
    • 2020
  • In this paper, we propose a routing method to improve the message transmission efficiency between DTN nodes in an environment where communication infrastructure in the city is destroyed. In the situation where a certain size of communication infrastructure can not function, the message transmission process between the nodes is explained. An effective routing method for improving reliability between nodes was proposed and evaluated using DTN simulator. The routing algorithm with improved reliability in urban areas was confirmed by simulation considering the message transmission relationship between nodes on uncertain path due to the destruction of communication infrastructure. We used a routing algorithm that includes all the contact information the node has experienced in the past. In the simulation of delivering messages in a situation where the communication infrastructure was destroyed, relatively better results were obtained than the existing routing algorithm.

A V2V Transmission Scheme for Safety Message Dissemination in Platooning (군집주행 차량의 안전 메시지 전달을 위한 V2V 전송 기법)

  • Ahn, Woojin;Hong, Hanseul;Kim, Ronny Yongho
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.6
    • /
    • pp.548-553
    • /
    • 2019
  • Along with advanced vehicle to vehicle (V2V) communication technologies, platooning is regarded as one of the most promising form of autonomous driving solutions in order to increase road capacity. In this paper, we propose a novel V2V transmission scheme for safety message dissemination in platooning. The proposed scheme enhances the efficiency of channel access and multi-vehicle orthogonal frequency division multiple access (OFDMA) transmission by taking advantage of triggered uplink access technique and null data packet feedback report protocol introduced in the sixth generation WLAN standard, IEEE 802.11ax. The simulation results prove that the proposed scheme outperforms the conventional IEEE 802.11 transmission scheme throughout all measured vehicle density range.

The problem resolution algorithm in ESP protocol (ESP 프로토콜에서의 문제점 보완 알고리즘)

  • Lee, Yeong-Ji;Kim, Tae-Yun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.189-196
    • /
    • 2002
  • IPSec is a protocol which provides data encryption, message authentication and data integrity on public and open network transmission. In IPSec, ESP protocol is used when it needs to Provide data encryption, authentication and integrity in real transmission Packets. ESP protocol uses DES-CBC encryption mode when sender encrypts packets and receiver decrypts data through this mode IV is used at that tome. This vague has many risks of attack during transmission by attacker because it is transferred clean and opened. If IV value is modified, then decryption of ESP data is impossible and higher level information is changed. In this paper we propose a new algorithm that it encrpty IV values using DES-ECB mode for preventing IV attack and checks integrity of whole ESP data using message authentication function. Therefore, we will protect attacks of IV and data, and guarantee more safe transmission on the public network.

A study of Routing algorithm of USN for the Telemedicine (원격의료지원을 위한 USN 라우팅 알고리즘에 대한 연구)

  • Yun, Chan-Young
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.716-720
    • /
    • 2006
  • In this paper, we designed and proposed new routing algorithm that can support a variety of vital-sign traffic characteristic and could be applicable to USN for telemedicine by using adaptive transmission power level and increase frequency of routing request message. In proposed routing algorithm, when an emergency vital-sign traffic is applied, we use large transmission power to reduce route query response time and make the priority order in route process. On the other hand, for non emergency vital-sign traffic, we use low transmission power and adaptive decrease frequency of routing request message. which is insensitive to delay. The proposed scheme should be better QoS performance in complex USN than conventional method, which is performed based on uniform transmission power level.

  • PDF

A Priority Based Transmission Control Scheme Considering Remaining Energy for Body Sensor Network

  • Encarnacion, Nico;Yang, Hyunho
    • Smart Media Journal
    • /
    • v.4 no.1
    • /
    • pp.25-32
    • /
    • 2015
  • Powering wireless sensors with energy harvested from the environment is coming of age due to the increasing power densities of both storage and harvesting devices and the electronics performing energy efficient energy conversion. In order to maximize the functionality of the wireless sensor network, minimize missing packets, minimize latency and prevent the waste of energy, problems like congestion and inefficient energy usage must be addressed. Many sleep-awake protocols and efficient message priority techniques have been developed to properly manage the energy of the nodes and to minimize congestion. For a WSN that is operating in a strictly energy constrained environment, an energy-efficient transmission strategy is necessary. In this paper, we present a novel transmission priority decision scheme for a heterogeneous body sensor network composed of normal nodes and an energy harvesting node that acts as a cluster head. The energy harvesting node's decision whether or not to clear a normal node for sending is based on a set of metrics which includes the energy harvesting node's remaining energy, the total harvested energy, the type of message in a normal node's queue and finally, the implementation context of the wireless sensor network.

An Aggregation Method for Effective tTransmission of Burst RREQ(Route Request) in MANET(Mobile Ad hoc Network) (MANET에서 집중적 RREQ의 효율적 전송을 위한 집적 방법)

  • Kim, Yong-Hyuck;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.12
    • /
    • pp.66-73
    • /
    • 2008
  • At MANET, Broadcasting message transmission makes throughput decrease because all of MANET nodes are participated at retransmitting broadcasting messages. Especially, burst RREQ transmission causes broadcasting message congestion and inter-RREQ transmission delay. In this paper, we propose a RREQ aggregation method applied to the sender node and intermediate node for solving the problem caused by burst RREQ generation. And we analysis performance of the proposed method by examining at the real testbed.

A Cross Layer Protocol based on IEEE 802.15.4 for Improving Energy Efficiency (에너지 효율 개선을 위한 IEEE 802.15.4 기반의 Cross Layer Protocol)

  • Jeong, Pil-Seong;Kim, Hwa-Sung;Oh, Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7A
    • /
    • pp.669-677
    • /
    • 2011
  • Superframe in IEEE 802.15.4 Standard is subdivided into an active period and an inactive period to reduce energy consumption. But communication nodes use same data transmission range in an active period, thus communication nodes spend a lot of energy to send data another nodes. In this paper, we proposed reduce energy consumption algorithm that nodes use different transmission power. Cordinator split transmission area into four group and transmit becon message to nodes. Nodes adjust transmission power according to becon message and wates lowe energy than normal nodes. We proposed energy-efficient cross layer protocol that have different PAN (Personal Area Network) by four range group.

Implementation of Real-Time Communication in CAN for a Humanoid Robot (CAN 기반 휴머노이드 로봇의 실시간 데이터 통신 구현)

  • Kwon Sun-Ku;Kim Byung-Yoon;Kim Jin-Hwan;Huh Uk-Youl
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.1
    • /
    • pp.24-30
    • /
    • 2006
  • The Controller Area Network (CAN) is being widely used for real-time control application and small-scale distributed computer controller systems. When the stuff bits are generated by bit-stuffing mechanism in the CAN network, it causes jitter including variations in response time and delay In order to eliminate this jitter, stuff bits must be controlled to minimize the response time and to reduce the variation of data transmission time. This paper proposes the method to reduce the stuff bits by restriction of available identifier and bit mask using exclusive OR operation. This da manipulation method are pretty useful to the real-time control strategy with respect to performance. However, the CAN may exhibit unfair behavior under heavy traffic conditions. When there are both high and low priority messages ready for transmission, the proposed precedence priority filtering method allows one low priority message to be exchanged between any two adjacent higher priority messages. In this way, the length of each transmission delays is upper bounded. These procedures are implemented as local controllers for the ISHURO(Inha Semvung Humanoid Robot).