• Title/Summary/Keyword: Network Protocol

Search Result 4,960, Processing Time 0.03 seconds

Routing Protocol for Energy Balancing in Energy Harvesting Wireless Sensor network (에너지 하베스팅 무선 센서네트워크에서 에너지균형을 위한 라우팅프로토콜)

  • Kang, Min-Seung;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.666-669
    • /
    • 2020
  • Energy harvesting sensor networks have the ability to collect energy from the environment to overcome the power limitations of traditional sensor networks. The sensor network, which has a limited transmission range, delivers data to the destination node through a multi-hop method. The routing protocol should consider the power situation of nodes, which is determined by the residual power and energy harvesting rate. At this time, if only considering the magnitude of the power, power imbalance can occur among nodes and it can induce instantaneous power shortages and reduction of network lifetime. In this paper, we designed a routing protocol that considers the balance of power as well as the residual power and energy harvesting rate.

Design of Power Line Communication Protocol using Polling Concept (Polling을 이용한 전력선 통신(PLC) 프로토콜의 설계)

  • Lim, Eun-Jeong;Kang, Cheoul-Shin
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.31-34
    • /
    • 2005
  • In this paper, we proposed a MAC protocol which can be used in power line communications(PLC). In the power line communication network, the data signal cannot travel long distance because of a serious attenuation. Consequently, we need to have a number of repeaters (amplifiers) in order to recover the signal power, which causes flooding problem in the network The proposed MAC protocol uses polling concept and solves the flooding problem in the power line communication network. The proposed protocol can be applied to power line communication networks for automatic power distribution control system. A mathematical analysis has been carried out to estimate the performance of the proposed protocol.

  • PDF

Performance Analysis of ILEACH and LEACH Protocols for Wireless Sensor Networks

  • Miah, Md. Sipon;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.384-389
    • /
    • 2012
  • In this paper, we examine the problems of the low energy adaptive clustering hierarchy (LEACH) protocol and present ideas for improvement by selecting the cluster head node. The main problem with LEACH lies in the random selection of cluster heads. There exists a probability that the formed cluster heads are unbalanced and may remain in one part of the network, which makes some part of the network unreachable. In this paper, we present a new version of the LEACH protocol called the improved LEACH (ILEACH) protocol, which a cluster head is selected based on its ratio between the current energy level and an initial energy level, and multiplies by the root square of its number of neighbor nodes. The simulation results show that the proposed ILEACH increases the energy efficiency and network lifetime.

Zone based Ad Hoc Network Construction Scheme for Local IoT Networks

  • Youn, Joosang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.95-100
    • /
    • 2017
  • In this paper, we propose a zone based ad hoc network construction scheme which support ad hoc path between nodes in local IoT networks consisting of IoT devices with the constrained feature, such as low power, the limited transmission rate and low computing capacity. Recently, the various routing protocols have been studied to support ad hoc networking of local IoT environments. This is, because basis RPL protocol is deigned to be used for the connecting service with Internet through gateway, ad hoc path between nodes in local IoT networks is not supported in basis RPL protocol. Thus, in this paper, the proposed routing scheme provides both ad hoc path and Infra path through gateway, supporting basis RPL protocol simultaneously. Through simulation, we show that the proposed routing scheme with zone based path selection scheme improves the performance of the success rate of end-to-end data transmission and the end-to-end delay, compared to basis RPL protocol.

A Study of a Secure Channel Implementation on the Military Computer Network (국방망 보안채널 구현에 관한 연구)

  • Lee, Jun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.106-114
    • /
    • 2008
  • In this paper we suggest a protocol and an algorithm which connect a secure channel between a server and a client over a TCP layer. To make key exchange time the most quickly, the protocol adopts ECC Diffie Hellman(ECCDH) algorithm. And the protocol does not use Hello message for key exchanges and state changes. We also implement this protocol over an open TCP/IP program and check the secure channel connecting time over the military computer network. The suggested protocol could be practically used on the military computer network without a hardware implementation.

Performance Analysis of Key Distribution Protocol in Satellite Network (위성 통신망에서 키 분배 프로토콜의 성능분석)

  • 진상민;조동호;이상한;강건우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7A
    • /
    • pp.955-963
    • /
    • 1999
  • In this paper, in other to analyze the performance of efficient key distribution protocol, we evaluate the key distribution processing method of push model like the Kerberos and pull model such as X.9.17 used in wired network. Also, we evaluate the procedure of key distribution protocol in satellite network. Besides, we analyze the performance of key distribution protocol procedure in view of delay and throughput in the case that key distribution protocol is processed based on Inband/Outband channel.

  • PDF

A Study on Real-time Protocol over UDP

  • Hwang, Jee-Hwan;Jung, Myung-Soon;Kang, Jung-Mo;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.52.3-52
    • /
    • 2001
  • There are some problems to implement a realtime network system with Ethernet because the MAC(Medium Access Control) of Ethernet uses a CSMA/CD protocol, which introduces unexpected delays. In this paper, we designed a method to solve problems due to the Ethernet MAC. This method introduces a pseudo-MAC in application layer to support the real-time feature. So the presented method doesn´t need any modifications of protocols such as UDP/IP/MAC. The presented pseudo-MAC is based on both a token passing protocol and a publisher-subscriber protocol. The suggested realtime protocol is implemented and tested practically in a local area network. The proposed real-time network consists of a token controller node and general nodes.

  • PDF

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

Urgency-Aware Adaptive Routing Protocol for Energy-Harvesting Wireless Sensor Networks

  • Kang, Min-Seung;Park, Hyung-Kun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.25-33
    • /
    • 2021
  • Energy-harvesting wireless sensor networks(EH-WSNs) can collect energy from the environment and overcome the technical limitations of existing power. Since the transmission distance in a wireless sensor network is limited, the data are delivered to the destination node through multi-hop routing. In EH-WSNs, the routing protocol should consider the power situations of nodes, which is determined by the remaining power and energy-harvesting rate. In addition, in applications such as environmental monitoring, when there are urgent data, the routing protocol should be able to transmit it stably and quickly. This paper proposes an adaptive routing protocol that satisfies different requirements of normal and urgent data. To extend network lifetime, the proposed routing protocol reduces power imbalance for normal data and also minimizes transmission latency by controlling the transmission power for urgent data. Simulation results show that the proposed adaptive routing can improve network lifetime by mitigating the power imbalance and greatly reduce the transmission delay of urgent data.

An Energy Effective Protocol for Clustering Ad Hoc Network

  • Lee, Kang-Whan;Chen, Yun
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.117-121
    • /
    • 2008
  • In ad hoc network, the scarce energy management of the mobile devices has become a critical issue in order to extend the network lifetime. Therefore, the energy consumption is important in the routing design, otherwise cluster schemes are efficient in energy conserving. For the above reasons, an Energy conserving Context aware Clustering algorithm (ECC) is proposed to establish the network clustering structure, and a routing algorithm is introduced to choose the Optimal Energy Routing Protocol (OERP) path in this paper. Because in ad hoc network, the topology, nodes residual energy and energy consuming rate are dynamic changing. The network system should react continuously and rapidly to the changing conditions, and make corresponding action according different conditions. So we use the context aware computing to actualize the cluster head node, the routing path choosing. In this paper, we consider a novel routing protocol using the cluster schemes to find the optimal energy routing path based on a special topology structure of Resilient Ontology Multicasting Routing Protocol (RODMRP). The RODMRP is one of the hierarchical ad hoc network structure which combines the advantage of the tree based and the mesh based network. This scheme divides the nodes in different level found on the node energy condition, and the clustering is established based on the levels. This protocol considered the residual energy of the nodes and the total consuming energy ratio on the routing path to get the energy efficiently routing. The proposed networks scheme could get better improve the awareness for data to achieve and performance on their clustering establishment and messages transmission. Also, by using the context aware computing, according to the condition and the rules defined, the sensor nodes could adjust their behaviors correspondingly to improve the network routing.