• Title/Summary/Keyword: Network Protocol

Search Result 4,959, Processing Time 0.026 seconds

Energy-efficient Data Dissemination Scheme via Sink Location Service in Wireless Sensor Networks (무선 센서망에서 위치정보 선제공 기법을 이용한 에너지 효율적인 데이타 전달방안)

  • Yu, Fu-Cai;Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Tian, Ye;Park, Ho-Sung;Kim, Sang-Ha
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.240-243
    • /
    • 2007
  • Geographic routing has been considered as an efficient simple, and scalable routing protocol for wireless sensor networks since it exploits pure location information instead of global topology information to route data packets. Geographic routing requires the sources nodes to be aware of the location of the sinks. In this paper, we propose a scheme named Sink Location Service for geographic routing in wireless Sensor Networks, in which the source nodes can get and update the location of sinks with low overhead. In this scheme, a source and a sink send data announcement and query messages along two paths respectively by geographic routing. The node located on the crossing point of the two paths informs the source about the location of the sink. Then the source can send data packet to the sink by geographic routing. How to guarantee that these two paths have at least one crossing point in any irregular profile of sensor network is the challenge of this paper.

  • PDF

Node scheduling algorithm for energy efficiency and delay reduction in mobile sensor networks (모바일 센서 망에서 효율적인 에너지 사용과 전송지연 감소를 위한 노드 스케쥴링 알고리즘)

  • Son, Jae-Hyun;Byun, Hee-Jung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.111-118
    • /
    • 2014
  • In mobile sensor networks, a large number of sensor nodes with battery powered are deployed randomly in a region. They monitor the environmental states and transmit data to its neighboring nodes. For mobile sensor networks, It is needed to maintain the connectivity autonomously among nodes as the sensor node moves. However, the existing works have focused on the energy savings in the fixed sensor networks. A specific algorithm considering node mobility is required in the mobile sensor networks. Along with energy efficiency, the transmission delay should be considered. In this paper, we propose an autonomous configuration scheme and a node scheduling algorithm when a moving node joins into the existing network. Through simulations, we show a superior performance of the proposed algorithm to the existing protocol.

Design of Intrusion Responsible System For Enterprise Security Management (통합보안 관리를 위한 침입대응 시스템 설계)

  • Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.51-56
    • /
    • 2005
  • Service operating management to keep stable and effective environment according as user increase and network environment of the Internet become complex gradually and requirements of offered service and user become various is felt constraint gradually. To solve this problem, invasion confrontation system through proposed this log analysis can be consisted as search of log file that is XML's advantage storing log file by XML form is easy and fast, and can have advantage log files of system analyze unification and manages according to structure anger of data. Also, created log file by Internet Protocol Address sort by do log and by Port number sort do log, invasion type sort log file and comparative analysis created in other invasion feeler system because change sort to various form such as do log by do logarithm, feeler time possible.

  • PDF

Performance of Hybrid DS/FH Spread-Spectrum Systems in Cellular Packet Radio Network (셀룰러 패킷무선망에서 하이브리드 DS/FH 확산대역 시스팀의 성능)

  • 조현욱;박상규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1462-1470
    • /
    • 1999
  • In this paper, the performance of packet radio networks using the ALOHA protocol in Rayleigh fading channels is analyzed in terms of the capture probability and the throughput. We consider capture effect in order to increase the probability of the channel access and to include cellular environment we assume that the traffic is a truncated bell-shaped distribution. The packet proposed in this paper consists of a competition part and a data part to decrease the probability of collision in the channel access. In the competition part, DS system with common spreading code is used and in the data, hybrid DS/FH system is used. We consider the linear correlation receiver and the hard-limiting correlation receiver as the receiver model. BPSK modulation is also employed. Because hybrid DS/FH systems are not sensitive to variation of the interference power, as we choose a proper chip number N and a frequency hopping number q, we can obtain a steady system performance even though the variation of interference power is severe fading channels such as Rayleigh fading.

  • PDF

Packet Scheduling Scheme to Enhance Throughput at IEEE 802.11e WLAN System (IEEE 802.11e 무선 LAN 시스템에서 서비스 처리율 증대를 위한 패킷 스케줄링 기법)

  • Jang Jae-Shin;Jeon Hyung-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4A
    • /
    • pp.412-420
    • /
    • 2006
  • With the appearance of various types of traffic services in communication networks, a study on QoS(Quality of Service) packet scheduling mechanisms which can support differentiated service to each traffic service becomes very important. To meet this requirement, IEEE 802.11 Working Group established the IEEE 802.11e MAC protocol which categorizes every traffic services into 4 access categories(AC) and provides the differentiated service to each AC. In addition, the physical layer of IEEE 802.11a/g standards provide up to 54 Mbps transmission rate per one wireless LAN terminal. However, since the radio resource is hardly limited in wireless channel, it is necessary to find an efficient packet scheduling scheme to maximize the transmission efficiency. Therefore, in this paper, we proposed a new packet scheduling scheme that can enhance the total throughput by setting different contention windows(CW) of CSMA-CA channel access scheme to each wireless LAN terminal according its current channel states. Numerical results derived from using NS-2 network simulator have shown that our proposed packet scheduling scheme can enhance the performance of IEEE 802.11e more and more.

Adaptive Data Hiding Techniques for Secure Communication of Images (자기유사성 네트워크에서 트래픽 제어에 의한 성능 개선)

  • 석경휴;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6B
    • /
    • pp.575-583
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to the window-based congestion control, in particular, such as the TCP. This is performed by interfacing the TCP with a large time scale control module which adjusts the aggressiveness of the bandwidth consumption behavior exhibited by the TCP as a function of large time scale Self-Similar network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by the RTT. How to effectively utilize such an information-due to its probabilistic nature, dispersion over the multiple time scales, and affection on the top of the existing window-based congestion controls-is a non-trivial problem. The evaluation performance of the multiple time scale TCP is facilitated by a simulation of the bench-mark environment which is based on the physical modeling of a self-similar traffic. We explicate our methodology for discerning and evaluating the impact of changes in transport protocols in the protocol stack under the self-similar traffic conditions. We discuss issues arising in the comparative performance evaluation under heavy-tailed workloads.

Design and Implementation of Mechanism for Effectively Exchanging Cybersecurity Information between Independent Security Management Domains (독립적인 보안관리 도메인간 효과적인 사이버보안정보 교환 방법의 설계 및 구현)

  • An, Gae-Il;Seo, Dae-Hee;Lim, Sun-Hee;Kim, Jong-Hyun;Seo, Dong-Il;Cho, Hyun-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1489-1497
    • /
    • 2011
  • As a way for defending against cyber security threats, there has been a research on cybersecurity information exchange between security management domains in order to raise security performance of the whole network. One of the hottest issues in exchanging cybersecurity information between security management domains is that the requirements of those domains on information sharing are different with each other because each is autonomous domain. This paper proposes a mechanism for effective cybersecurity Information exchange between independent security management domains, which can satisfy their requirements on information sharing through sharing policy and sharing policy control protocol, proposed in this paper. In this paper we have developed an integrated security control system that supports the proposed mechanism. Through the system the performance of the proposed mechanism is measured and evaluated.

Sink Location Dissemination Scheme in Geographic Routing for Wireless Sensor Networks (무선 센서 망을 위한 위치 기반 라우팅에서 싱크 위치 전달 방안)

  • Lee, Eul-Sin;Park, Soo-Chang;Lee, Jeong-Cheol;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.847-856
    • /
    • 2009
  • In geographic routing for wireless sensor networks, sources need the location of sinks destined for delivering their data packets. Most of the existing geographic routing protocols merely assume that the sources can get the locations of sinks by some location service. How source nodes find out the location of sinks is not easy. In this paper, we propose a sink location dissemination scheme in geographic routing for wireless sensor networks. In this scheme, a source node and a sink node send sink location announcement and query messages along two paths respectively by geographic routing. The node located on the crossing point of the two paths informs the source about the sink location. Then the source can send data packet to the sink by geographic routing. How to guarantee that these two paths have at least one crossing point in any irregular profile of sensor network is the challenge of this paper Simulation results show that our protocol is significantly superior to other protocols in terms of energy consumption and control overhead.

A Control Platform Scheme for Seamless Service Provisioning During Handover on FMC Networks (유무선 통합망에서 핸드오버시 끊김없는 서비스 제공을 위한 제어 플랫품)

  • Maeng, Doo-Lyel;Park, Jong-Kae;Kim, Sung-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.857-866
    • /
    • 2009
  • Recently, IP mobility study of infra's common elements is undergoing processes to achieve FMC based on All-IP. Existing typical mobility technology based on IP is IETF's Mobile IP. However, it faced to limitations due to packet loss, delays when MN is moving on Mobile IP, also existing network infra - routers (FA)-needed to add/change the functions to support Mobile IP. In this paper, existing mobility problems based on IP and the suggested improvements for platforms which support mobility, quality, security are proposed. It discusses the performance on the current existing IP infrastructure derived from simulation analysis on mobility packet loss and delay. From the resulting data, improvements will also be outlined for optimal performance.

DTN Routing Protocol Utilizing Underwater Channel Properties in Underwater Wireless Sensor Networks (수중 무선센서네트워크에서 수중채널의 특성을 활용한 DTN 라우팅 프로토콜)

  • Park, Seongjin;Kim, Sungryul;Yoo, Younghwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.10
    • /
    • pp.645-653
    • /
    • 2014
  • Recently, the ocean field researches such as offshore plant, ocean survey and underwater monitoring systems are garnering the attention from both academy and industry. However, the communication in underwater environment is very difficult because of the unique irregular features in water. This is the reason that the application of terrestrial protocols to the water environment is not proper. This paper proposes a routing algorithm that can enhance communication reliability by utilizing channel properties in underwater environment. We address two problems that lead to the poor communication performance, signal attenuation and multi-path problem in water. Overcoming these problems, the proposed algorithm ensures high packet delivery ratio and low transmission delay. Also, this paper evaluates the performance through simulation.