• 제목/요약/키워드: Optimized protocol

검색결과 263건 처리시간 0.028초

적응적 Request Mini-slots을 이용한 WATM MAC 프로토콜 (WATM MAC Protocol using Adaptive Request Mini-slots)

  • 문홍진;장성현
    • 한국멀티미디어학회논문지
    • /
    • 제6권5호
    • /
    • pp.831-841
    • /
    • 2003
  • 무선 ATM 망에서, 이동 단말기들은 유선 ATM 망의 단말기와 같은 기능과 QoS를 제공해 야 한다. 그러므로, 기지국 스케줄러에게 이동 단말기들의 ATM 셀 도착에 대한 정보가 빠르게 전달되는 것이 중앙 집중방식으로 제어되는 ATM 기반 MAC 프로토콜의 중요한 항목이다. 그러나, 다수 개의 무선 단말기들이 상향 링크를 통해 상호 경쟁적인 방법으로 데이터 전송을 요구하는 과정에서 충돌이 발생되고, 충돌에 의한 재전송 때문에 처리율이 감소되고 전송 지연이 증가하게 된다. 본 논문에서는 예약을 요청하는 단말기 수를 통계적으로 예측하고 사후 처리율을 고려하여 최적화된 request mini-slot의 개수를 결정하는 MAC 프로토콜을 제안한다. 시뮬레이션 결과에서 제안한 프로토콜이 지연과 처리율에서 높은 성능을 보임을 알 수 있었다.

  • PDF

32-bit RISC마이크로프로세서를 위한 버스 설계 및 구현 (Design and Implementation of Bus for 32-bit RISC Microprocessor)

  • 양동훈;곽승호;이문기
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(2)
    • /
    • pp.333-336
    • /
    • 2002
  • This paper purpose design and implementation of system bus for the effective interconnection between peripheral device and 32-bit microprocessor. The designed system bus support general bus protocol. Also, it is optimized for 32-bit microprocessor. It is divided into two system. high performance system bus and Peripheral system bus.

  • PDF

Wireless sensor network protocol comparison for bridge health assessment

  • Kilic, Gokhan
    • Structural Engineering and Mechanics
    • /
    • 제49권4호
    • /
    • pp.509-521
    • /
    • 2014
  • In this paper two protocols of Wireless Sensor Networks (WSN) are examined through both a simulation and a case study. The simulation was performed with the optimized network (OPNET) simulator while comparing the performance of the Ad-Hoc on demand Distance Vector (AODV) and the Dynamic Source Routing (DSR) protocols. This is compared and shown with real-world measurement of deflection from eight wireless sensor nodes. The wireless sensor response results were compared with accelerometer sensors for validation purposes. It was found that although the computer simulation suggests the AODV protocol is more accurate, in the case study no distinct difference was found. However, it was shown that AODV is still more beneficial in the field as it has a longer battery life enabling longer surveying times. This is a significant finding as a large factor in determining the use of wireless network sensors as a method of assessing structural response has been their short battery life. Thus if protocols which enhance battery life, such as the AODV protocol, are employed it may be possible in the future to couple wireless networks with solar power extending their monitoring periods.

An Energy efficient protocol to increase network life in WSN

  • Kshatri, Dinesh Baniya;Lee, WooSuk;Jung, Kyedong;Lee, Jong-Yong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제7권1호
    • /
    • pp.62-65
    • /
    • 2015
  • Wireless Sensor Network consists of several sensor nodes, these nodes loss some of their energy after the process of communication. So an energy efficient approach is required to improve the life of the network. In case of broadcast network, LEACH protocol uses an aggregative approach by creating cluster of nodes. Now the major concern is to built such clusters over WSN in an optimized way. This work presents the improvement over LEACH protocol. Hence we have different work environments where the network is having different capacities. The proposed work shows how the life time of the network will improve when the number of nodes varies within the network.

ROSS: Low-Cost Self-Securing VoIP Communication Framework

  • Syafalni, Alfin;Samsudin, Azman;Jaafar, Yazid;Omar, Mohd. Adib
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권12호
    • /
    • pp.3366-3383
    • /
    • 2012
  • Reliance on the Internet has introduced Voice over Internet Protocol (VoIP) to various security threats. A reliable security protocol and an authentication scheme are thus required to prevent the aforementioned threats. However, an authentication scheme often demands additional cost and effort. Accordingly, a security framework for known participants in VoIP communication is proposed in this paper. The framework is known as Randomness-Optimized Self-Securing (ROSS), which performs authentication automatically throughout the session by optimizing the uniqueness and randomness of the communication itself. Elliptic Curve Diffie-Hellman (ECDH) key exchange and Salsa20 stream cipher are utilized in the framework correspondingly to secure the key agreement and the communication with low computational cost. Human intelligence supports ROSS authentication process to ensure participant authenticity and communication regularity. The results show that with marginal overhead, the proposed framework is able to secure VoIP communication by performing reliable authentication.

Development of a Protocol for Somatic Embryogenesis of Cnidium officinale M akino

  • Hui Yeong Jeong;Ji Ah Kim
    • 한국자원식물학회:학술대회논문집
    • /
    • 한국자원식물학회 2021년도 춘계학술대회
    • /
    • pp.51-51
    • /
    • 2021
  • This study was conducted to develop a somatic embryogenesis protocol for the Cnidium officinale Makino difficult to seed propagation. The immature flowers were used as explants. The concentration of a 2,4-D 1.0mg/L was found to be optimal concentration for induction of embryogenic callus and somatic embryos. Addition of 0.3mg/L, 0.5mg/L and 1.0mg/L to the embryo germination medium promoted somatic embryo germination. Among four concentrations, GA3 1.0mg/L were superior to others. Shoots were transferred to hormone-free MS medium after 2 months of culture in the dark. We obtained an optimized protocol for the regeneration of C. officinale.

  • PDF

무선 하이브리드 메쉬 네트워크를 위한 개선된 계층구조 라우팅 프로토콜 (An Improved Hierarchical Routing Protocol for Wireless Hybrid Mesh Network)

  • 기상렬;윤원식
    • 대한전자공학회논문지TC
    • /
    • 제47권5호
    • /
    • pp.9-17
    • /
    • 2010
  • 본 논문에서는 이동 Ad-hoc 네트워크를 지원하여 확장성과 광대역의 무선 환경을 제공하는 무선 메쉬 네트워크인 무선 하이브리드 메쉬 구조를 고려하여, 이에 효율적으로 적용될 수 있는 무선 하이브리드 메쉬 네트워크를 위한 계층구조의 라우팅 기법을 제안하였다. 무선 하이브리드 메쉬 네트워크상에서 효율적인 토폴로지 관리와 소스노드에서 목적노드로 라우팅 패스를 설정할 시에 발생하는 트래픽을 감소시키고 노드간 링크 안정성을 고려하고, 노드의 문제 또는 링크간 장애로 인한 잦은 라우팅 재설정 문제를 해결하는 계층구조의 라우팅 기법을 제안하였다. 또한 case study를 통하여 본 논문에서 제안된 계층구조의 라우팅 기법을 이용하여 네트워크 클러스터링 및 토폴로지 관리의 효율성을 인지할 수 있었으며, 성능분석 결과에서는 제안된 방법을 적용하였을 때, 링크의 상태가 좋지 않을 경우 기존 HOLSR (hierarchical optimized link state routing) 방법보다 데이터 전송에 따른 종단간 지연시간이 감소되고 aggregate goodput과 packet delivery ratio가 향상됨을 알 수 있었다.

An optimized radiosynthesis of 18F-THK-5351 for routine production on TRACERlab™ FXFN

  • Park, Jun Young;Son, Jeongmin;Yun, Mijin;Chun, Joong-Hyun
    • 대한방사성의약품학회지
    • /
    • 제3권2호
    • /
    • pp.91-97
    • /
    • 2017
  • $^{18}F-THK-5351$ is a PET radiotracer to image the hyperphosphorylated tau fibrillar aggregates in human brain. This protocol describes the optimized radiosynthesis of $^{18}F-THK-5351$ using a commercial GE $TRACERlab^{TM}$ $FX_{FN}$ radiosynthesis module. $^{18}F-THK-5351$ was prepared by nucleophilic [$^{18}F$]fluorination from its protected tosylate precursors, (S)-(2-(2-methylaminopyrid-5-yl)-6-[[2-(tetrahydro-2H-pyran-2-yloxy)-3-tosyloxy]propoxy] quinolone(THK-5352), at $110^{\circ}C$ for 10 min in dimethyl sulfoxide, followed by deprotection with 1 N HCl. The average radiochemical yield of $^{18}F-THK-5351$ was $31.9{\pm}6.7%$(decay-corrected, n = 10), with molar activity of $198.1{\pm}33.9GBq/{\mu}mol$($5.4{\pm}0.9Ci/{\mu}mol$, n = 10). The radiochemical purity was determined to be above 98%. The overall production time including HPLC purification is approximately 70 min. This fully-automated protocol is validated for clinical use.

Trust Predicated Routing Framework with Optimized Cluster Head Selection using Cuckoo Search Algorithm for MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제4권2호
    • /
    • pp.115-125
    • /
    • 2015
  • This paper presents a Cuckoo search algorithm to secure adversaries misdirecting multi-hop routing in Mobile ad hoc networks (MANETs) using a robust Trust Predicated Routing Framework with an optimized cluster head selection. The clustering technique designed in this framework leads to efficient routing in MANETs. The heavy work load in the node causes an energy drop in cluster head, which leads to re-clustering of the group, and another cluster head is selected to avoid packet loss during data transmission. The problem in the re-clustering process is that the overall efficiency of the routing process is reduced and the processing time is increased. A Cuckoo search based optimization algorithm is proposed to solve the problem of re-clustering by selecting the secondary cluster head within the initially formed cluster group and eliminating the reclustering process. The proposed framework enables a node to select a reliable and secure route for MANET and the performance can be evaluated by comparing the simulated results with the AODV routing protocol, which shows that the performance of the proposed routing protocol are improved significantly.

Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic

  • Sui, Nannan;Wang, Cong;Xie, Wei;Xu, Youyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.687-708
    • /
    • 2017
  • The machine-to-machine (M2M) communication is featured by tremendous number of devices, small data transmission, and large uplink to downlink traffic ratio. The massive access requests generated by M2M devices would result in the current medium access control (MAC) protocol in LTE/LTE-A networks suffering from physical random access channel (PRACH) overload, high signaling overhead, and resource underutilization. As such, fairness should be carefully considered when M2M traffic coexists with human-to-human (H2H) traffic. To tackle these problems, we propose an adaptive Slotted ALOHA (S-ALOHA) and time division multiple access (TDMA) hybrid protocol. In particular, the proposed hybrid protocol divides the reserved uplink resource blocks (RBs) in a transmission cycle into the S-ALOHA part for M2M traffic with small-size packets and the TDMA part for H2H traffic with large-size packets. Adaptive resource allocation and access class barring (ACB) are exploited and optimized to maximize the channel utility with fairness constraint. Moreover, an upper performance bound for the proposed hybrid protocol is provided by performing the system equilibrium analysis. Simulation results demonstrate that, compared with pure S-ALOHA and pure TDMA protocol under a target fairness constraint of 0.9, our proposed hybrid protocol can improve the capacity by at least 9.44% when ${\lambda}_1:{\lambda}_2=1:1$and by at least 20.53% when ${\lambda}_1:{\lambda}_2=10:1$, where ${\lambda}_1,{\lambda}_2$ are traffic arrival rates of M2M and H2H traffic, respectively.