• Title/Summary/Keyword: Protocols

Search Result 3,952, Processing Time 0.029 seconds

Performance Comparison between Hierarchical Routing Protocols applying New Performance Evaluation Items (성능 비교 항목들을 적용한 계층형 라우팅 프로토콜간의 성능비교)

  • Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.51-57
    • /
    • 2020
  • WSN is a wirelessly configured network of sensor nodes with limited power such as batteries. If the sensor node's battery is exhausted, the node is no longer available. Therefore, if the network is to be used for a long time, energy consumption should be minimized. There are many Wireless Sensor Network Protocols to improve energy efficiency, including Cluster-based and chain-based Protocols. This paper seeks to examine the performance evaluation of routing protocols studied separately for the improvement of performance in wireless sensor network. The criteria for comparison were selected as the LEACH protocol, a representative hierarchical routing protocol, and the comparison targets considered CHEF and FLCFP and LEACH-DFL routing protocols with Fuzzy Logic. Various criteria for performance comparison were presented in this paper, and the performance was compared through simulation of each protocol. The purpose is to present a reference point for comparing the performance of other protocols through the performance comparison of CHEF, FLCFP, and LEACH-DFL, protocols with LEACH and Fuzzy Logic, and to provide additional design methods for improving the performance of protocols.

Modeling and Simulation for using Multiple Routing Protocols in Wireless Sensor Networks (무선 센서 네트워크에서 다중 라우팅 프로토콜 사용을 위한 모델링과 시뮬레이션)

  • Nam, Su Man;Cho, Tae Ho;Kim, Hyung Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.73-82
    • /
    • 2020
  • In the fourth industrial revolution, wireless sensor networks (WSNs) are an important element of collecting and analyzing data in a variety of environments without human intervention. This sensor network is greatly affected by topology and routing protocols. Routing protocols, which affect energy consumption, are executed after deploying sensor nodes. Once built, they are difficult to change. Before the WSN is deployed, a routing protocol is carefully selected in view of various environments and the performance of the protocol is evaluated. In this paper, we propose a model to simulate multiple routing protocols using a discrete event system specification (DEVS). The DEVS-based proposed model simulates various situations without changes and structures of the its model as algorithms of the routing protocols are implemented in its coordinators model. To verify normal behaviors of the proposed model, the number of report delivery and the energy consumption of the sensor network were compared using representative protocols LEACH and Dijkstra. As a result, it was confirmed that the proposed model executes normally in both routing protocols.

Effects of the cone-beam computed tomography protocol on the accuracy and image quality of root surface area measurements: An in vitro study

  • Chanikarn Intarasuksanti;Sangsom Prapayasatok;Natnicha Kampan;Supassara Sirabanchongkran;Pasuk Mahakkanukrauh;Thanapat Sastraruji;Pathawee Khongkhunthian;Kachaphol Kuharattanachai;Kanich Tripuwabhrut
    • Imaging Science in Dentistry
    • /
    • v.53 no.4
    • /
    • pp.325-333
    • /
    • 2023
  • Purpose: The objective of this study was to evaluate and compare the accuracy and image quality of root surface area (RSA) measurements obtained with various cone-beam computed tomography (CBCT) protocols, relative to the gold standard of micro-computed tomography (CT), in an in vitro setting. Materials and Methods: Four dry human skulls were scanned using 8 different protocols, with voxel sizes of 0.15 mm, 0.3 mm, and 0.4 mm. Three-dimensional models of the selected teeth were constructed using CBCT and microCT protocols, and the RSA was automatically measured by the image-processing software. The absolute difference in the percentage of the RSA(%ΔRSA) was calculated and compared across the 8 CBCT protocols using repeatedmeasures analysis of variance. Finally, image quality scores of the RSA measurements were computed and reported in terms of percent distribution. Results: No significant differences were observed in the %ΔRSA across the 8 protocols (P>0.05). The deviation in %ΔRSA ranged from 1.51% to 4.30%, with an increase corresponding to voxel size. As the voxel size increased, the image quality deteriorated. This decline in quality was particularly noticeable at the apical level of the root, where the distribution of poorer scores was most concentrated. Conclusion: Relative to CBCT protocols with voxel sizes of 0.15mm and 0.3mm, the protocols with a voxel size of 0.4 mm demonstrated inferior image quality at the apical levels. In spite of this, no significant discrepancies were observed in RSA measurements across the different CBCT protocols.

Throughput Analysis for Blast Protocols under Markov Error Type (마코프 에러형태 하에서의 Blast 프로토콜의 수율 분석)

  • Hong, Jung-Sik;Hong, Jung-Wan;Lie, Chang-Hoon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.23 no.4
    • /
    • pp.687-698
    • /
    • 1997
  • In this paper, a Variation of Blast with Go-Back-N(V-BGBN) protocol is proposed, which differs from Blast with Go-Back-N(BGBN) and Blast with Full Retransmission on Error(BFRE) protocols in the retransmission strategy of packets. Performances of these three protocols under correlated packet errors are analyzed. Throughput efficiency of an arbitrary packet is obtained under the assumption that the round trip delay and the packet length are respectively constant. Recursive formula and difference equations are used as analytical tools. Correlation of packet errors is modelled by a two state Markov chain. The throughput efficiencies under these protocols are compared. V-BGBN protocol is shown to be superior to other two protocols in high speed network.

  • PDF

Analysis on Security Vulnerability of Password-based key Exchange and Authentication Protocols (패스워드 기반 키 교환 및 인증 프로토콜의 안전성에 관한 분석)

  • Park, Choon-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1403-1408
    • /
    • 2008
  • A number of three party key exchange protocols using smart card in effort to reduce server side workload and two party password based key exchange authentication protocols has been proposed. In this paper, we introduce the survey and analysis on security vulnerability of smart card based three party authenticated key exchange protocols. Furthermore, we analyze Kwak et al's password based key exchange and authentication protocols which have shown security weakness such as Shim et al's off-line password guessing attack and propose the countermeasure to deter such attack.

  • PDF

Design and performance evaluation of WDMA protocols for high-speed optical network (수동 성형 구조의 고속 광통신망을 위한 WDMA 프로토콜 및 성능평가에 관한 연구)

  • 이호숙;최형윤;이남준;박성우;김영천
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.2
    • /
    • pp.59-68
    • /
    • 1996
  • In this paper, we propose two types of WDMA protocol for multi-wavelength optical networks that have a dedicated control channel. Protocol type I is designed for the case that the number of nimislots is less than the number of nodes (La${\ge}$M). Proposed protocols employ the aging scheme to guarantee a fairness in the process of channel allocation. The perfomrance of proposed protocols are evaluated in terms of throughput and delay with variations in offered load. Simulation results show that the proposed protocols have superior performance to conventional protocols.

  • PDF

Discrete-Event Based Packet Simulation for Sensor Network Routing Protocols (분산이벤트 기반 센서네트워크 패킷 라우팅 프로토클 시뮬레이션)

  • Chung, Kyung-Yul;Lee, Hoo-Rock;Choi, Dae-Seok;Kim, Yong-Sik;Lee, Soo-Tae;Rhyu, Keel-Soo
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2006.06a
    • /
    • pp.79-81
    • /
    • 2006
  • Simulation and physical implementation are both valuable tools in evaluating sensor network routing protocols, but neither alone is sufficient. In this paper, we present the implementation and analysis of sensor routing protocols on the discrete-event simulation system that allows existing nesC codes of sensor network routing protocols to be used to create a physical implementation of the same protocol. We have evaluated the Surge function of TinyOS through example implementations in the Ptolemy II of the unmodified codes and Direct-diffusion routing protocols using VIPTOS simulation models.

  • PDF

An Efficient Embedding Structure for Heterogeneous Routing Protocols in Wireless Mesh Routers (무선 메쉬 라우터에서 이종 라우팅 프로토콜의 효율적인 탑재구조)

  • Lee, Youngsuk;Kim, Younghan
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.4
    • /
    • pp.209-213
    • /
    • 2007
  • In this paper, we propose more efficient implementation architecture for realizing combination of heterogeneous routing protocols in wireless mesh routes. For realizing heterogeneous routing protocol in wireless mesh router, the following should be considered; which position in OS platform protocols should be implemented, how to define the common API for multiple routing protocols, how to provide architecture for providing high data transfer throughput and for supporting multi platform, and finally how to verify the throughput of protocol by using simulator. For solving those consideration, we propose HRPC(Heterogeneous Routing Protocol Coordinator) and describe the method for testing the protocols.

  • PDF

Feature Modeling with Multi-Software Product Line of IoT Protocols

  • Abbas, Asad;Siddiqui, Isma Fara;Lee, Scott Uk-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.79-82
    • /
    • 2017
  • IoT devices are interconnected in global network with different functionalities and manage the data transfer in cloud computing. IoT devices can be used anytime, anywhere with any device with different applications and protocols. Same devices but different applications according to end user requirements such as sensors and Wi-Fi devices, reusability of these applications can enhance the development process. However, large number of variations in cloud computing make it difficult the features selection in application because of compatibility issues of devices. In this paper we have proposed multi-Software Product Lines (multi-SPLs) approach to manage the variabilities and commonalities of IoT applications and protocols. Feature modeling is used to manage the commonalities and variabilities of SPL. We proposed that multi-SPLs feature model is more appropriate for modeling of IoT applications and protocols.

  • PDF

Fuzzy based Energy-Efficient Adaptive Routing Algorithm for Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 퍼지 기반 적응형 라우팅 알고리즘 및 시뮬레이션)

  • Hong, Soon-Oh;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.4
    • /
    • pp.95-106
    • /
    • 2005
  • Recent advances in wireless sensor networks have led to many routing protocols designed for energy-efficiency in wireless sensor networks. Despite that many routing protocols have been proposed in wireless sensor networks, a single routing protocol cannot be energy-efficient if the environment of the sensor network varies. This paper presents a fuzzy logic based Adaptive Routing (FAR) algorithm that provides energy-efficiency by dynamically changing protocols installed at the sensor nodes. The algorithm changes protocols based on the output of the fuzzy logic which is the fitness level of the protocols for the environment. A simulation is performed to show the usefulness of the proposed algorithm.

  • PDF