• Title/Summary/Keyword: Reliable Wireless Network

Search Result 311, Processing Time 0.022 seconds

Relay Cooperative Transmission Scheme for an WiMedia based Shipboard Wireless Bridge (와이미디어기반 선내 무선 브릿지용 릴레이 협력통신 방식)

  • Jeon, Dong-Keun;Lee, Yeonwoo
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.687-696
    • /
    • 2014
  • An integrated ship area network has functionality of remote control and autonomous management of various sensors and instruments embedded or boarded in a ship. For such environment, an wireless bridge is essential to transmit control and/or managing information to sensors or instruments from a central integrated ship area network station. In this paper, one of reliable schemes of WiMedia based wireless bridge using relay cooperative transmission using WiMedia distributed MAC protocol is proposed to increase a communication reliability between cluster headers, irrespective of channel variation. Simulation results show that the proposed wireless bridge using relay cooperative transmission scheme increases communication reliability.

A Protocol for Reliable Data Transfer and Congestion Control in Wireless Sensor Networks (무선 센서 네트워크에서 신뢰성 있는 데이터 전송과 혼잡 제어를 위한 프로토콜)

  • Kim, Hyun-Tae;Joo, Young-Hoon;Ra, In-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.3
    • /
    • pp.230-234
    • /
    • 2007
  • Generally, huge amounts of data traffic are generated by using broadcasting method to deliver sensing data to a sink node reliably so that it makes a severe network saturation problem resulting in unreliable data transfer. In order to handle this problem, a new congestion control protocol is required for supporting reliable data transfer, minimal use of energy and network resources at the same time in wireless sensor networks. In this paper, it proposes a Protocol to guarantee both a reliable transfer in data accuracy and minimum consumption of energy waste by using Hop-by-Hop sequence number and DSbACK(Delayed and Selective ACK Buffer Condition) scheme. In addition, it proves that reliability and energy efficiency are enhanced by the proposed method with the simulation results performed on TinyOS platform which is a component based built-in OS announced by UC Berkely with the performance comparison of other existing methods.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

Wireless sensor networks for underground railway applications: case studies in Prague and London

  • Bennett, Peter J.;Soga, Kenichi;Wassell, Ian;Fidler, Paul;Abe, Keita;Kobayashi, Yusuke;Vanicek, Martin
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.619-639
    • /
    • 2010
  • There is increasing interest in using structural monitoring as a cost effective way of managing risks once an area of concern has been identified. However, it is challenging to deploy an effective, reliable, large-scale, long-term and real-time monitoring system in an underground railway environment (subway / metro). The use of wireless sensor technology allows for rapid deployment of a monitoring scheme and thus has significant potential benefits as the time available for access is often severely limited. This paper identifies the critical factors that should be considered in the design of a wireless sensor network, including the availability of electrical power and communications networks. Various issues facing underground deployment of wireless sensor networks will also be discussed, in particular for two field case studies involving networks deployed for structural monitoring in the Prague Metro and the London Underground. The paper describes the network design, the radio propagation, the network topology as well as the practical issues involved in deploying a wireless sensor network in these two tunnels.

Reliable Data Transmission Based on Erasure-resilient Code in Wireless Sensor Networks

  • Lei, Jian-Jun;Kwon, Gu-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.1
    • /
    • pp.62-77
    • /
    • 2010
  • Emerging applications with high data rates will need to transport bulk data reliably in wireless sensor networks. ARQ (Automatic Repeat request) or Forward Error Correction (FEC) code schemes can be used to provide reliable transmission in a sensor network. However, the naive ARQ approach drops the whole frame, even though there is a bit error in the frame and the FEC at the bit level scheme may require a highly complex method to adjust the amount of FEC redundancy. We propose a bulk data transmission scheme based on erasure-resilient code in this paper to overcome these inefficiencies. The sender fragments bulk data into many small blocks, encodes the blocks with LT codes and packages several such blocks into a frame. The receiver only drops the corrupted blocks (compared to the entire frame) and the original data can be reconstructed if sufficient error-free blocks are received. An incidental benefit is that the frame error rate (FER) becomes irrelevant to frame size (error recovery). A frame can therefore be sufficiently large to provide high utilization of the wireless channel bandwidth without sacrificing the effectiveness of error recovery. The scheme has been implemented as a new data link layer in TinyOS, and evaluated through experiments in a testbed of Zigbex motes. Results show single hop transmission throughput can be improved by at least 20% under typical wireless channel conditions. It also reduces the transmission time of a reasonable range of size files by more than 30%, compared to a frame ARQ scheme. The total number of bytes sent by all nodes in the multi-hop communication is reduced by more than 60% compared to the frame ARQ scheme.

Reliable Transmission of Bio-Data for IEEE 11073 PHD Standards at 6LoWPAN Multi-Hop Wireless Sensor Networks (6LoWPAN 멀티-홉 무선 센서 네트워크에서의 IEEE 11073 PHD 표준을 위한 신뢰성 있는 생체 정보 전송)

  • Woo, Yeon Kyung;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.116-123
    • /
    • 2013
  • In mobile healthcare applications, the reliable transmission of the bio-data is very important. In this article, we present a reliable bio-data transmission technique for mobile healthcare monitoring service at 6LoWPAN multi-hop wireless networks. In particular, we expand IEEE 11073-20601 protocol, and propose the reliable path construction for 6LoWPAN aimed to reliably provide mobile healthcare service over wireless sensor network, using IPv6 network. 6LoWPAN is recognized possibility because it is agree with sensor network by raising Adaptation layer on the MAC layer to transmit IPv6 packets. In this article proposed minimize the algorithm complexity and reliability routing protocol because the 6LoWPAN devices are suitable for low cost, small size and battery that can be used to health care system environment. And detailed procedures and algorithms are presented. We the proposed method to prove the superiority of using NS-3 for compareing with AODV protocol.

Real-time Water Monitoring System for Small Water Supply Facility using High Reliable Wireless Sensor Network (고신뢰 무선센서네트워크를 이용한 실시간 수질 모니터링 시스템)

  • Kang, Hoyong;Jang, Youn-Seon
    • Journal of Sensor Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.331-341
    • /
    • 2015
  • In this paper, real-time water quality monitoring system of small water supply facilities based on IEEE 802.15.4e-2012 DSME MAC and IEEE 802.15.4g-2012 PHY standard is presented, which is capable to acquire for highly reliable water quality information in the wide outdoor areas for effective water quality management of small water quality facilities is distributed in the long distance and remote areas. Previously, Long distance transmission is difficult in most water quality sensor module is using RS-485 protocol. But with this system, even in harsh outdoor environment, it is possible to establish a radio wave sensor in a wide area network, and not only water quality sensor shall be connected to the wireless system, but also wireless integrated management system shall provide more effective way of management of the numerous small water supply facilities spread throughout the community, so that the administrator can remotely monitor the data of water turbidity, pH, residual chlorine in the water-supply, water-level, and generate alarm to cope with risks. The management of small water facilities is done by residents will be very effective to notice water quality information of small water facilities to residents.

Performance Analysis of Multimedia CDMA Network with Concatenated Coding and RAKE Receiver

  • Roh Jae-Sung;Kim Choon-Gil;Cho Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.3
    • /
    • pp.139-144
    • /
    • 2004
  • In order to transmit various types of multimedia data (i.e. voice, video, and data) over a wireless channel, the coding and modulation scheme needs to be flexible and capable of providing a variable quality of service, data rates, and latency. In this paper, we study a mobile multimedia COMA network combined with the concatenated Reed-Solomon/Rate Compatible Punctured Convolution code (RS/RCPC). Also, this paper propose the combination of concatenated RS/RCPC coder and COMA RAKE receiver for multimedia COMA traffic which can be sent over wireless channels. From the results, using a frequency selective Rayleigh fading channel model, it is shown that concatenated RS/RCPC coder at the wireless physical layer can be effective in providing reliable wireless multimedia CDMA network. And the proposed scheme that combine concatenated RS/RCPC coder and CDMA RAKE receiver provides a significant gain in the BER performance over multi-user interference and multipath frequency selective fading channels.

INTERFERENCE CHARACTERISTICS OF CONSTRUCTION ENVIRONMENT FOR WSN APPLICATIONS

  • Sun-Chan Bae;Won-Sik Jang;Sang-Dae Park;Won-Suk Jang
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.592-595
    • /
    • 2013
  • Advent of Wireless Sensor Networks (WSN) has provided potentials to a variety of construction applications. It is well appreciated that WSNs have advantages over traditional wired system, such as ease of installation and maintenance with increased cost savings and efficiencies. However, the obstruction of wireless signal from physical objects in the heterogeneous construction environment often brings challenges to WSN measurement system. This paper analyzed the obstruction characteristic of construction environment where construction materials, equipment, and built structures obstruct the wireless signal yielding negative effect of measurement system. By adopting evaluation criteria, such as packet reception rate, field experiments have been implemented to quantitatively identify the interference of wireless signal from penetration, reflection, and network traffic under the construction environment. The results show that reliable performance of wireless sensor in construction environment depends on the optimal separation distance between a receiver and a transmitter, obstruction types, obstruction thickness, and transmission interval. In addition, the methodology and experimental results of this paper could be used in the practical design of network topology when hundreds of sensor nodes form a mesh network in the large scale construction applications.

  • PDF

Policy-Based Identity Authentication and Transmission Architecture for Highly Reliable Emergency Bio-Data Management in Wireless Mesh Network for U-Healthcare (U-헬스케어를 위한 무선 매쉬 네트워크에서 고 신뢰성 있는 응급 생체 데이터 관리를 위한 정책기반의 신원 인증 및 전송 구조)

  • Chun, Seung-Man;Woo, Yeung-Kyung;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.21-29
    • /
    • 2013
  • This paper proposed the architecture of the authentication and the transmission for high reliable emergency data management based on U-healthcare wireless mesh networks. In U-healthcare monitoring service, the high reliable bio data management as well as the data transmission are required because the monitoring emergency bio data is related linked to life. More specifically, the technologies of the identity authentication of the measuring bio data, the personalized emergency status diagnosis who is authenticated the bio data and the emergency data transmission are important first of all. To do this, this paper presents the structure and protocol of the identity authentication management with using the extended IEEE 11073 PHD, the structure of policy-based management of the emergency bio data for the highly reliable management and the resilient routing protocol based on wireless mesh network for the reliable data transmission.