• Title/Summary/Keyword: Source Node

Search Result 603, Processing Time 0.03 seconds

A Dynamic Grouping Mechanism in Wireless Sensor Networks (무선 센서 네트워크에서의 동적 그룹화 메커니즘)

  • Park, Kwang-Che;Kim, Hyon-Yul;Bae, Cheol-Soo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.6 no.4
    • /
    • pp.208-215
    • /
    • 2013
  • In recent years, many applications in WSN have increasingly interested in data transfer reliability. In this paper, we propose a dynamic grouping transfer mechanism which maintains both reliability and energy efficiency in transmission from a source to a sink. The proposed scheme considers channel error of each node. Then it uses an end-to-end ACK transmission in a group and a hop-by-hop ACK transmission between groups. Consequently this mechanism minimize the cost of packet transfer along with enhancing the network lifetime and reliability.

In vitro Conservation of Coleus forskohlii- an Endangered Medicinal Plant

  • Rajasekharan P.E.;Ambika S.R.;Ganeshan S.
    • Journal of Plant Biotechnology
    • /
    • v.7 no.2
    • /
    • pp.135-141
    • /
    • 2005
  • Protocols for in vitro conservation was developed for Coleus forskohlii. Plants maintained both in field served as explant source. Shoot tips and single node cuttings were used to optimize protocols for in vitro multiplication. MS basal medium supplemented with $0.54\;{\mu}M$ naphthalene acetic acid (NAA) and $8.87\;{\mu}M$ benzy-ladenine (BA) induced multiple shoots in shoot tips and nodes. Shoot multiplication was amplified with a gradual decrease of BA concentration, leading to its final omission after 4 months. Concomitant rooting on multiplication media enabled successful establishment extra vitrum. For in vitro conservation studies, experiments were carried out with 2-3 week maintained in vitro plants under standard and reduced culture conditions (SCC, RCC). In vitro plants could be successfully conserved in full strength MS medium (FMS) under SCC for 6 months without subculture with full potential to regenerate, producing viable shoots and nodes. The root production remained unaffected due to conservation, showing high rooting activity in mannitol and low temperature treatments. Preset low temperature (15 and $10^{\circ}C$) and reduction in media constituents does not appear to favour conservation, although the former accomplished conservation levels equal to (FMS) under SCC.

Energy Efficient Routing for Satisfying Target Lifetime in Wireless Sensor Networks (무선 센서 네트워크의 목표 수명을 만족시키기 위한 에너지 효율적 라우팅)

  • Lee, Keon-Taek;Park, Sun-Ju;Kim, Hak-Jin;Han, Seung-Jae
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.505-513
    • /
    • 2009
  • In some wireless sensor networks, each wireless sensor network has its own target lifetime (desired lifetime after deployment). However, satisfying the target lifetime is not a trivial problem since the nodes in wireless sensor networks often rely on batteries as their power source. In this paper, we propose an energy efficient routing algorithm that satisfies the target-lifetime requirement of a wireless sensor network. The proposed routing algorithm not only finds energy efficient paths but also optimizes the sensing rate of each sensor node. Through simulation, we compare the performance of the proposed scheme with several other existing algorithms.

Performance Analysis of Forwarding Schemes Based on Similarities for Opportunistic Networks (기회적 네트워크에서의 유사도 기반의 포워딩 기법의 성능 분석)

  • Kim, Sun-Kyum;Lee, Tae-Seok;Kim, Wan-Jong
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.3
    • /
    • pp.145-150
    • /
    • 2018
  • Forwarding in opportunistic networks shows low performance because there may be no connecting paths between the source and the destination nodes due to the intermittent connectivity. Currently, social network analysis has been researched. Specifically, similarity is one of methods of social networks analysis. In this paper, we propose forwarding schemes based on representative similarities, and evaluate how much the forwarding performance increases. As a result, since the forwarding schemes are based on similarities, these schemes only forward messages to nodes with higher similarity as relay nodes, toward the destination node. These schemes have low network traffic and hop count while having stable transmission delay.

Software-Defined Cloud-based Vehicular Networks with Task Computation Management

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.419-421
    • /
    • 2018
  • Cloud vehicular networks are a promising paradigm to improve vehicular through distributing computation tasks between remote clouds and local vehicular terminals. Software-Defined Network(SDN) can bring advantages to Intelligent Transportation System(ITS) through its ability to provide flexibility and programmability through a logically centralized controlled cluster that has a full comprehension of view of the network. However, as the SDN paradigm is currently studied in vehicular ad hoc networks(VANETs), adapting it to work on cloud-based vehicular network requires some changes to address particular computation features such as task computation of applications of cloud-based vehicular networks. There has been initial work on briging SDN concepts to vehicular networks to reduce the latency by using the fog computing technology, but most of these studies do not directly tackle the issue of task computation. This paper proposes a Software-Defined Cloud-based vehicular Network called SDCVN framework. In this framework, we study the effectiveness of task computation of applications of cloud-based vehicular networks with vehicular cloud and roadside edge cloud. Considering the edge cloud service migration due to the vehicle mobility, we present an efficient roadside cloud based controller entity scheme where the tasks are adaptively computed through vehicular cloud mode or roadside computing predictive trajectory decision mode. Simulation results show that our proposal demonstrates a stable and low route setup time in case of installing the forwarding rules of the routing applications because the source node needs to contact the controller once to setup the route.

  • PDF

Software-Defined Cloud-based Vehicular Networks with Task Computation Management

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.238-240
    • /
    • 2018
  • Cloud vehicular networks are a promising paradigm to improve vehicular through distributing computation tasks between remote clouds and local vehicular terminals. Software-Defined Network(SDN) can bring advantages to Intelligent Transportation System(ITS) through its ability to provide flexibility and programmability through a logically centralized controlled cluster that has a full comprehension of view of the network. However, as the SDN paradigm is currently studied in vehicular ad hoc networks(VANETs), adapting it to work on cloud-based vehicular network requires some changes to address particular computation features such as task computation of applications of cloud-based vehicular networks. There has been initial work on briging SDN concepts to vehicular networks to reduce the latency by using the fog computing technology, but most of these studies do not directly tackle the issue of task computation. This paper proposes a Software-Defined Cloud-based vehicular Network called SDCVN framework. In this framework, we study the effectiveness of task computation of applications of cloud-based vehicular networks with vehicular cloud and roadside edge cloud. Considering the edge cloud service migration due to the vehicle mobility, we present an efficient roadside cloud based controller entity scheme where the tasks are adaptively computed through vehicular cloud mode or roadside computing predictive trajectory decision mode. Simulation results show that our proposal demonstrates a stable and low route setup time in case of installing the forwarding rules of the routing applications because the source node needs to contact the controller once to setup the route.

  • PDF

Self-Healing Algorithm for The Restoration of Synchronous Optical Networks (동기식 광전송망 복구를 위한 자체 치유 알고리즘)

  • 장윤선;지윤규;김홍주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.6
    • /
    • pp.1158-1168
    • /
    • 1994
  • The paper proposes a distributed control self-healing algorithm for a line failure to improve the restoration time. This proposed self-healing algorithm acquired the fast restoration time by reducing the number of control messages and the queueing delay. And the reduction of queueing delay was attained by the ASC_NULL(Available Spare Channel_NULL) message which informs neighbor nodes that a source node has no available spare channel to reduce the waste of time during the rerouting. It is difficult for this proposed self-healing algorithm to be compared with other self-healing algorithms, because each self-healing algorithm has different simulation conditions. So, the performance of the proposed self-healing algorithm was compared with only NETRATS(NETwork Restoration Algorithm for Telecommunication Systems). The results of the simulation showed that the proposed self-healing algorithm was better than NETRATS in the restoration time.

  • PDF

Scalable Data Provisioning Scheme on Large-Scale Distributed Computing Environment (대규모 분산 컴퓨팅 환경에서 확장성을 고려한 실시간 데이터 공급 기법)

  • Kim, Byungs-Sang;Youn, Chan-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.18A no.4
    • /
    • pp.123-128
    • /
    • 2011
  • As the global grid has grown in size, large-scale distributed data analysis schemes have gained momentum. Over the last few years, a number of methods have been introduced for allocating data intensive tasks across distributed and heterogeneous computing platforms. However, these approaches have a limited potential for scaling up computing nodes so that they can serve more tasks simultaneously. This paper tackles the scalability and communication delay for computing nodes. We propose a distributed data node for storing and allocating the data. This paper also provides data provisioning method based on the steady states for minimizing the communication delay between the data source and the computing nodes. The experimental results show that scalability and communication delay can be achieved in our system.

A Prototype Virtual Network Embedding System using OpenStack

  • Fukushima, Yukinobu;Sato, Kohei;Goda, Itsuho;Ryu, Heung-Gyoon;Yokohira, Tokumi
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.1
    • /
    • pp.60-65
    • /
    • 2017
  • Network virtualization enables us to make efficient use of resources in a physical network by embedding multiple virtual networks in the physical network. In this paper, we develop a prototype of a virtual network embedding system. Our system consists of OpenStack, which is an open source cloud service platform, and shell scripts. Because OpenStack does not provide a quality of service control function, we realize bandwidth reservation for virtual links by making use of the ingress policing function of Open vSwitch, which is a virtual switch used in OpenStack. The shell scripts in our system automatically construct the required virtual network on the physical network using the OpenStack command-line interface, and they reserve bandwidth for virtual links using the Open vSwitch command. Experimental evaluation confirms that our system constructs the requested virtual network and appropriately allocates node and link resources to it.

Analysis for Security Vulnerabilities on DSTM Tunneling (DSTM 터널링 보안 취약점 분석)

  • Cho, Hyug-Hyun;Kim, Jeong-Wook;Noh, Bong-Nam
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.4
    • /
    • pp.215-221
    • /
    • 2007
  • IPv6 is a protocol to solve the address space limitation of IPv4 by IETF. Many transition mechanism to communicate between IPv4 and IPv6 in mixed IPv4/IPv6 network are proposed. DSTM tunneling is a mechanism that dual stack in IPv6 network is able to communicate with node in IPv4 network by dynamic allocating the IPv4 address. This mechanism supports the execution of IPv4 dependent application without modification at IPv6 network. In this paper, we explain the security vulnerability at DSTM network for DHCP attack, TEP attack, and source spoofing attack then describe the result of attacks.

  • PDF