• Title/Summary/Keyword: Throughput Evaluation

Search Result 384, Processing Time 0.027 seconds

Maximizing the capacity of the IoT-based WSNs by employing the MIM capability (MIM 적용을 통한 IoT 기반 무선 센서 네트워크 성능 최대화 방안)

  • Kang, Young-myoung
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.9-15
    • /
    • 2020
  • Wireless sensor nodes adopting the advanced preamble detection function, Message-In-Mesage (MIM), maximize the concurrent transmission opportunities due to the capture effect, result in improving the system performance significantly compared to the legacy IEEE 802.15.4 based sensor devices. In this paper, we propose an MIM capture probability model to analyze the performance gains by applying the MIM function to the wireless sensor nodes. We implemented the IEEE 802.15.4 and MIM by Python and performed extensive simulations to verify the performance gains through MIM capture effects. The evaluation results show that the MIM sensors achieve 34% system throughput gains and 31% transmission delay gains over the legacy IEEE 802.15.4-based sensors, which confirm that it was consistent with the analysis result of the proposed MIM capture probability model.

Cross-layer Design and its Performance Evaluation of Joint Routing and Scheduling for Maximizing Network Capacity of Wireless Mesh Networks (무선 메쉬 네트워크의 최대 전송 성능을 위한 라우팅과 스케쥴링의 계층 교차적 설계 및 성능 분석)

  • Min, Seokhong;Kim, Byungchul;Lee, Jaeyong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.30-45
    • /
    • 2014
  • Recently, multimedia application users who demand for ubiquitous computing environment are rapidly increasing, and wireless mesh network is receiving attention as a cost-effective key technology for next generation wireless networking. When multiple flows are transmitting data at the same time in the network, routing for path selection of each flow and link resource allocation for data transmission of each flow are one of the key factors that influence to the effectiveness of the network directly. In this paper, we consider problems for path discovery and resource allocation of links at the same time and we propose an algorithm based on mathematical modeling using a technique for cross-layer optimization design in STDMA-based wireless mesh networks that can enhance transfer performance for each flow. We show by performance analysis that the proposed algorithm can enhance the throughput performance by maximally utilizing given bandwidth resources when the number of flows increase in multi-hop wireless mesh networks.

A Synchronized Job Assignment Model for Manual Assembly Lines Using Multi-Objective Simulation Integrated Hybrid Genetic Algorithm (MO-SHGA) (다목적 시뮬레이션 통합 하이브리드 유전자 알고리즘을 사용한 수동 조립라인의 동기 작업 모델)

  • Imran, Muhammad;Kang, Changwook
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.4
    • /
    • pp.211-220
    • /
    • 2017
  • The application of the theoretical model to real assembly lines has been one of the biggest challenges for researchers and industrial engineers. There should be some realistic approach to achieve the conflicting objectives on real systems. Therefore, in this paper, a model is developed to synchronize a real system (A discrete event simulation model) with a theoretical model (An optimization model). This synchronization will enable the realistic optimization of systems. A job assignment model of the assembly line is formulated for the evaluation of proposed realistic optimization to achieve multiple conflicting objectives. The objectives, fluctuation in cycle time, throughput, labor cost, energy cost, teamwork and deviation in the skill level of operators have been modeled mathematically. To solve the formulated mathematical model, a multi-objective simulation integrated hybrid genetic algorithm (MO-SHGA) is proposed. In MO-SHGA each individual in each population acts as an input scenario of simulation. Also, it is very difficult to assign weights to the objective function in the traditional multi-objective GA because of pareto fronts. Therefore, we have proposed a probabilistic based linearization and multi-objective to single objective conversion method at population evolution phase. The performance of MO-SHGA is evaluated with the standard multi-objective genetic algorithm (MO-GA) with both deterministic and stochastic data settings. A case study of the goalkeeping gloves assembly line is also presented as a numerical example which is solved using MO-SHGA and MO-GA. The proposed research is useful for the development of synchronized human based assembly lines for real time monitoring, optimization, and control.

Efficient Authentication Establishment Scheme between IoT Device based on Pascal Triangle Theory (파스칼 삼각 이론 기반의 IoT 장치간 효율적인 인증 설립 기법)

  • Han, Kun-Hee;Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.15-21
    • /
    • 2017
  • Recently, users' interest in IoT related products is increasing as the 4th industrial revolution has become social. The types and functions of sensors used in IoT devices are becoming increasingly diverse, and mutual authentication technology of IoT devices is required. In this paper, we propose an efficient double signature authentication scheme using Pascal's triangle theory so that different types of IoT devices can operate smoothly with each other. The proposed scheme divides the authentication path between IoT devices into two (main path and auxiliary path) to guarantee authentication and integrity of the IoT device. In addition, the proposed scheme is suitable for IoT devices that require a small capacity because they generate keys so that additional encryption algorithms are unnecessary when authenticating IoT devices. As a result of the performance evaluation, the delay time of the IoT device is improved by 6.9% and the overhead is 11.1% lower than that of the existing technique. The throughput of IoT devices was improved by an average of 12.5% over the existing techniques.

Design and performance evaluation of a storage cloud service model over KREONET (KREONET 기반의 스토리지 클라우드 서비스 모델 설계 및 성능평가)

  • Hong, Wontaek;Chung, Jinwook
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.29-37
    • /
    • 2017
  • Compared to the commercial networks, R&E networks have the strength such as flexible network engineering and design. Based on those features of R&E networks, we propose our storage cloud service model which supports general-purpose network users in a central region and experimental network users in distributed regions simultaneously. We prototype our service model utilizing multiple proxy controllers of OpenStack Swift service in order to deploy several regions via experimental backbone networks. Our experiments on the influence of the network latency and the size of data to be transmitted show that the bigger size of data is preferable to the smaller size of data in an experimental backbone network where the network latency increases within 10ms because the rate of throughput decline in the bigger object is comparatively small. It means that our service model is appropriate for experimental network users who directly access the service in order to move intermittently high volume of data as well as normal users in the central region who access the service frequently.

A Cache Consistency Control for B-Tree Indices in a Database Sharing System (데이타베이스 공유 시스템에서 B-트리 인덱스를 위한 캐쉬 일관성 제어)

  • On, Gyeong-O;Jo, Haeng-Rae
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.593-604
    • /
    • 2001
  • A database sharing system (DSS) refers to a system for high performance transaction processing. In the DSS, the processing nodes are coupled via a high speed network and share a common database at the disk level. Each node has a local memory and a separate copy of operating system. To reduce the number of disk accesses, the node caches data pages and index pages in its memory buffer. In general, B-tree index pages are accessed more often and thus cached at more processing nodes, than their corresponding data pages. There are also complicated operations in the B-tree such as Fetch, Fetch Next, Insertion and Deletion. Therefore, an efficient cache consistency scheme supporting high level concurrency is required. In this paper, we propose cache consistency schemes using identifiers of index pages and page_LSN of leaf page. The propose schemes can improve the system throughput by reducing the required message traffic between nodes and index re-traversal.

  • PDF

An Analytical Model for LR-WPAN Performance in the Presence of Hidden Nodes (은닉노드를 고려한 LR-WPAN 성능의 분석적 모델)

  • Lee, Kang-Woo;Shin, Youn-Soon;Hyun, Gyu-Wan;Ahn, Jong-Suk;Kim, Hie-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.133-142
    • /
    • 2009
  • This paper proposes an analytical performance model of IEEE 802.15.4 in the presence of hidden nodes. Conventional 802.15.4 mathematical models assume ideal situations where every node can detect the transmission signal of every other nodes different from the realistic environments. Since nodes can be randomly located in real environments so that some nodes' presence is hidden from other ones, this assumption leads to wrong performance evaluation of 802.15.4. For solving this problem, we develop an extended performance model which combines the traditional 802.15.4 performance model with one for accounting the presence of hidden nodes. The extended model predicts the rapid performance degradation of 802.15.4 due to the small number of hidden nodes. The performance, for example, degrades by 62% at maximum when 5% of the total nodes are hidden. These predictions are confirmed to be equal to those of ns-2 simulations by less than 6% difference.

Study on Wireless Body Area Network System Design Based on Transmission Rate (전송률을 고려한 WBAN 시스템 설계에 관한 연구)

  • Park, Joo-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.121-129
    • /
    • 2012
  • In this paper, we proposed WBAN system model to management an application that requires low rate data transfer in IEEE 802.15.4. We have to use different wireless sensor network technology to transfer different date rate and emergency message in medical application service. A suitable system model for WBAN and a WBAN MAC protocol in order to solve these existing system problems are proposed. Firstly, the priority queuing was applied to contention access period, and the system model which could guarantee transmission of a MAC command frame was proposed. Secondly, the MAC frame was newly defined to use the system model which was proposed above. Thirdly, WBAN CSMA/CA back-off algorithm based on data transmission rate was proposed to enhance data throughput and transmission probability of the data frame which does not have priority in the proposed WBAN system. The proposed algorithm is designed to be variable CSMA/CA algorithm parameter, depending on data rate. For the evaluation of WBAN CSMA/CA algorithm, we used Castalia. As a result of the simulation, it is found that the proposed system model can not only relieve loads of data processing, but also probability of collision was decreased.

Performance Analysis of Relay-Based Shipboard Wireless Communication Systems (릴레이 기반 선내 무선통신 시스템의 성능 분석)

  • Joo, Yang-Ick;Kim, Beom-Mu;Jeong, Min-A;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.202-208
    • /
    • 2015
  • A wireless ship area network is required to configure and control various sensors and electrical instruments embedded or boarded in a ship. In such environment, wireless communication protocol adopting relaying function is needed because direct link or communication between two nodes is hardly guaranteed due to spatial constraints in a ship. In this study, we introduce and analyze a WiMedia Distributed MAC (D-MAC) based approach considering throughput and energy constraint of wireless communication module. Performance evaluation results demonstrate that the relay-based wireless communication protocol improves reliability of wireless communication network in a ship.

Performance Evaluation of an Adaptive Collision Avoidance Algorithm for IEEE 802.15.4 (IEEE 802.15.4에서 적응적 충돌 회피 알고리즘의 성능분석)

  • Noh, Ki-Chul;Lee, Seung-Yeon;Shin, Youn-Soon;Ahn, Jong-Suk;Lee, Kang-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3A
    • /
    • pp.267-277
    • /
    • 2011
  • Like other wireless network protocols, IEEE 802.15.4 adopts CA (Collision Avoidance)algorithm to avoid the early collision of a new packet by randomizing its first transmission time rather than its immediate delivery. The traditional CA scheme of IEEE 802.15.4, however, selects the random access time from the predetermined range without considering the degree of current congestion. It probably causes either a long delay to settle in the suitable range for the current network load or frequent clashes especially during the long lasting heavy traffic period. This paper proposes an ACA(Adaptive Collision Avoidance) algorithm adapting the initial backoff range to the undergoing collision variations. It also introduces a mathematical model to predict the performance of ACA algorithm added to IEEE 802.15.4. With only small deviations from corresponding simulations, our analytical model shows that ACA technique can improve the throughput of IEEE 802.15.4 by up-to 41% maximally in addition to shortening the packet delays.