• Title/Summary/Keyword: Topology changes

Search Result 200, Processing Time 0.027 seconds

Location Based Concierge Service with Spatially Extended Topology for Moving Objects

  • Lee, Byoung-Jae
    • Spatial Information Research
    • /
    • v.17 no.4
    • /
    • pp.445-454
    • /
    • 2009
  • Beyond simple transfer of information through sensor network, this study will provide the insights about the way to embody the real context aware location based service in an ubiquitous computing environment. In this paper, a new formal approach is introduced to derive knowledge about the scope of influence for a point object. A scope of influence is defined as the conceptual area where there is a possibility of the phenomenon or event occurring because of this point object. A point object can be spatially extended by considering this scope of influence in conjunction with the point. These point objects are called Spatially Extended Point (SEP) objects. Compositions of gradual changes of topological relations between a SEP and the environment near the SEP show how to represent the qualitative spatial behaviors of a SEP objects. These qualitative spatial behaviors will be good standards for Location Based Service (LBS) to provide more subdivided and suitable information to the users.

  • PDF

Mobility Management for ILNP-based Tactical Network (전술 네트워크를 위한 ILNP 기반 환경에서의 이동성 관리 기술)

  • Sun, Kyoungjae;Kim, Younghan;Noh, Hongjun;Park, Hyungwon;Han, Myounghun;Kwon, Daehoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.246-256
    • /
    • 2020
  • In the future Network Centric Warfare(NCW), changing to IPv6 based network environment is required to enable various future technologies such as the Internet of Things(IoT) and cloud technology which are expected to be introduced to the tactical network evolution. With the change to the IPv6 network, an ID/LOC(Identifier/Location) separation protocol that decomposes context of the IP address to location and identifier can enhance network capacity of increasing number of device and provide efficient mobility management in the tactical network that changes topology dynamically. In this paper, we choose ILNP(Identifier-Locator Network Protocol) as an ID/LOC separation for tactical network environment. In addition to ILNP-based tactical network design, this paper proposes a network-based mobility management scheme for providing efficient mobility management. Through numerical performance analysis, we show that the proposed scheme can reduce network loads more effectively than the conventional IP-based mobility management scheme and common handover procedure in ILNP.

A Study on Cross-Layer Network Synchronization Architecture for TDMA-Based Mobile Ad-Hoc Networks (TDMA 기반 MANET을 위한 계층교차적 네트워크 동기 아키텍처 연구)

  • Seo, Myung-Hwan;Kim, Joung-Sik;Cho, Hyung-Weon;Jung, Sung-Hun;Park, Jong-Ho;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.647-656
    • /
    • 2012
  • TDMA MAC protocol in MANET requires precise network synchronization between nodes though network topology changes continuously due to node mobility and the effect of propagation environment. In this paper we propose in-band cross-layer network synchronization architecture for TDMA-based MANETs. In the proposed architecture TDMA MAC protocol and proactive routing protocol cooperate closely to rapidly detect network partition and merge caused by node mobility and to precisely maintain network synchronization. We also implement the proposed synchronization architecture in OPNET simulator and evaluate the performance of it in various simulation scenarios. Simulation results show that our architecture stably maintains network time synchronization in both network partition and merge situations.

A Study on the Implement of Test Bed for Ad-hoc Networks (Ad-hoc 네트워크 테스트 베드 구현에 관한 연구)

  • Lee, Heung-Jae;Ga, Soon-Mo;Choe, Jin-Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1059-1067
    • /
    • 2006
  • AODV(Ad-hoc On-demand Distance Vector) routing protocol was devised for use of mobile nodes in Ad-hoc network. When we use the AODV routing protocol in Ad-hoc networks with high mobility, disturbance of optimized route path and link break occur. In order to solve the shortcomings, this paper proposes a new routing protocol in which new routing control messages are added to the existing AODV. The proposed protocol minimizes link break and transmission delay while is able to secure the optimized route path constantly in changes of network topology The performance of the proposed routing protocol was evaluated by using us2 network simulator. The actual Ad-hoc network test bed provides us the most reliable experimental data for Ad-hoc networks. In order to support this experimental environment, the dissertation also developed an efficient embedded system on which AODV routing protocol, NAT, Netfilter can run and other event message can be verified without declining efficiency. The correct operation of AODV routing protocol has been verified in both the Ad-hoc network test bed in which the embedded system was used, and Ad-hoc networks linked with Ethernet backbone network.

Sensitivity Analysis of the Runoff Model Parameter for the Optimal Design of Hydrologic Structures (수공구조물의 적정설계를 위한 유출모형 매개변수의 민감도 분석)

  • Lee, Jung-Hoon;Kim, Mun-Mo;Yeo, Woon-Kwang
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.755-758
    • /
    • 2008
  • Currently, the increased run-off and the shortened arrival time are one of the causes of the city environmental disasters in urbanization. Therefore, it is necessary to properly design the hydrologic structures, but it is very difficult to forecast the values necessary to design from the planning stage. Moreover, as the parameter is changed due to the urban development, it is difficult not only to analyze the run-off influences but also to find the related studies and literatures. The purpose of this study is to utilize the results as the important basic data of the hydrologic structures, its proper design and run-off influences through the sensibility analysis of the model parameter variables. In this study, the absolute and relative sensibility analysis method were used to find out the correlation through the sensibility analysis of the topology and hydrology parameters. Especially, in this study, the changes in the run-off amount and volume were calculated according to increase/decrease in CN, the coefficient of discharge, and the empirical formula is prepared and proposed through the regressive analysis among the parameters. In the meantime, the parameter sensibility analysis was performed through the simulation HEC-HMS that is used and available in Korea. From the results of this study, it was found that the run-off amount is increased about by 10% when the CN value is increased by 5% before and after the development through the HEC-HMS simulation and data analysis. As long as there will be additional data collection analysis and result verification, and continuous further studies to find out the parameters proper to the domestic circumstances, it is expected to considerably contribute to the proper design of the hydrologic structures with respect to the ungauged basin.

  • PDF

Active Frequency with a Positive Feedback Anti-Islanding Method Based on a Robust PLL Algorithm for Grid-Connected PV PCS

  • Lee, Jong-Pil;Min, Byung-Duk;Kim, Tae-Jin;Yoo, Dong-Wook;Yoo, Ji-Yoon
    • Journal of Power Electronics
    • /
    • v.11 no.3
    • /
    • pp.360-368
    • /
    • 2011
  • This paper proposes an active frequency with a positive feedback in the d-q frame anti-islanding method suitable for a robust phase-locked loop (PLL) algorithm using the FFT concept. In general, PLL algorithms for grid-connected PV PCS use d-q transformation and controllers to make zero an imaginary part of the transformed voltage vector. In a real grid system, the grid voltage is not ideal. It may be unbalanced, noisy and have many harmonics. For these reasons, the d-q transformed components do not have a pure DC component. The controller tuning of a PLL algorithm is difficult. The proposed PLL algorithm using the FFT concept can use the strong noise cancelation characteristics of a FFT algorithm without a PI controller. Therefore, the proposed PLL algorithm has no gain-tuning of a PI controller, and it is hardly influenced by voltage drops, phase step changes and harmonics. Islanding prediction is a necessary feature of inverter-based photovoltaic (PV) systems in order to meet the stringent standard requirements for interconnection with an electrical grid. Both passive and active anti-islanding methods exist. Typically, active methods modify a given parameter, which also affects the shape and quality of the grid injected current. In this paper, the active anti-islanding algorithm for a grid-connected PV PCS uses positive feedback control in the d-q frame. The proposed PLL and anti-islanding algorithm are implemented for a 250kW PV PCS. This system has four DC/DC converters each with a 25kW power rating. This is only one-third of the total system power. The experimental results show that the proposed PLL, anti-islanding method and topology demonstrate good performance in a 250kW PV PCS.

Decentralized Group Key Management for Untrusted Dynamic Networks (신뢰할 수 없는 동적 네트워크 환경을 위한 비중앙화 그룹키 관리 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.263-274
    • /
    • 2009
  • Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by confining the impact of a membership change in a local area. However, many of the previous decentralized solutions reveal the plaintext to the intermediate relaying proxies, or require the key distribution center to coordinate secure group communications between subgroups. In this study, we propose a decentralized group key management scheme that features a mechanism allowing a service provider to deliver the group key to valid members in a distributed manner using the proxy cryptography. In the proposed scheme, the key distribution center is eliminated while data confidentiality of the transmitted message is provided during the message delivery process. The proposed scheme can support a secure group communication in dynamic network environments where there is no trusted central controller for the whole network and the network topology changes frequently.

Performance Analysis of Drone-type Base Station on the mmWave According to Radio Resource Management Policy (무선자원 운용방안에 따른 밀리미터파 대역에서의 드론형 기지국 성능분석)

  • Jeong, Min-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.917-926
    • /
    • 2019
  • At present, TICN has been developed and distributed for military command control. TICN is known as the 3.5G mobile communication technology based on WiBro, which shows technical limitation in the field operation situation. Accordingly, the drone-type base station platform is attracting attention as an alternative to overcome technical limitations such as difficulty in securing communication LoS and limiting expeditious network configuration. In this study, we performed simulation performance evaluation of drone-type base station operation in 28 GHz that is considered most suitable for cellular communication within mmWave frequency band. Specifically, we analyzed the changes in throughput and fairness performance according to radio resource management policies such as frequency reuse and scheduling in multi-cell topology. Through this, we tried to provide insights on the operation philosophy on drone-type base station.

Modeling and Simulation for using Multiple Routing Protocols in Wireless Sensor Networks (무선 센서 네트워크에서 다중 라우팅 프로토콜 사용을 위한 모델링과 시뮬레이션)

  • Nam, Su Man;Cho, Tae Ho;Kim, Hyung Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.73-82
    • /
    • 2020
  • In the fourth industrial revolution, wireless sensor networks (WSNs) are an important element of collecting and analyzing data in a variety of environments without human intervention. This sensor network is greatly affected by topology and routing protocols. Routing protocols, which affect energy consumption, are executed after deploying sensor nodes. Once built, they are difficult to change. Before the WSN is deployed, a routing protocol is carefully selected in view of various environments and the performance of the protocol is evaluated. In this paper, we propose a model to simulate multiple routing protocols using a discrete event system specification (DEVS). The DEVS-based proposed model simulates various situations without changes and structures of the its model as algorithms of the routing protocols are implemented in its coordinators model. To verify normal behaviors of the proposed model, the number of report delivery and the energy consumption of the sensor network were compared using representative protocols LEACH and Dijkstra. As a result, it was confirmed that the proposed model executes normally in both routing protocols.

Tactical Service Mesh for Intelligent Traffic QoS Coordination over Future Tactical Network (미래 전술망의 지능적 트래픽 QoS 조율을 위한 전술 서비스 메쉬)

  • Kang, Moonjoong;Shin, Jun-Sik;Park, Juman;Park, Chan Yi;Kim, JongWon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.369-381
    • /
    • 2019
  • As tactical networks are gradually shifting toward IP-based flexible operation for diversified battlefield services, QoS(Quality-of-Service) coordination for service differentiation becomes essential to overcome the heterogeneous and scarce networking resources limitations. QoS coordination for tactical network traffic should be able to monitor and react the dynamic changes in underlying network topology and service priorities. In this paper, by adopting the emerging cloud-native service mesh concept into tactical network context, we study the feasibility of intelligent QoS coordination by employing tactical service mesh(TSM) as an additional layer to support enhanced traffic quality monitoring and control. The additional TSM layer can leverage distributed service-mesh proxies at tactical mesh WAN(Wide Area Network) nodes so that service-aware differentiated QoS coordination can be effectively designed and integrated with TSM-assisted traffic monitoring and control. Also, by validating the feasibility of TSM layer for QoS coordination with miniaturized experimental setup, we show the potential of the proposed approach with several approximated battlefield traffics over a simulated TSM-enabled tactical network.