• Title/Summary/Keyword: Topology changes

Search Result 200, Processing Time 0.028 seconds

Vehicle-to-Vehicle Broadcast Protocols Based on Wireless Multi-hop Communication (무선 멀티 홉 통신 기반의 차량간 브로드캐스트 프로토콜)

  • Han, Yong-Hyun;Lee, Hyuk-Joon;Choi, Yong-Hoon;Chung, Young-Uk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.53-64
    • /
    • 2009
  • Inter-vehicular communication that propagates information without infrastructures has drawn a lot of interest. However, it is difficult to apply conventional ad-hoc routing protocols directly in inter-vehicular communication due to frequent changes in the network topology caused by high mobility of the vehicles. MMFP(Multi-hop MAC Forwarding) is a unicast forwarding protocol that transport packets based on the reachability information instead of path selection or position information. However, delivering public safety messages informing road conditions such as collision, obstacles and fog through inter-vehicular communication requires broadcast rather than unicast since these messages contain information valuable to most drivers within a close proximity. Flooding is one of the simplest methods for multi-hop broadcast, but it suffers from reduced packet delivery-ratio and high transmission delay due to an excessive number of duplicated packets. This paper presents two multi-hop broadcast protocols for inter-vehicular communication that extend the MMFP. UMHB(Unreliable Multi-Hop Broadcast) mitigates the duplicated packets of MMFP by limiting the number of nodes to rebroadcast packets. UMHB, however, still suffers from low delivery ratio. RMHB(Reliable Multi-Hop Broadcast) uses acknowledgement and retransmission in order to improve the reliability of UMHB at the cost of increase in transmission delay, which we show through simulation is within an acceptable range for collision avoidance application.

  • PDF

A Study on Backup Route Setup Scheme in Ad Hoc Networks (애드혹 네트워크에서의 보조 경로 설정 기법에 관한 연구)

  • Jung Se-Won;Lee Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.47-58
    • /
    • 2006
  • Due to the movement of nodes, ad-hoc networks suffer from the problems such as the decrease of data delivery ratio, the increase of end-to-end delay, and the increase of routing overhead. The backup routing schemes try to solve these problems by finding the backup routes during the route discovery phase and using them when a route fails. Generally the backup routing schemes outperform the single-path routing schemes in terms of data delivery ratio, end-to-end delay, and routing overhead when the nodes move rapidly. But when the nodes don't move rapidly, the backup routing schemes generate more routing traffics than the single-path routing schemes because they need to exchange packets to find the backup route. In addition, when the backup route fails earlier than the main route, it can not use the backup route because in many backup route algorithms, the backup route is found only at the initial route discovery phase. RBR(Reactive Backup Routing Algorithm) proposed in this paper is an algorithm that provides more stable data delivery than the previous backup routing schemes through the selective maintenance of backup route and the backup route rediscovery. To do that RBR prioritize the backup routes, and maintain and use them selectively Thus it can also decrease the routing overheads. Also, RBR can increase data delivery ratio and decrease delay because it reestablishes the backup route when the network topology changes. For the performance evaluation, OPNET simulator is used to compare RBR with the single-path routing scheme and some of the well known backup routing schemes.

In Situ Spectroscopy in Condensed Matter Physics

  • Noh, Tae Won
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2014.02a
    • /
    • pp.92-92
    • /
    • 2014
  • Recently, many state-of-art spectroscopy techniques are used to unravel the mysteries of condensed matters. And numerous heterostructures have provided a new avenue to search for new emergent phenomena. Especially, near the interface, various forms of symmetry-breaking can appear, which induces many novel phenomena. Although these intriguing phenomena can be emerged at the interface, by using conventional measurement techniques, the experimental investigations have been limited due to the buried nature of interface. One of the ways to overcome this limitation is in situ investigation of the layer-by-layer evolution of the electronic structure with increasing of the thickness. Namely, with very thin layer, we can measure the electronic structure strongly affected by the interface effect, but with thick layer, the bulk property becomes strong. Angle-resolved photoemission spectroscopy (ARPES) is powerful tool to directly obtain electronic structure, and it is very surface sensitive. Thus, the layer-by-layer evolution of the electronic structure in oxide heterostructure can be investigated by using in situ ARPES. LaNiO3 (LNO) heterostructures have recently attracted much attention due to theoretical predictions for many intriguing quantum phenomena. The theories suggest that, by tuning external parameters such as misfit strain and dimensionality in LNO heterostructure, the latent orders, which is absent in bulk, including charge disproportionation, spin-density-wave order and Mott insulator, could be emerged in LNO heterostructure. Here, we performed in situ ARPES studies on LNO films with varying the misfit strain and thickness. (1) By using LaAlO3 (-1.3%), NdGaO3 (+0.3%), and SrTiO3 (+1.7%) substrates, we could obtain LNO films under compressive strain, nearly strain-free, and tensile strain, respectively. As strain state changes from compressive to tensile, the Ni eg bands are rearranged and cross the Fermi level, which induces a change of Fermi surface (FS) topology. Additionally, two different FS superstructures are observed depending on strain states, which are attributed to signatures of latent charge and spin orderings in LNO films. (2) We also deposited LNO ultrathin films under tensile strain with thickness between 1 and 10 unit-cells. We found that the Fermi surface nesting effect becomes strong in two-dimensions and significantly enhances spin-density-wave order. The further details are discussed more in presentation. This work was collaborated with Hyang Keun Yoo, Seung Ill Hyun, Eli Rotenberg, Ji Hoon Shim, Young Jun Chang and Hyeong-Do Kim.

  • PDF

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Performance Analysis of Routing Protocols for WLAN Mesh Networks (WLAN Mesh 망을 위한 라우팅 기법의 성능 분석)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.417-424
    • /
    • 2007
  • Mesh networks using WLAN technology have been paid attention as a key wireless access technology. However, many technical issues still exist for its successful deployment. One of those issues is the routing problem that addresses the path setup through a WLAN mesh network for the data exchanges between a station and a wired network. Since the characteristics of a WLAN mesh network can be very dynamic, the use of single routing protocol would not fit for all environments whether it is reactive or proactive. Therefore, it is required to develop an adaptive routing protocol that modifies itself according to the changes in the network parameters. As a logical first step for the development, an analytical model considering all the dynamic features of a WLAN mesh network is required to evaluate the performance of a reactive and a proactive routing scheme. In this paper, we propose an analytical model that makes us scrutinize the impact of the network and station parameters on the performance of each routing protocol. Our model includes the size of a mesh network, the density of stations, mobility of stations. and the duration of network topology change. We applied our model to the AODV that is a representative reactive routing protocol and DSDV that is a representative proactive routing protocol to analyze the tradeoff between AODV and DSDV in dynamic network environments. Our model is expected to help developing an adaptive routing protocol for a WLAN mesh network.

Elastic Behavior of Zeolite Mesolite under Hydrostatic Pressure (제올라이트 메소라이트의 수압 하 탄성특성)

  • Lee, Yong-Jae;Lee, Yong-Moon;Seoung, Dong-Hoon;Jang, Young-Nam
    • Economic and Environmental Geology
    • /
    • v.42 no.5
    • /
    • pp.509-512
    • /
    • 2009
  • Powder diffraction patterns of the zeolite mesolite ($Na_{5.33}Ca_{5.33}Al_{16}Si_{24}O_{80}{\cdot}21.33H_2O$), with a natrolite framework topology were measured as a function of pressure up to 5.0 GPa using a diamond-anvil cell and a $200{\mu}m$-focused monochromatic synchrotron X-ray. Under the hydrostatic conditions mediated by pore-penetrating alcohol and water mixture, the elastic behavior of mesolite is characterized by continuous volume expansion between ca. 0.5 and 1.5 GPa, which results from expansion in the ab-plane and contraction along the c-axis. Subsequent to this anomalous behavior, changes in the powder diffraction patterns suggest possible reentrant order-disorder transition. The ordered layers of sodium- and calcium-containing channels in a 1:2 ratio along the b-axis attribute to the $3b_{natrolite}$ cell below 1.5 GPa. When the volume expansion is completed above 1.5 GPa, such characteristic ordering reflections disappear and the $b_{natrolite}$ cell persists with marginal volume contraction up to ca. 2.5 GPa. Further increase in pressure leads to progressive volume contraction and appears to generate another set of superlattice reflections in the $3c_{natrolite}$ cell. This suggests that mesolite in the pressure-induced hydration state experiences order-disorder-order transition involving the motions of sodium and calcium cations either through cross-channel diffusion or within the respective channels.

A Study on Innovation and Competitive Strategy in Network-Based Economy: Case Analysis on Network Effects, Incremental Innovation in Korean Mobile Telecommunication Industry (네트워크 경제 하에서 혁신과 경쟁 전략에 대한 기반 연구: 한국 이동통신 산업 사례를 중심으로)

  • An, Kwang-Jun;Shin, Dong-Hyung
    • Journal of Korea Technology Innovation Society
    • /
    • v.11 no.2
    • /
    • pp.145-170
    • /
    • 2008
  • The existence of network is indeed the single most important factor that brings about new business phenomena in the new digital economy, especially in the IT industry. Network effect refers to a phenomenon that the increase in size of the network leads to increased network value and user utility. It determines the competitive structure of an industry and the performances of industry competitors (Shapiro and Varian, 1999). The phenomenon of increasing returns and winner-take-all enjoyed by the early winner in the competition can be attributed to the existence of positive feedback which increases the value of network and induces more users into join the network (Arthur, 1996; Shapiro and Varian, 1999; Song and Lee, 2003). This research attempts to shed light on the topic of innovation and competitive strategy of network-based industries. We analyze the case of the Korean mobile communications industry, in which a shift in technological paradigm from 2G to 3G brought new changes to the competitive structure of the industry. The Korean mobile communications industry makes an ideal case for analysis since it is an industry whose value is inherently dependent upon its user network. It is characterized by the typical increasing returns, in which a monopolizing player is enjoying firstmover's network effects. Because of the existence of network in the mobile communications industry, latecomers' disruptive innovations could not outcompete the incumbent's sustaining innovations. The contribution of this research lies in laying a groundwork for future studies by introducing a numerical simulation model to analyze the complexity theory and network effect.

  • PDF

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.

Dynamic Single Path Routing Mechanism for Reliability and Energy-Efficiency in a Multi Hop Sensor Network (다중 홉 센서 네트워크에서 신뢰성과 에너지 효율성을 고려한 동적 단일경로 설정기법)

  • Choi, Seong-Yong;Kim, Jin-Su;Jung, Kyung-Yong;Han, Seung-Jin;Choi, Jun-Hyeog;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.31-40
    • /
    • 2009
  • What are important in wireless sensor networks are reliable data transmission, energy efficiency of each node, and the maximization of network life through the distribution of load among the nodes. The present study proposed DSPR, a dynamic unique path routing machanism that considered these requirements in wireless sensor networks. In DSPR, data is transmitted through a dynamic unique path, which has the least cost calculated with the number of hops from each node to the sink, and the average remaining energy. At that time, each node monitors its transmission process and if a node detects route damage it changes the route dynamically, referring to the cost table, and by doing so, it enhances the reliability of the network and distributes energy consumption evenly among the nodes. In addition, when the network topology is changed, only the part related to the change is restructured dynamically instead of restructuring the entire network, and the life of the network is extended by inhibiting unnecessary energy consumption in each node as much as possible. In the results of our experiment, the proposed DSPR increased network life by minimizing energy consumption of the nodes and improved the reliability and energy efficiency of the network.

Building change detection in high spatial resolution images using deep learning and graph model (딥러닝과 그래프 모델을 활용한 고해상도 영상의 건물 변화탐지)

  • Park, Seula;Song, Ahram
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.3
    • /
    • pp.227-237
    • /
    • 2022
  • The most critical factors for detecting changes in very high-resolution satellite images are building positional inconsistencies and relief displacements caused by satellite side-view. To resolve the above problems, additional processing using a digital elevation model and deep learning approach have been proposed. Unfortunately, these approaches are not sufficiently effective in solving these problems. This study proposed a change detection method that considers both positional and topology information of buildings. Mask R-CNN (Region-based Convolutional Neural Network) was trained on a SpaceNet building detection v2 dataset, and the central points of each building were extracted as building nodes. Then, triangulated irregular network graphs were created on building nodes from temporal images. To extract the area, where there is a structural difference between two graphs, a change index reflecting the similarity of the graphs and differences in the location of building nodes was proposed. Finally, newly changed or deleted buildings were detected by comparing the two graphs. Three pairs of test sites were selected to evaluate the proposed method's effectiveness, and the results showed that changed buildings were detected in the case of side-view satellite images with building positional inconsistencies.