• Title/Summary/Keyword: Tree topology

Search Result 180, Processing Time 0.028 seconds

The Dynamic Allocation Algorithm for Efficient Data Transmission in Wireless Sensor Network (무선 센서 네트워크에서 효율적인 데이터 전송을 위한 동적 할당 알고리즘)

  • Kim, Ji-Won;Yoon, Wan-Oh;Kim, Kang-Hee;Hong, Chang-Ki;Choi, Sang-Bang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.62-73
    • /
    • 2012
  • IEEE 802.15.4 standard which has low-speed, low-power, low-cost can be efficiently used in wireless sensor network environment. Among various topologies used in IEEE 802.15.4 standard, a cluster-tree topology which has many nodes in it, transmit delay, energy consumption and data loss due to traffic concentration around the sink node. In this paper, we propose the MRS-DCA algorithm that minimizes conflicts between packets for efficient data transmission, and dynamically allocates the active period for efficient use of limited energy. The MRS-DCA algorithm allocates RP(Reservation Period) to the active period of IEEE 802.15.4 and guarantees reliable data transmission by allocating RP and CAP dynamically which is based on prediction using EWMA. The comparison result shows that the MRS-DCA algorithm reduces power consumption by reducing active period, and increasing transmission rate by avoiding collision.

An Internet Gateway Based Link State Routing for Infrastructure-Based Mobile Ad Hoc Networks (인프라구조 기반의 이동 애드혹 네트워크를 위한 인터넷 게이트웨이 중심의 링크상태 라우팅 프로토콜)

  • Lee, Sung Uk;Ngo, Chi-Trung;Han, Trung-Dinh;Kim, Je-Wook;Oh, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.10
    • /
    • pp.859-876
    • /
    • 2012
  • Since the existing protocols separated mobility management part and routing protocol part in their design and used a flooding, they suffer from the high control overhead, thereby limiting performance. In this paper, we use a tree-based mobility management method and present a simple and efficient routing protocol that exploits the topology information which is built additionally through mobility management. Thus, the mobility management and the routing protocol closely cooperate to optimize control overhead. Furthermore, we use a progressive path discovery method to alleviate traffic congestion around IG and a unicast-based broadcast method to increase the reliability of message delivery and to judge link validity promptly. The proposed protocol reduces control overhead greatly and works in a stable manner even with the large number of nodes and high mobility. This was proven by comparing with the AODV protocol that employs the hybrid mobility management protocol.

Detection of Entry/Exit Zones for Visual Surveillance System using Graph Theoretic Clustering (그래프 이론 기반의 클러스터링을 이용한 영상 감시 시스템 시야 내의 출입 영역 검출)

  • Woo, Ha-Yong;Kim, Gyeong-Hwan
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.46 no.6
    • /
    • pp.1-8
    • /
    • 2009
  • Detecting entry and exit zones in a view covered by multiple cameras is an essential step to determine the topology of the camera setup, which is critical for achieving and sustaining the accuracy and efficiency of multi-camera surveillance system. In this paper, a graph theoretic clustering method is proposed to detect zones using data points which correspond to entry and exit events of objects in the camera view. The minimum spanning tree (MST) is constructed by associating the data points. Then a set of well-formed clusters is sought by removing inconsistent edges of the MST, based on the concepts of the cluster balance and the cluster density defined in the paper. Experimental results suggest that the proposed method is effective, even for sparsely elongated clusters which could be problematic for expectation-maximization (EM). In addition, comparing to the EM-based approaches, the number of data required to obtain stable outcome is relatively small, hence shorter learning period.

A Proposal of Heuristic Using Zigzag Steiner Point Locating Strategy for GOSST Problem (GOSST 문제 해결을 위한 지그재그 스타이너 포인트 배치 방법을 이용한 휴리스틱의 제안)

  • Kim, In-Bum;Kim, Chae-Kak
    • The KIPS Transactions:PartA
    • /
    • v.14A no.5
    • /
    • pp.317-326
    • /
    • 2007
  • We propose more enhanced heuristic for the GOSST(Grade of Services Steiner Minimum Tree) problem in this paper. GOSST problem is a variation of Steiner Tree problem and to find a network topology satisfying the G-Condition with minimum network construction cost. GOSST problem is known as one of NP-Hard or NP-Complete problems. In previous our research, we proposed a heuristic employing Direct Steiner Point Locating strategy with Distance Preferring MST building strategy. In this paper, we propose new Steiner point locating strategy, Zigzag Steiner point Locating strategy. Through the results of out experiments, we can assert this strategy is better than our previous works. The Distance Zigzag GOSST method which hires the Distance Preferring MST building strategy and Zigzag Steiner point Locating strategy defrays the least network construction cost and brings 31.5% cost saving by comparison to G-MST, the experimental control and 2.2% enhancement by comparison to the Distance Direct GOSST method, the best GOSST method in our previous research.

Efficient Multicast Tree Algorithm for Acceptable Delay and Minimum Delay Variation (지연시간 한계의 만족과 효율적인 최소 지연변이 멀티캐스트 트리 생성 알고리즘)

  • Kim Moon-Seong;Choo Hyun-Seung;Lee Young-Ro
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.105-110
    • /
    • 2005
  • With the proliferation of multimedia group applications, the construction of multicast trees satisfying QoS requirements is becoming a problem of prime importance. In this paper, we study the delay- and delay variation-bounded multicast tree (DVBMT) problem which is NP-complete. The problem is to construct a spanning tree for destination node, which has the minimized multicast delay variation, and the delay on the path from the source to each destination is bounded. A solution to this problem is required to provide decent real-time communication services such as on-line games, shopping, and teleconferencing. Performance comparison shows that the proposed scheme outperforms DDVCA which is known to be effective so far in any network topology. The enhancement is up to about $3.6{\%}{\~}11.1{\%}$ in terms of normalized surcharge for DUVCA. The time complexity of our algorithm is $O(mn^2)$.

A Study on G-Condition Examination Scheme to Improve the Heuristics for Grade Of Services Steiner Minimum Tree Problem (Grade Of Services Steiner Minimum Tree 문제에 대한 휴리스틱의 성능 개선을 위한 G-Condition 검사 방법에 대한 연구)

  • Kim, In-Bum;Kim, Chae-Kak
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.1
    • /
    • pp.44-52
    • /
    • 2008
  • This paper is on the enhancement of our heuristics for Grade Of Services Steiner Minimum Tree (GOSST) problem that can apply to the design of communication networks offering manifold grade of services in multimedia communication area. GOSST problem known as one of NP-Hard problems asks for a network topology meeting the G-Condition with minimum construction cost. In our prior researches, we proposed some heuristics for the problem. In this paper, we suggest a strategy of G-Condition scrutiny sequence to fortify our previous heuristics. In the experiment results, the ameliorated achieves 71.9% economy of execution times, 28.9% of required Steiner points and 1.1% of network construction costs.

  • PDF

New formula in domination theory and it's application for reliability analysis (Domination이론에서의 새로운 식과 이의 신뢰성계산에 대한 적용)

  • 이광원;이일재;강신재
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.1
    • /
    • pp.16-26
    • /
    • 1996
  • In a series of original papers, [1-17] efficient methods and algorithms have been presented, for the exact solution of many reliability problems represented by binary networks. A starting point of these methods was the concept of domination, firstly introduced in ,elation with reliability problems in [2]. It's application to directed networks resulted in the development of a topological formula for the classical problem of the two terminal reliability. This result was extended later to the all-terminal and the k-terminal reliability problems. All papers mentioned above use a path oriented representation for the network topology. In practical applications, however, it is common and often advantageous to work with cut sets. This article considers the Domination theory for reliability problem of a network. Some topological formula are derived and the power and the application of this formula are shown through the alternative proof of topological formula of A. Satyanarayana [2].

  • PDF

Enhancing the Quality of Service by GBSO Splay Tree Routing Framework in Wireless Sensor Network

  • Majidha Fathima K. M.;M. Suganthi;N. Santhiyakumari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2188-2208
    • /
    • 2023
  • Quality of Service (QoS) is a critical feature of Wireless Sensor Networks (WSNs) with routing algorithms. Data packets are moved between cluster heads with QoS using a number of energy-efficient routing techniques. However, sustaining high scalability while increasing the life of a WSN's networks scenario remains a challenging task. Thus, this research aims to develop an energy-balancing component that ensures equal energy consumption for all network sensors while offering flexible routing without congestion, even at peak hours. This research work proposes a Gravitational Blackhole Search Optimised splay tree routing framework. Based on the splay tree topology, the routing procedure is carried out by the suggested method using three distinct steps. Initially, the proposed GBSO decides the optimal route at initiation phases by choosing the root node with optimum energy in the splay tree. In the selection stage, the steps for energy update and trust update are completed by evaluating a novel reliance function utilising the Parent Reliance (PR) and Grand Parent Reliance (GPR). Finally, in the routing phase, using the fitness measure and the minimal distance, the GBSO algorithm determines the best route for data broadcast. The model results demonstrated the efficacy of the suggested technique with 99.52% packet delivery ratio, a minimum delay of 0.19 s, and a network lifetime of 1750 rounds with 200 nodes. Also, the comparative analysis ensured that the suggested algorithm surpasses the effectiveness of the existing algorithm in all aspects and guaranteed end-to-end delivery of packets.

LECSEN : Link Exchanged Chain in SEnsor Networks (링크 교환을 이용한 무선 센서 네트워크용 체인 토폴로지 : LECSEN)

  • Shin, Ji-Soo;Suh, Chang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.273-280
    • /
    • 2008
  • In WSN(Wireless Sensor Network) many routing algorithms such as LEACH, PEGASIS and PEDEP consisting of sensor nodes with limited energy have been proposed to extend WSN lifetime. Under the assumption of perfect fusion, these algorithms used convergecast that periodically collects sensed data from all sensor nodes to a base station. But because these schemes studied less energy consumption for a convergecast as well as fairly energy consumption altogether, the minimum energy consumption for a convergecast was not focused enough nor how topology influences to energy consumption. This paper deals with routing topology and energy consumption for a single convergecast in the following ways. We chose major WSN topology as MSC(Minimum Spanning Chain)s, MSTs, PEGASIS chains and proposed LECSEN chains. We solved the MSC length by Linear Programming(LP) and propose the LECSEN chain to compete with MST and MSC. As a result of simulation by Monte Carlo method for calculation of the topology length and standard deviation of link length, we learned that LECSEN is competitive with MST in terms of total energy consumption and shows the best with the view of even energy consumption at the sensor nodes. Thus, we concluded LECSEN is a very useful routing topology in WSN.

A Network Coding Scheme with Code Division Multiple Access in Underwater Acoustic Sensor Networks (수중 센서 네트워크에서 코드 분할 다중 접속 방식을 사용하는 네트워크 코딩 기법)

  • Seo, Bo-Min;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.1
    • /
    • pp.86-94
    • /
    • 2013
  • In this paper, we propose a network coding scheme that is one of the most promising techniques for overcoming transmission errors in underwater acoustic communications. It is assumed that the proposed scheme operates in a Code Division Multiple Access (CDMA) network where multiple sensor nodes share the underwater acoustic channel in both the frequency and the time domains by means of orthogonal codes. The network topology deploys multi-hop transmission with relaying between multiple source nodes and one destination node via multiple relay nodes. The proposed scheme is evaluated in terms of the successful packet delivery ratio of end-to-end transactions under varying packet loss rates. A computer simulation shows that the successful delivery ratio is maintained at over 95% even when the packet loss rate reaches 50%.