• Title/Summary/Keyword: Wireless Network Protocol

Search Result 1,743, Processing Time 0.022 seconds

Design and implementation of flooding-based query model in wireless sensor networks for indoor environmental monitoring system (실내환경 모니터링시스템을 위한 무선 센서네트워크에서의 플러딩 방식의 질의모델 설계 및 구현)

  • Lee, Seung-Chul;Jung, Sang-Joong;Lee, Young-Dong;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.168-177
    • /
    • 2008
  • An indoor environmental monitoring system using IEEE 802.15.4 based wireless sensor network is proposed to monitor the amount of pollutant entering to the room from outside and also the amount of pollutant that is generated in indoor by the building materials itself or human activities. Small-size, low-power wireless sensor node and low power electrochemical sensor board is designed to measure the condition of indoor environment in buildings such as home, offices, commercial premises and schools. In this paper, two query models, the broadcasting query protocol and flooding query protocol, were designed and programmed as a query-based routing protocol in wireless sensor network for an environment monitoring system. The flooding query routing protocol in environment monitoring is very effective as a power saving routing protocol and reliable data transmission between sensor nodes.

A Case Study of a Resource Reservation Protocol in IP Based Wireless Access Networks for ITS Service

  • Jung Kwang Mo;Jung Hyun Chul;Min Sang Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.1 s.6
    • /
    • pp.107-115
    • /
    • 2005
  • For effective IP based service implementation on the wireless network environments, wireless network including the ITS network have to support QoS guaranteed protocol such as a RSVP. RSVP is a resource reservation protocol for Internet environment, and its scalability makes easy to implement RSVP over the various IP transport technologies. But for the If based ITS wireless network environment, RSVP is not suitable, since by its path setup procedure characteristic. In the wireless access network for ITS service, when a mobile node moves to other domain it must perform registration procedure. But the registration procedure is time consuming steps, so if a RSVP session was already established in the previous domain, the RSYP session may be disconnected and the time to re establish a new RSVP session is long enough to cause serious packet loss. In this paper, we propose a pre-path reservation mechanism for applying the RSVP in wireless access networks for ITS. In the pre-path reservation mechanism, the resource reservation procedure occurred during a mobile node's handoff time. An access point in wireless access network performs this procedure when the mobile node attempts handoff The access point executes pre-path reservation procedure as a proxy, since the mobile node does not have IP address until the address allocation procedure is finished in a new domain.

  • PDF

Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks

  • Avula, Mallikarjun;Lee, Sang-Gon;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1982-2004
    • /
    • 2014
  • Wireless Mesh Networks (WMNs) are emerging as promising, convenient next generation wireless network technology. There is a great need for a secure framework for routing in WMNs and several research studies have proposed secure versions of the default routing protocol of WMNs. In this paper, we propose a security framework for Hybrid Wireless Mesh Protocol (HWMP) in WMNs. Contrary to existing schemes, our proposed framework ensures both end-to-end and point-to-point authentication and integrity to both mutable and non-mutable fields of routing frames by adding message extension fields to the HWMP path selection frame elements. Security analysis and simulation results show that the proposed approach performs significantly well in spite of the cryptographic computations involved in routing.

A Study on Improving TCP Performance in Wireless Network (무선 네트워크에서 TCP성능향상을 위한 연구)

  • Kim, Chang-Hee
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.279-289
    • /
    • 2009
  • As the TCP is the protocol designed for the wired network that packet loss probability is very low, because TCP transmitter takes it for granted that the packet loss by the wireless network characteristics is occurred by the network congestion and lowers the transmitter's transmission rate, the performance is degraded. In this article, we suggest the newly improved algorithm using two parameters, the local retransmission time value and the local retransmission critical value to the BS based on the Snoop. This technique adjusts the base stations local retransmission timer effectively according to the wireless link status to recover the wireless packet loss rapidly. We checked that as a result of the suggested algorithm through various simulations, A-Snoop protocol improve more the wireless TCP transmission rate by recovering the packet loss effectively in the wireless link that the continuous packet loss occur than the Snoop protocol.

  • PDF

An Efficient Checkpoint Protocol in Wireless Sensor Network for Reliability (무선 센서 네트워크에서 신뢰성 향상을 위한 효율적인 체크포인트 프로토콜)

  • Jung, Dong-Won;Choi, Chang-Yeol;Kim, Sung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.583-594
    • /
    • 2006
  • The reliability concept of wireless sensor network is essential to get exactly actual data from the ubiquitous environment. A rollback technique for the self-healing helps to increase it. However, a fault can occur in wireless sensor network when to use a previous rollback technique because it is designed just for the local system. So, checkpoint protocols are suggested in order to use a rollback technique in the network without the fault. However, there is trade-off among performance overhead, power consumption, and memory overhead for each of protocols. Hence, we suggest a novel global checkpoint protocol, so called address log based protocol(ALBP), based on an asynchronous protocol. It is a platform based protocol to reduce power consumption, performance overhead, and memory overhead which are the most of consideration in wireless sensor network.

Ad hoc Network for Dynamic Multicast Routing Protocol Using ADDMRP

  • Chi, Sam-Hyun;Kim, Sung-Uk;Lee, Kang-Whan
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.209-214
    • /
    • 2007
  • In this paper, we proposed a new MANET (Mobile Ad hoc Networks) technology of routing protocol. The MANET has a mobility formation of mobile nodes in the wireless networks. Wireless network have two types architecture: the Tree based multicast and shared tree based. The two kind's architecture of general wireless networks have difficult to solve the problems existing in the network, such as connectivity, safety, and reliability. For this purpose, as using that ADDMRP (Ad hoc network Doppler effect-based for Dynamic Multicast Routing Protocol), this study gives the following suggestion for new topology through network durability and Omni-directional information. The proposed architectures have considered the mobility location, mobility time, density, velocity and simultaneous using node by Doppler effects and improved the performance.

Improvement of CH selection of WSN Protocol

  • Lee, WooSuk;Jung, Kye-Dong;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • v.6 no.3
    • /
    • pp.53-58
    • /
    • 2017
  • A WSN (Wireless Sensor Network) is a network that is composed of wireless sensor nodes. There is no restriction on the place where it can be installed because it is composed wirelessly. Instead, sensor nodes have limited energy. Therefore, to use the network for a long time, energy consumption should be minimized. Several protocols have been proposed to minimize energy consumption, and the typical protocol is the LEACH protocol. The LEACH protocol is a cluster-based protocol that minimizes energy consumption by dividing the sensor field into clusters. Depending on how you organize the clusters of sensor field, network lifetimes may increase or decrease. In this paper, we will improve the network lifetime by improving the cluster head selection method in LEACH Protocol.

An Energy Efficient Routing Protocol for Unicast in Wireless Sensor Networks (무선 센서 네트워크에서 유니캐스트를 위한 에너지 효율적인 라우팅 프로토콜)

  • Han, Uk-Pyo;Lee, Hee-Choon;Chung, Young-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.4
    • /
    • pp.262-268
    • /
    • 2007
  • The efficient node-energy utilization in wireless sensor networks has been studied because sensor nodes operate with limited power based on battery. To extend the lifetime of the wireless sensor networks, maintaining balanced power consumption between sensor nodes is more important than reducing total energy consumption of the overall network. Since a large number of sensor nodes are densely deployed and collect data by cooperation in wireless sensor network, keeping more sensor nodes alive as possible is important to extend the lifetime of the sensor network. In this paper, we submit an efficient energy aware routing protocol based on AODV ad hoc routing protocol for wireless sensor networks to increase its lifetime without degrading network performance. The proposed protocol is designed to avoid traffic congestion on minor specific nodes at data transfer and to make the node power consumption be widely distributed to increase the lifetime of the network. The performance of the proposed protocol has been examined and evaluated with the NS-2 simulator in terms of network lifetime and end-to-end delay.

An Adaptive MAC Protocol for Wireless LANs

  • Jamali, Amin;Hemami, Seyed Mostafa Safavi;Berenjkoub, Mehdi;Saidi, Hossein
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.311-321
    • /
    • 2014
  • This paper focuses on contention-based medium access control (MAC) protocols used in wireless local area networks. We propose a novel MAC protocol called adaptive backoff tuning MAC (ABTMAC) based on IEEE 802.11 distributed coordination function (DCF). In our proposed MAC protocol, we utilize a fixed transmission attempt rate and each node dynamically adjusts its backoff window size considering the current network status. We determined the appropriate transmission attempt rate for both cases where the request-to-send/clear-to-send mechanism was and was not employed. Robustness against performance degradation caused by the difference between desired and actual values of the attempt rate parameter is considered when setting it. The performance of the protocol is evaluated analytically and through simulations. These results indicate that a wireless network utilizing ABTMAC performs better than one using IEEE 802.11 DCF.

Extending Network Domain for IEEE1394

  • Lee, Seong-Hee;Park, Seong-Hee;Choi, Sang-Sung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.177-178
    • /
    • 2005
  • Wireless 1394 over IEEE802.15.3 must allow a data reserved for delivery over a wired 1394 network to be delivered over an IEEE802.15.3 wireless network through bridging IEEE 1394 to IEEE802.15.3. Isochronous transfers on the 1394 bus guarantee timely delivery of data. Specifically, isochronous transfers are scheduled by the bus so that they occur once every $125\;{\mu}s$ and require clock time synchronization to complete the real-time data transfer. IEEE1394.1 and Protocol Adaptation Layer for IEEE1394 over IEEE802.15.3 specify clock time synchronization for a wired 1394 bus network to a wired 1394 bus network and wireless 1394 nodes, which are IEEE802.15.3 nodes handling 1394 applications, over IEEE802.15.3. Thus, the clock time synchronizations are just defined within a homogeneous network environment like IEEE1394 or IEEE802.15.3 until now. This paper proposes new clock time synchronization method for wireless 1394 heterogeneous networks between 1394 and 802.15.3. If new method is adopted for various wireless 1394 products, consumer electronics devices such as DTV and Set-top Box or PC devices on a 1394 bus network can transmit real time data to the AV devices on the other 1394 bus in a different place via IEEE 802.15.3.

  • PDF