• Title/Summary/Keyword: Wireless Packet Data Communication

Search Result 265, Processing Time 0.023 seconds

isMAC: An Adaptive and Energy-Efficient MAC Protocol Based on Multi-Channel Communication for Wireless Body Area Networks

  • Kirbas, Ismail;Karahan, Alper;Sevin, Abdullah;Bayilmis, Cuneyt
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1805-1824
    • /
    • 2013
  • Recently, the use of wireless body area networks (WBAN) has been increasing rapidly in medical healthcare applications. WBANs consist of smart nodes that can be used to sense and transmit vital data such as heart rate, temperature and ECG from a human body to a medical centre. WBANs depend on limited resources such as energy and bandwidth. In order to utilise these resources efficiently, a very well organized medium access control (MAC) protocol must be considered. In this paper, a new, adaptive and energy-efficient MAC protocol, entitled isMAC, is proposed for WBANs. The proposed MAC is based on multi-channel communication and aims to prolong the network lifetime by effectively employing (i) a collision prevention mechanism, (ii) a coordinator node (WCN) selection algorithm and (iii) a transmission power adjustment approach. The isMAC protocol has been developed and modelled, by using OPNET Modeler simulation software. It is based on a networking scenario that requires especially high data rates such as ECG, for performance evaluation purposes. Packet delay, network throughput and energy consumption have been chosen as performance metrics. The comparison between the simulation results of isMAC and classical IEEE 802.15.4 (ZigBee) protocol shows that isMAC significantly outperforms IEEE 802.15.4 in terms of packet delay, throughput and energy consumption.

The Design and Implementation of the Mutual Message Processing between WME Module and MLME Module for Vehicle Communication Technology (차량 통신 기술을 위한 WME 모듈과 MLME 모듈 간의 상호 메시지 처리과정 설계 및 구현)

  • Jang, Chung Ryong;Lee, Dae Sik;Lee, Yong Kwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.63-71
    • /
    • 2013
  • WAVE(Wireless Access for Vehicular Environment) System is a communication technology to monitor system failure and vehicle functions and management services to prevent possible incidents of driving a vehicle. In this paper, we have designed and implemented the mutual message processing through parameter between WME management module that manages WAVE system and MLME that manages the upper layer MAC(Media Access Control) module. Also, in order to verify the validity, we have carried out experiments to compare the speed of data processing by dividing data of 1Mbyte, 2Mbyte, 3Mbyte into the packets of 2KByte and 4KByte. Experiments data processing speed of 2KByte packet were shown about 173.62ms in 1MByte, 2MByte about 352.61ms, 3MByte about 550.13ms and, data processing speed of 4KByte packet, 1MByte approximately 87.56ms, 2MByte about 177.94ms, 3MByte about 277.18ms. Therefore, in WAVE system, the mutual messages processing through the parameters between WME and MLME module can be utilized in the various service of ITS(Intelligent Transportation Systems) depending on the speed of data processing.

Analysis of Channel Access Delay in CR-MAC Protocol for Ad Hoc Cognitive Radio Wireless Sensor Networks without a Common Control Channel

  • Joshi, Gyanendra Prasad;Nam, Seung Yeob;Acharya, Srijana;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.911-923
    • /
    • 2014
  • Ad hoc cognitive radio wireless sensor networks allow secondary wireless sensor nodes to recognize spectrum opportunities and transmit data. Most existing protocols proposed for ad hoc cognitive radio wireless sensor networks require a dedicated common control channel. Allocating one channel just for control packet exchange is a waste of resources for channel-constrained networks. There are very few protocols that do not rely on a common control channel and that exchange channel-negotiation control packets during a pre-allocated time on the data channels. This, however, can require a substantial amount of time to access the channel when an incumbent is present on the channel, where the nodes are intended to negotiate for the data channel. This study examined channel access delay on cognitive radio wireless sensor networks that have no dedicated common control channel.

Analysis of Optimized Aggregation Timing in Wireless Sensor Networks

  • Lee, Dong-Wook;Kim, Jai-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.209-218
    • /
    • 2009
  • In a wireless sensor network(WSN) each sensor node deals with numerous sensing data elements. For the sake of energy efficiency and network lifetime, sensing data must be handled effectively. A technique used for this is data aggregation. Sending/receiving data involves numerous steps such as MAC layer control packet handshakes and route path setup, and these steps consume energy. Because these steps are involved in all data communication, the total cost increases are related to the counts of data sent/received. Therefore, many studies have proposed sending combined data, which is known as data aggregation. Very effective methods to aggregate sensing data have been suggested, but there is no means of deciding how long the sensor node should wait for aggregation. This is a very important issue, because the wait time affects the total communication cost and data reliability. There are two types of data aggregation; the data counting method and the time waiting method. However, each has weaknesses in terms of the delay. A hybrid method can be adopted to alleviate these problems. But, it cannot provide an optimal point of aggregation. In this paper, we suggest a stochastic-based data aggregation scheme, which provides the cost(in terms of communication and delay) optimal aggregation point. We present numerical analysis and results.

On Concealing Data-Path Against Eavesdropping in Wireless Networks (무선망에서의 신호도청에 대응하는 데이터 경로 은닉에 관한 연구)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.433-438
    • /
    • 2020
  • Nodes on a data communication path in a wireless network emit electro-magnetic waves whenever they transmit packets; thus, the path can be exposed and identified with capturing and analyzing a sequence of the signals emitted there. One of countermeasures against a malicious eavesdropper is to let certain nodes mimic the nodes on the data path in sending dummy packets. In this paper we propose a packet transfer protocol which establishes the shortest path between source-destination pair a time and restricts heavy generation of dummy packets. We verify the location-privacy of a node on the communication paths through simulation.

System of gas sensor for conbinating wire and wireless using Internet of Things (IOT기술을 이용한 유무선 통합 가스검출 시스템 구현)

  • Bang, Yong-Ki;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.4
    • /
    • pp.297-304
    • /
    • 2015
  • This study concerns the integrated gas sensor system of wire and wireless communication by using IoT(Internet of Things) technology. First, communication part is that it delivers the detection information, which transferred by wire or wireless communication and required control procedure based on a wireless module that receives the gas leakage information from wired or wireless detector, to administrator or user's terminal. Second, receiver part is that it shows the location and information, which received from the wired detector formed by a detecting sensor's node as linking with the communication part, and transfers these to the communication part. Third, wireless detector formed as a communication module of a detecting sensor node is that it detects gas leakage and transfers the information through wireless as a packet.Fourth, wired detector communicated with the receiver part and formed as a communication module of a detecting sensor node is that it detects gas leakage, transfers and shows the information as a packet. Fifth, administrator's terminal is that it receives gas leakage information by the communication part, transfers the signal by remote-control, and shut off a gas valve as responding the information. Sixth, database is that it is connected with the communication part; it sets and stores the default values for detecting smoke, CO., and temperature; it transfers this information to the communication part or sends a gas detecting signal to user's terminal. Seventh, user's terminal is that it receives each location's default value which stored and set at the database; it manages emergency situation as shutting off a gas valve through remote control by corresponding each location's gas leakage information, which transferred from the detector to the communication part by wireless.It is possible to process a high quality data regarding flammable or toxic gas by transferring the data, which measured by a sensor module of detector, to the communication part through wire and wireless. And, it allows a user to find the location by a smart phone where gas leaks. Eventually, it minimizes human life or property loss by having stability on gas leakage as well as corresponding each location's information quickly.

A Novel Opportunistic Greedy Forwarding Scheme in Wireless Sensor Networks

  • Bae, Dong-Ju;Choi, Wook;Kwon, Jang-Woo;Choo, Hyun-Seung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.753-775
    • /
    • 2010
  • Greedy forwarding is a key mechanism of geographic routing using distance as a metric. As greedy forwarding only uses 1-hop neighbor node information, it minimizes routing overhead and is highly scalable. In existing greedy forwarding schemes, a node selects a next forwarding node based only on the distance. However, the signal strength in a realistic environment reduces exponentially depending on the distance, so that by considering only the distance, it may cause a large number of data packet retransmissions. To solve this problem, many greedy forwarding schemes have been proposed. However, they do not consider the unreliable and asymmetric characteristics of wireless links and thus cause the waste of limited battery resources due to the data packet retransmissions. In this paper, we propose a reliable and energy-efficient opportunistic greedy forwarding scheme for unreliable and asymmetric links (GF-UAL). In order to further improve the energy efficiency, GF-UAL opportunistically uses the path that is expected to have the minimum energy consumption among the 1-hop and 2-hop forwarding paths within the radio range. Comprehensive simulation results show that the packet delivery rate and energy efficiency increase up to about 17% and 18%, respectively, compared with the ones in PRR${\times}$Distance greedy forwarding.

Comparison Analysis of Packet Delay Model in IEEE 802.11 Wireless Network (IEEE 802.11 무선망에서의 패킷지연시간 모델 비교분석)

  • Lim, Seog-Ku
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.679-686
    • /
    • 2008
  • Wireless LAN(WLAN) is a rather mature communication technology connecting mobile terminals. IEEE 802.11 is a representative protocol among WLAN technologies. With the rising popularity of delay-sensitive real-time multimedia applications(video, voice and data) in IEEE 802.11 wireless LAN, it is important to study the MAC layer delay performance of WLANs. In this paper, performance for packet delay model that recently have been proposed schemes is analysed in wireless LAN and proved performance results via simulation.

  • PDF

Bilateral Controller for Time-varying Communication Delay: Time Domain Passivity Approach (시변 시간지연 하에서 안정성을 보장하는 양방향 원격제어기 : 시간영역 수동성 기법)

  • Ryu, Jee-Hwan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.11
    • /
    • pp.1099-1105
    • /
    • 2007
  • In this paper, modified two-port time-domain passivity approach is proposed for stable bilateral control of teleoperators under time-varying communication delay. We separate input and output energy at each port of a bilateral controller, and propose a sufficient condition for satisfying the passivity of the bilateral controller including time-delay. Output energy at the master port should be less than the transmitted input energy from the slave port with time-delay, and output energy at the slave port should be less than the transmitted input energy from the master port with time-delay. For satisfying above two conditions, two passivity controllers are attached at each port of the bilateral controller. A packet reflector with wireless internet connection is used to introduce serious time-varying communication delay of teleoperators. Average amount of time-delay was about 190(msec) for round trip, and varying between 175(msec) and 275(msec). Moreover some data packet was lost during the communication due to UDP data communication. Even under the serious time-varying delay and packet loss communication condition, the proposed approach can achieve stable teleoperation in free motion and hard contact as well.

Implementation of WAP Gateway Agents for Wireless Communication Efficiency Improvement (무선통신 효율 향상을 위한 WAP 게이트웨이 에이전트)

  • Park, Kee-Hyun;Kang, Dong-Woo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.45-54
    • /
    • 2005
  • Recently, researches on various base technologies for wireless Internet services have been conducted. In the WAP (Wireless Application Protocol) Forum, a WAP gateway which does mutual conversion between existent wired Internet protocols and WAP protocols was proposed. In this paper, CSA(Client Side Agent) and SSA(Server Side Agent) for WAP gateway environments are designed and implemented, as a way of improving communication efficiency in such restrictive environments as wireless communications. Located on mobile WAP devices(CSA) and a WAP Gateway(SSA), the agents perform communication efficiency improvement activities such as a packet header reduction mechanism and a data reduction mechanism using data differencing analysis in order to reduce the size of data transmission in wireless communication environments. The Internet phone emulator of Phone.com is used in order to make sure that the implemented agents work correctly, Experimental results show that the implemented agents reduce the size of data transmission significantly.

  • PDF