• Title/Summary/Keyword: Wireless device

Search Result 1,399, Processing Time 0.026 seconds

Analysis of Low Power and Channel Interferences for Zigbee (Zigbee의 저전력화와 채널간섭 분석)

  • Kang, Min-Goo;Shin, Ho-Jin
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.33-41
    • /
    • 2010
  • The battery consumption and the wireless communication pattern were analyzed for the low power and the improvement of channel interferences between of Zigbee networks and WPAN(Wireless Personal Area Network). The communication patterns considering end device's battery saving during channel searching period were analyzed for low power consumption topology of Zigbee dynamic ad-hoc characteristics. And, the communication patterns were analyzed due to channel interferences between WLAN and Random Back off of Zigbee, too. As a result, the communication patterns of Zigbee's coordinator and end devices is alleviated for the longer battery life time of Zigbee's end device due to Zigbee's end device setting techniques.

Design of U-Healthcare Monitoring System based on Mobile Device (모바일 디바이스 기반의 U-헬스케어 모니터링 시스템 구현)

  • Park, Joo-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.46-53
    • /
    • 2012
  • The WBAN technology means a short distance wireless network which provides each device's interactive communication by connecting devices inside and outside of body located within 3 meters. Standardization on the physical layer, data link layer, network layer and application layer is in progress by IEEE 802.15.6 TG BAN. It is necessary to develop the WBAN core technology that sensor node device, WBAN middleware and WBAN application service for WBAN environment. In this paper we designed the medical message structure and implemented medical application for purpose of vital information reliability. The message structure was proposed for WBAN environment and application can be check biometric information from BN on smart device through WBAN gateway.

An Energy-efficient MAC Protocol in Cognitive Radio Environment (Cognitive Radio 환경을 고려한 에너지 효율적인 MAC 프로토콜)

  • Kim, Byung-Boo;Rhee, Seung-Hyong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.2
    • /
    • pp.81-91
    • /
    • 2008
  • In mobile wireless communications, there is a new approach that uses the lacking spectrum efficiently. A cognitive radio is a device that can changes its transmitter parameters based on interaction with the environment in which it operates. At present, the wireless communication standard for wireless device contains power-saving modes or energy efficient mechanisms which cuts off the power of transmitter and receiver for power-saving. However, in cognitive radio environment, every device has the Quiet Period for searching channel and existing energy-saving method is not appropriate to be adjust to cognitive radio environment. In this paper, we propose an energy-efficient MAC protocol of mobile device in cognitive radio environment and prove the improvement of proposed method.

  • PDF

M2M Architecture: Can It Realize Ubiquitous Computing in Daily life?

  • Babamir, Seyed Morteza
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.566-579
    • /
    • 2012
  • Ubiquitous computing called pervasive one is based on the thought of pervading ability of computation in daily life applications. In other words, it aims to include computation in devices such as electronic equipment and automobiles. This has led to disengagement of computers from desktop form. Accordingly, the notice in ubiquitous computing being taken of a world steeped in remote and wireless computer-based-services. Handheld and wearable programmed devices such as sense and control appliances are such devices. This advancement is rapidly moving domestic tasks and life from device-and-human communication to the device-and-device model. This model called Machine to Machine (M2M) has led to acceleration of developments in sciences such as nano-science, bio-science, and information science. As a result, M2M led to appearance of applications in various fields such as, environment monitoring, agricultural, health care, logistics, and business. Since it is envisaged that M2M communications will play a big role in the future in all wireless applications and will be emerged as a progressive linkage for next-generation communications, this paper aims to consider how much M2M architectures can realize ubiquitous computing in daily life applications. This is carried out after acquainting and initiating readers with M2M architectures and arguments for M2M. Some of the applications was not achievable before but are becoming viable owing to emergence of M2M communications.

Joint Optimization for Residual Energy Maximization in Wireless Powered Mobile-Edge Computing Systems

  • Liu, Peng;Xu, Gaochao;Yang, Kun;Wang, Kezhi;Li, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5614-5633
    • /
    • 2018
  • Mobile Edge Computing (MEC) and Wireless Power Transfer (WPT) are both recognized as promising techniques, one is for solving the resource insufficient of mobile devices and the other is for powering the mobile device. Naturally, by integrating the two techniques, task will be capable of being executed by the harvested energy which makes it possible that less intrinsic energy consumption for task execution. However, this innovative integration is facing several challenges inevitably. In this paper, we aim at prolonging the battery life of mobile device for which we need to maximize the harvested energy and minimize the consumed energy simultaneously, which is formulated as residual energy maximization (REM) problem where the offloading ratio, energy harvesting time, CPU frequency and transmission power of mobile device are all considered as key factors. To this end, we jointly optimize the offloading ratio, energy harvesting time, CPU frequency and transmission power of mobile device to solve the REM problem. Furthermore, we propose an efficient convex optimization and sequential unconstrained minimization technique based combining method to solve the formulated multi-constrained nonlinear optimization problem. The result shows that our joint optimization outperforms the single optimization on REM problem. Besides, the proposed algorithm is more efficiency.

Study on Compatibility between WPT Device at ISM band and Radio Modem (ISM 대역의 WPT 기기와 무선 모뎀의 공존 방안 연구)

  • Kim, SeungNam;Lee, Ilkyoo;Min, Kyoungil
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.47-52
    • /
    • 2014
  • Recently, the interest of Wireless Power Transmission(WPT) has been increased for Mobile device application. It is necessary to analyze interference between wireless devices for the efficient use of frequency resource. The Minimum Coupling Loss(MCL) method and the Monte Carlo(MC) method were used for the interference analysis. In this paper, the impact of the 3rd order harmonics of the wireless charger for Cellular Phone on the existing Radio Modem was analyzed. As a result, the separation distance and the allowable number of interferer on the basis of service radius were obtained to protect the Radio Modem from the wireless charger for Cellular Phone.

A Network Coding-Aware Routing Mechanism for Time-Sensitive Data Delivery in Multi-Hop Wireless Networks

  • Jeong, Minho;Ahn, Sanghyun
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1544-1553
    • /
    • 2017
  • The network coding mechanism has attracted much attention because of its advantage of enhanced network throughput which is a desirable characteristic especially in a multi-hop wireless network with limited link capacity such as the device-to-device (D2D) communication network of 5G. COPE proposes to use the XOR-based network coding in the two-hop wireless network topology. For multi-hop wireless networks, the Distributed Coding-Aware Routing (DCAR) mechanism was proposed, in which the coding conditions for two flows intersecting at an intermediate node are defined and the routing metric to improve the coding opportunity by preferring those routes with longer queues is designed. Because the routes with longer queues may increase the delay, DCAR is inefficient in delivering real-time multimedia traffic flows. In this paper, we propose a network coding-aware routing protocol for multi-hop wireless networks that enhances DCAR by considering traffic load distribution and link quality. From this, we can achieve higher network throughput and lower end-to-end delay at the same time for the proper delivery of time-sensitive data flow. The Qualnet-based simulation results show that our proposed scheme outperforms DCAR in terms of throughput and delay.

An Analysis on the Number of Advertisements for Device Discovery in the Bluetooth Low Energy Network (저전력 블루투스 네트워크에서 장치 탐색을 위한 Advertising 횟수에 관한 분석)

  • Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.3-12
    • /
    • 2016
  • Bluetooth Low Energy (BLE) protocol has attracted attention as a promising technology for low data throughput and low energy wireless sensor networks. Fast device discovery is very important in a BLE based wireless network. It is necessary to configure the network to work with minimized energy consumption because the BLE network nodes are expected to operate a long time typically on a coin cell battery. However, since it is difficult to obtain low energy and low latency at the same time, the BLE standard introduces wide range setting of parameters related to device discovery process and let the network operators to set up parameter values for the application. Therefore, it is necessary to analyze the performance of device discovery according to the related parameter values prior to BLE network operation. In this paper we analyze the expected value and the cumulative distribution function of the number of advertisements for device discovery in the BLE network. In addition, we propose a scheme for controlling the interval between advertising events that can improve the performance of device discovery without increasing energy consumption.

The Development of Real-Time Free Length Monitoring Systems Interlocking with PLC Device (PLC 장비와 연동하는 실시간 자유장 모니터링 시스템 개발)

  • Jung, Jin-uk;Kim, Su-hong;Jin, Kyo-hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.539-541
    • /
    • 2016
  • In this paper, we proposed real time free-length monitoring systems interlocking with the spring free-length sorter which shows the state of production connected to the spring production device. This systems enable the administrator to check the quality or quantity of product and the defect rate, etc., in the remote place. The proposed systems are comprised of the wireless device interlocking with PLC device, the server program, and user GUI program. The wireless device transmits the received data from PLC device to server program using Wi-Fi. Server program represents the data from the wireless device on the screen and insert those data into database. User GUI program shows data stored in database and supports the function which converts the stored data in DB to excel file.

  • PDF

Security Threats Analysis and Security Requirement for Industrial Wireless Protocols : ISA 100.11a and WirelessHART (ISA 100.11a 및 WirelessHART 기반 보안위협 식별 및 보안요구사항 도출 연구)

  • Jeong, Jae-Han;Kwon, Sung-Moon;Shon, Tae-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1063-1075
    • /
    • 2019
  • In recent years, industrial automation has been established and WISN (Wireless Industrial Sensor Network) has been introduced for efficient system management. By introducing WISN, many engineering costs have been reduced and process processors have been optimized. And communication flow using wireless is increasing. An empirical study on industrial wireless sensor networks is actively conducted, but there are few security studies on them and they are exposed to such threats. If there is a problem with the standard of the wireless communication protocol itself, the device that is certified according to the standard may also be subject to security threats including problems. We analyze security functions and threats of ISA 100.11a and WirelessHART protocol stack based on standards. Procedures for distributing the security key are not provided or it is vulnerable using the Global Data Link key when the device enters the network. This paper presents the problems of the standard itself and presents the security requirements accordingly.