• Title/Summary/Keyword: Wireless operation

Search Result 948, Processing Time 0.027 seconds

Design of Operation-Level Simulator for Wireless Sensor Network (무선센서네트워크용 동작레벨 시뮬레이터 설계)

  • Lee, Doo-Wan;Kim, Min-Je;Lee, Kang-Whan;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.733-739
    • /
    • 2011
  • Recently, a lots of research proposals and results on mobile sensor network are actively announced. The most of such works are based on general-purposed network simulators such as ns-2, mathlab, etc. But, It is not easy to model and simulate the detail activities of each sensor node, data deliveries between them, and its cost such as power consumption and resource utilization, so that the simulation results of those simulators show the limited aspects of overall networks features or performance metrics. In this paper proposed, power consumption of each node, performance, mobility, and location information in operation-level of the network that can simulate a wireless sensor network simulator platform. Because the network routing algorithm analysis of being developed in an existing becomes available, the proposed simulator can usability in the new network routing algorithm development.

A New Energy Saving Transport Protocol in Wireless Environments (무선 환경에서 새로운 에너지 절약형 전송 프로토콜)

  • Hwang, Sae-Joon;Lee, Jung-Min;Chung, Kwang-Sue
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.654-662
    • /
    • 2005
  • Mobile portable devices for wireless network solely depend on a limited battery power. Therefore, we need to design for wireless communication protocols with an energy efficiency. TCP-Westwood is one of the most important approaches on TCP performance improvement in wireless environments that estimates the available bandwidth by using the sampling mechanism. The advantage is that data can be transmitted efficiently using the estimation of available bandwidth. However, when the sender with TCP-Westwood is in a wireless environment, it does not consider of the sampling mechanism operation. In this thesis, a new energy saving transport protocol, called E2TP(Energy Efficient Transport Protocol), is proposed to solve problems which occur when the sender with TCP-Westwood is in a wireless environment. Also, when there are packet loss while doing frequent link error in a wireless environment, E2TP provides the instantaneous segment size adjustment for a more efficient data retransmission. The simulation result proves that the proposed E2TP has better performance in energy efficiency and throughput than both TCP and TCP-Westwood.

The Risk of Wardriving Attack Against Wireless LAN and its Counterplan (무선랜 워드라이빙 공격의 위험성과 대응방안)

  • Choi, Young-Nam;Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2121-2128
    • /
    • 2009
  • The application range of IEEE 802.11 wireless LAN has rapidly expanding from campus, enterprise to the public network of Hot Spot area due to the advantages of easiness of construction, mobility of wireless client station, convenience of usage and so on. However the security of WLAN(Wireless LAN) is vulnerable inherently because of using RF as a medium, and so the dangers of infringement of personal information and inside data of enterprises have increased and wardriving attack searching for security vulnerability in wireless LAN has become more serious especially. In this paper, we find out the overview of various procedures and preparatory stages for wardriving attack against wireless LAN, and propose complementary methods to prevent information infringement accidents from wardriving attack in wireless LAN. For this purpose, we make an equipment which is suitable for wardriving in wireless LAN and show security vulnerability of AP(Access Point) operation in WLAN around Yangjae-Dong in Seoul as a result of using the equipment.

Develoment of high-sensitivity wireless strain sensor for structural health monitoring

  • Jo, Hongki;Park, Jong-Woong;Spencer, B.F. Jr.;Jung, Hyung-Jo
    • Smart Structures and Systems
    • /
    • v.11 no.5
    • /
    • pp.477-496
    • /
    • 2013
  • Due to their cost-effectiveness and ease of installation, wireless smart sensors (WSS) have received considerable recent attention for structural health monitoring of civil infrastructure. Though various wireless smart sensor networks (WSSN) have been successfully implemented for full-scale structural health monitoring (SHM) applications, monitoring of low-level ambient strain still remains a challenging problem for WSS due to A/D converter (ADC) resolution, inherent circuit noise, and the need for automatic operation. In this paper, the design and validation of high-precision strain sensor board for the Imote2 WSS platform and its application to SHM of a cable-stayed bridge are presented. By accurate and automated balancing of the Wheatstone bridge, signal amplification of up to 2507-times can be obtained, while keeping signal mean close to the center of the ADC span, which allows utilization of the full span of the ADC. For better applicability to SHM for real-world structures, temperature compensation and shunt calibration are also implemented. Moreover, the sensor board has been designed to accommodate a friction-type magnet strain sensor, in addition to traditional foil-type strain gages, facilitating fast and easy deployment. The wireless strain sensor board performance is verified through both laboratory-scale tests and deployment on a full-scale cable-stayed bridge.

A Performance Comparison of Flooding Schemes in Wireless Sensor Networks (무선센서네트워크에서 플러딩 기법의 성능평가)

  • Kim, Kwan-Woong;Cho, Juphil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.153-158
    • /
    • 2016
  • Broadcasting in multi-hop wireless sensor networks is a basic operation that supports many applications such as route search, setting up addresses and sending messages from the sink to sensor nodes. The broadcasting using flooding causes problems that can be mentioned as a broadcasting storm such as redundancy, contention and collision. A variety of broadcasting schemes using wireless sensor networks have been proposed to achieve superior performance rather than simple flooding scheme. Broadcasting algorithms in wireless sensor networks can be classified into six subcategories: flooding scheme, probabilistic scheme, counter-based scheme, distance-based scheme, location-based schemes, and neighbor knowledge-based scheme. This study analyzes a simple flooding scheme, probabilistic scheme, counter-based scheme, distance-based scheme, and neighbor knowledge-based scheme, and compares the performance and efficiency of each scheme through network simulation.

A Study on Evaluation Method of IDC in the Wire/Wireless Integrated Environment (유.무선 통합환경에서의 IDC 평가방법에 관한 연구)

  • Lee, Jea-Pyuing;Park, Jin-Seok;Lee, Man-Woo;Kim, Sun-Gohn
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.599-603
    • /
    • 2006
  • Korea Information Security Agency has executed the certification system for the information security management since 2002 and examines the conformance of the IDCs'total management system including the technical and the physical protection measure. However, this certification system has the standard only for the IDC in the wire/wireless segregated and the evaluation method for the wire/wireless integrated has not been suggested yet. This paper is on the basis of "Accumulation Information Communication Facility Secure Principle", guidelines of Wireless LAN security operation, the existing principles and recommendations of the information security and the data on IDC environment. And the paper suggests the IDC network model in the wire/wireless integrated and the IDC evaluation method.

  • PDF

Design and Implementation of Self-networking and Replaceable Structure in Mobile Vector Graphics

  • Jeong Gu-Min;Na Seung-Won;Jung Doo-Hee;Lee Yang-Sun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.6
    • /
    • pp.827-835
    • /
    • 2005
  • In this paper, self-networking and replaceable structure in vector graphics contents are presented for wireless internet service. The wireless networks over 2G or 3G are limited in the sense of the speed and the cost. Considering these characteristics of wireless network, self-networking method and replaceable structure in downloaded contents are introduced in order to save the amount of data and provide variations for contents. During the display of contents, a certain data for the contents is downloaded from the server and it is managed appropriately for the operation of the contents. The downloaded materials are reflected to the original contents using replaceable structure. Also, the downloading and modification are independent of the play. In this implementation, the data consists of control data for control and resource data for image, sound or text. Comparing to the conventional methods which download the whole data, the amount of the transmitted data is very small since only the difference is downloaded. Also, during the play of the contents, the changes are adopted immediately. The whole functions are implemented in wireless handset and the various applications are discussed.

  • PDF

Social-Aware Resource Allocation Based on Cluster Formation and Matching Theory in D2D Underlaying Cellular Networks

  • Zhuang, Wenqin;Chen, Mingkai;Wei, Xin;Li, Haibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.1984-2002
    • /
    • 2020
  • With the appearance of wireless spectrum crisis in traditional cellular network, device-to-device (D2D) communication has been regarded as a promising solution to ease heavy traffic burden by enabling precise content delivery among mobile users. However, due to the channel sharing, the interference between D2D and cellular users can affect the transmission rate and narrow the throughput in the network. In this paper, we firstly present a weighted interference minimization cluster formation model involving both social attribute and physical closeness. The weighted-interference, which is evaluated under the susceptible-infected(SI) model, is utilized to gather user in social and physical proximity. Then, we address the cluster formation problem via spectrum clustering with iterative operation. Finally, we propose the stable matching theory algorithm in order to maximize rate oriented to accomplish the one-to-one resource allocation. Numerical results show that our proposed scheme acquires quite well clustering effect and increases the accumulative transmission rate compared with the other two advanced schemes.

An Effective Multi-hop Relay Algorithm in Wireless Mesh Network (무선 메쉬 네트워크 환경에서 효율적인 다중 홉 전달 기법)

  • Kim, Young-An;Park, Chul-Hyun;Hong, Choong-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10B
    • /
    • pp.872-882
    • /
    • 2006
  • The Wireless Mesh Network uses a wireless communication technology with transmission rates similar to that of a cable, which is used as a backbone network. The topology structure is in a Mesh form which resembles an Ad-hoc network, however a metric is needed in order to set the channel and channel methods since the operation intentions and interior motions are different. This thesis proposes a metric(ETR : Expected Transmission Rate) that sets the channel with physical link performance and multi hop transmission capabilities. This metric will also be based on multi channel creation methods and Hop-by-hop routing techniques for an effective multi hop transmission with no loops.

Optimized Charging in Large-Scale Deployed WSNs with Mobile Charger

  • Qin, Zhenquan;Lu, Bingxian;Zhu, Ming;Sun, Liang;Shu, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5307-5327
    • /
    • 2016
  • Restricted by finite battery energy, traditional wireless sensor networks (WSNs) can only maintain for a limited period of time, resulting in serious performance bottleneck in long-term deployment of WSN. Fortunately, the advancement in the wireless energy transfer technology provides a potential to free WSNs from limited energy supply and remain perpetual operational. A mobile charger called wireless charging vehicle (WCV) is employed to periodically charge each sensor node and keep its energy level above the minimum threshold. Aiming at maximizing the ratio of the WCV's vocation time over the cycle time as well as guaranteeing the perpetual operation of networks, we propose a feasible and optimal solution to this issue within the context of a real-time large-scale deployed WSN. First, we develop two different types of charging cycles: initialization cycles and renewable cycles and give relevant algorithms to construct these two cycles for each sensor node. We then formulate the optimization problem into an optimal construction algorithm and prove its correctness through theoretical analysis. Finally, we conduct extensive simulations to demonstrate the effectiveness of our proposed algorithms.