• Title/Summary/Keyword: delay performance

Search Result 4,138, Processing Time 0.031 seconds

Multi-Channel Pipelining for Energy Efficiency and Delay Reduction in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율성과 지연 감소를 위한 다중 채널 파리프라인 기법)

  • Lee, Yoh-Han;Kim, Daeyoung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.11-18
    • /
    • 2014
  • Most of the energy efficient MAC protocols for wireless sensor networks (WSNs) are based on duty cycling in a single channel and show competitive performances in a small number of traffic flows; however, under concurrent multiple flows, they result in significant performance degradation due to contention and collision. We propose a multi-channel pipelining (MCP) method for convergecast WSN in order to address these problems. In MCP, a staggered dynamic phase shift (SDPS) algorithms devised to minimize end-to-end latency by dynamically staggering wake-up schedule of nodes on a multi-hop path. Also, a phase-locking identification (PLI) algorithm is proposed to optimize energy efficiency. Based on these algorithms, multiple flows can be dynamically pipelined in one of multiple channels and successively handled by sink switched to each channel. We present an analytical model to compute the duty cycle and the latency of MCP and validate the model by simulation. Simulation evaluation shows that our proposal is superior to existing protocols: X-MAC and DPS-MAC in terms of duty cycle, end-to-end latency, delivery ratio, and aggregate throughput.

The Cell Resequencing Buffer for the Cell Sequence Integrity Guarantee for the Cyclic Banyan Network (사이클릭 벤얀 망의 셀 순서 무결성 보장을 위한 셀 재배열 버퍼)

  • 박재현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.9
    • /
    • pp.73-80
    • /
    • 2004
  • In this paper, we present the cell resequencing buffer to solve the cell sequence integrity problem of the Cyclic banyan network that is a high-performance fault-tolerant cell switch. By offering multiple paths between input ports and output ports, using the deflection self-routing, the Cyclic banyan switch offer high reliability, and it also solves congestion problem for the internal links of the switch. By the way, these multiple paths can be different lengths for each other. Therefore, the cells departing from an identical source port and arriving at an identical destination port can reach to the output port as the order that is different from the order arriving at input port. The proposed cell resequencing buffer is a hardware sliding window mechanism. to solve such cell sequence integrity problem. To calculate the size of sliding window that cause the prime cost of the presented device, we analyzed the distribution of the cell delay through the simulation analyses under traffic load that have a nonuniform address distribution that express tile Property of traffic of the Internet. Through these analyses, we found out that we can make a cell resequencing buffer by which the cell sequence integrity is to be secured, by using a, few of ordinary memory and control logic. The cell resequencing buffer presented in this paper can be used for other multiple paths switching networks.

Numerical Simulation of Full-Scale Crash Impact Test for Fuel Cell of Rotorcraft (회전익항공기 연료셀 충돌충격시험 Full-Scale 수치모사)

  • Kim, Hyun-Gi;Kim, Sung Chan;Kim, Sung Jun;Kim, Soo Yeon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.26 no.5
    • /
    • pp.343-349
    • /
    • 2013
  • Crashworthy fuel cells have a great influence on improving the survivability of crews. Since 1960's, the US army has developed a detailed military specification, MIL-DTL-27422, defining the performance requirements for rotorcraft fuel cells. In the qualification tests required by MIL-DTL-27422, the crash impact test should be conducted to verify the crashworthiness of fuel cell. Success of the crash impact test means the improvement of survivability of crews by preventing post-crash fire. But, there is a big risk of failure due to huge external load in the crash impact test. Because the crash impact test itself takes a long-term preparation efforts together with costly fuel cell specimens, the failure of crash impact test can result in serious delay of a entire rotorcraft development. Thus, the numerical simulations of the crash impact test has been required at the early design stage to minimize the possibility of trial-and-error with full-scale fuel cells. Present study performs the numerical simulation using SPH(smoothed particle hydro-dynamic) method supported by a crash simulation software, LS-DYNA. Test condition of MIL-DTL-27422 is reflected on analysis and material data is acquired by specimen test of fuel cell material. As a result, the resulting equivalent stresses of fuel cell itself are calculated and vulnerable areas are also evaluated.

Hydrologic and Environmental Assessment of an Infiltration Planter for Roof Runoff Use (지붕 빗물이용을 위하여 개발된 침투화분의 환경·수문학적 평가)

  • Moon, So-Yeon;Choi, Ji-Yeon;Hong, Jung-Sun;Yu, Gi-Gyung;Jeon, Je-Chan;Flores, Precious Eureka D.;Kim, Lee-Hyung
    • Journal of Wetlands Research
    • /
    • v.17 no.4
    • /
    • pp.325-331
    • /
    • 2015
  • Due to urbanization and increase in impervious area, changes in natural water circulation system have become a cause of groundwater recharge reduction, streamflow depletion and other hydrological problems. Therefore, this study developed the infiltration planter techniques applied in an LID facility treating roof stormwater runoff such as, performance of small decentralized retention and infiltration through the reproduction of natural water circulation system and use of landscape for cleaning water. Assessment of an infiltration planter was performed through rainfall monitoring to analyze the water balance and pollutant removal efficiency. Hydrologic assessment of an infiltration planter, showed a delay in time of effluent for roof runoff for about 3 hours and on average, 79% of facilities had a runoff reduction through retention and infiltration. Based on the analysis, pollutant removal efficiency generated in the catchment area showed an average of 97% for the particulate matter, 94% for the organic matter and 86-96% and 92-93% for the nutrients and heavy metals were treated, respectively. Comparative results with other LID facilities were made. For this study, facilities compared the SA/CA to high pollutant removal efficiency for the determination to of the effectiveness of the facility when applied in an urban area.

Analysis on Risk Factors of Reactor Containment Building Construction using Analytic Hierarchy Process (계층 분석 방법을 이용한 원자로 격납 건물 시공의 리스크 요인 분석)

  • Shin, Dae-Woong;Shin, Yoonseok;Kim, Gwang-Hee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.15 no.4
    • /
    • pp.425-431
    • /
    • 2015
  • Since the construction of Kori 1 was completed in 1978, the construction projects for nuclear power plant are increasingly expanded into domestic and foreign sites. However, some of construction sites of nuclear power plant have the problems of process delay and cost loss due to lack of ability of risk management. The construction of reactor containment building in nuclear power plant is especially dotted with many risk factors because it needs professional skills and large-scale resources due to long duration compared with different construction phase. Therefore, it needs the study that analyzes risk factors expected in construction of reactor containment building and suggests way of stable performance of projects. So, this study assesses risk factors of construction of reactor containment building. For the objectives, this study uses survey for group of minority specialists of 36 experts. The risks of 24 factors is classified by criterions of process, cost, safety, and quality and the results of assessment is analyzed by analytic hierarchy process. As the results, the importance and priority of risk factors classified by each criterion were calculated and the applicability of analytic hierarchy process was identified to analyze risk factors of nuclear power plant construction. These will be baseline data for risk management in construction phase of reactor containment building.

Performance of an Efficient Backoff Retransmission Algorithm with a Proactive Jamming Scheme for Realtime transmission in Wireless LAN (재밍 기반의 재전송 방식을 사용한 무선 LAN에서의 효율적인 실시간 트래픽 전송 방안의 성능 분석)

  • Koo Do-Jung;Yoon Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2B
    • /
    • pp.98-106
    • /
    • 2006
  • In order to provide a realtime transmission over a wireless LAM, we here present a new jamming based retransmission mechanism. In a legacy wireless LAN system, all stations use the binary exponential backoff algorithm to avoid collisions among frames. It is well known that the backoff algorithm causes more collisions as the numbers of active stations increases. This makes transmission of real time traffic hard. In the proposed scheme, when each station senses collisions, it promptly allows to send a jamming signal during a unique jamming window period which is determined by its own channel access count database(CACDB). This jamming windows is chosen not to be overlapped each other by using of CACDB, and thus channel access of another station is prevented. Hereafter the station gets the ownership of the medium when the wireless medium becomes idle after sending the jamming signal and sensing carrier, and then sends frame in medium. In our proposal, repeating collisions is never happened. We here assume that real time traffic use a frame of fixed length in order to make the time for receiving its ACK frame same. Comparing the proposed jamming-based retransmission scheme with the the 802.11 and 802.11e MAC by simulation. one can find that the proposed scheme have advantages in terms of delay, average backoff time, and average number of collisions per frame. One can find that the proposed scheme might be practically applicable to several applications of realtime traffic transmission in wireless LAN systems.

Development of Imaging Gamma Probe Using the Position Sensitive PMTube (위치 민감형 광전자증배관을 이용한 영상용 감마프로브의 개발)

  • Bong, Jeong-Gyun;Kim, Hui-Jung;So, Su-Gil;Kim, Han-Myeong;Lee, Jong-Du;Gwon, Su-Il
    • Journal of Biomedical Engineering Research
    • /
    • v.20 no.1
    • /
    • pp.107-113
    • /
    • 1999
  • The purpose of this study was to develop a miniature imaging gamma probe with high performance that can detect small or residual tumors after surgery. Gamma probe detector system consists of NaI(Tl) scintillator, position sensitive photomultiplier tube (PSPMT), and collimator. PSPMT was optically coupled with 6.5 mm thick, 7.62 cm diameter of NaI(Tl) crystal and supplied with -1000V for high voltage. Parallel hexagonal hole collimator was manufactured for characteristics of 40-mm hole length, 1.3-mm hole diameter, and 0.22 mm septal thickness. Electronics consist of position and trigger signal readout systems. Position signals were obtained with summing, subtracting, and dividing circuit using preamplifer and amplifier. Trigger signals were obtained using summing amplifier, constant fraction discriminator, and gate and delay generator module with preamplifer. Data acquisition and processing were performed by Gamma-PF interface board inserted into pentium PC and PIP software. For imaging studies, flood and slit mask images were acquired using a point source. Two hole phantom images were also acquired with collimator. Intrinsic and system spatial resolutions were measured as 3.97 mm and 5.97 mm, respectively. In conclusion, Miniature gamma probe images based on the PSPMT showed good image quality, we conclude that the miniature imaging gamma probe was successfully developed and good image data were obtained. However, further studies will be required to optimize imaging characteristics.

  • PDF

Performance of an Authentication Proxy for Port Based Security Systems (포트레벨 보안을 위한 인증 프록시 시스템의 성능분석)

  • 이동현;이현우;정해원;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8B
    • /
    • pp.730-737
    • /
    • 2003
  • In this paper, we present an efficient authentication proxy for IEEE 802.1x systems based on the port-based access control mechanism. An IEEE 802.1x system consists of PC supplicants, a bridge with authentication client functions, and an authentication server. For the network security and user authentication purposes, a supplicant who wants to access Internet should be authorized to access the bridge port using the Extended Authentication Protocol (EAP) over LAN. The frame of EAP over LAN is then relayed to the authentication server by the bridge. After several transactions between the supplicant and the server via the bridge, the supplicant may be either authorized or not. Noting that the transactions between the relaying bridge and the server will be increased as the number of supplicants grows in public networks, we propose a scheme for reducing the transactions by employing an authentication proxy function at the bridge. The proxy is allowed to cache the supplicant's user ID and password during his first transaction with the server. For the next authentication procedure of the same supplicant, the proxy function of the bridge handles the authentication transactions using its cache on behalf of the authentication server. Since the main authentication server handles only the first authentication transaction of each supplicant, the processing load of the server can be reduced. Also, the authentication transaction delay experienced by a supplicant can be decreased compared with the conventional 802.1x system.

Multiple Path Security-Aware Routing Protocol Mechanism for Ad Hoc Network (Ad Hoc 네트워크 라우팅 보안을 위한 다중경로 기반의 MP-SAR 프로토콜)

  • Han, In-Sung;Ryou, Hwang-Bin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.260-267
    • /
    • 2008
  • As pervious the SAR(Security Aware Routing)[10] protocol is an secure Ad Hoc network protocol that finds a secure path, it is the security routing protocol that uses the security level of nodes as the routing information. However, the SAR protocol sometimes transfers data through inefficient transmission paths because it always tries to find secure nodes for a safe transmission. Since it is a protocol based on AODV[6], it will cause transmission delay as researching of security routing path. when a node is out of the data transmission range as its battery dying or movement. Although it is possible to connection of nodes because a characteristic of the SAR protocol, the connection is not easy to reconnect when the security level of intermediate node is lower than the level requested by a source node. In this paper, we suggest the MP-SAR based on the SAR to solve the SAR protocol's problem. The MP-SAR seeks multiple secure path for maintenance of data confidentiality using the expanded secure path detection techniques based on the SAR. It can transfer data quickly and reliably by using the shortest efficient path among multiple paths. In the research result, we proved a outstanding performance of MP-SAR than the previous SAR through comparison and analysis.

A Maximally Disjoint Multipath Routing Protocol Based on AODV in Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서의 AODV 기반 치대 비중첩 다중경로 라우팅 프로토콜)

  • Kim Jungtae;Moh Sangman;Chung Ilyong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.429-436
    • /
    • 2005
  • A mobile ad hoc network (MANET) is a collection of mobile nodes without any fixed infrastructure or my form of centralized administration such as access points and base stations. The ad hoc on-demand distance vector routing (AODV) protocol is an on-demand routing protocol for MANETs, which is one of the Internet-Drafts submitted to the Internet engineering task force (IETF) MANET working group. This paper proposes a new multipath routing protocol called maximally disjoint multipath AODV (MDAODV), which exploits maximally node- and link-disjoint paths and outperforms the conventional multipath protocol based on AODV as well as the basic AODV protocol. The key idea is to extend only route request (RREQ) message by adding source routing information and to make the destination node select two paths from multiple RREQs received for a predetermined time period. Compared to the conventional multipath routing protocol, the proposed MDAODV provides more reliable and robust routing paths and higher performance. It also makes the destination node determine the maximally node- and link-disjoint paths, reducing the overhead incurred at intermediate nodes. Our extensive simulation study shows that the proposed MDAODV outperforms the conventional multipath routing protocol based on AODV in terms of packet delivery ratio and average end-to-end delay, and reduces routing overhead.