• Title/Summary/Keyword: delay tolerant network

Search Result 96, Processing Time 0.028 seconds

Algorithm of Holding Time Control Using Delay-Tolerant Packet for Energy-Efficient Transmission (에너지 효율적인 전송을 위한 지연 허용 패킷의 유지시간 제어 알고리즘)

  • Ryu, Seung Min;Choi, Won Seok;Choi, Seong Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.87-94
    • /
    • 2016
  • This paper proposes an energy transmission method to maximize energy efficiency of a based station. This method makes use of classification of service type to solve an inefficient use of transmission power, which is from exponential relationship between the legacy data throughput and transmission power. The proposed one is a way to find the most energy-efficiency points with the transmitted optimal amount of data on users in a base station of wireless network environment. For this, we propose EETA (Energy-Efficient Transmission Algorithm) which can control the amount of data and the holding time at the base station. As a result, the proposed method can improve the energy efficiency of about 10% compared to the legacy base station.

International Standardization and Domestic Application Methods according to Interagency Operations Advisory Group (IOAG) Service Catalog (Interagency Operations Advisory Group (IOAG) Service Catalog 에 따른 국제 표준화 및 국내 적용 방안)

  • Lee, Junghyun;Park, Durkjong;Ahn, Sangil
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.137-145
    • /
    • 2022
  • Space development has been independently performed by space agencies in each country. This causes redundant development for individual function, resulting in waste of space resources. Accordingly, Interagency Operations Advisory Group (IOAG) was established for standardization with mutual agreement between international organizations, and space resources can be used efficiently between space agencies through cross-support. IOAG define Service Catalog#1, #2, and #3, according to the network layer. In this technical paper, the background and main contents of the IOAG Service Catalog, and the application plan for domestic space development will be discussed.

Hybrid Spray and Wait Routing Protocol in DTN (DTN에서 Hybrid Spray and Wait 라우팅 프로토콜)

  • Hyun, Sung-Su;Jeong, Hyeon-Jin;Choi, Seoung-Sik
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.53-62
    • /
    • 2014
  • DTN is the next generation network that is used in not guaranteed end-to-end connection such as communication between planet and satellite, frequent connection severance, and not enough for qualified network infrastructure. In this paper, we propose the hybrid Spray-and-Wait algorithm to predict the node contact time by monitoring the periodic contacts information between the nodes. Based on this method, we select one node on the basis of prediction time and copy a message for spray and wait algorithm. In order to verify the the hybrid Spray and Wait algorithm, we use the ONE(Opportunistic Network Environment) Simulator of Helsinki University. The delivery probability of the proposed algorithm is compared to the Binary Spray and Wait algorithm, it is showed that it has 10% less overhead than Binary Spray and Wait routing. It has also shown that it reduces unnecessary copying of this message.

Fault free Shortest Path routing on the de Bruijin network (드브르젼 네트워크에서 고장 노드를 포함하지 않는 최단 경로 라우팅)

  • Ngoc Nguyen Chi;Nhat Vo Dinh Minh;Zhung Yonil;Lee Sungyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.946-955
    • /
    • 2004
  • It is shown that the do Bruijn graph (dBG) can be used as an architecture for interconnection network and a suitable structure for parallel computation. Recent works have classified dBG based routing algorithms into shortest path routing and fault tolerant routing but investigation into fault free shortest path (FFSP) on dBG has been non-existent. In addition, as the size of the network increase, more faults are to be expected and therefore shortest path dBG algorithms in fault free mode may not be suitable routing algorithms for real interconnection networks, which contain several failures. Furthermore, long fault free path may lead to high traffic, high delay time and low throughput. In this paper we investigate routing algorithms in the condition of existing failure, based on the Bidirectional do Bruijn graph (BdBG). Two FFSP routing algorithms are proposed. Then, the performances of the two algorithms are analyzed in terms of mean path lengths and discrete set mean sizes. Our study shows that the proposed algorithms can be one of the candidates for routing in real interconnection networks based on dBG.

Stochastic Method of Relay Node Selection for Efficient Message Forward in DTN (DTN에서 효율적인 메시지 전달을 위한 확률적 중계 노드 선택 기법)

  • Dho, Yoon-hyung;Shin, Dong-Ryoul;Kim, Myeon-sik;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.105-106
    • /
    • 2015
  • 본 논문에서는 DTN(Delay Tolerant Network) 환경에서 효율적인 메시지 전달을 위해 확률적으로 중계 노드를 선택하는 기법을 제안한다. DTN은 종단 간 연결이 불확실한 네트워크에서의 통신을 Store-Carry-Forward 방식을 사용하여 메시지를 목적 노드에 전달한다. 또한 종단 간 연결이 불확실한 상황에서도 중계 노드를 통해 메시지를 목적 노드에 전달하여 높은 전송률을 보장한다. 하지만 에피데믹(Epidemic) 라우팅이나 Spray and Wait 라우팅과 같은 기존 다중 복사 라우팅 알고리즘은 접촉한 모든 노드에게 메시지를 복사하여 메시지 복사로 인한 오버헤드가 높아진다. 반면에 PROPHET 라우팅과 같은 단일 복사 알고리즘은 적은 오버헤드를 발생시키지만 중계 노드 수 감소로 인한 메시지 전송률 감소 현상이 나타난다. 본 논문에서 제안하는 알고리즘은 기존 DTN 라우팅의 문제점을 보완하기 위해 확률적으로 노드 분포를 분석하여 현재 네트워크에 효율적인 메시지 복사 방식을 선택하여 작동한다. 본 논문에서는 제안하는 알고리즘이 기존 DTN 라우팅 알고리즘과 오버헤드와 전송률을 비교하여 더 효율적임을 증명한다.

  • PDF

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm

  • Vamshi Krishna. K;Ganesh Reddy K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.233-262
    • /
    • 2024
  • Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.

Improved Tree-Based ${\mu}TESLA$ Broadcast Authentication Protocol Based on XOR Chain for Data-Loss Tolerant and Gigh-Efficiency (데이터 손실에 강하고 효율적 연산을 지원하는 XOR 체인을 이용한 트리기반 ${\mu}TESLA$ 프로토콜 개선)

  • Yeo, Don-Gu;Jang, Jae-Hoon;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.43-55
    • /
    • 2010
  • ${\mu}TESLA$ broadcast authentication protocol have been developed by many researchers for providing authenticated broadcasting message between receiver and sender in sensor networks. Those cause authentication delay Tree-based ${\mu}TESLA$[3] solves the problem of authentication delay. But, it has new problems from Merkel hash tree certificate structure. Such as an increase in quantity of data transmission and computation according to the number of sender or parameter of ${\mu}TESLA$ chain. ${\mu}TPCT$-based ${\mu}TESLA$[4] has an advantages, such as a fixed computation cost by altered Low-level Merkel has tree to hash chain. However, it only use the sequential values of Hash chain to authenticate ${\mu}TESLA$ parameters. So, It can't ensure the success of authentication in lossy sensor network. This paper is to propose the improved method for Tree-based ${\mu}TESLA$ by using XOR-based chain. The proposed scheme provide advantages such as a fixed computation cost with ${\mu}$TPCT-based ${\mu}TESLA$ and a message loss-tolerant with Tree-based ${\mu}TESLA$.

Performance Analysis of Multimedia CDMA Mobile Communication System Considering Diverse Qos Requirements (멀티미디어 CDMA 이동통신 시스템에서의 다양한 QoS 요구조건을 고려한 성능 분석)

  • Kim, Baek-Hyun;Shin, Seung-Hoon;Kwak Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.1-12
    • /
    • 2002
  • In the multimedia CDMA mobile communication service, it is required to support various applications, such as voice, video, file transfer, e-mail, and Internet access, with guaranteed QoS. In the mixed traffic environment ,which consists of voice, stream data, and packet data, we analyze the network where preemptive priority is granted to delay-intolerant voice service and a buffer is offered to delay-tolerant stream data service. And, for best-effort packet data service, the access control by transmission permission probability is applied to obtain prominent throughput. To analyze the multimedia CDMA mobile communication system, we build a 2-dimensional markov chain model about prioritized-voice and stream data services and accomplish numerical analysis in combination with packet data traffic based on residual capacity equation.

A Hardware Barrier Synchronization using Multi -drop Scheme in Parallel Computer Systems (병렬 컴퓨터 시스템에서의 Multi-drop 방식을 사용한 하드웨어 장벽 동기화)

  • Lee, June-Bum;Kim, Sung-Chun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.5
    • /
    • pp.485-495
    • /
    • 2000
  • The parallel computer system that uses parallel program on the application such as a large scale business or complex operation is required. One of crucial operation of parallel computer system is synchronization. A representative method of synchronization is barrier synchronization. A barrier forces all process to wait until all the process reach the barrier and then releases all of the processes. There are software schemes, hardware scheme, or combinations of these mechanism to achieve barrier synchronization which tends to use hardware scheme. Besides, barrier synchronization lets parallel computer system fast because it has fewer start-up overhead. In this paper, we propose a new switch module that can implement fast and fault-tolerant barrier synchronization in hardware scheme. A proposed barrier synchronization is operated not in full-switch-driven method but in processor-driven method. An effective barrier synchronization is executed with inexpensive hardware supports. Therefore, a new proposed hardware barrier synchronization is designed that it is operated in arbitrary network topology. In this paper, we only show comparison of barrier synchronization on Multistage Interconnection Network. This research results in 24.6-24.8% reduced average delay. Through this result, we can expect lower average delay in irregular network.

  • PDF

Using Mobile Data Collectors to Enhance Energy Efficiency a nd Reliability in Delay Tolerant Wireless Sensor Networks

  • Yasmine-Derdour, Yasmine-Derdour;Bouabdellah-Kechar, Bouabdellah-Kechar;Faycal-Khelfi, Mohammed
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.275-294
    • /
    • 2016
  • A primary task in wireless sensor networks (WSNs) is data collection. The main objective of this task is to collect sensor readings from sensor fields at predetermined sinks using routing protocols without conducting network processing at intermediate nodes, which have been proved as being inefficient in many research studies using a static sink. The major drawback is that sensor nodes near a data sink are prone to dissipate more energy power than those far away due to their role as relay nodes. Recently, novel WSN architectures based on mobile sinks and mobile relay nodes, which are able to move inside the region of a deployed WSN, which has been developed in most research works related to mobile WSN mainly exploit mobility to reduce and balance energy consumption to enhance communication reliability among sensor nodes. Our main purpose in this paper is to propose a solution to the problem of deploying mobile data collectors for alleviating the high traffic load and resulting bottleneck in a sink's vicinity, which are caused by static approaches. For this reason, several WSNs based on mobile elements have been proposed. We studied two key issues in WSN mobility: the impact of the mobile element (sink or relay nodes) and the impact of the mobility model on WSN based on its performance expressed in terms of energy efficiency and reliability. We conducted an extensive set of simulation experiments. The results obtained reveal that the collection approach based on relay nodes and the mobility model based on stochastic perform better.