• Title/Summary/Keyword: node mobility

Search Result 571, Processing Time 0.027 seconds

A Multi-path QoS Routing Protocol for the OFDM-TDMA Mesh Networks (OFDM-TDMA 메쉬 네트워크를 위한 다중경로 QoS 라우팅 프로토콜)

  • Choi, Jungwook;Lee, Hyukjoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.1
    • /
    • pp.57-67
    • /
    • 2015
  • A large amount of work has been done in the areas of routing, MAC, QoS, capacity, location service, cooperative communication, fault tolerance, mobility models and various applications of mesh networks thanks to their merits of cost-effective way of deployment and flexibility in extending wireline services. Although multi-path routing protocols have been proposed to be used to provide QoS and fault-tolerance, there has not been any significant results discussed that support both in the literature to our best knowledge as they are often required in military and public safety applications. In this paper, we present a novel routing protocol for a mesh network based on the OFDM-TDMA collision-free MAC that discovers and maintains multiple paths that allows retransmitting and forwarding packets that have been blocked due to a link failure using an alternative next-hop node such that the delay-capacity tradeoff is reduced and the reliability is enhanced. Simulation results show that the proposed protocol performs well in terms of both the QoS and delivery ratio.

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node (MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구)

  • Lee, Dae-Young;Song, Sang-Hoon;Bae, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.

Design and Implementation of High Throughput Geographical Handoff Using GPS Information (GPS정보를 이용한 위치기반 핸드오프의 설계 및 구현)

  • Han, Seung-ho;Yang, Seung-chur;Kim, Jong-duok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.80-83
    • /
    • 2009
  • The most popular communication protocol is those defined by the IEEE 802.11 WLAN to support broadband internet connection. The demand for real-time multimedia service is increasing through WLAN on the road. The Hand-off function of mobile terminal is essential to support mobility. But, the hand-off function of IEEE 802.11 WLANs has the latency up to 300ms, and recent research has focusing on channel scanning and reconnection to AP and certification process of AP. It is also the lack of consideration in related works that hand-off happens frequently when the mobile node is moving. This paper proposed the hand-off algorithm that guarantees high throughput and estimates the point which may occur hand-off using GPS information and RSSI. We implement the proposed hand-off function that achieves the best performance.

  • PDF

Epidemic & Prediction based Routing Protocol for Delay Tolerant Network (DTN에서 에피데믹과 예측 기반 알고리즘을 이용한 라우팅 프로토콜)

  • Dho, Yoon-Hyung;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.404-407
    • /
    • 2014
  • Delay Tolerant Network (DTN) is a networking architecture that is designed to solve network problem in unstable and stressed environments using the Store-Carry-Forward method. Different form general networks, DTN does not guarantee the end-to-end connectivity, it is hard for the exiting TCP/IP based protocols to normally work due to the characteristic such as large latency and unstable link connectivity. And the condition that send massage without the information of the destination occurs frequently. Thus, suitable routing protocols for DTN are required and being researched. In this paper, we propose a novel routing protocol for DTN utilizing epidemic and prediction based algorithm to prevent the defect of previously DTN routing protocols such as the absence of the holistic view of the network. Proposed algorithm predicted destination using the mobility information recorded in neighbor node's history and utilize epidemic based algorithm when occurred condition without destination's information. This algorithm is enhanced in terms of delivery ratio, decreases latency and overhead in sparse network such as DTN.

  • PDF

How to Protect Critical Nodes of Megacities in Preparation for the Digitization of Spatial Information (공간정보 디지털화에 대비한 메가시티 핵심노드 방호 대책)

  • Sim, Jun Hak;Cho, Sang Keun;Park, Sung Jun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.121-125
    • /
    • 2022
  • As the technologies of the 4th industrial revolution develops, spatial information is becoming digitized. Now, even with a smartphone, we can easily identify the location of national & military critical facilities located in the mega cities. As a result, mega cities' national & military critical facilities were exposed to not only traditional threats, but also non-traditional threats such as terrorism, cyber hacking, and criminal activities. This study suggests a way to protect national & military critical facilities of mega cities from such threats. Considering limitation of time & resources, protecting perfectly all national & military critical facilities is impossible, so we should focus on their critical nodes. Specifically, We suggest ways to protect the critical nodes by converging some measures such as design & arrangement in harmony with the surrounding environment, underground construction & covering, and visual deception. Transparency of digital spatial information will further increase with the advent of urban air mobility and autonomous vehicles in the future. Therefore, in order to prepare for future threats, we should take measures to minimize the exposure of critical nodes.

Updating Obstacle Information Using Object Detection in Street-View Images (스트리트뷰 영상의 객체탐지를 활용한 보행 장애물 정보 갱신)

  • Park, Seula;Song, Ahram
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.599-607
    • /
    • 2021
  • Street-view images, which are omnidirectional scenes centered on a specific location on the road, can provide various obstacle information for the pedestrians. Pedestrian network data for the navigation services should reflect the up-to-date obstacle information to ensure the mobility of pedestrians, including people with disabilities. In this study, the object detection model was trained for the bollard as a major obstacle in Seoul using street-view images and a deep learning algorithm. Also, a process for updating information about the presence and number of bollards as obstacle properties for the crosswalk node through spatial matching between the detected bollards and the pedestrian nodes was proposed. The missing crosswalk information can also be updated concurrently by the proposed process. The proposed approach is appropriate for crowdsourcing data as the model trained using the street-view images can be applied to photos taken with a smartphone while walking. Through additional training with various obstacles captured in the street-view images, it is expected to enable efficient information update about obstacles on the road.

Development of Engine Clutch Female Flange for Tank Using SNCM439 Material (SNCM439재질의 전차용 엔진클러치 암플랜지 개발)

  • Kim, Joong-Seon;Kwon, Dae-Kyu;Ahn, Seok-Young
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.20 no.11
    • /
    • pp.67-73
    • /
    • 2021
  • Tanks are key weapons of ground combat that are equipped with powerful weapons and have strong protective bodies. One tank component, the engine clutch flange, is located in the part of the tank where the engine and transmission are installed, and it is a key part of the power transfer and shutoff. The engine clutch flange transmits high power to secure the mobility of the tank; thus, it must have high strength and hardness. In addition, high durability and safety must be ensured because tank operations must exclude concerns about damage. In this study, an engine clutch female flange for tanks made of SNCM439 was developed. The 2D design used AutoCAD programs, and the 3D shape design used CATIA programs. The structural analysis was conducted using ANSYS. The mesh grid has a tetrahedron shape and is created by adding a mid-side node. After the mechanical properties and constraints of SNCM439 were entered, the changes in the safety factor, total deformation, and Von-Mises stress were identified according to the increase in torque. Prototype processing was performed to verify the engine clutch female flange for the tank. To determine the productivity of the product, the cutting processing time was measured when processing the prototypes. Based on the results of measuring the cutting processing time, it is concluded that research is needed to improve productivity because MCT slot cutting processing is time consuming.

Lifetime Escalation and Clone Detection in Wireless Sensor Networks using Snowball Endurance Algorithm(SBEA)

  • Sathya, V.;Kannan, Dr. S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1224-1248
    • /
    • 2022
  • In various sensor network applications, such as climate observation organizations, sensor nodes need to collect information from time to time and pass it on to the recipient of information through multiple bounces. According to field tests, this information corresponds to most of the energy use of the sensor hub. Decreasing the measurement of information transmission in sensor networks becomes an important issue.Compression sensing (CS) can reduce the amount of information delivered to the network and reduce traffic load. However, the total number of classification of information delivered using pure CS is still enormous. The hybrid technique for utilizing CS was proposed to diminish the quantity of transmissions in sensor networks.Further the energy productivity is a test task for the sensor nodes. However, in previous studies, a clustering approach using hybrid CS for a sensor network and an explanatory model was used to investigate the relationship between beam size and number of transmissions of hybrid CS technology. It uses efficient data integration techniques for large networks, but leads to clone attacks or attacks. Here, a new algorithm called SBEA (Snowball Endurance Algorithm) was proposed and tested with a bow. Thus, you can extend the battery life of your WSN by running effective copy detection. Often, multiple nodes, called observers, are selected to verify the reliability of the nodes within the network. Personal data from the source centre (e.g. personality and geographical data) is provided to the observer at the optional witness stage. The trust and reputation system is used to find the reliability of data aggregation across the cluster head and cluster nodes. It is also possible to obtain a mechanism to perform sleep and standby procedures to improve the life of the sensor node. The sniffers have been implemented to monitor the energy of the sensor nodes periodically in the sink. The proposed algorithm SBEA (Snowball Endurance Algorithm) is a combination of ERCD protocol and a combined mobility and routing algorithm that can identify the cluster head and adjacent cluster head nodes.This algorithm is used to yield the network life time and the performance of the sensor nodes can be increased.

Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things (사물인터넷과 융합한 헬스케어 시스템에서의 보안 이슈 및 취약점 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.699-706
    • /
    • 2023
  • Recently, the 4 generation industry revolution is developed with advanced and combined with a variety of new technologies. Conventional healthcare system is applied with IoT application. It provides many advantages with mobility and swift data transfers to patient and doctor. In despite of these kinds of advantages, it occurred security issues between basic devices and protocols in their applications. Especially, internet of things have restricted and limited resources such as small memory capacity, low capability of computing power, etc. Therefore, we can not utilize conventional mechanism. In this paper, we analyzed attacks and vulnerability in terms of security issues. To analyze security structure, features, demands and requirements, we solve the methods to be reduced security issues.

An Intelligent Land Vehicle Information System for CDMA-based Wireless Remote Diagnosis and Management (CDMA기반 무선 원격진단 및 관리를 위한 지능형 차량 정보 시스템)

  • Kim, Tae-Hwan;Lee, Seung-Il;Hong, Won-Kee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.2
    • /
    • pp.91-101
    • /
    • 2006
  • Researches on services of vehicles have been mainly focused on how to provide useful information and entertainment for an in-vehicle driver. However, the needs are appreciably increased for more advanced services that help drivers to check and manage their vehicles conveniently, without requiring drivers to attach to their vehicles. It is a sort of ubiquitous computing, providing an intelligent interactive services for human at any time and any where. In this paper, we present an intelligent vehicle information system to enable a driver to remotely diagnose and control a vehicle via CDMA communication network connected to the Internet. The system improves mobility for diagnosis and control of vehicle by implementing a cut and call back mechanism, which allows the vehicle terminal to have access to the information server on the Internet via CDMA call. No matter where the driver is, he can obtain the remote diagnosis and control services on the web browser without any additional application installation. Design methodology is introduced and evaluation results are analyzed for the CDMA-based intelligent vehicle information system. The experimental results show that the response time of the vehicle terminal to a web client request is 10.302 seconds at the beginning and 646.44ms thereafter. The average response time of CAN sensor node to a vehicle terminal request is 6.669ms.