• 제목/요약/키워드: node state

검색결과 507건 처리시간 0.029초

Time Switching for Wireless Communications with Full-Duplex Relaying in Imperfect CSI Condition

  • Nguyen, Tan N.;Do, Dinh-Thuan;Tran, Phuong T.;Voznak, Miroslav
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권9호
    • /
    • pp.4223-4239
    • /
    • 2016
  • In this paper, we consider an amplify-and-forward (AF) full-duplex relay network (FDRN) using simultaneous wireless information and power transfer, where a battery-free relay node harvests energy from the received radio frequency (RF) signals from a source node and uses the harvested energy to forward the source information to destination node. The time-switching relaying (TSR) protocol is studied, with the assumption that the channel state information (CSI) at the relay node is imperfect. We deliver a rigorous analysis of the outage probability of the proposed system. Based on the outage probability expressions, the optimal time switching factor are obtained via the numerical search method. The simulation and numerical results provide practical insights into the effect of various system parameters, such as the time switching factor, the noise power, the energy harvesting efficiency, and the channel estimation error on the performance of this network. It is also observed that for the imperfect CSI case, the proposed scheme still can provide acceptable outage performance given that the channel estimation error is bounded in a permissible interval.

유비쿼터스 환경에능동형 창고 상태관리를 위한 보안 프로토콜 설계 (A Design of Security Protocol for Active Warehouse Condition Management System based on Ubiquitous Environment)

  • 전영준;최용식;신승호;박상민
    • 대한안전경영과학회지
    • /
    • 제8권6호
    • /
    • pp.91-108
    • /
    • 2006
  • RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.

Analysis of Energy Consumption and Sleeping Protocols in PHY-MAC for UWB Networks

  • Khan, M.A.;Parvez, A.Al;Hoque, M.E.;An, Xizhi;Kwak, Kyung-Sup
    • 한국통신학회논문지
    • /
    • 제31권12B호
    • /
    • pp.1028-1036
    • /
    • 2006
  • Energy conservation is an important issue in wireless networks, especially for self-organized, low power, low data-rate impulse-radio ultra-wideband (IR-UWB) networks, where every node is a battery-driven device. To conserve energy, it is necessary to turn node into sleep state when no data exist. This paper addresses the energy consumption analysis of Direct-Sequence (DS) versus Time-Hopping (TH) multiple accesses and two kinds of sleeping protocols (slotted and unslotted) in PHY-MAC for Un networks. We introduce an analytical model for energy consumption or a node in both TH and DS multiple accesses and evaluate the energy consumption comparison between them and also the performance of the proposed sleeping protocols. Simulation results show that the energy consumption per packet of DS case is less than TH case and for slotted sleeping is less than that of unslotted one for bursty load case, but with respect to the load access delay unslotted one consumes less energy, that maximize node lifetime.

3차원 유한 요소법을 이용한 흉부 모델 (A Thoracic Model using Three-dimensional Finite Element Method)

  • Deok-Won Kim
    • 대한의용생체공학회:의공학회지
    • /
    • 제8권1호
    • /
    • pp.57-62
    • /
    • 1987
  • 본 연구에서는 8-node cubic element로서 3차원 흉부모델을 구성하였고 또한 3차원 정상상태 유한요소법 코드를 FORTRAN을 이용하여 개발하였다. 프로그램의 출력은 각 node의 전위. 각 요소의 전ㄹ. 그리고 Z축방향으로의 각 층에서 총 전류이다. 이 흉부모델을 이용한 임피던스혈량측정법에서의 기초임피던스 ($Z_0$)를 계산하였다. 일반화된 라플라스 방정식을 정전위와 무전속 경계조건을 적용하여 풀었다. 또한, 전극간의 전위차와 $Z_0$의 계산값이 실측치와 근접하였으므로 이 모델이 인체의 흉뷰화 유사함을 확인하였다.

  • PDF

Biologically Inspired Node Scheduling Control for Wireless Sensor Networks

  • Byun, Heejung;Son, Sugook;Yang, Soomi
    • Journal of Communications and Networks
    • /
    • 제17권5호
    • /
    • pp.506-516
    • /
    • 2015
  • Wireless sensor networks (WSNs) are generally comprised of densely deployed sensor nodes, which results in highly redundant sensor data transmissions and energy waste. Since the sensor nodes depend on batteries for energy, previous studies have focused on designing energy-efficient medium access control (MAC) protocols to extend the network lifetime. However, the energy-efficient protocols induce an extra end-to-end delay, and therefore recent increase in focus on WSNs has led to timely and reliable communication protocols for mission-critical applications. In this paper, we propose an energy efficient and delay guaranteeing node scheduling scheme inspired by biological systems, which have gained considerable attention as a computing and problem solving technique.With the identification of analogies between cellular signaling systems and WSN systems, we formulate a new mathematical model that considers the networking challenges of WSNs. The proposed bio-inspired algorithm determines the state of the sensor node, as required by each application and as determined by the local environmental conditions and the states of the adjacent nodes. A control analysis shows that the proposed bio-inspired scheme guarantees the system stability by controlling the parameters of each node. Simulation results also indicate that the proposed scheme provides significant energy savings, as well as reliable delay guarantees by controlling the states of the sensor nodes.

불완전한 채널정보를 사용하는 다중안테나 적응형 복호 후 전송 중계 프로토콜의 Diversity-Multiplexing Tradeoff 분석 (The Diversity-Multiplexing Tradeoff for Multiple-Antenna Adaptive Decode and Forward Relay Protocols Exploiting Imperfect CSIT)

  • 윤한상;윤은철
    • 한국통신학회논문지
    • /
    • 제36권9A호
    • /
    • pp.776-783
    • /
    • 2011
  • 본 논문에서는 적응형 복호 후 전송 (decode-and-forward) 중계 프로토콜이 송신을 위해 불완전한 채널정보를 사용할 때, 목적지 노드에서만 다중 안테나를 사용하는 경우, 릴레이 노드에서만 다중안테나를 사용하는 경우, 그리고 소스 노드에서만 다중 안테나를 사용하는 경우에 대한 diversity-multiplexing tradeoff (DMT) 상계 함수들을 유도하여 그 결과를 제시한다. 또한 소스 노드와 목적지 노드, 소스 노드와 릴레이 노드, 릴레이 노드와 목적지 노드 사이의 불완전한 채널정보들이 점근적 조건하에 있을 경우, 적응형 복호 후 전송 중계 프로토콜이 얻을 수 있는 다이버시티 이득을 조사한다.

DTN에서 속성 정보 변화에 따른 노드의 이동 예측 기법 (A Prediction Method using property information change in DTN)

  • 전일규;이강환
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 춘계학술대회
    • /
    • pp.425-426
    • /
    • 2016
  • 본 논문에서는 Delay Tolerant Networks(DTNs)에서 노드의 속성 정보를 Markov Chain으로 분석하여 노드의 이동 경로를 예측하는 알고리즘을 제안한다. 기존 DTN에서 예측기반 라우팅 기법은 노드가 미리 정해진 스케줄에 따라 이동하거나 노드 간 접촉정보와 같은 추가 정보가 필요하다. 이러한 네트워크에서는 추가적인 정보가 없는 경우 노드의 신뢰성이 낮아진다. 본 논문에서 제안하는 알고리즘은 노드의 속성 정보 중 노드의 속도와 방향성을 상태로 맵핑한 후, Markov chain을 이용하여 확률전이 매트릭스를 생성하여 노드의 이동 경로를 예측하는 알고리즘이다. 주어진 모의실험 환경에서 노드의 이동 경로 예측을 통해 중계 노드를 선정하여 라우팅 함으로써 메시지 전송률이 증가하고 전송 지연 시간이 감소함을 보여주고 있다.

  • PDF

무선 네트워크를 위한 하향식 클러스터링 프로토콜의 구현 (Implementation of a Top-down Clustering Protocol for Wireless Sensor Networks)

  • 윤필중;김상경;김창화
    • 한국IT서비스학회지
    • /
    • 제9권3호
    • /
    • pp.95-106
    • /
    • 2010
  • Many researches have been performed to increase energy-efficiency in wireless sensor networks. One of primary research topics is about clustering protocols, which are adopted to configure sensor networks in the form of hierarchical structures by grouping sensor nodes into a cluster. However, legacy clustering protocols do not propose detailed methods from the perspective of implementation to determine a cluster's boundary and configure a cluster, and to communicate among clusters. Moreover, many of them involve assumptions inappropriate to apply those to a sensor field. In this paper, we have designed and implemented a new T-Clustering (Top-down Clustering) protocol, which takes into considerations a node's density, a distance between cluster heads, and remained energy of a node all together. Our proposal is a sink-node oriented top-down clustering protocol, and can form uniform clusters throughout the network. Further, it provides re-clustering functions according to the state of a network. In order to verify our protocol's feasibility, we have implemented and experimented T-Clustering protocol on Crossbow's MICAz nodes which are executed on TinyOS 2.0.2.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

Control Design for Flexible Joint Manipulators with Mismatched Uncertainty : Adaptive Robust Scheme

  • Kim, Dong-Hwa
    • Transactions on Control, Automation and Systems Engineering
    • /
    • 제1권1호
    • /
    • pp.32-43
    • /
    • 1999
  • Adaptive robust control scheme is introduced for flexible joint manipulator with nonlinearities and uncertainties. The system does not satisfy the matching condition due to insufficient actuators for each node. The control only relies on the assumption that the bound of uncertainty exists. Thus, the bounded value does not need to be known a prior. The control utilizes the update law by estimating the bound of the uncertainties. The control scheme uses the backstepping method and constructs a state transformation. Also, stability analysis is done for both transformed system and original system.

  • PDF