• Title/Summary/Keyword: number of exchange messages

Search Result 38, Processing Time 0.022 seconds

Efficient All-to-All Personalized Communication Algorithms in Wormhole Networks (웜홀 방식 망에서의 효율적인 완전교환 통신 알고리즘)

  • Kim, Si-Gwan;Maeng, Seung-Ryoul;Cho, Jung-Wan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.5
    • /
    • pp.464-474
    • /
    • 2000
  • All-to-all personalized communication, or complete exchange, is at the heart of numerous applications, such as matrix transposition, fast Fourier Transform(FFT), and distributed table lookup.We present an efficient all-to-all personalized communication algorithm for a 2D torus inwormhole-routed networks. Our complete exchange algorithm adopts divide-and-conquer approach toreduce the number of start-up latency significantly, which is a good metric for network performancein wormhole networks. First, we divide the whole network into 2x2 basic cells, After speciallydesignated nodes called master nodes have collected messages to transmit to the rest of the basic cell,only master nodes perform complete exchange with reduced network size, N/2 x N/2. When finishedwith this complete exchange in master nodes, these nodes distribute messages to the rest of the masternode, which results in the desired complete exchange communication. After we present our algorithms,we analyze time complexities and compare our algorithms with several previous algorithms. And weshow that our algorithm is efficient by a factor of 2 in the required start-up time which means thatour algorithm is suitable for wormhole-routed networks.

  • PDF

A Multiple Servers Presence Service System using SIP based CCMP Control Messages (SIP 기반 CCMP 제어 메시지를 사용한 다중 서버 프레즌스 서비스 시스템)

  • Jang, Choonseo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.547-553
    • /
    • 2019
  • Presence server should process massive SIP subscription request messages and massive presence event notifications from presence resources in real time. Therefore multiple servers architecture is needed for presence service system. In this paper, an architecture of multiple servers presence service system using SIP based CCMP control messages for lowering presence server load level has been presented. In this system, each presence server exchanges current load status using CCMP control messages, and total system load according to variance of users number and amount of presence resources has been effectively distributed processed. The CCMP control messages has been optimally designed to control presence servers, and exchange procedures of these control messages between presence servers has been also presented and the performance of the proposed multiple servers presence service system has been analysed by experiments. The result shows that average presence subscription processing time reduced from 40.8% to 69.2% and average presence notification processing time reduced from 29.4% to 62.7%.

Block-based Self-organizing TDMA for Reliable VDES in SANETs

  • Sol-Bee Lee;Jung-Hyok Kwon;Bu-Young Kim;Woo-Seong Shim;Dongwan Kim;Eui-Jik Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.511-527
    • /
    • 2024
  • This paper proposes a block-based self-organizing time-division multiple access (BSO-TDMA) protocol for very high frequency (VHF) data exchange system (VDES) in shipborne ad-hoc networks (SANETs). The BSO-TDMA reduces the collisions caused by the simultaneous transmission of automatic identification system (AIS) messages by uniformly allocating channel resources using a block-wise frame. For this purpose, the BSO-TDMA includes two functional operations: (1) frame configuration and (2) slot allocation. The first operation consists of block division and block selection. A frame is divided into multiple blocks, each consisting of fixed-size subblocks, by using the reporting interval (RI) of the ship. Then, the ship selects one of the subblocks within a block by considering the number of occupied slots for each subblock. The second operation allocates the slots within the selected subblock for transmitting AIS messages. First, one of the unoccupied slots within the selected subblock is allocated for the periodic transmission of position reports. Next, to transmit various types of AIS messages, an unoccupied slot is randomly selected from candidate slots located around the previously allocated slot. Experimental simulations are conducted to evaluate the performance of BSO-TDMA. The results show that BSO-TDMA has better performance than that of the existing SOTDMA.

A Relay Node Selection Method of Vehicle Safety Messages for Protecting Traffic Accidents (교통사고 예방을 위한 차량안전메시지 중계노드 선택방법)

  • Yu Suk-Dea;Lee Moon-Kun;Cho Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.60-68
    • /
    • 2006
  • Using the wireless communication among unacquainted vehicles, an intelligent vehicle safety system can be constructed to exchange vehicle safety-related information, such as urgency stop, traffic accident and road obstacles. In the majority of vehicle safety applications, vehicle safety messages are propagated in the form of broadcast. However, this approach causes some effectiveness and performance problems with massive radio collision, multi-hop propagation. This paper presents a priority based relay node selection method for propagating vehicle safety messages of traffic accident protection system. With this method, vehicle safety messages are relayed by a node that locates in proper distance out of the nodes that are included in the radio transmission range. By decreasing the number of duplicated messages, the packet overhead is lessened while the communication performance is raised. The proposed method was proven to be better than other schemes through network simulations.

A New Interference-Aware Dynamic Safety Interval Protocol for Vehicular Networks

  • Yoo, Hongseok;Chang, Chu Seock;Kim, Dongkyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.2
    • /
    • pp.1-13
    • /
    • 2014
  • In IEEE 802.11p/1609-based vehicular networks, vehicles are allowed to exchange safety and control messages only within time periods, called control channel (CCH) interval, which are scheduled periodically. Currently, the length of the CCH interval is set to the fixed value (i.e. 50ms). However, the fixed-length intervals cannot be effective for dynamically changing traffic load. Hence, some protocols have been recently proposed to support variable-length CCH intervals in order to improve channel utilization. In existing protocols, the CCH interval is subdivided into safety and non-safety intervals, and the length of each interval is dynamically adjusted to accommodate the estimated traffic load. However, they do not consider the presence of hidden nodes. Consequently, messages transmitted in each interval are likely to overlap with simultaneous transmissions (i.e. interference) from hidden nodes. Particularly, life-critical safety messages which are exchanged within the safety interval can be unreliably delivered due to such interference, which deteriorates QoS of safety applications such as cooperative collision warning. In this paper, we therefore propose a new interference-aware Dynamic Safety Interval (DSI) protocol. DSI calculates the number of vehicles sharing the channel with the consideration of hidden nodes. The safety interval is derived based on the measured number of vehicles. From simulation study using the ns-2, we verified that DSI outperforms the existing protocols in terms of various metrics such as broadcast delivery ration, collision probability and safety message delay.

Performance Analysis of Entropy-based Multi-Robot Cooperative Systems in a MANET

  • Kim, Sang-Chul;Shin, Kee-Hyun;Woo, Chong-Woo;Eom, Yun-Shick;Lee, Jae-Min
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.5
    • /
    • pp.722-730
    • /
    • 2008
  • This paper proposes two novel algorithms enabling mobile robots to cooperate with each other in a reliability-based system and a time-critical system. In the reliability-based cooperative system, the concepts of a mobile ad hoc network (MANET) and an object entropy are adopted in order to coordinate a specific task. A logical robot group is created based on the exchange of request and reply messages in a robot communication group whose organization depends on transmission range. In the time-critical cooperative system, relational entropy is used to define the relationship between mobile robots. A group leader is selected based on optimizing power consumption. The proposed algorithm has been verified based on the computer-based simulation and soccer robot experiment. The performance metrics are defined. The metrics include the number of messages needed to make a logical robot group and to obtain the relationship of robots and the power consumption to select a group leader. They are verified by simulation and experiment.

An Evaluation of Data Delivery Mechanisms in Clustered Sensor Networks (클러스터 기반 센서 망에서 데이터 전달 방법들의 성능 분석)

  • Park Tae-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3A
    • /
    • pp.304-310
    • /
    • 2006
  • This paper evaluates the performance of three types of data delivery mechanisms in clustered sensor networks, as a basic research to develop an energy efficient topology management scheme. In the first mechanism, one node per cluster(clusterhead) turns on its radio(or wakes up) to transmit and receive RTS/CTS/DATA/ACK messages, but in the second one, k nodes per cluster wake up and participate in the message exchange. In the last mechanism, clusterheads turn on the radio to exchange RTS/CTS messages, and if a clusterhead receives RTS containing its cluster m as a destination, it makes k nodes in the cluster hun on the radio to receive DATA and transmit ACK. Through simulation, we show the energy consumption of the three types of data delivery mechanisms as functions of the number of active nodes per cluster, offered load, and packet loss probability.

Comparison and Analysis of Information Exchange Distributed Algorithm Performance Based on a Circular-Based Ship Collision Avoidance Model (원형 기반 선박 충돌 피항 모델에 기반한 정보 교환 분산알고리즘 성능 비교 분석)

  • Donggyun Kim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.401-409
    • /
    • 2023
  • This study compared and analyzed the performance of a distributed area search algorithm and a distributed probability search algorithm based on information exchange between ships. The distributed algorithm is a method that can search for an optimal avoidance route based on information exchange between ships. In the distributed area search algorithm, only a ship with the maximum cost reduction among neighboring ships has priority, so the next expected location can be changed. The distributed stochastic search algorithm allows a non-optimal value to be searched with a certain probability so that a new value can be searched. A circular-based ship collision avoidance model was used for the ship-to-ship collision avoidance experiment. The experimental method simulated the distributed area search algorithm and the distributed stochastic search algorithm while increasing the number of ships from 2 to 50 that were the same distance from the center of the circle. The calculation time required for each algorithm, sailing distance, and number of message exchanges were compared and analyzed. As a result of the experiment, the DSSA(Distributed Stochastic Search Algorithm) recorded a 25%calculation time, 88% navigation distance, and 84% of number of message exchange rate compared to DLSA.

Provably-Secure and Communication-Efficient Protocol for Dynamic Group Key Exchange (안전성이 증명 가능한 효율적인 동적 그룹 키 교환 프로토콜)

  • Junghyun Nam;Jinwoo Lee;Sungduk Kim;Seungjoo Kim;Dongho Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.163-181
    • /
    • 2004
  • Group key agreement protocols are designed to solve the fundamental problem of securely establishing a session key among a group of parties communicating over a public channel. Although a number of protocols have been proposed to solve this problem over the years, they are not well suited for a high-delay wide area network; their communication overhead is significant in terms of the number of communication rounds or the number of exchanged messages, both of which are recognized as the dominant factors that slow down group key agreement over a networking environment with high communication latency. In this paper we present a communication-efficient group key agreement protocol and prove its security in the random oracle model under the factoring assumption. The proposed protocol provides perfect forward secrecy and requires only a constant number of communication rounds for my of group rekeying operations, while achieving optimal message complexity.

A Dynamic Key Lifetime Change Algorithm for Performance Improvement of Virtual Private Networks (가상사설망의 성능개선을 위한 동적 키 재생성 주기 변경 알고리즘)

  • HAN, Jong-Hoon;LEE, Jung Woo;PARK, Sung Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.10 s.340
    • /
    • pp.31-38
    • /
    • 2005
  • Ipsec is a security protocol suite that provides encryption and authentication services for IP messages at the network layer of the internet. Internet Key Exchange (IKE) is a protocol that is used to negotiate and provide authenticated keying materials in a protected manner for Security Associations (SAs). In this paper, we propose a dynamic key lifetime change algorithm for performance enhancement of virtual private networks using IPSec. The proposed algorithm changes the key lifetime according to the number of secure tunnels. The proposed algorithm is implemented with Linux 2.4.18 and FreeS/WAN 1.99. The system employing our proposed algorithm performs better than the original version in terms of network performance and security.