• Title/Summary/Keyword: number of nodes

Search Result 2,153, Processing Time 0.023 seconds

Efficient Broadcasting Scheme of Emergency Message based on VANET and IP Gateway (VANET과 IP 게이트웨이에 기반한 긴급메시지의 효율적 방송 방법)

  • Kim, Dongwon;Park, Mi-Ryong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.31-40
    • /
    • 2016
  • In vehicular ad-hoc networks (VANETs), vehicles sense information on emergency incidents (e.g., accidents, unexpected road conditions, etc.) and propagate this information to following vehicles and a server to share the information. However, this process of emergency message propagation is based on multiple broadcast messages and can lead to broadcast storms. To address this issue, in this work, we use a novel approach to detect the vehicles that are farthest away but within communication range of the transmitting vehicle. Specifically, we discuss a signal-to-noise ratio (SNR)-based linear back-off (SLB) scheme where vehicles implicitly detect their relative locations to the transmitter with respect to the SNR of the received packets. Once the relative locations are detected, nodes that are farther away will set a relatively shorter back-off to prioritize its forwarding process so that other vehicles can suppress their transmissions based on packet overhearing. We evaluate SLB using a realistic simulation environment which consists of a NS-3 VANET simulation environment, a software-based WiFi-IP gateway, and an ITS server operating on a separate machine. Comparisons with other broadcasting-based schemes indicate that SLB successfully propagates emergency messages with latencies and hop counts that is close to the experimental optimal while reducing the number of transmissions by as much as 1/20.

Low Cost and Acceptable Delay Unicast Routing Algorithm Based on Interval Estimation (구간 추정 기반의 지연시간을 고려한 저비용 유니캐스트 라우팅 방식)

  • Kim, Moon-Seong;Bang, Young-Cheol;Choo, Hyun-Seung
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.263-268
    • /
    • 2004
  • The end-to-end characteristic Is an important factor for QoS support. Since network users and required bandwidths for applications increase, the efficient usage of networks has been intensively investigated for the better utilization of network resources. The distributed adaptive routing is the typical routing algorithm that is used in the current Internet. The DCLC(Delay Constrained 1.east Cost) path problem has been shown to be NP-hard problem. The path cost of LD path is relatively more expensive than that of LC path, and the path delay of LC path is relatively higher than that of LD path in DCLC problem. In this paper, we investigate the performance of heuristic algorithm for the DCLC problem with new factor which is probabilistic combination of cost and delay. Recently Dr. Salama proposed a polynomial time algorithm called DCUR. The algorithm always computes a path, where the cost of the path is always within 10% from the optimal CBF. Our evaluation showed that heuristic we propose is more than 38% better than DCUR with cost when number of nodes is more than 200. The new factor takes in account both cost and delay at the same time.

Proximity-based Overlay Network Routing for Service Discovery in Mobile Ad-Hoc Network (이동 애드혹 망에서의 서비스 검색을 위한 근접성 기반 오버레이 네트워크 라우팅)

  • Yoon Hyeon-Ju;Lee Eunju;Jeong Hyunku;Kim Jin-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.643-658
    • /
    • 2004
  • Mobile ad hoc networks(MANET) have recently attrarted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on the various problems of MANET in data link and network layers, we consider, in this paper, how to efficiently support applications such as service discovery on top of MANET. Peer-to-Peer(P2P) overlay network can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both arc instances of self-organizing decentralized systems. Especially, distributed hash table(DHT) systems used for r2r overlay network can be effective in reducing the communication overhead in service discovery. However, since overlay network is independent of physical network topology and existing topology-aware mechanisms are based on the wired network, they are inefficient in MANET. We propose a proximity-based overlay network routing to overcome the inefficiency of routing in overlay network. In the proximity-based overlay network routing, each node collects information of physically close nodes by using one hop broadcast and routes messages to the logically closest node to destination. In a detailed ns-2 simulation study, we show that the proximity-based overlay network routing reduces the number of physical hops comparable to the flooding-based mechanism with low communication overhead. We also find that the proposed scheme works well in the mobile environment.

Porous modeling for the prediction of pressure drop through a perforated strainer (타공형 스트레이너의 압력강하 예측을 위한 다공성모델링)

  • Jung, Il-Sun;Park, Jae-Hyun;Bae, Jae-Hwan;Kang, Sangmo
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.4
    • /
    • pp.358-367
    • /
    • 2013
  • In the present paper, we apply a porous modelling technique to accurately predict the pressure drop through the strainer by replacing all or some of the filter composed of perforated plates with porous media and there imposing the streamwise and transverse loss coefficients required according to the Forchheimer law and then confirm its effectiveness. At first, the streamwise coefficient is obtained by performing a simple simulation on the pipe flow mimicking the hole flow. Subsequently, the transverse coefficient is obtained by setting a unit pattern to have common flow loss characteristics with the repeated shape patterns in the filter, then performing numerical simulations on the prototype and porous model of the unit shape pattern, and finally comparing their results of pressure drop. To validate the applied modeling technique, we perform the numerical simulation with the two specified loss coefficients on a whole shape of strainer and compare the modeling results with those of the corresponding prototype numerical simulation. Comparison indicates that the modeling technique can predict the pressure drop and flow characteristics comparatively accurately and save the number of nodes closely related to the computational cost (CPU and memory) by about 3~4 times compared with the prototype simulation.

Effect of Mulching Material on the Growth and Quality of Oriental Melon (Cucumis melo L. var. makuwa Mak.) in Protected Cultivation (멀칭재료가 시설참외의 생육과 품질에 미치는 영향)

  • Su Gon Bae;Yong Seub Shin;Il Kweon Yeon;Han Woo Do
    • Journal of Bio-Environment Control
    • /
    • v.10 no.4
    • /
    • pp.237-243
    • /
    • 2001
  • The experiment was conducted to investigate the effect of different mulching materials on the growth and quality of oriental melon in protected cultivation. Soil temperature, plant growth and fruit quality were affected by different mulching materials, clear polyethylene (P.E.) film (control), clear inset between black P.E. film, green P.E. film. and recycled ethylene vinyl acetate (E.V.A.) film. The highest night soil temperature was at 20 cm depth under green P.E. film, but was at 5 cm depth under other materials. Difference of soil temperature as affected by mulching materials decreased with increasing soil depth. Plant height, number of nodes, leaf area index (LAI), crop growth rate (CGR), and relative growth rate (RGR) at 30 days after transplanting were significantly greater in the recycled E.V.A. film treatment than in the other treatments. Fresh weight of weeds growth under the mulching materials was not affected by mulching material at 30 days after transplanting. However, it was the greatest under clear P.E. film mulching at 90 days after transplanting. Harvesting time of recycled E.V.A. film was 2 days earlier than that of clear P.E. film. Difference in fruit weight and length, and soluble solid content were not affected by the mulching materials. Marketable yield was 2,426 kg.10a$^{-1}$ in recycled E.V.A. film treatment, which was 6% greater than in clear P.E. film treatment.

  • PDF

Prefetch R-tree: A Disk and Cache Optimized Multidimensional Index Structure (Prefetch R-tree: 디스크와 CPU 캐시에 최적화된 다차원 색인 구조)

  • Park Myung-Sun
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.463-476
    • /
    • 2006
  • R-trees have been traditionally optimized for the I/O performance with the disk page as the tree node. Recently, researchers have proposed cache-conscious variations of R-trees optimized for the CPU cache performance in main memory environments, where the node size is several cache lines wide and more entries are packed in a node by compressing MBR keys. However, because there is a big difference between the node sizes of two types of R-trees, disk-optimized R-trees show poor cache performance while cache-optimized R-trees exhibit poor disk performance. In this paper, we propose a cache and disk optimized R-tree, called the PR-tree (Prefetching R-tree). For the cache performance, the node size of the PR-tree is wider than a cache line, and the prefetch instruction is used to reduce the number of cache misses. For the I/O performance, the nodes of the PR-tree are fitted into one disk page. We represent the detailed analysis of cache misses for range queries, and enumerate all the reasonable in-page leaf and nonleaf node sizes, and heights of in-page trees to figure out tree parameters for best cache and I/O performance. The PR-tree that we propose achieves better cache performance than the disk-optimized R-tree: a factor of 3.5-15.1 improvement for one-by-one insertions, 6.5-15.1 improvement for deletions, 1.3-1.9 improvement for range queries, and 2.7-9.7 improvement for k-nearest neighbor queries. All experimental results do not show notable declines of the I/O performance.

Design of Dual Network Topology and Redundant Transmitting Protocol for High Survivability of Ship Area Network (SAN) (네트워크 생존성을 고려한 선박 통신망(SAN)의 이중화 네트워크 토폴로지 및 중복 전송 프로토콜의 설계)

  • Son, Chi-Won;Shin, Jung-Hwa;Jung, Min-Young;Moon, Kyeong-Deok;Park, Jun-Hee;Lee, Kwang-Il;Tak, Sung-Woo
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.119-128
    • /
    • 2010
  • In the shipbuilding industry, due to the global trends where the number of IT (Information Technology) devices of a smart ship have been increased rapidly, the need to develop a new shipboard backbone network has recently emerged for integrating and managing the IT devices of a smart ship efficiently. A shipboard backbone network requires high survivability because it is constructed in automatic and unmanned smart ships where a failure of the backbone network can cause critical problems. The purpose of this paper thus is to study SAN (Ship Area Network) as a efficient shipboard backbone network, considering particularity of shipboard environment and requirement of high survivability. In order to do so, we designed a dual network topology that all network nodes, including the IT devices installed in a smart ship, are connected each other through dual paths, and reuding tht IT devices pnstalles supporices network survivability as well as t Iffic efficiency for the dual network topology. And then, we verified the performance of the suggested SAN by theoretical and practical analysis including the graph theory, the probability theory, implemental specifications, and computer simulations.

Time-Dependent Optimal Routing in Indoor Space (실내공간에서의 시간 가변적 최적경로 탐색)

  • Park, In-Hye;Lee, Ji-Yeong
    • Spatial Information Research
    • /
    • v.17 no.3
    • /
    • pp.361-370
    • /
    • 2009
  • As the increasing interests of spatial information for different application area such as disaster management, there are many researches and development of indoor spatial data models and real-time evacuation management systems. The application requires to determine and optical paths in emergency situation, to support evacuees and rescuers. The optimal path in this study is defined to guide rescuers, So, the path is from entrance to the disaster site (room), not from rooms to entrances in the building. In this study, we propose a time-dependent optimal routing algorithm to develop real-time evacuation systems. The network data that represents navigable spaces in building is used for routing the optimal path. Associated information about environment (for example, number of evacuees or rescuers, capacity of hallways and rooms, type of rooms and so on) is assigned to nodes and edges in the network. The time-dependent optimal path is defined after concerning environmental information on the positions of evacuees (for avoiding places jammed with evacuees) and rescuer at each time slot. To detect the positions of human beings in a building per time period, we use the results of evacuation simulation system to identify the movement patterns of human beings in the emergency situation. We use the simulation data of five or ten seconds time interval, to determine the optimal route for rescuers.

  • PDF

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

Attention Based Collaborative Source-Side DDoS Attack Detection (어텐션 기반 협업형 소스측 분산 서비스 거부 공격 탐지)

  • Hwisoo Kim;Songheon Jeong;Kyungbaek Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.4
    • /
    • pp.157-165
    • /
    • 2024
  • The evolution of the Distributed Denial of Service Attack(DDoS Attack) method has increased the difficulty in the detection process. One of the solutions to overcome the problems caused by the limitations of the existing victim-side detection method was the source-side detection technique. However, there was a problem of performance degradation due to network traffic irregularities. In order to solve this problem, research has been conducted to detect attacks using a collaborative network between several nodes based on artificial intelligence. Existing methods have shown limitations, especially in nonlinear traffic environments with high Burstness and jitter. To overcome this problem, this paper presents a collaborative source-side DDoS attack detection technique introduced with an attention mechanism. The proposed method aggregates detection results from multiple sources and assigns weights to each region, and through this, it is possible to effectively detect overall attacks and attacks in specific few areas. In particular, it shows a high detection rate with a low false positive of about 6% and a high detection rate of up to 4.3% in a nonlinear traffic dataset, and it can also confirm improvement in attack detection problems in a small number of regions compared to methods that showed limitations in the existing nonlinear traffic environment.