• Title/Summary/Keyword: packet data

Search Result 1,636, Processing Time 0.025 seconds

On Routing for Enhancing Destination-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 도착지 위치 기밀을 강화하는 라우팅)

  • Tscha, Yeong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.7
    • /
    • pp.1715-1722
    • /
    • 2010
  • In this paper we consider methods for selecting the next tracing node that take advantage of the history of traced positions during the packet-tracing. In the meantime, the proposed routing strategy that counters the tracing is to design the routing path is such a way that nodes on it are not close to the nodes whose location privacy is needed and zigzag or back-and-forth movements hardly take place. In simulations, the ratios of successful tracing were largely improved. It was shown that our routing scheme allows more data packets to be delivered to the destination while, enticing the tracer to move more long distances in the presence of multiple assets.

Adaptive Rate Control for Wireless Multicast (무선 멀티캐스트 전송률의 적응적 제어기법)

  • Kim, Sung-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1673-1678
    • /
    • 2009
  • Multicast can transmit data packet to multiple terminals by using only one transmission and enhances the system performance. However, the multicast transmission rate is fixed and the system performance is not optimized. In this paper, we propose an adaptive multicast rate control method. In the proposed method, orthogonal subcarrier is assigned to each terminal. Each terminal informs the channel status using the allocated subcarrier. Transmitter selects the optimal rate using the feedback information. With the proposed adaptive rate control method, the system performance is enhanced compared with the legacy multicast method.

AO/DI Service Capacity of the TDX-10A Switching System (TDX-10A 교환기의 AO/DI 서비스 수용 능력 평가)

  • Kook, Kwang-Ho;Lee, Kang-Won;Hong, Seon-Mi;Kim, Tae-Il;Lim, Seog-Ku
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.9
    • /
    • pp.2930-2939
    • /
    • 2000
  • An AO/DI service was proposed to efficiently provide data communication service through the public network. It is planned to provide AO/DI service by the TDX -lOA switching system. It is necessary to evaluate the packet handling capacity of the TDX -lOA switching system in order to know whether its capacity is sufficient enough to accomodate AO/DI service or not. Simulation results show that TDX -lOA switching system can meet GoS(Grade of Service) requirements for AP/DI service until the AOIOI subscription rate of the ~.OOO ISDN subscribers becomes 29%.

  • PDF

Incremental Design of MIN using Unit Module (단위 모듈을 이용한 MIN의 점증적 설계)

  • Choi, Chang-Hoon;Kim, Sung-Chun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.2
    • /
    • pp.149-159
    • /
    • 2000
  • In this paper, we propose a new class of MIN (Multistage Interconnection Network) called SCMIN(ShortCut MIN) which can form a cheap and efficient packet switching interconnection network. SCMIN satisfies full access capability(FAC) and has multiple redundant paths between processor-memory pairs even though SCMIN is constructed with 2.5N-4 SEs which is far fewer SEs than that of MINs. SCMIN can be constructed suitable for localized communication by providing the shortcut path and multiple paths inside the processor-memory cluster which has frequent data communications. Therefore, SCMIN can be used as an attractive interconnection network for parallel applications with a localized communication pattern in shared-memory multiprocessor systems.

  • PDF

A Dynamic Grouping Mechanism in Wireless Sensor Networks (무선 센서 네트워크에서의 동적 그룹화 메커니즘)

  • Park, Kwang-Che;Kim, Hyon-Yul;Bae, Cheol-Soo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.6 no.4
    • /
    • pp.208-215
    • /
    • 2013
  • In recent years, many applications in WSN have increasingly interested in data transfer reliability. In this paper, we propose a dynamic grouping transfer mechanism which maintains both reliability and energy efficiency in transmission from a source to a sink. The proposed scheme considers channel error of each node. Then it uses an end-to-end ACK transmission in a group and a hop-by-hop ACK transmission between groups. Consequently this mechanism minimize the cost of packet transfer along with enhancing the network lifetime and reliability.

Improvement of Underlay Cooperative Cognitive Networks Bandwidth Efficiency under Interference and Power Constraints

  • Al-Mishmish, Hameed R.M.;Preveze, Barbaros;Alkhayyat, Ahmed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5335-5353
    • /
    • 2019
  • The definition of the bandwidth efficiency (BE) of cognitive cooperative network (CCN) is the ratio between a number of the licensed slot(s) or sub-channel(s) used by the unlicensed users to transmit a single data packet from the unlicensed transmitter to unlicensed destination, and from unlicensed relay(s) to unlicensed destination. This paper analyzes and improves the BE in the underlay CCN with a new reactive relay selection under interference and power constraints. In other words, this paper studies how unlicensed cooperative users use the licensed network slot(s) or sub-channel(s) efficiently. To this end, a reactive relay selection method named as Relay Automatic Repeat Request (RARQ) is proposed and utilized with a CCN under interference and power constraints. It is shown that the BE of CCN is higher than that of cooperative transmission (CT) due to the interference and power constraint. Furthermore, the BE of CCN is affected by the distance of the interference links which are between the unlicensed transmitter to the licensed destination and unlicensed relay to the licensed destination. In addition, the BE for multiple relays selection over a CCN under interference and power constraints is also analyzed and studied, and it is shown that the BE of CCN decreases as the number of relays increases.

Fast code synchronization method of the DS-SS/TDMA control channel for satellite communication (직접대역확산 방식의 시분할 다중접속 위성통신 제어채널 고속 부호동기 방법)

  • Ryu, Young-Jae
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.1
    • /
    • pp.14-20
    • /
    • 2009
  • This paper describes synchronization concept and algorithm of the reverse DS-SS/TDMA control channel to handle satellite terminals which are distributed through the mission area. Military satellite control channel should have ECCM capabilities and handle more than several hundreds satcom terminals simultaneously. DS-SS/TDMA control channel can satisfy these demand but it spend much synchronization time. Proposed algorithm insert the preamble which is divided with several short sub bins prior to control data and use the parallel matched filtering searcher for each sub bin. As a result of the test, proposed algorithm can acquire most of control channel packet successfully within several milliseconds in severe jamming environment.

  • PDF

Damage detection for a beam under transient excitation via three different algorithms

  • Zhao, Ying;Noori, Mohammad;Altabey, Wael A.
    • Structural Engineering and Mechanics
    • /
    • v.64 no.6
    • /
    • pp.803-817
    • /
    • 2017
  • Structural health monitoring has increasingly been a focus within the civil engineering research community over the last few decades. With increasing application of sensor networks in large structures and infrastructure systems, effective use and development of robust algorithms to analyze large volumes of data and to extract the desired features has become a challenging problem. In this paper, we grasp some precautions and key points of the signal processing approach, wavelet, establish a relative reliable framework, and analyze three problems that require attention when applying wavelet based damage detection approach. The cases studies how to use optimal scales for extracting mode shapes and modal curvatures in a reinforced concrete beam and how to effectively identify damages using maximum curves of wavelet coefficient differences. Moreover, how to make a recognition based on the wavelet multi-resolution analysis, wavelet packet energy, and fuzzy sets is a meaningful topic that has been addressed in this work. The relative systematic work that compasses algorithms, structures and evaluation paves a way to a framework regarding effective structural health monitoring, orientation, decision and action.

Performance Analysis of Ad-Hoc Network Protocols under Vehicular Communication Environments (차량 통신 환경에서 애드혹 네트워크 프로토콜의 성능분석)

  • Shin, Sung-Kwon;Kim, Doo-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.6
    • /
    • pp.2234-2239
    • /
    • 2010
  • In this paper, the performance of ad-hoc wireless network protocols is analyzed under the vehicular communication environments. We estimate the throughput and delay of the protocols with packet sizes and various data traffics in expressways and metropolis by using QualNet simulator. It turns out that the performance of DSR protocol is better in expressways and the performance of AODV works well in metropolitan areas. Therefore, it is necessary that the proper protocols should be selected to provide the better performance according to the vehicular communication environments.

A New Filtering System against the Disclosure of Sensitive Internal Information (내부 중요정보 유출 방지를 위한 차단 시스템 개발)

  • Ju, Tae-kyung;Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1137-1143
    • /
    • 2015
  • Sensitive internal information has been transmitted in a variety of services of Internet environment, but almost users do not know what internal information is sent. In this paper, we intend to develop a new filtering system that continuously monitors the sensitive information in outbound network packets and notifies the internal user whether or not to expose. So we design a filtering system for sensitive information and analyze the implementation results. Thus users visually can check whether disclosure of the important information and drop the corresponding packets by the proposed system. The results of this study can help decrease cyber threats various targeting internal information of company by contributing to prevent exposure of sensitive internal information.