• Title/Summary/Keyword: passive acknowledgement

Search Result 5, Processing Time 0.019 seconds

PDAODMRP: An Extended PoolODMRP Based on Passive Data Acknowledgement

  • Cai, Shaobin;Yang, Xiaozong;Wang, Ling
    • Journal of Communications and Networks
    • /
    • v.6 no.4
    • /
    • pp.362-375
    • /
    • 2004
  • An ad hoc network is a multi-hop wireless network. Its limited bandwidth and frequently changing topology require that its protocol should be robust, simple, and energy conserving. We have proposed PoolODMRP to reduce its control overhead greatly by its one-hop local route maintenance. However, PoolODMRP still has some shortcomings. In this paper, we propose PDAODMRP (passive data acknowledgement ODMRP) to extend PoolODMRP. Compared with PoolODMRP, PDAODMRP has the following contributions: (1) It knows the status of its downstream forwarding nodes by route information collected from data packets instead of BEACON signal of MAC layer; (2) it max simplifies the route information collected from data packets by pool nodes; (3) it adopts a dynamic local route maintenance to enforce its local route maintenance; (4) it adopts the route evaluation policy of NSMP (neighbor supporting multicast protocol). Compared with PoolODMRP, PDAODMRP has lower control overhead, lower data delivery delay, and lower data overhead.

A Novel Geographical On-Demand Routing Protocol (새로운 지리적 온디맨드 라우팅 프로토콜)

  • Choi, Youngchol;Lim, Yong-kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1092-1099
    • /
    • 2017
  • In this paper, we propose a novel geographical on-demand routing protocol for a mobile ad-hoc network (MANET) that resolves the broadcast storm problem of ad-hoc on-demand distance vector (AODV) routing protocol. The candidates relaying route request (RREQ) packet are geographically restricted by the locations of the destination and a (RREQ sender. Then, the duplicate RREQs, which are generally discarded in the protocols that follow the principle of the AODV, are parsed to avoid redundant RREQ rebroadcasts and to perform passive acknowledgement with respect to a RREQ rebroadcast. The proposed routing protocol is implemented by modifying the source code of the AODV in QualNet. It is shown through QualNet simulations that the proposed routing protocol significantly improves the packet delivery ratio and the latency of the AODV in high-density and heavy traffic network scenarios.

Process for the Architectural Application of Biomimicry (생체모방의 건축적 적용을 위한 프로세스)

  • Kim, Jong-Moo;Kang, Chul-Hee;Yoon, Heakyung
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.12
    • /
    • pp.77-84
    • /
    • 2018
  • Biomimicry architecture has been highlighted in recent years for the innovative ideas from the nature have provided main developments in many areas. The related studies in Korean architecture is entering the first step and are needed close attentions for its vitalizations. This study starts with the acknowledgement of necessity to establish the architectural application process. First of all, it is named as a 'Passive Cycle' if a problem-solving or a project has been through the analysis of process complexity and biomimicry application process in other areas. Then, the basic frame is structured as a 'Process-Cooperation,' which integrates process complexation with process circulation. The cooperative relationship starts from the beginning of the design with not only professionalists related with architecture but also ones in various areas when it is issued a difficult problem or high environmental performance not found in common architectural design processes. To make the architectural application good progress, the characteristics of bio-mimetic architectural applications are categorized as three areas; the expected effect, the application level, and application method. As a result, the organic complexity should be prioritized to have bio-mimetic application effectively while accessing the principles. Therefore, the process for the architectural application of biomimicry is suggested as 'Organic Cycle-Cooperation.'

Ethical Consciousness: Passive Privacy Intrusion versus Active Privacy Intrusion on a SNS (윤리의식: SNS상의 수동적 개인정보 침해와 능동적 개인정보 침해)

  • Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.24 no.4
    • /
    • pp.55-76
    • /
    • 2022
  • People have adopted Social Networking Sites (SNSs) as a part of their daily lives. When a person uses SNSs, (s)he intentionally or unintentionally discloses her/his personal information. Although using SNSs can provide benefits to a person such as maintaining relationships with people who does not see often, it also opens a dark side. Someone can use one's disclosed information without the acknowledgement of the information owner. It is called a privacy intrusion on SNSs, which has become a social problem and needs attention. This study examined factors affecting privacy intrusion intention on SNSs. This study classifies privacy intrusions into passive intrusion (collector) and active intrusion (distributor). The results reveal that low ethical consciousness positively affects enjoyment in both of collecting and distributing someone's personal information on SNSs. A person who has the low ethical consciousness also tends to raise her/his curiosity of collecting someone's private information on SNSs. Apart from low ethical consciousness, this study discloses how enjoyment, curiosity, experience of being a victim of privacy intrusion, experience of intruding others' privacies, and self-efficacy of collecting or distributing others' private information are related to passive or/and active privacy intrusion on SNSs with survey data.

A Phenomenological Study on Conflicts Experience by Women: Focused on the Case of Women in Small and Medium Size Enterprises (중소기업 직장 여성의 갈등경험에 대한 현상학적 연구)

  • NamGung, Eun-Jeong;Shin, Seong-Gene;Hur, Gyeong-Ho
    • Korean journal of communication and information
    • /
    • v.41
    • /
    • pp.337-382
    • /
    • 2008
  • This study examined the case of women's conflict experience in small and medium size enterprises. Although the number of women working in business organizations is rapidly growing in Korea, discourse about them is still scarce. Some discourse about them focuses only on the productivity and inequality aspects within the organizations. Therefore, we need to examine their organizational lives through a more dynamic and performance based perspective. Especially, because conflicts experience by women within business organizations involve a variety of organizational interactions, they reveal the vivid reality with which working women face today. The existing conflict research studies focused on communication or interpersonal relationship are limited by the fact that they have primarily dealt with the variables such as conflict management styles. However, conflict research needs a more specific and wholistic interpretation because conflicts usually depend on their contexts and interaction dynamics. Therefore, the phenomenological methodology was employed as a more appropriate method for the current conflict study. Results shows that the two themes were identified regarding the conflict content. The first and second themes were the unfair situations and the hierarchical rank respectively. The three themes were identified regarding the attitudes about conflicts. They were the passive stance toward conflicts, the recognition of the gender difference, and the acknowledgement of the importance of the relational aspect respectively. Finally, three more themes were identified regarding the conflict management styles. The first, second and third themes were the passive responding, the aggressive responding and the positive conflict management respectively. In addition, the implications of the results and the suggestions for future studies were made.

  • PDF