• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.031 seconds

A study on the Ad-hoc Network Application of Zone Routing Protocol (Zone Routing Protocol의 Ad-hoc네트워크 적용에 관한 연구)

  • Lee Young Roh;Kim Yong-Deuk
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.119-122
    • /
    • 2004
  • This mobile oriented Ad-hoc network yet steps on development level, related issues and standardization are progressing. This paper presented ad-hoc network's overview and overall property, followed by routing scheme that must be setup for communication between each nodes. Among several routing scheme proposed for standardization, ZRP that is foaled by this paper, is hybrid type algorithm, and only includes advantages of others This paper presented running process and implementation method, result that is made from network simulation, shows analysis of each parameter values's change. Each parameters changed with many differences according to Zone radius and communication node's location from simualtion that was performed changing a number of nodes and a velocity of nodes.

  • PDF

Performance Analysis of CAN-FD Based Network Against Network Topology (네트워크 토폴로지에 따른 CAN-FD 통신 영향성 분석)

  • Seo, Sukhyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.351-358
    • /
    • 2017
  • The most common communication interface for automotive electronic control devices is CAN (Controller Area Network). Sine CAN was first adopted to Daimler vehicles in 1991, all of automobile manufacturers use the CAN communication for in-vehicle networks. However, as the number of electronic control devices connected to the CAN network rapidly increases, the CAN protocol reaches the limit of technology. To overcome this limitation, Bosch introduced the new communication protocol, that is CAN-FD (Flexible Data-rate). In this paper, we analyze the characteristics and limitations of CAN-FD communication according to the topology under the in-vehicle wiring harness environment designed based on the existing classic CAN communication.

Node-Level Trust Evaluation Model Based on Blockchain in Ad Hoc Network

  • Yan, Shuai-ling;Chung, Yeongjee
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.169-178
    • /
    • 2019
  • Due to the characteristics of an ad hoc network without a control center, self-organization, and flexible topology, the trust evaluation of the nodes in the network is extremely difficult. Based on the analysis of ad hoc networks and the blockchain technology, a blockchain-based node-level trust evaluation model is proposed. The concepts of the node trust degree of the HASH list on the blockchain and the perfect reward and punishment mechanism are adopted to construct the node trust evaluation model of the ad hoc network. According to the needs of different applications the network security level can be dynamically adjusted through changes in the trust threshold. The simulation experiments demonstrate that ad-hoc on-demand distance vector(AODV) Routing protocol based on this model of multicast-AODV(MAODV) routing protocol shows a significant improvement in security compared with the traditional AODV and on-demand multipath distance vector(AOMDV) routing protocols.

Throughput Analysis for Blast Protocols under Markov Error Type (마코프 에러형태 하에서의 Blast 프로토콜의 수율 분석)

  • Hong, Jung-Sik;Hong, Jung-Wan;Lie, Chang-Hoon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.23 no.4
    • /
    • pp.687-698
    • /
    • 1997
  • In this paper, a Variation of Blast with Go-Back-N(V-BGBN) protocol is proposed, which differs from Blast with Go-Back-N(BGBN) and Blast with Full Retransmission on Error(BFRE) protocols in the retransmission strategy of packets. Performances of these three protocols under correlated packet errors are analyzed. Throughput efficiency of an arbitrary packet is obtained under the assumption that the round trip delay and the packet length are respectively constant. Recursive formula and difference equations are used as analytical tools. Correlation of packet errors is modelled by a two state Markov chain. The throughput efficiencies under these protocols are compared. V-BGBN protocol is shown to be superior to other two protocols in high speed network.

  • PDF

Performance Analysis of Adaptive Frame Size Control Scheme in Wireless Networks (무선 통신망에서의 적응 프레임 길이 제어 방식의 성능 분석)

  • Kim, Eung-In
    • 전자공학회논문지 IE
    • /
    • v.47 no.2
    • /
    • pp.54-59
    • /
    • 2010
  • This paper suggests a new data link protocol with an adaptive frame length control scheme for wireless data networks which is subject to errors that occur with time variance. We analyze the proposed scheme under a two-state markov block interference(BI) model. Numerical results show that the proposed scheme can achieve high throughput performance for both dense and diffuse burst noise channels.

A Performance Analysis of Region-based Overlay Multicast Routing Protocol for Ad Hoc Networks (Ad Hoc 네트워크를 위한 지역기반 오버레이 멀티캐스트 라우팅 프로토콜의 성능 분석)

  • Kim Kap-Dong;Park Jun-Hee;Lee Kwang-Il;Kim Hag-Young;Kim Sang-Ha
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1037-1040
    • /
    • 2006
  • This paper presents an efficient overlay multicast routing protocol (ROMP) and its architecture. ROMP using GPS and region map stands on the basis of scalable 2-tiered multicast architecture and maintains a global overlay multicast tree through reactive fashion. With this approach, the coarse-grain location-awareness for an efficient overlay multicasting and the determination of hot-spot area for efficient data delivery are feasible. The simulation results show that the localized control packets of ROMP prevent the overlay control packets from squandering the physical network resources.

  • PDF

Power system protection IED design using an embedded processor (임베디드 프로세서를 이용한 계통 보호 IED 설계)

  • Yoon, Ki-Don;Son, Young-Ik;Kim, Kab-Il
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.711-713
    • /
    • 2004
  • In the past time, the protection relay did only a protection function. Currently, its upgraded device i.e. IED(Intelligent Electric Device) has been designed to protect, control, and monitor the whole power system automatically. Also the device is desired to successfully measure important elements of the power system. This paper considers design method of a digital protection IED with a function of measuring various elements and a communication function. The protection IED is composed of the specific function modules that are signal process module, communication module, input/output module and main control module. A signal process module use a DSP processor for analysis of input signal. Main control module use a embedded processor, Xscale, that has an ARM Core. The communication protocol uses IEC61850 protocol that becomes standard in the future. The protection IED is able to process mass information with high-performance processor. As each function module is designed individually, the reliability of the device can be enhanced.

  • PDF

Performance Analysis of a Network System using the CAN Protocol (CAN 프로토콜을 이용한 네트워크 시스템의 성능 분석)

  • Kim, Dae-Won;Choi, Hwan-Soo
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.50 no.5
    • /
    • pp.218-225
    • /
    • 2001
  • This paper analyses the performance of network system using the CAN(Controller Area Network) protocol. Given messages are assumed to be scheduled by the DMS(Deadline Monotonic Scheduling) algorithm. The mathematical models for time-delay that can be occurred between CAN nodes are defined. The effectiveness of modeling is shown by comparing the difference of time-delay between simulations and practical experiments. We analyse the results according to the variation of factors, such as the number of nodes, the transmission speed, the message size and the number of aperiodic messages through simulation and confirm the real-time performance of lower priority messages. We also investigate the real-time performance of periodic messages when aperiodic message generates.

  • PDF

Surgery First Approach in Orthognathic Surgery : Indication and limitation (임상가를 위한 특집 4 - 턱교정수술에서 선수술접근 :적응증과 한계)

  • Hwang, Dae-Seok
    • The Journal of the Korean dental association
    • /
    • v.50 no.11
    • /
    • pp.682-688
    • /
    • 2012
  • Surgery first approach in orthognathic surgery is to proceed the orthognathic surgery without preoperative orthodontic treatment. This approach has many advantages, which include a shorter total treatment period, a high level of patient satisfaction due to immediate post-surgical facial improvement, easy postoperative orthodontic treatment due to early normalization of skeletal muscle, and the rapid tooth movement reflecting the regional accelerated phenomenon. However instability due to transient occlusal interference after surgery make worse of long-term skeletal stability. Especially increasing of vertical occlusion caused by interference of interbicupid and molar happen postsurgical skeletal change. Until now, there is no common consensus about treatment protocol of surgery first approach in orthognathic surgery. The purpose of this paper is to introduce our treatment protocol of the surgery first approach and to evaluate indication and limitation with case analysis.

PERFORMANCE ANALYSES OF PATH RECOVERY ROUTING PROTOCOLS IN AD HOC NETWORKS

  • Wu, Mary;Kim, Chong-Gun
    • Journal of applied mathematics & informatics
    • /
    • v.26 no.1_2
    • /
    • pp.235-249
    • /
    • 2008
  • On-demand routing protocol in ad hoc network is that establishes a route to a destination node only when it is required by a source node. But, it is necessary to reestablish a new route when an active route breaks down. The reconstruction process establishes another route by flooding messages from the source to the destination, cause not only heavy traffic but also long delays in route discovery. A good method for analyzing performance of protocols is important for deriving better systems. In this paper, we suggest the numerical formulas of a representative on-demand routing protocol AODV, ARMP, and RRAODV to estimate the performance of these routing protocols for analyzing the performance of these protocols. The proposed analytical models are very simple and straightforward. The results of analysis show good agreement with the results of computer simulations.

  • PDF