• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.039 seconds

Performance Comparison of OLSR and AODV Routing Protocols Using OPNET (OPNET을 이용한 OLSR과 AODV 라우팅 프로토콜 성능 비교)

  • Wang, Ye;Zhang, Xiao-Lei;Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.9-17
    • /
    • 2009
  • A Mobile Ad hoc network(MANET) is a network consisting of a set of wireless mobile nodes, which communicate with each other without centralized control or established infrastructure. In this paper, to obtain a better understanding of AODV(Ad hoc On-Demand Distance Vector Routing Protocol)and OLSR(Optimized Link State Routing Protocol) routing protocols, different performances are simulated and analyzed using OPNET modeler 14.5 with the various performance metrics, such as packet delivery ratio, end-to-end delay and routing overhead. As a conclusion, in static analysis, the routing overhead of OLSR is affected by the number of nodes, but not data traffic. In AODV case, it is affected by both data traffic and number of nodes. In mobility analysis, routing overhead is not greatly affected by mobility speed in AODV and OLSR, and the PDR(Packet Delivery Ration) of OLSR is decreased as the node speed increased, while AODV is not changed. AS to delay, AODV is always higher than OLSR in both static and nobility cases.

  • PDF

Routing protocol Analysis for Minimum delay Between Hierarchical node in Low Power Sensor Network (저 전력 센서 네트워크에서의 계층 노드 간 지연 감소를 위한 라우팅 프로토콜 분석)

  • Kim, Dong Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1721-1726
    • /
    • 2014
  • The sensor network technology for core technology of ubiquitous computing is in the spotlight recently, the research on sensor network is proceeding actively which is composed many different sensor node. The major traffic patterns of plenty of sensor networks are composed of collecting types of single directional data, which is transmitting packets from several sensor nodes to sink node. One of the important condition for design of sensor node is to extend for network life which is to minimize power-consumption under the limited resources of sensor network. In this paper analysis used routing protocols using the network simulation that was used second level cluster structure to reduce delay and power-consumption of sensor node.

The Construction of the Fishing-vessel Monitoring System and the Protocol Analysis for the Calling of Location Requirement Using VHF-DSC (VHF-DSC 위치요청 프로토콜 분석과 어선관제시스템 구축)

  • Kim, Jeong-nyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.929-932
    • /
    • 2013
  • In preperation for the compulsory installation of VHF(Very High Frequency) wireless equipment and fishing vessel automatic identification system according to the revision of "The Ships Safety Act" and "Fishing Vessel act", Fishery Information & Communication Department of National Federation of Fisheries Cooperatives is building VHF communication network and automatic identification system for fishing vessel monitoring. This study suggests the protocol analysis for the calling of location requirement using DSC(Digital Selective Calling) function and show best way for fishing vessel automatic identification system. Also, it suggest way to realize fishing vessel monitoring system.

  • PDF

Transmission Performance of Voice Traffic over LTE-R Network (LTE-R 네트워크에서 음성트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.568-570
    • /
    • 2018
  • Currently, with rapid progress and supply of mobile communication technology, LTE(Long Term Evolution) technology is expanded and widely used to industrial and emergency communications beyond earlier smart-phone based service. In this paper, transmission performance of voice traffic, one of railway communication service based on LTE-R as an application field of LTE technology, is analyzed. This study is performed performance analysis with level of application service and consider effects of satisfaction level for users. Computer Simulation based on ns(Network Simulation)-3 is used for analysis and VoIP(Voice over Internet Protocol) specification is used for voice traffics. Results of this paper is used to implement LTE-R networks and develope application services over LTE-R network.

  • PDF

A Study on Timing Modeling and Response Time Analysis in LIN Based Network System (LIN 프로토콜 시간 모델링 및 메시지 응답 시간 해석에 관한 연구)

  • Youn, Jea-Myoung;Sunwoo, Myoung-Ho;Lee, Woo-Taik
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.13 no.6
    • /
    • pp.48-55
    • /
    • 2005
  • In this paper, a mathematical model and a simulation method for the response time analysis of Local Interconnect Network(LIN) based network systems are proposed. Network-induced delays in a network based control system can vary widely according to the transmission time of message and the overhead time of transmission. Therefore, in order to design a distributed control system using LIN network, a method to predict and verify the timing behavior of LIN protocol is required at the network design phase. Furthermore, a simulation environment based on a timing model of LIN protocol is beneficial to predict the timing behavior of LIN. The model equation is formulated with six timing parameters deduced from timing properties of LIN specification. Additionally, LIN conformance test equations to verify LIN device driver are derived with timing constraints of the parameters. The proposed model equation and simulation method are validated with a result that is measured at real LIN based network system.

Outage Probability Analysis of Full Duplex Relay with Decode and Forward Protocol (복호 후 전달 방식을 사용하는 전이중 통신 릴레이 시스템에서의 오수신 확률 성능 분석)

  • Kwon, Tae-Hoon;Lim, Sung-Mook;Park, Sung-Soo;Hong, Dae-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.568-576
    • /
    • 2010
  • In this paper, we analyze the outage probability of full duplex relay (FDR) with decode-and-forward (DF) protocol is derived under fading channels. The fading channel for source-relay link is assumed to be Rician fading to consider the infrastructured fixed relay with line of sight (LOS) propagation, and the other fading channels are assumed to be Rayleigh fading. Based on this analytical result, we provide the criterion that FDR shows a lower outage probability than HDR to consider the interference problem and the resource efficiency improvement by full duplex (FD) operation. The accuracy of the analysis is confirmed throughout the simulation results.

User Interface Satisfaction of the Air Traffic Control System (항공교통관제시스템에 대한 사용자 인터페이스 만족도 조사)

  • Song, Chang-Sun;Sohn, Young-Woo;Kwon, Hyuk-Jin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.22 no.4
    • /
    • pp.1-7
    • /
    • 2014
  • The purpose of study is to investigate the current user interface level of air traffic control system with the usability analysis and satisfaction survey questionnaire on user satisfaction. Think aloud protocol is used to identify not only task analysis, but also the level of user-friendliness of the FIMS and ASDE system, and the user interface questionnaires was conducted by QUIS. We collected data from 6 controllers for Think aloud protocol and 15 controllers for QUIS in Incheon airport. The results showed that the system was the valuable tool for ensuring human performance with the support of memory and the facilitation of decision-making tasks. It helps air traffic controllers perform better and minimize errors in a congested time. The human-computer interface system design, however, was not applied, which led to the increase of workload. Air traffic controller participation in software development provided excellent examples for applications in terms of software in FIMS. Based on these results, the study provided that the usability of system interface was necessary to take into account human factors. The development and design of system was discussed in User Interface environment.

A Simulation-based Analysis and Verification Method for Network Vulnerability (시뮬레이션 기반 네트워크 보안 취약점 분석 및 검증 방안)

  • Lee, Hyun-Jin;Kim, Kwang-hee;Lee, Haeng-Ho
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.659-666
    • /
    • 2019
  • MANET can be applied to various applications as it can autonomously configure the network with only mobile nodes. However, the network can be vulnerable to cyber attacks because it is organized in a distributed environment without central control or management. In this paper, we propose a simulation-based network security vulnerability analysis and verification method. Using this method, we simulated the routing message modification attack, Sybil node attack, and TLV message modification attack that may frequently occur in MANET, and confirmed that similar vulnerabilities can be occurred in the real system. Therefore, the proposed method can be used to improve the accuracy of the protocol design by verifying possible security vulnerabilities through simulation during the protocol design procedure.

Development of an Evidence-Based Clinical Practice Guideline of Korean Medicine for Stroke: A Study Protocol

  • Han, Chang-ho;Kim, Mikyung
    • The Journal of Korean Medicine
    • /
    • v.39 no.4
    • /
    • pp.30-39
    • /
    • 2018
  • Introduction: The aim of this study protocol is to share and disclose the methodology used to develop an evidence-based clinical practice guideline (CPG) of therapeutic interventions used in Korean medicine for patients with stroke. Methods: The CPG development process will consist of two phases. In phase I, a development committee will be established, and they will decide the key questions to be answered. A systematic review and meta-analysis will be performed to answer these key questions by searching relevant randomized controlled trials and systematic reviews. Draft recommendations will be developed according to the evidence level and recommendation grades primarily determined using the GRADE methodology. Panels comprised of external experts will be formed, and surveys and a face-to-face meeting will be conducted to reach a consensus on the recommendations. A preliminary guideline will be created after final review by the development committee. In phase II, we will conduct clinical trials and economic analysis to supplement the lack of evidence found in the phase I. Conclusion: The CPG is expected to help doctors practicing Korean medicine in clinics or hospitals with making decisions based on the most reliable evidence, ultimately leading to the provision of optimal care for patients with stroke.

Routing protocol Analysis in Low Power Sensor Network For Energy Efficiency (에너지 효율성을 고려한 저 전력 센서 네트워크에서의 라우팅 프로토콜 분석)

  • Kim, Dong-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.777-780
    • /
    • 2014
  • The sensor network technology for core technology of ubiquitous computing is in the spotlight recently, the research on sensor network is proceeding actively which is composed many different sensor node. The major traffic patterns of plenty of sensor networks are composed of collecting types of single directional data, which is transmitting packets from several sensor nodes to sink node. One of the important condition for design of sensor node is to extend for network life which is to minimize power-consumption under the limited resources of sensor network. In this work, we analysis adapted routing protocols using the network simulation that was used exiting network and network provider needs will be able to solve the problem.

  • PDF