• Title/Summary/Keyword: ring networks

Search Result 170, Processing Time 0.026 seconds

The Efficiency Design & MAC Function of the Composition Optical Network (광통신망 구축의 효과적인 설계 및 MAC고려 요소)

  • 하창국
    • Journal of the Korean Professional Engineers Association
    • /
    • v.34 no.4
    • /
    • pp.41-47
    • /
    • 2001
  • The paper describes SR3 (Synchronous Round Robin with Reservations), a collision-free medium access control protocol for all-optical slotted packet networks based on WDM multi-channel ring topologies where nodes are equipped with one fixed-wavelength receiver and one wavelength-tunable transmitter SR3 is derived from the SRR and MMR protocols previously proposed by the same authors for the same class of all-optical networks. SRR and MMR already achieve an efficient exploitation of the available bandwidth, while guaranteeing a throughput-fair access to each node. SR3, In addition, allows nodes to reserve slots. thereby achieving a stronger control on access delays; it is thus well suited to meet tight delay requirements, as it is the case for multimedia applications. Simulation results show that SR3 provides very good performance to guaranteed qualify traffic, but also brings signigicant performance improvements for best-effort traffic. Energy effciency is an important issue for optical network since they must rely on their batteries. We present a novel MAC protocol that achieves a good energy efficiency of optical interface of the network and provides support for diverse traffic types and QoS. The scheduler of the base station is responsible to provide the required QoS to connections on the optical link and to minimise the amount of energy spend by the High speed Network. The main principles of the MaC protocol are to avoid unsuccessful actions, minimise the number of transitions , and synchronise the mobile and the base-station. We will show that considerable amounts of energy can be saved using these principles.

  • PDF

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

A Low-Power Design of Delta-Sigma Based Digital Frequency Synthesizer for Bio Sensor Networks (의료용 센서 네트워크를 위한 저전력 델타 시그마 디지털 주파수 합성기 설계)

  • Bae, Jung-Nam;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.193-197
    • /
    • 2017
  • In this paper, we present a low-power delta-sigma based digital frequency synthesizer with high frequency resolution for bio sensor networks. Biomedical radio-frequency (RF) transceivers require miniaturized forms with a long battery life and low power consumption. For the technology scaling, digital circuits have become preferable compared to analog circuits because of the aggressive cost, size, flexibility, and repeatability. Therefore, the digital circuits based on standard-cell library are used to reduce a power consumption. Additionally, a delta-sigma is used for making fractional frequency tuning range. From the simulation, we confirmed that proposed scheme has good performance in accordance with power and frequency resolution.

Molecular Design for the Formation of Two-dimensional Molecular Networks: STM Study of ${\gamma}$-phenylalanine on Au(111)

  • Jeon, A-Ram;Youn, Young-Sang;Lee, Hee-Seung;Kim, Se-Hun
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2011.08a
    • /
    • pp.205-205
    • /
    • 2011
  • The self-assembly of ${\gamma}$-phenylalanine on Au(111) at 150 K was investigated using scanning tunneling microscopy (STM). Phenylalanine can potentially form two-dimensional (2D) molecular networks through hydrogen bonding (through the carboxyl and amino groups) and ${\pi}-{\pi}$ stacking interactions (via aromatic rings). We found that ${\gamma}$-phenylalanine molecules self-assembled on Au(111) surfaces into well-ordered structures such as ring-shaped clusters (at low and intermediate coverages) and 2D molecular domains (intermediate and monolayer coverages), whereas ${\alpha}$-phenylalanine molecules formed less-ordered structure on Au(111). The self-assembly of ${\gamma}$- but not ${\alpha}$-phenylalanine may be related to the flexibility of the carboxyl and amino groups in the molecule. Moreover, as expected, the 2D molecular network of ${\gamma}$-phenylalanine on Au(111) was mediated by a combination of hydrogen bonding and ${\pi}-{\pi}$ stacking interactions.

  • PDF

Protection Switching Methods for Point-to-Multipoint Connections in Packet Transport Networks

  • Kim, Dae-Ub;Ryoo, Jeong-dong;Lee, Jong Hyun;Kim, Byung Chul;Lee, Jae Yong
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.18-29
    • /
    • 2016
  • In this paper, we discuss the issues of providing protection for point-to-multipoint connections in both Ethernet and MPLS-TP-based packet transport networks. We introduce two types of per-leaf protection-linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes - tree protection and hybrid protection - are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per-leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper.

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks

  • Sharma, Bharti;Bhatia, Ravinder Singh;Singh, Awadhesh Kumar
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.36-54
    • /
    • 2014
  • Resource sharing is a major advantage of distributed computing. However, a distributed computing system may have some physical or virtual resource that may be accessible by a single process at a time. The mutual exclusion issue is to ensure that no more than one process at a time is allowed to access some shared resource. The article proposes a token-based mutual exclusion algorithm for the clustered mobile ad hoc networks (MANETs). The mechanism that is adapted to handle token passing at the inter-cluster level is different from that at the intra-cluster level. It makes our algorithm message efficient and thus suitable for MANETs. In the interest of efficiency, we implemented a centralized token passing scheme at the intra-cluster level. The centralized schemes are inherently failure prone. Thus, we have presented an intra-cluster token passing scheme that is able to tolerate a failure. In order to enhance reliability, we applied a distributed token circulation scheme at the inter-cluster level. More importantly, the message complexity of the proposed algorithm is independent of N, which is the total number of nodes in the system. Also, under a heavy load, it turns out to be inversely proportional to n, which is the (average) number of nodes per each cluster. We substantiated our claim with the correctness proof, complexity analysis, and simulation results. In the end, we present a simple approach to make our protocol fault tolerant.

Localization of People at Risk based on the Fire Alarm Networks and Bluetooth (화재경보망과 블루투스 기반으로 위험에 처한 사람의 위치 파악)

  • Kim, Chae-Won;Son, Joo-Young
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.159-160
    • /
    • 2019
  • It would be very important to localize people at risk as soon as possible in order to minimize the damage. Generally the infrastructure should be deployed additionally for indoor positioning system. In this paper, we proposed an indoor localization system for people at risk using the existing fire alarm networks. The system detects the signal of smart devices of people in danger immediately and let the main alarm controller ring all alarms in vessel and display the position. Thus, the proposed system can make the burden much less to deploy additional network and infrastructure.

  • PDF

Improvement of Unicast Traffic Performance in High-availability Seamless Redundancy (HSR) Using Port Locking (PL) Algorithm (Port Locking (PL) 알고리즘을 이용한 HSR (High-availability Seamless Redundancy)의 유니캐스트 트래픽 성능개선)

  • Abdulsam, Ibraheem Read;Kim, Se Mog;Choi, Young Yun;Rhee, Jong Myung
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.1
    • /
    • pp.51-56
    • /
    • 2014
  • High-availability seamless redundancy (HSR) is a protocol for fault-tolerant Ethernet (FTE) networks. It provides two frame copies and each copy is forwarded on a separate physical path, which provides zero fail-over time. Therefore, the HSR is becoming a potential candidate for various real-time FTE applications. However, the generation and circulation of unnecessary frames due to the duplication of every sending frame is inherent drawback of HSR. Such drawback degrades the performance of the network and may deplete its resources. In this paper, we present a new algorithm called port locking (PL) based on the media access control (MAC) address to solve the abovementioned problem in popular connected-rings network. Our approach makes the network gradually learn the locations of the source and the destination nodes without relying on network control frames. It then prunes all the rings that do not contain the destination node by locking corresponding rings' entrance ports. With the PL algorithm, the traffic can be significantly reduced and therefore the network performance will be greatly enhanced specially in a large scale connected-rings network. Analytical results are provided to validate the PL algorithm.

An automated visual inspection of solder joints using 2D and 3D features (2차원 및 3차원 특징값을 이용한 납땜 시각 검사)

  • 김태현;문영식;박성한
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.11
    • /
    • pp.53-61
    • /
    • 1996
  • In this paper, efficient techniques for solder joint inspection have been described. Using three layers of ring shaped LED's with different illumination angles, three frames of images are sequentially obtained. From these images the regions of interest (soldered regions) are segmented, and their characteristic features including the average gray level and the percentage of highlights - refereed to as 2D features - are extracted. Based on the backpropagation algorithm of neural networks, each solder joint is classified intor one of the pre-defined types. If the output value is not in the confidence interval, the distribution of tilt angles-referred to as 3D features - is claculated, and the solder joint is classified based on the bayes classfier. The second classifier requires more computation while providing more information and better performance. The proposed inspection system has been implemented and tested with various types of solder joints in SMDs. The experimental results have verified the validity of this scheme in terms of speed and recognition rate.

  • PDF

Implementation and Performance Analysis of a Fault-tolerant Mini-MAP System (결함 허용 Mini-MAP 시스템의 구현 및 성능해석)

  • 문홍주;박홍성;권욱현
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.32B no.3
    • /
    • pp.1-10
    • /
    • 1995
  • In this paper, a fault-tolerant Mini-MAP system with high reliability is proposed. For fault-tolerance, the LLC sublayer, MAC sublayer, and physical layer of the Mini-MAP system are dualized. The detection of faults, the replacement of the failed network, and the management of the network are three major functions required for the dualization, and they are performed by ESM(Error Supervisory Machine), EMM(Error Management Machine), and NMM(Network Management Machine) of the proposed fault-tolerant Mini-MAP system, respectively. The ring maintenance function of the MAC sublayer is used for the detection of the faults. In the proposed fault-tolerant Mini-MAP system, the data are received from both of the dualized networks and transmitted to the selected one of the two. We analyze the reliability and the MTTF(Mean Time To Failure) of the proposed fault-tolerant Mini-MAP system and show that it has better performance compared to a general Mini-MAP system.

  • PDF