• 제목/요약/키워드: wireless applications

검색결과 1,698건 처리시간 0.028초

응용프로그램의 특성에 따른 무선센서 네트워크의 에너지 소모와 처리 지연 분석 (Analysis of Energy Consumption and Processing Delay of Wireless Sensor Networks according to the Characteristic of Applications)

  • 박총명;한영탁;전수빈;정인범
    • 정보과학회 논문지
    • /
    • 제42권3호
    • /
    • pp.399-407
    • /
    • 2015
  • 무선 센서네트워크는 다양한 응용 프로그램들을 위하여 주변 환경으로부터 데이터수집 또는 처리를 위하여 사용된다. 무선 센서네트워크는 저 수준 계산 능력, 제한적인 배터리 용량, 낮은 네트워크 대역폭을 기반으로 운영되므로, 무선센서 네트워크의 구조 모델은 응용 프로그램의 성능에 큰 영향을 미친다. 응용 프로그램이 높은 계산 복잡도를 요구하거나, 실시간 처리를 필요로 하는 경우, 무선센서 네트워크의 중앙 집중 형 구조는 데이터 처리에 있어서 지연을 발생하게 되므로, 응용 프로그램의 성능 요구사항을 만족시키지 못하는 결과를 가져온다. 반면에, 응용 프로그램이 단순한 데이터 수집을 장기간 수행하는 경우, 분산 형으로 무선센서 네트워크를 구성한다면, 무선 센서들에서 불필요한 에너지 소모를 피할 수 없게 된다. 이 논문에서는 중앙집중 형 구조와 분산 형 구조에서 에너지 소모와 데이터 처리 지연을 분석, 평가한다. 또한, 본 논문에서는 무선 센서 네트워크를 위한 새로운 융합 형 구조를 제안하고 평가한다 제안된 방식은 응용 프로그램의 특성에 따라서 무선센서 네트워크에서 최적의 무선센서 노드 개수를 찾을 수 있게 한다.

A Function Point Model for Measuring the Development Cost of Information Services using Wireless Data Broadcast

  • Seokjin Im
    • International journal of advanced smart convergence
    • /
    • 제13권1호
    • /
    • pp.12-22
    • /
    • 2024
  • Software applications have a huge and inseparable impact on our lives. The complexity of the applications increases rapidly to support high performance and multifunction. Accordingly, the cost model for applications is increasingly important. Line of Code (LOC) and Man-Month (M/M) as the cost model measure the quantitative sides of the applications. Unlike them, Function Point (FP) measures the functionalities of the application. FP is efficient for estimating qualitative characteristics, but it is restricted to measuring the cost of an application using the wireless data broadcast which can support any number of clients. In this paper, we propose, a Function Point model for Information services using wireles data Broadcast (FPIB) to measure the development cost of an application that serves using the wireless data broadcast environment. FPIB adopts critical parameters of the wireless broadcast environment and the complexity of them to measure effectively the cost developing the application. Through the evaluation comparing the proposed FPIB with FP, we reveal the effectiveness of the proposed FPIB.

The Impact of Wireless Data Technologies in New Zealand: A Study of New Zealand Small and Medium-Sized Enterprises

  • Barnes, Stuart J.
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2004년도 e-Biz World Conference
    • /
    • pp.60-64
    • /
    • 2004
  • The rapidly improving price-performance of wireless technologies is providing an unprecedented platform for the development of wireless applications for the business. Such applications are able to take advantage of a new paradigm of mobility for data services, with the ability to sensitize to location, time and personal features. While big business has been a central feature of wireless implementation, it is now clear that small- and medium-sized enterprises (SMEs) are beginning to take advantage of the strategic benefits of wireless data communications. This study examines the state-of-the-art of wireless data services in New Zealand. It provides a survey of 127 current applications in use, as well as two short illustrative cases of application use. The paper rounds off with a summary and conclusions.

  • PDF

Extending Network Domain for IEEE1394

  • Lee, Seong-Hee;Park, Seong-Hee;Choi, Sang-Sung
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.177-178
    • /
    • 2005
  • Wireless 1394 over IEEE802.15.3 must allow a data reserved for delivery over a wired 1394 network to be delivered over an IEEE802.15.3 wireless network through bridging IEEE 1394 to IEEE802.15.3. Isochronous transfers on the 1394 bus guarantee timely delivery of data. Specifically, isochronous transfers are scheduled by the bus so that they occur once every $125\;{\mu}s$ and require clock time synchronization to complete the real-time data transfer. IEEE1394.1 and Protocol Adaptation Layer for IEEE1394 over IEEE802.15.3 specify clock time synchronization for a wired 1394 bus network to a wired 1394 bus network and wireless 1394 nodes, which are IEEE802.15.3 nodes handling 1394 applications, over IEEE802.15.3. Thus, the clock time synchronizations are just defined within a homogeneous network environment like IEEE1394 or IEEE802.15.3 until now. This paper proposes new clock time synchronization method for wireless 1394 heterogeneous networks between 1394 and 802.15.3. If new method is adopted for various wireless 1394 products, consumer electronics devices such as DTV and Set-top Box or PC devices on a 1394 bus network can transmit real time data to the AV devices on the other 1394 bus in a different place via IEEE 802.15.3.

  • PDF

A Secure Network for Mobile Wireless Service

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • 제9권2호
    • /
    • pp.247-258
    • /
    • 2013
  • A new secure network communication technique that has been designed for mobile wireless services, is presented in this paper. Its network services are mobile, distributed, seamless, and secure. We focus on the security of the scheme and achieve anonymity and reliability by using cryptographic techniques like blind signature and the electronic coin. The question we address in this paper is, "What is the best way to protect the privacy and anonymity of users of mobile wireless networks, especially in practical applications like e-commerce?" The new scheme is a flexible solution that answers this question. It efficiently protects user's privacy and anonymity in mobile wireless networks and supports various applications. It is employed to implement a secure e-auction as an example, in order to show its advantages in practical network applications.

Experimental Interference Studies Between WCDMA and UWB System

  • Kim, Myung-Jong;Kim, Jae-Young;Kang, Young-Jin;Hong, Ic-Pyo
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.187-190
    • /
    • 2005
  • Ultra wideband (UWB) technologies have been developed to exploit a new spectrum resource in substances and to realize ultra-high-speed communication, high precision geolocation, and other applications. The energy of UWB signal is extremely spread from near DC to a few GHz. This means that the interference between conventional narrowband systems and UWB systems is inevitable. However, the interference effects had not previously been studied from UWB wireless systems to conventional mobile wireless systems sharing the frequency bands such as WCDMA system. This paper experimentally evaluates the interference from two kinds of UWB sources, namely a direct-sequence spread-spectrum UWB source and an impulse radio UWB source, to a WCDMA digital transmission system. The average frame error rate degradations are presented. From these experimental results, we show that in all practical cases UWB system can coexist with WCDMA terminal without causing any dangerous interference.

  • PDF

Silicon-Based Integrated Inductors for Wireless Applications

  • Kim, Bruce C.
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2003년도 추계종합학술대회
    • /
    • pp.389-393
    • /
    • 2003
  • This paper presents circuit modeling and characterization of silicon-based on-chip integrated inductors in Giga Hertz range for wireless communication products. We compare several different designs of on-chip inductors for self-resonant frequency and quality factor. The measurement data could be used as a design guide for manufacturing practical spiral inductors for wireless applications. We provide the equivalent inductor circuit parameters from the actual measurement data.

  • PDF

무선전력전송에 대한 기술 개발 동향 (Wireless Power Transfer Technologies Trends)

  • 엄태윤;오창섭;박석준
    • 에너지공학
    • /
    • 제24권2호
    • /
    • pp.174-178
    • /
    • 2015
  • 무선전력전송기술은 복잡한 전선을 이용하지 않고 전기에너지를 필요한 기기나 장소에 전송할 수 있는 기술이다. 특히 휴대폰 등 모바일 기기의 무선충전뿐 아니라 전기자동차와 같은 전기장치에 무선으로 전력을 공급할 수 있는 기술로 최근 이 분야에 대한 연구개발이 대단히 활발하다. 여기서는 무선전력전송기술의 개요와 전망에 대해 서술하고 인체영향, 주파수할당 및 표준화 등의 문제점을 분석한다.

M2M 어플리케이션 지원을 위한 무선 결합 전송 플랫폼의 전송률 분석 (Throughput Analysis of Wireless Transmission Platform using Multiple Wireless Chips for M2M Networks)

  • 왕한호;우중재
    • 전기학회논문지P
    • /
    • 제63권3호
    • /
    • pp.195-199
    • /
    • 2014
  • Various M2M applications have different quality-of-service(QoS) requirements to be implemented practically. QoS requirements are normally data rate and delay constraint. However, there are limited number of wireless communication chip solutions which cannot support QoS requirements for all M2M application. Hence, aggregated usage of plural wireless communication chip solutions should be needed to implement M2M applications. In this paper, we consider the case that two wireless communication chips using random access protocol work together to transmit data of an M2M application. In such case, data rate and delay performance are mathematically analyzed. In our results, practical data rate can be improved from 2.5 to 7 times while delay constraints are satisfied if we simply use two wireless communication chips together.

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

  • Raazi, Syed Muhammad Khaliq-Ur-Rahman;Lee, Sung-Young
    • Journal of Computing Science and Engineering
    • /
    • 제4권1호
    • /
    • pp.23-51
    • /
    • 2010
  • Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.