• Title/Summary/Keyword: 반복전송

Search Result 405, Processing Time 0.023 seconds

An Energy-Efficient Asynchronous Sensor MAC Protocol Design for Wireless Sensor Networks (무선 센서 네트워크를 위한 에너지 효율적인 비동기 방식의 센서 MAC 프로토콜 설계)

  • Park, In-Hye;Lee, Hyung-Keun;Kang, Seok-Joong
    • Journal of IKEEE
    • /
    • v.16 no.2
    • /
    • pp.86-94
    • /
    • 2012
  • Synchronization MAC Protocol such as S-MAC and T-MAC utilize duty cycling technique which peroidically operate wake-up and sleep state for reducing energy consumption. But synchronization MAC showed low energy efficiency because of additional control packets. For better energy consumption, Asychronization MAC protocols are suggested. For example, B-MAC, and X-MAC protocol adopt Low Power Listening (LPL) technique with CSMA algorithm. All nodes in these protocols joining a network with independent duty cycle schedules without additional synchronization control packets. For this reason, asynchronous MAC protocol improve energy efficiency. In this study, a low-power MAC protocol which is based on X-MAC protocol for wireless sensor network is proposed for better energy efficiency. For this protocol, we suggest preamble numbering, and virtual-synchronization technique between sender and receive node. Using TelosB mote for evaluate energy efficiency.

Performance of Frequency Planning and Channel Allocation Algorithm for Unified Inter-Cell Interference Avoidance and Cancellation in OFDMA Cellular Systems (OFDMA 셀룰러 시스템에서 셀 간 간섭 회피 및 제거 기법을 적용한 주파수 설계와 채널 할당 알고리즘의 성능)

  • Lee, Jae-Hoon;Kim, Dong-Woo;Lee, Hee-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2A
    • /
    • pp.99-106
    • /
    • 2009
  • In this paper, we propose UCA algorithms that are applied to the unified inter-cell interference mitigation through frequency plannings in OFDMA cellular systems. Under three frequency plannings, UCA algorithms allocate frequency channels to UEs(User Equipments). Proposed UCA algorithms require the information of received signal power from home sector and neighbor sectors respectively. We compare all possible combinations of UCA algorithms and frequency plannings through compute simulation. A primary performance measure is the low 5th percentile of SINR at UEs. The proposed UCA algorithms can avoid the interference to neighbor cells by allocating relatively low transmit power to centrally-located UEs and cancel inter-cell interference at cell-edge UEs by a coordinated symbol repetition. We show that UCA algorithm 2 applied in frequency planning 1 is promising among other combinations of UCA algorithms and frequency palnnings in terms of the low 5th percentile of SINR at UEs.

Wireless Caching Techniques Based on Content Popularity for Network Resource Efficiency and Quality of Experience Improvement (네트워크 자원효율 및 QoE 향상을 위한 콘텐츠 인기도 기반 무선 캐싱 기술)

  • Kim, Geun-Uk;Hong, Jun-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1498-1507
    • /
    • 2017
  • According to recent report, global mobile data traffic is expected to increase by 11 times from 2016 to 2020. Moreover, this growth is expected to be driven mainly by mobile video traffic which is expected to account for about 70% of the total mobile data traffic. To cope with enormous mobile traffic, we need to understand video traffic's characteristic. Recently, the repetitive requests of some popular content such as popular YouTube videos cause a enormous network traffic overheads. If we constitute a network with the nodes capable of content caching based on the content popularity, we can reduce the network overheads by using the cached content for every request. Through device-to-device, multicast, and helpers, the video throughput can improve about 1.5~2 times and prefix caching reduces the playback delay by about 0.2~0.5 times than the conventional method. In this paper, we introduce some recent work on content popularity-based caching techniques in wireless networks.

A Study on Error Resilience of Header Parameters considering the activity of macroblock (매크로블록의 활동성을 고려한 헤더정보의 오류 복원에 관한 연구)

  • Kim, Jong-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.837-842
    • /
    • 2008
  • Any errors that are generated in the channels and networks distort the video quality and are propagated in both the spatial and temporal domains. In particular, header errors ran result in serious visual degradation of the output video encoding/decoding schemes that can make an error resilient compressed bit-stream in error prone environments, such as mobile networks. In this paper, we proposes an header error resilience method that consider the activity of macroblock in video bitstream syntex. The extract of header error repaetedly embeds the header parameters into the least significant bits(LSB) of the quantized DCT coefficients prior to VLC. Experimental results show that the proposed error resilience method restores good image quality despite the detected error on header parameters.

Performance analysis and experiment results of multiband FSK signal based on direct sequence spread spectrum method (직접 수열 확산 방식 기반 다중 밴드 FSK 신호의 성능 분석 및 실험 결과)

  • Jeong, Hyun-Woo;Shin, Ji-Eun;Jung, Ji-Won
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.4
    • /
    • pp.370-381
    • /
    • 2021
  • This paper presented an efficient transceiver structure of multiband Frequency Shift Keying (FSK) signals with direct sequence spread spectrum for maintaining covertness and performance. In aspect to covertness, direct sequence spread spectrum method, which multiplying by Pseudo Noise (PN) codes whose rate is much higher than that of data sequence, is employed. In aspect to performance, in order to overcome performance degradation caused by multipath and Doppler spreading, we applied multiband, turbo equalization, and weighting algorithm are applied. Based on the simulation results, by applying 4 number of multiband and number of chips are 8 and 32, experiments were conducted in a lake with a distance of moving from 300 m to 500 m between the transceivers. we confirmed that the performance was improved as the number of bands and chips are increased. Furthermore, the performance of multiband was improved when the proposed weighting algorithm was applied.

Stateless Randomized Token Authentication for Performance Improvement of OAuth 2.0 MAC Token Authentication (OAuth 2.0 MAC 토큰인증의 효율성 개선을 위한 무상태 난수화토큰인증)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1343-1354
    • /
    • 2018
  • OAuth 2.0 bearer token and JWT(JSON web token), current standard technologies for authentication and authorization, use the approach of sending fixed token repeatedly to server for authentication that they are subject to eavesdropping attack, thus they should be used in secure communication environment such as HTTPS. In OAuth 2.0 MAC token which was devised as an authentication scheme that can be used in non-secure communication environment, server issues shared secret key to authenticated client and the client uses it to compute MAC to prove the authenticity of request, but in this case server has to store and use the shared secret key to verify user's request. Therefore, it's hard to provide stateless authentication service. In this paper we present a randomized token authentication scheme which can provide stateless MAC token authentication without storing shared secret key in server side. To remove the use of HTTPS, we utilize secure communication using server certificate and simple signature-based login using client certificate together with the proposed randomized token authentication to achieve the fully stateless authentication service and we provide an implementation example.

A Service Model Development Plan for Countering Denial of Service Attacks based on Artificial Intelligence Technology (인공지능 기술기반의 서비스거부공격 대응 위한 서비스 모델 개발 방안)

  • Kim, Dong-Maeong;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.587-593
    • /
    • 2021
  • In this thesis, we will break away from the classic DDoS response system for large-scale denial-of-service attacks that develop day by day, and effectively endure intelligent denial-of-service attacks by utilizing artificial intelligence-based technology, one of the core technologies of the 4th revolution. A possible service model development plan was proposed. That is, a method to detect denial of service attacks and minimize damage through machine learning artificial intelligence learning targeting a large amount of data collected from multiple security devices and web servers was proposed. In particular, the development of a model for using artificial intelligence technology is to detect a Western service attack by focusing on the fact that when a service denial attack occurs while repeating a certain traffic change and transmitting data in a stable flow, a different pattern of data flow is shown. Artificial intelligence technology was used. When a denial of service attack occurs, a deviation between the probability-based actual traffic and the predicted value occurs, so it is possible to respond by judging as aggressiveness data. In this paper, a service denial attack detection model was explained by analyzing data based on logs generated from security equipment or servers.

Optimal CW Synchronization Scheme in IEEE 802.11 WLANs (IEEE 802.11 WLAN 환경에서 최적의 CW 공유 방안)

  • Lee, Jin-Lee;Lee, Su-Bin;Kyung, Yeunwoong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.15-19
    • /
    • 2020
  • In this paper, we propose a optimal CW(Conention Window) synchronization scheme in IEEE 802.11 WLANs. IEEE 802.11 WLANs support DCF(Distributed Coordination Function) mode for the MAC(Medium Access Control) operation. In DCF, the CW increases exponentially according to the collisions and becomes minimum CW according to the success of data transmissions. However, since the base minimum CW value is hardware or standard specific, the number of active stations and network status are not considered to determine the CW value. Even though the researches on optimal CW have beend conducted, they do not consider the optimal CW synchronization among mobile stations which occur network performance degradation. Therefore, this paper calculates the optimal CW value and shares it with mobile stations in the network.

Privilege Management Technique for Unreliable Network Environments based on Tree Structure (신뢰도가 낮은 네트워크 환경을 위한 트리 구조 기반의 권한 관리 기법)

  • Yang, Soo-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.83-91
    • /
    • 2008
  • IISO/IEC 9594-8 defines the public key framework and attribute certificate framework. Attribute certificate framework deals with privilege management infrastructure(PMI). In PMI, for privilege management using attribute certificates, role assignment certificates and role specification certificates are used to assign and specify privileges independently. Role specification certificates includes privilege specifications and the details far privilege management of network environments. Privilege management of unreliable network environment tries to enhance the reliability and efficiency of privilege information transmission forwarding over unreliable routes in the presence of potentially faulty nodes and edges. Each node forms a role specification tree based on role specification relationship data collected from the network. In this paper privilege management cost with the role specification certificates tree structure is evaluated trying to reduce the overhead incurred by role creation and modification of privileges. The multicasting of packets are used for scalability. We establish management cost model taking into account the packet loss and node reliability which continuously join and leave for network. We present quantitative results which demonstrate the effectiveness of the proposed privilege management scheme.

Availability-based Server Redirection System for Effective Content Delivery on Web (웹상에서의 효과적인 콘텐츠 전송을 위한 가용율 기반의 서버 재설정 시스템)

  • Song, Seung-Hyeon;Jang, Sung-Ho;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.61-71
    • /
    • 2009
  • The server redirection system replicates contents on replica servers in the distributed network environment. When users make a request for contents, the system can provide the contents much faster than the client-server network system. In the server redirection system, it is the most important to select the optimal replica server with user's information because many replica servers are geographically distributed. And, the system can serve contents to users flexibly if a redirector is well constructed. In this paper, the redirector makes a list of candidates suitable for user conditions by the decision tree method and calculates the availability of each replica server. And, the redirector selects the replica server with the highest availability. This paper also proposes an availability-based server redirection system that predicts the availability of each replica server in order to reduce the workload of replica servers and the repetitive communication messages between a redirector and replica servers. If a user accesses the network path for the replica server selected and noticed by the proposed system, the user can get contents effectively and efficiently.