• Title/Summary/Keyword: Carrier sense

Search Result 129, Processing Time 0.02 seconds

A Variable Priority MAC Protocol for QoS Guarantee in Wireless ad hoc Networks (무선 ad hoc 망에서 QoS 보장을 위한 가변 우선순위 MAC 프로토콜)

  • Park, Ha-Young;Kim, Chang-Wook;Han, Jung-Ahn;Kim, Byoung-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.463-471
    • /
    • 2007
  • Because of MANET's dynamic characteristic, the hidden node problem can happen. Thus it must use with distributed channel access. In Ad hoc networks, carrier sense multiple access with collision avoidance(CSMA/CA) is one of the most widely used medium access control(MAC) schemes for asynchronous data traffics. However, CSMA/CA could not guarantee the quality of multimedia traffics. CSMA is a contention based protocol. Therefor once a node gets a channel, it can momopolze. Thus the fairness problem with channel starvation will happen. We will propose a new MAC protocol to guarantee QoS for multimedia data in ad hoc networks.

Performance Analysis of CSMA/CD in Radio Environment with Capture Effect (무선환경에서 포획효과를 고려한 CSMA/CD 프로토콜의 성능분석)

  • Sa, Ju-Hee;Hyun, In-Bok;Kwak, Kyung-Sup
    • Journal of IKEEE
    • /
    • v.1 no.1 s.1
    • /
    • pp.73-82
    • /
    • 1997
  • In this paper we analyzed, using Markov modeling, the performance of CSMA/CD over the wireless channel which is characterized by near-far effect, shadowing and Rayleigh fading. The analysis shows that throughput of CSMA/CD is degraded by channel error. However, if capture effect which arises from the randomness of power level of received signal due to the fading phenomena of electromagnetic waves is taken into consideration, the system performance is much improved and the system stability is also made better.

  • PDF

Game-Theoretic Analysis of Selfish Secondary Users in Cognitive Radio Networks

  • Kahsay, Halefom;Jembre, Yalew Zelalem;Choi, Young-June
    • Journal of Communications and Networks
    • /
    • v.17 no.4
    • /
    • pp.440-448
    • /
    • 2015
  • In this paper, we study the problem of selfish behavior of secondary users (SUs) based on cognitive radio (CR) with the presence of primary users (PUs). SUs are assumed to contend on a channel using the carrier sense multiple access with collision avoidance (CSMA/CA) and PUs do not consider transmission of SUs, where CSMA/CA protocols rely on the random deference of packets. SUs are vulnerable to selfish attacks by which selfish users could pick short random deference to obtain a larger share of the available bandwidth at the expense of other SUs. In this paper, game theory is used to study the systematic cheating of SUs in the presence of PUs in multichannel CR networks. We study two cases: A single cheater and multiple cheaters acting without any restraint. We identify the Pareto-optimal point of operation of a network with multiple cheaters and also derive the Nash equilibrium of the network. We use cooperative game theory to drive the Pareto optimality of selfish SUs without interfering with the activity of PUs. We show the influence of the activity of PUs in the equilibrium of the whole network.

A Performance Analysis of CSMA in Wireless Networks Based on MIL-STD-188-220 (MIL-STD-188-220기반 무선네트워크의 CSMA 성능분석)

  • Seo, NanSol;Joo, JaeWoo;Jang, DohngWoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1129-1137
    • /
    • 2012
  • The wireless link of tactical datalink system provides a communication network to share digitalized tactical data in real-time. Also MAC(Multiple Access Control) of this system is subject to TDMA or CSMA according to a operated circumstance of target nodes to exchange the data reliably. In this paper, we verify the operability when we use CSMA scheme based on MIL-STD-188-220 in tactical datalink system which is basically designed with TDMA, and provide a mathematical analysis scheme to verify the operability and performance. Finally, by implementing CSMA scheme to a tactical datalink equipment we obtain practical results which can be compared with theoretical results.

Modeling and Performance Analysis of MAC Protocol for WBAN with Finite Buffer

  • Shu, Minglei;Yuan, Dongfeng;Chen, Changfang;Wang, Yinglong;Zhang, Chongqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4436-4452
    • /
    • 2015
  • The IEEE 802.15.6 standard is introduced to satisfy all the requirements for monitoring systems operating in, on, or around the human body. In this paper, analytical models are developed for evaluating the performance of the IEEE 802.15.6 CSMA/CA-based medium access control protocol for wireless body area networks (WBAN) under unsaturation condition. We employ a three-dimensional Markov chain to model the backoff procedure, and an M/G/1/K queuing system to describe the packet queues in the buffer. The throughput and delay performances of WBAN operating in the beacon mode are analyzed in heterogeneous network comprised of different user priorities. Simulation results are included to demonstrate the accuracy of the proposed analytical model.

Differentially Expressed Genes in Marine Medaka Fish (Oryzias javanicus) Exposed to Cadmium

  • Woo, Seon-Ock;Son, Sung-Hee;Park, Hong-Seog;Vulpe, Chris D.;Ryu, Jae-Chun;Yum, Seung-Shic
    • Molecular & Cellular Toxicology
    • /
    • v.4 no.4
    • /
    • pp.293-299
    • /
    • 2008
  • To screen the differentially expressed genes in cadmuim-exposed marine medaka fish (Oryzias javanicus), a candidate marine test fish for ecological toxicity, the differential display polymerase chain reaction (DD-PCR) was carried out, since the genome-wide gene expression data are not available in this fish species yet. A total of 35 clones were isolated from cadmium-exposed fish and their nucleotide sequences were analyzed. The differentially expressed gene candidates were categorized to response to stimulus (3); ion binding (3); DNA binding (1); protein binding (6); carbohydrate binding (1); metabolic process (4); biological regulation (3); cellular process (2); protein synthesis (2); catalytic activity (2); sense of sight (1); immune (1); neurohormone (1); signaling activity (1); electron carrier activity (1) and others (3). For real-time quantitative RT-PCR, we selected catalase, glucose-6-phosphate dehydrogenase, heat shock protein 70, and metallothionein and confirmed that cadmium exposure enhanced induction of these four genes.

A Model for Analyzing the Performance of Wireless Multi-Hop Networks using a Contention-based CSMA/CA Strategy

  • Sheikh, Sajid M.;Wolhuter, Riaan;Engelbrecht, Herman A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2499-2522
    • /
    • 2017
  • Multi-hop networks are a low-setup-cost solution for enlarging an area of network coverage through multi-hop routing. Carrier sense multiple access with collision avoidance (CSMA/CA) is frequently used in multi-hop networks. Multi-hop networks face multiple problems, such as a rise in contention for the medium, and packet loss under heavy-load, saturated conditions, which consumes more bandwidth due to re-transmissions. The number of re-transmissions carried out in a multi-hop network plays a major role in the achievable quality of service (QoS). This paper presents a statistical, analytical model for the end-to-end delay of contention-based medium access control (MAC) strategies. These strategies schedule a packet before performing the back-off contention for both differentiated heterogeneous data and homogeneous data under saturation conditions. The analytical model is an application of Markov chain theory and queuing theory. The M/M/1 model is used to derive access queue waiting times, and an absorbing Markov chain is used to determine the expected number of re-transmissions in a multi-hop scenario. This is then used to calculate the expected end-to-end delay. The prediction by the proposed model is compared to the simulation results, and shows close correlation for the different test cases with different arrival rates.

The Method of Reducing the Delay Latency to Improve the Efficiency of Power Consumption in Wireless Sensor Networks

  • Ho, Jang;Son, Jeong-Bong
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.199-204
    • /
    • 2008
  • Sensor nodes have various energy and computational constraints because of their inexpensive nature and ad-hoc method of deployment. Considerable research has been focused at overcoming these deficiencies through faster media accessing, more energy efficient routing, localization algorithms and system design. Our research attempts to provide a method of improvement MAC performance in these issues. We show that traditional carrier-sense multiple access(CSMA) protocols like IEEE 802.11 do not handle the first constraint adequately, and do not take advantage of the second property, leading to degraded latency and throughput as the network scales in size, We present more efficient method of a medium access for real-time wireless sensor networks. Proposed MAC protocol is a randomized CSMA protocol, but unlike previous legacy protocols, does not use a time-varying contention window from which a node randomly picks a transmission slot. To reduce the latency for the delivery of event reports, it carefully decides a fixed-size contention window, non-uniform probability distribution of transmitting in each slot within the window. We show that it can offer up to several times latency reduction compared to legacy of IEEE 802.11 as the size of the sensor network scales up to 256 nodes using widely used simulator ns-2. We, finally show that proposed MAC scheme comes close to meeting bounds on the best latency achievable by a decentralized CSMA-based MAC protocol for real-time wireless sensor networks which is sensitive to latency.

  • PDF

Ultimate Longitudinal Strength Analysis of Ship′s Hull Girder by Idealized Structural Unit Method (이상화(理想化) 구조요소법(構造要素法)에 의한 선체구조(船體構造)의 최종종강도(最終縱强度) 해석(解析))

  • Jeom-K. Paik
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.28 no.1
    • /
    • pp.139-149
    • /
    • 1991
  • In this paper, an efficient method for the ultimate longitudinal strength analysis of the double skin hull girder is presented by using idealized structural unit method. Idealized plate element subjected to biaxial load is developed taking account of initial deflection and welding residual stress. Interaction effect between local and global buckling in the whole structure is also taken into consideration. The reserve strength factor and reliability index for the example 40K double skin product oil carrier are evacuated against the ultimate longitudinal strength. It is concluded that the prudent method seems to be useful in the sense that the computing time required is very short while giving the reasonable solution.

  • PDF

Scheduling of Real-time and Nonreal-time Traffics in IEEE 802.11 Wireless LAN (무선랜에서의 실시간 및 비실시간 트래픽 스케줄링)

  • Lee, Ju-Hee;Lee, Chae Y.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.2
    • /
    • pp.75-89
    • /
    • 2003
  • Media Access Control (MAC) Protocol in IEEE 802.11 Wireless LAN standard supports two types of services, synchronous and asynchronous. Synchronous real-time traffic is served by Point Coordination Function (PCF) that implements polling access method. Asynchronous nonreal-time traffic is provided by Distributed Coordination Function (DCF) based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. Since real-time traffic is sensitive to delay, and nonreal-time traffic to error and throughput, proper traffic scheduling algorithm needs to be designed. But it is known that the standard IEEE 802.11 scheme is insufficient to serve real-time traffic. In this paper, real-time traffic scheduling and admission control algorithm is proposed. To satisfy the deadline violation probability of the real time traffic the downlink traffic is scheduled before the uplink by Earliest Due Date (EDD) rule. Admission of real-time connection is controlled to satisfy the minimum throughput of nonreal-time traffic which is estimated by exponential smoothing. Simulation is performed to have proper system capacity that satisfies the Quality of Service (QoS) requirement. Tradeoff between real-time and nonreal-time stations is demonstrated. The admission control and the EDD with downlink-first scheduling are illustrated to be effective for the real-time traffic in the wireless LAN.