• Title/Summary/Keyword: Control packet

Search Result 1,137, Processing Time 0.023 seconds

A CS/MLBP Reservtion Control Scheme in Integrated Data/Voice Local Area Networks (데이터/음성 공용 LAN에서의 CS/MLBP 예약제어방식)

  • 이재진;최흥문
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.12 no.2
    • /
    • pp.160-167
    • /
    • 1987
  • This paper proposes a CS/MLBP(carrier sence/message and location based priority) reservation sheme in integrated data/voice local area networks. In this sceme reservation can be done with only 2 reservation bits regardless of the total number of stations in the network. Thus the reservation time is shorter than that of DSMA scheme(6) where reservation time is proportional to the logarithm of the total number of stations. Simulation results show that, as compared to DSMA scheme, this control scheme improves th delay-throughput characteristics of both the data and the voice traffic, reduces the lossrate of voice packet at heavy load. Results also show that the performance of the propoxed scheme is independant of the total number of the stations allowed.

  • PDF

Analysis of MIMD Backoff Algorithm for IEEE 802.11 DCF (IEEE 802.11 DCF를 위한 MIMD 백오프 알고리즘 분석)

  • Lim, Seog-Ku
    • Journal of Digital Contents Society
    • /
    • v.12 no.3
    • /
    • pp.299-307
    • /
    • 2011
  • The MAC of IEEE 802.11 WLAN to control data transmission uses two control methods called DCF and PCF. The DCF controls the transmission based on CSMA/CA The BEB backoff algorithm of DCF shows relatively excellent performance in situation that the number of competing station is less, but has a problem that performance of throughput and delay is degraded in situation that the number of competing station is increased. This paper mathematically analyzes an MIMD backoff algorithm considering retry limit that increases the CW to doubled after collision and decreases smoothly the CW to halves after successful transmission in order to reduce the collision probability. To prove efficiency of the MIMD backoff algorithm, lots of simulations are conducted and analyzed.

PM-MAC : An Efficient MAC Protocol for Periodic Traffic Monitoring In Wireless Sensor Networks (무선 센서 네트워크에서 주기적인 트래픽의 효율적인 모니터링을 위한 MAC 프로토콜)

  • Kim, Dong-Min;Kim, Seong-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.157-164
    • /
    • 2008
  • In this paper we suggest a scheduling algorithm that transmits periodic traffics efficiently in tree-structured wireless sensor networks (WSNs). The related research[l] showed the problems such as increasing the energy consumption and decreasing the data throughput as the depth of tree increases. To solve these problems. we use idle time slots and avoid the redundancy at data transmission. Also we suggest the algorithm that transmits the control packet when it is similar to a previously measured data. And if emergency data is occurred, our proposed algorithm transits that data in EDP(Emergency Data Period) for reducing the wait time. The proposed algorithm shows more data throughput and less energy consumption than that of the related research.

  • PDF

A MAC Protocol for Link Maintenance in Multichannel Cognitive Radio Ad Hoc Networks

  • Li, Jingye;Luo, Tao;Gao, Jing;Yue, Guangxin
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.172-183
    • /
    • 2015
  • To provide an efficient link maintenance approach, we propose a cross layer medium access control (LM-MAC) protocol for multichannel cognitive radio ad hoc networks. Link establishment and reliable transmission are two key problems for a perfect link maintenance mechanism. Since the cognitive user (CU) pairs have to reestablish their links each frame, in the proposed MAC protocol, three different access modes are designed to guarantee transmission efficiency in continuous frames. To enhance the transmission reliability, each CU will create a father spectrum list (FSL) after joining in the network. FSL is divided into three groups of sub-channels with different functions to compensate the packet loss caused by the primary users' appearance and the deep fading. Meanwhile, since the transmitter and the receiver will share the same FSL, periodical cooperative sensing is adopted to further optimize the former problem. Finally, compared with the existing opportunistic multichannel (OMC)-MAC protocol, the proposed LM-MAC protocol achieves better system performance in terms of saturation throughput, continuity and access delay.

Protocol-independent Information Modeling and Web Services Implementation for Resource Management in NGN Transport Stratum (NGN 전송 층의 자원 관리를 위한 프로토콜 중립적인 정보 모델링과 웹 서비스 구현)

  • Yim, Young-Eun;Kwon, Tae-Hyun;Kim, Choon-Hee;Han, Tae-Man;Jeong, You-Hyeon;Cha, Young-Wook
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.453-462
    • /
    • 2007
  • NGN is a packet-based converged network to support session and non-session based services in QoS-enabled broadband transport technologies. Resource and admission control functions(RACF) of NGN have been considering COPS and SNMP as resource management protocols to collect network topology and resource status information of transport network. This paper defines requirements of resource management in NGN transport network, and proposes protocol independent information model to keep consistency of data models of each resource management protocol. Based on this information model described with UML class diagram, we designed and implemented NGN resource management system on Web Services.

A Study of Security Threats and Security Requirements of Software Defined Networking Technology (소프트웨어 정의 네트워킹 기술의 보안 위협 및 보안 요구사항에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.561-562
    • /
    • 2017
  • Software defined networking technology allows centralized and powerful network control by separating packet processing and network control. However, powerfulness of software-defined networking technology threats the network itself. Most security researches of software-defined networking focus on discovering and defending network vulnerabilities. But, there is not much security for this technology itself. In this paper, the security vulnerabilities that can occur in this networking technology are analyzed and the security requirements of it are proposed. The biggest threats are the threats to the controller, the reliability problem between the controller and the switch must be solved, and a technique to detect attacks that malfunction by manipulating configuration information are needed.

  • PDF

Topology Aggregation for Hierarchical Wireless Tactical Networks

  • Pak, Woo-Guil;Choi, Young-June
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.344-358
    • /
    • 2011
  • Wireless tactical network (WTN) is the most important present-day technology enabling modern network centric warfare. It inherits many features from WMNs, since the WTN is based on existing wireless mesh networks (WMNs). However, it also has distinctive characteristics, such as hierarchical structures and tight QoS (Quality-of-Service) requirements. Little research has been conducted on hierarchical protocols to support various QoS in WMN. We require new protocols specifically optimized for WTNs. Control packets are generally required to find paths and reserve resources for QoS requirements, so data throughput is not degraded due to overhead. The fundamental solution is to adopt topology aggregation, in which a low tier node aggregates and simplifies the topology information and delivers it to a high tier node. The overhead from control packet exchange can be reduced greatly due to decreased information size. Although topology aggregation is effective for low overhead, it also causes the inaccuracy of topology information; thus, incurring low QoS support capability. Therefore, we need a new topology aggregation algorithm to achieve high accuracy. In this paper, we propose a new aggregation algorithm based on star topology. Noting the hierarchical characteristics in military and hierarchical networks, star topology aggregation can be used effectively. Our algorithm uses a limited number of bypasses to increase the exactness of the star topology aggregation. It adjusts topology parameters whenever it adds a bypass. Consequently, the result is highly accurate and has low computational complexity.

A Survey on Transport Protocols for Wireless Multimedia Sensor Networks

  • Costa, Daniel G.;Guedes, Luiz Affonso
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.241-269
    • /
    • 2012
  • Wireless networks composed of multimedia-enabled resource-constrained sensor nodes have enriched a large set of monitoring sensing applications. In such communication scenario, however, new challenges in data transmission and energy-efficiency have arisen due to the stringent requirements of those sensor networks. Generally, congested nodes may deplete the energy of the active congested paths toward the sink and incur in undesired communication delay and packet dropping, while bit errors during transmission may negatively impact the end-to-end quality of the received data. Many approaches have been proposed to face congestion and provide reliable communications in wireless sensor networks, usually employing some transport protocol that address one or both of these issues. Nevertheless, due to the unique characteristics of multimedia-based wireless sensor networks, notably minimum bandwidth demand, bounded delay and reduced energy consumption requirement, communication protocols from traditional scalar wireless sensor networks are not suitable for multimedia sensor networks. In the last decade, such requirements have fostered research in adapting existing protocols or proposing new protocols from scratch. We survey the state of the art of transport protocols for wireless multimedia sensor networks, addressing the recent developments and proposed strategies for congestion control and loss recovery. Future research directions are also discussed, outlining the remaining challenges and promising investigation areas.

Algorithm of Holding Time Control Using Delay-Tolerant Packet for Energy-Efficient Transmission (에너지 효율적인 전송을 위한 지연 허용 패킷의 유지시간 제어 알고리즘)

  • Ryu, Seung Min;Choi, Won Seok;Choi, Seong Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.87-94
    • /
    • 2016
  • This paper proposes an energy transmission method to maximize energy efficiency of a based station. This method makes use of classification of service type to solve an inefficient use of transmission power, which is from exponential relationship between the legacy data throughput and transmission power. The proposed one is a way to find the most energy-efficiency points with the transmitted optimal amount of data on users in a base station of wireless network environment. For this, we propose EETA (Energy-Efficient Transmission Algorithm) which can control the amount of data and the holding time at the base station. As a result, the proposed method can improve the energy efficiency of about 10% compared to the legacy base station.

Effective Performance Evaluation of IEEE 802.11 WLAN DCF Under Normal Conditions (IEEE 802.11 무선랜 DCF의 정상상태에서의 효과적인 성능 분석)

  • Lee, Kye-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.261-266
    • /
    • 2009
  • We analyze the performances of the DCF, which is the medium access control protocol of IEEE 802.11 WLAN, assuming normal traffic condition. There have been much less research efforts under the normal condition than those under the saturated one. This paper proposes an analytical method of approximating the transmission attempt rate under normal condition as proportional to that under saturated condition. In result, we show that we can obtain the transmission attempt rate and the packet collision probability which quickly converge using iterative computations of relatively simple equations, and using these results we derive the network throughput and medium access delay. Numerical results show that our method is much less complex than those based on the Markov Chain while it can predict the performances quite accurately.