• Title/Summary/Keyword: IEEE 802.11ad

Search Result 156, Processing Time 0.031 seconds

A Slot Based Multi-channel MAC Protocol for Wireless Ad hoc Network (무선 애드혹 네트워크에서 슬롯방식을 이용한 멀티채널 MAC 프로토콜)

  • Kim Sung-Chan;Ko Young-Bae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.289-291
    • /
    • 2005
  • 무선 애드혹 네트워크에서 주로 사용되는 IEEE 802.11은 모든 노드가 하나의 채널을 공유하기 때문에 높은 throughput을 기대하기 어렵다. 이러한 문제를 해결하기 위해 여러 채널을 동시에 사용하는 멀티채널 기반의 MAC 프로토콜이 제안되었다. 그러나 기존의 멀티 채널 기반 MAC 프로토콜은 멀티채널을 사용함에도 불구하고 각 노드들이 서로간의 경쟁을 통해 데이터를 전승하기 때문에, 데이터 트래픽이 증가하는 경우 throughput이 급격하게 감소한다. 따라서 본 논문에서는 데이터의 전송시간을 일정한 시간으로 나누어 노드들간의 경쟁을 방지함으로써 throughput을 향상시키는 슬롯 기반의 멀티채널 MAC 프로토콜 (Slotted MMAC)을 제안한다.

  • PDF

Selective Decoding Schemes and Wireless MAC Operating in MIMO Ad Hoc Networks

  • Suleesathira, Raungrong;Aksiripipatkul, Jansilp
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.421-427
    • /
    • 2011
  • Problems encountered in IEEE 802.11 medium access control (MAC) design are interferences from neighboring or hidden nodes and collision from simultaneous transmissions within the same contention floors. This paper presents the selective decoding schemes in MAC protocol for multiple input multiple output ad-hoc networks. It is able to mitigate interferences by using a developed minimum mean-squared error technique. This interference mitigation combined with the maximum likelihood decoding schemes for the Alamouti coding enables the receiver to decode and differentiate the desired data streams from co-channel data streams. As a result, it allows a pair of simultaneous transmissions to the same or different nodes which yields the network utilization increase. Moreover, the presented three decoding schemes and time line operations are optimally selected corresponding to the transmission demand of neighboring nodes to avoid collision. The selection is determined by the number of request to send (RTS) packets and the type of clear to send packets. Both theoretical channel capacity and simulation results show that the proposed selective decoding scheme MAC protocol outperforms the mitigation interference using multiple antennas and the parallel RTS processing protocols for the cases of (1) single data stream and (2) two independent data streams which are simultaneously transmitted by two independent transmitters.

Dynamic Multi-Rate Routing Sub-Layer for Mobile Ad hoc Networks (모바일 애드 혹 네트워크에서의 동적 다중전송속도 경로 배정 알고리즘)

  • Nam Yong-Sub;Choi Nak-Jung;Ryu Ji-Ho;Kwon Tae-Kyoung;Choi Yang-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.115-117
    • /
    • 2006
  • IEEE 802.11 표준은 채널 상태에 따라 다양한 전송 속도를 지원하며, 무선랜 환경에서 이러한 특성을 활용하는 연구들이 진행되어 왔다. 그러나, 모바일 애드 혹 네트워크 환경에서 다중전송속도를 활용하는 연구는 거의 이루어지지 않았다. 본 논문은 모바일 애드 혹 네트워크에서 동적으로 다중전송속도를 활용하여 채널 효율을 높이는 알고리즘을 제안한다. 제안 기법은 MAC 계층과 네트워크 계층 중간에 위치하며 각 계층에 독립적으로 동작한다. 라우팅 프로토콜에서 결정한 다음 홉에 더불어, 제안 기법은 더 빠른 전송 속도를 갖는 중계 경로를 탐색한다. 또한, 패킷의 크기에 따라 경쟁 부하를 고려하여 선택적으로 전송 경로를 변경한다. 모의 실험을 통한 성능 평가는 제안 기법의 우수한 성능을 입증한다.

  • PDF

A Study on Control Scheme for Media Access in Wireless Sensor Network (무선 센서 네트워크를 위한 미디어 엑세스 처리에 관한 연구)

  • Yun, Jung-Mee;Kim, Dae-Hwan;Park, Jin-Hee;Kim, Yong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.705-708
    • /
    • 2003
  • 본 논문에서는 무선 센서 네트워크의 특성을 고려한 미디어제어 프로토콜의 설계에 있어서의 고려사항 및 설계기법에 대해서 제안하고 있다. 무선 센서 네트워크는 제한된 에너지를 가지는 배터리를 에너지원으로 사용하는 센싱 디바이스들로 구성되어 있으며, 이러한 디바이스들로 구성된 네트워크는 하나 혹은 그 이상의 공통의 작업을 수행하는데 그 목적이 있다. 일반적으로 무선 센서네트워크는 ad hoc 헝태의 구조를 가지며, 각각의 노드들은 장시간동안 비활성화 상태에 머무르게 되며, 센싱을 하기 위한 특정 이벤트가 발생하였을 때만 활성 상태로 전이하게 된다. 이와 같은 센서 네트워크의 특성은 IEEE802.11 과 같은 기존의 무선 미디어 제어 프로토콜과는 차별성을 띄게 된다. 센서 네트워크는 노드별 미디어 접근 공정성이나 시간지연보다는 에너지절약과 위상자동설정에 더 중점을 두고 있기 때문에 이에 적합한 미디어 제어 기술이 필요한 것이다. 본 고에서는 에너지 소모를 최소화하고 위상 자동 설정을 지원하기 위한 3 가지의 기법들에 대해서 제안하고자 한다. 첫째로 이벤트 발생 여부에 따른 노드의 신호감지 및 Sleep 상태 전이 및 이웃 노드들과의 가상동기화기법을 이용한 에너지 절약 기법에 대해서 제안하고, 충돌회피 기법에 대해서 살펴보도록 하겠다.

  • PDF

Simulation and measurement: Feasibility study of Tactile Internet applications for mmWave virtual reality

  • Na, Woongsoo;Dao, Nhu-Ngoc;Kim, Joongheon;Ryu, Eun-Seok;Cho, Sungrae
    • ETRI Journal
    • /
    • v.42 no.2
    • /
    • pp.163-174
    • /
    • 2020
  • Numerous wearable technology companies have recently developed several headmounted display (HMD) products for virtual reality (VR) services. 5G wireless networks aim at providing high-quality 3D multimedia services such as VR, augmented reality, and mixed reality. In this study, we examine the application of millimeter-wave (mmWave) technology to realize low-latency wireless communication between an HMD and its content server. However, the propagation characteristics of mmWave present several challenges such as the deafness, blockage, and beam alignment problems, and interference among content servers. In this study, we focus on an environment that provides VR services in the mmWave band and introduce existing techniques for addressing such challenges. In addition, we employ a commercialized IEEE 802.11ad VR dongle to measure the actual data rate of an mmWave VR application and identify the degree to which the performance deteriorates when the above problems occur. Finally, we verify the feasibility of the proposed solutions through a simulation of several VR scenarios in the mmWave band.

CE-OLSR: a Cartography and Stability Enhanced OLSR for Dynamic MANETs with Obstacles

  • Belghith, Abdelfettah;Belhassen, Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.270-286
    • /
    • 2012
  • In this paper, we propose a novel routing protocol called the Cartography Enhanced OLSR (CE-OLSR) for multi hop mobile ad hoc networks (multi hop MANETs). CE-OLSR is based on an efficient cartography gathering scheme and a stability routing approach. The cartography gathering scheme is non intrusive and uses the exact OLSR reduced signaling traffic, but in a more elegant and efficient way to improve responsiveness to the network dynamics. This cartography is a much richer and accurate view than the mere network topology gathered and used by OLSR. The stability routing approach uses a reduced view of the collected cartography that only includes links not exceeding a certain distance threshold and do not cross obstacles. In urban environments, IEEE 802.11 radio signals undergo severe radio shadowing and fading effects and may be completely obstructed by obstacles such as buildings. Extensive simulations are conducted to study the performances of CE-OLSR and compare them with those of OLSR. We show that CE-OLSR greatly outperforms OLSR in delivering a high percentage of route validity, a much higher throughput and a much lower average delay. In particular the extremely low average delay exacerbated by CE-OLSR makes it a viable candidate for the transport of real time data traffic in multi hop MANETs.

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

A Distributed Dynamic Address Assignment for Tactical Mobile Ad-hoc Networks (전술 MANET에서 그룹 단위 분산된 동적 주소 할당 기법)

  • Park, Mun-Young;Lee, Jong-Kwan;Baek, Ho-Ki;Kim, Du-Hwan;Lim, Jae-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.327-335
    • /
    • 2014
  • In this paper, we propose a group distributed dynamic address assignment scheme suitable for tactical mobile ad hoc networks(MANET). Efficient address assignment is an important issue in the MANET because a node may frequently leave the current network and join another network owing to the mobility of the node. The conventional schemes do not consider the features of the tactical networks: existence of a leader node and network activity on a group basis. Thus, they may not be suitable for military operations. In our proposed scheme, called grouped units dynamic address assignment protocol(G-DAAP), a leader node maintains the address information for the members in the network and any of the nodes can exploit the information for the assignment or request of the IP address by a simple message exchange procedure. This leads to fast address assignment with small overheads. In addition, G-DAAP based on the modified IEEE 802.11e Enhanced Distributed Channel Access(EDCA) can assign addresses more quickly. We describe the delay performance of the G-DAAP and compare it with conventional schemes by numerical analysis and computer simulations. The results show that the G-DAAP significantly improves the delay performance as compared with the conventional schemes.

Analytical Model of Isochronous MAC Protocol for MANET (모바일 애드혹 네트워크를 위한 Isochronous MAC 프로토콜의 분석적 모델 연구)

  • Heo, Ung;Choi, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.2
    • /
    • pp.111-118
    • /
    • 2008
  • In this paper a novel medium access control mechanism is investigated as a means to support real-time services. The primary goal is to provide constant-bit-rate voice call services to pairs of autonomous mobile nodes operating in ad hoc networks. Here, a time-slot reservation based MAC is considered to provide real-time voice calls and a new MAC called the time-slot reservation coordination function(TRCF) is presented. In addition to this isochronous type MAC protocol development, the proposed protocol is modeled using a Markov chain in order to predict its behavior. The performance of TRCF is analytically derived and the performance measures such as average wait time taken for a call connection and throughput are obtained.

Design and Implementation of 60 GHz Wi-Fi for Multi-gigabit Wireless Communications (멀티-기가비트 무선 통신을 위한 60GHz Wi-Fi 설계 및 구현)

  • Yoon, Jung-Min;Jo, Ohyun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.43-49
    • /
    • 2020
  • In spite of the notable advancements of millimeter wave communication technologies, the 60 GHz Wi-Fi is still not widespread yet, mainly due to the high limitation of coverage. Conventionally, it has been hardly possible to support a high data rate with fast beam adaptation while keeping atmospheric beamforming coverage. To solve these challenges in the 60 GHz communication system, holistic system designs are considered. we implemented an enhanced design LDPC decoder enabling 6.72 Gbps coded-throughput with minimal implementation loss, and our proposed phase-tracking algorithm guarantees 3.2 dB performance gain at 1 % PER in the case of 16 QAM modulation and LDPC code-rate 3/4.