• Title/Summary/Keyword: IEEE 802.6

Search Result 496, Processing Time 0.024 seconds

Unified Model for Performance Analysis of IEEE 802.11 Ad Hoc Networks in Unsaturated Conditions

  • Xu, Changchun;Gao, Jingdong;Xu, Yanyi;He, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.683-701
    • /
    • 2012
  • IEEE 802.11 standard has achieved huge success in the past decade and is still under development to provide higher physical data rate and better quality of service (QoS). An important problem for the development and optimization of IEEE 802.11 networks is the modeling of the MAC layer channel access protocol. Although there are already many theoretic analysis for the 802.11 MAC protocol in the literature, most of the models focus on the saturated traffic and assume infinite buffer at the MAC layer. In this paper we develop a unified analytical model for IEEE 802.11 MAC protocol in ad hoc networks. The impacts of channel access parameters, traffic rate and buffer size at the MAC layer are modeled with the assistance of a generalized Markov chain and an M/G/1/K queue model. The performance of throughput, packet delivery delay and dropping probability can be achieved. Extensive simulations show the analytical model is highly accurate. From the analytical model it is shown that for practical buffer configuration (e.g. buffer size larger than one), we can maximize the total throughput and reduce the packet blocking probability (due to limited buffer size) and the average queuing delay to zero by effectively controlling the offered load. The average MAC layer service delay as well as its standard deviation, is also much lower than that in saturated conditions and has an upper bound. It is also observed that the optimal load is very close to the maximum achievable throughput regardless of the number of stations or buffer size. Moreover, the model is scalable for performance analysis of 802.11e in unsaturated conditions and 802.11 ad hoc networks with heterogenous traffic flows.

Design of a UWB Antenna with Hexagonal Slot (육각 슬롯 구조를 가진 UWB 안테나 설계)

  • Ahn, Sang-Chul;Kim, Yong-Hee;Jung, Hoon;Jung, Chun-Suk
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.3
    • /
    • pp.336-342
    • /
    • 2008
  • This paper suggests a CPW-fed UWB antenna with new hexagonal slot. To increase the impedance bandwidth of an antenna, the proposed antenna is designed with the hexagonal patch. Polygonal slot is inserted in the hexagonal patch to avoid interference with IEEE 802.11a. The proposed antenna was fabricated on FR-4 substrate with a relative dielectric constant 4.7 and thickness of 1.6 mm and measured for VSWR Characteristic and group delay. The fabricated antenna shows that the gain flatness is 4 dBi except at the band for IEEE 802.11a.

Call Admission Control SRN Modeling of IEEE 802.16e (IEEE 802.16e의 호 수락 제어 SRN 모델링)

  • Kim, Kyung-Min;Ro, Chul-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.355-358
    • /
    • 2007
  • In wireless mobile communication systems, priority of voice service through high speed data and multimedia transmission requires increased service diversification. Research is being carried out in this environment, on the call admission control techniques to guarantee the diversified service's QoS. SRN (Stochastic Reward Net) is an extended version of Petri nets, well know modeling and analysis tool. In this paper, we develop SRN call admission control model considering the 4 classes of services in the 4th generation IEE 802.16e mobile communication Technology.

  • PDF

Selective Unacknowledged Transmission in IEEE 802.15.4 Considering Energy Efficiency (IEEE 802.15.4에서 에너지 효율성을 고려한 선택적 Unacknowledged 전송)

  • Yang, Hyun;Park, Tan-Se;Park, Chang-Yun;Jung, Chung-Il
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.717-721
    • /
    • 2010
  • In general, wireless MAC uses the ACK for reliability. Meanwhile, in wireless sensor network, data is delivered periodically and redundantly. In these situations, every ACK transmission causes the reliability flexible applications to waste some energy. IEEE 802.15.4 developed for energy efficiency has the option of using ACK or not, but there are no researches exploiting this peculiarity. In this paper, we proposed the selective unacknowledged transmission satisfying some requirements (e.g., end-to-end delivery) by removing the ACK when frames are delivered well and using the ACK when frames are delivered poorly. Also, we performed several evaluations exploiting the NS2 simulator.

Improving the Reliability of IEEE 802.11s Based Wireless Mesh Networks for Smart Grid Systems

  • Kim, Jaebeom;Kim, Dabin;Lim, Keun-Woo;Ko, Young-Bae;Lee, Sang-Youm
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.629-639
    • /
    • 2012
  • A challenge faced by smart grid systems is providing highly reliable transmissions to better serve different types of electrical applications and improve the energy efficiency of the system. Although wireless networking technologies can provide high-speed and cost-effective solutions, their performance may be impaired by various factors that affect the reliability of smart grid networks. Here, we first suggest the use of IEEE 802.11s-based wireless LAN mesh networks as high-speed wireless backbone networks for smart grid infrastructure to provide high scalability and flexibility while ensuring low installation and management costs. Thereafter, we analyze some vital problems of the IEEE 802.11s default routing protocol (named hybrid wireless mesh protocol; HWMP) from the perspective of transfer reliability, and propose appropriate solutions with a new routing method called HWMP-reliability enhancement to improve the routing reliability of 802.11s-based smart grid mesh networking. A simulation study using ns-3 was conducted to demonstrate the superiority of the proposed schemes.

Enhanced Power Saving Mechanism for Type I and Type II Power Saving Classes in IEEE802.16e (IEEE 802.16e의 절전 클래스 I형과 II형을 위한 강화된 절전 메커니즘)

  • Go, Kwang-Sub;LEE, Kyung-Hye;Mun, Young-Song
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.7
    • /
    • pp.6-11
    • /
    • 2012
  • A mobile station(MS) in an 802.16e network manages its limited energy using the sleep mode operation. An MS can power down its physical operation components during the unavailability interval of the sleep mode. To reduce energy consumption by increasing the unavailability interval, this paper proposes an enhanced power saving mechanism(ePSM) when both activated Type I and Type II power saving classes(PSCs) exist in an MS. A performance evaluation confirms that ePSM results in the improved performance in terms of the unavailability interval as well as the energy consumption than conventional schemes.

Spatial Reuse in IEEE 802.11ax: Whether and How to Use in Practice

  • Zhu, Deqing;Luan, Shenji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4617-4632
    • /
    • 2021
  • IEEE 802.11ax is a protocol being developed for high-density Wireless Local Area Networks (WLAN). Several algorithms have been proposed to improve the level of spatial reuse applied in IEEE 802.11ax. However, these algorithms are tentative and do not specify how to select the transmit power and carrier sense threshold in practice; It is unclear when and why the tuned parameters lead to better network performance. In this paper, we restricted the scale of transmit power tuning to prevent the case of backfire in which spatial reuse will result in transmission failure. If the restrictions cannot be satisfied, spatial reuse will be abandoned. This is why we named the proposed scheme as Arbitration based Spatial Reuse (ASR). We quantified the network performance after spatial reuse, and formulate a corresponding maximum problem whose solution is the optimal carrier sense threshold and transmit power. We verified our theoretical analysis by simulation and compared it with previous studies, and the results show that ASR improves the throughput up to 8.6% compared with 802.11ax. ASR can avoid failure of spatial reuse, while the spatial reuse failure rate of existing schemes can up to 36%. To use the ASR scheme in practice, we investigate the relation between the optimal carrier sense threshold and transmit power. Based on the relations got from ASR, the proposed Relation based Spatial Reuse (RSR) scheme can get a satisfactory performance by using only the interference perceived and the previously found relations.

Load-based Dynamic Backoff Algorithm in Contention-based Wireless Shared Medium (단일 경쟁 매체에서의 새로운 로드 기반 동적 매체 접속 제어 백오프 알고리즘)

  • Seo Chang-Keun;Wang Weidong;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.406-415
    • /
    • 2005
  • The standards which use shared medium like IEEE 802.11 wireless LAN have transmission opportunity by contention in contention period. If there are collisions in contention period, medium access control protocol may solve problem by using backoff algorithm. Backoff algorithm is important part in medium access control, but legacy backoff method which is used under IEEE 802.11 standards is not adjusted when load is heavy because of increasing collisions. In this paper, we propose a new load-based dynamic backoff algorithm in contention-based wireless shared medium to improve throughput of medium and to reduce the number of collisions. Proposed backoff algorithm can increase the network utilization about $20\%$ higher than that of binary exponential backoff algorithm.

Neighbor List Management to enable Fast Scanning and Efficient Handover in IEEE 802.16e-Based Femto-cell Systems (IEEE 802.16e 기반의 펨토셀 시스템에서 빠른 스캐닝 및 효율적인 핸드오버를 위한 이웃 기지국 리스트 관리 기법)

  • Nam, Ji-Hee;Shin, Jung-Chae;Yoon, Cul-Sik;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6A
    • /
    • pp.445-457
    • /
    • 2009
  • Recently, there are growing interests in femto-cell for providing indoor users with various broadband multimedia services more efficiently. The technical issues regarding femto-cell such as interference management, self-organization, and resource allocation are now being intensively studied and investigated by researchers worldwide. In this paper, two novel schemes of neighboring cell list(NCL) management are proposed for the IEEE 802.16e system where a macro-cell and huge number of femto-cells coexist. The proposed schemes, named MS location-based neighboring cell list management and BS type-based neighboring cell list management, enable a mobile station(MS) to perform fast scanning and efficient handover by means of preselecting the candidate target femto-cells with high possibility for handover. The simulation result shows that the proposed schemes improve the MS's handover-related performance in terms of scanning power and scanning time compared with the conventional managements scheme of IEEE 802.16e system.

Secure 6LoWPAN Neighbor Discovery Address Registration Protocol (안전한 6LoWPAN Neighbor Discovery 주소 등록 프로토콜)

  • Han, Sang-woo;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.17-28
    • /
    • 2019
  • 6LoWPAN based on IEEE 802.15.4 is a realistic standard platform for various Internet of Things (IoT) applications. To bootstrap the LoWPAN (Low-power Wireless Personal Area Network), each device must perform 6LoWPAN-ND address registration to assign a unique IPv6 address. Without adequate security mechanisms, 6LoWPAN-ND is vulnerable to a variety of security attacks including corrupted node attacks. Several security mechanisms have been proposed as a supplement to the vulnerability, but the vulnerability exists because it relies solely on IEEE 802.15.4 hop-by-hop security. In this paper, we propose and analyze a vulnerability of 6LoWPAN-ND address registration and a new security mechanism suitable for preventing the attack of damaged node. It also shows that the proposed security mechanism is compatible with the Internet Engineering Task Force (IETF) standard and is more efficient than the mechanism proposed in the IETF 6 lo WG.