• Title/Summary/Keyword: Link Layer Protocol

Search Result 140, Processing Time 0.027 seconds

Transmission of Efficient WAP Packet Using Turbo Code Scheme in Wireless Network (무선 네트워크에서 터보 코드 기법을 적용한 효율적인 WAP 패킷 전송)

  • Moon, Il-Young;Ye, Hwi-Jin;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.1
    • /
    • pp.1-6
    • /
    • 2006
  • In this paper, we have analyzed transmission time for WAP over CDMA using turbo code scheme. In order for SAR to improve the transfer capability, the transmission of messages have been simulated using a fragmentation that begins with the total package and incremental fragmentation for each layer using the WTP to define the resultant packet size and the level of fragmentation for each proceeding layer. This turbo code scheme decreases transmission time of RLP baseband packets by sending packets. From the results, we were able to obtain packet transmission time and optimal WTP packet size for WAP over CDMA in a Rician fading channel.

  • PDF

A Reputation based Cooperative Routing Scheme for End-to-End Reliable Communications in Multi-hop Wireless Networks (다중 홉 무선 네트워크에서 종단 간 신뢰성 통신을 위한 평판 기반의 협력적 라우팅 기법)

  • Kim, Tae-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1593-1608
    • /
    • 2009
  • If a certain relay node in multi-hop wireless networks might become a malicious node that does not cooperate with other nodes or a selfish node, network throughput will be dramatically decreased. Most of existing ad hoc routing protocols assuming that the nodes will fully cooperate with other nodes do not resolve the problem of network performance degradation due to malicious and selfish nodes. This paper presents the CARE (Cooperative Ad hoc routing protocol based REputation) scheme incorporating the reputation management that can achieve a multi-hop wireless network with high throughput performance. The proposed scheme provides the horizontal cross-layer approach which can identify misbehaving malicious, selfish nodes dropped out of the hop-by-hop based packet processing in the network and then set up an optimal packet routing path that will detour misbehaving nodes. And the vertical cross-layer approach contained in the CARE scheme attempts to improve the quality of routing paths by exploiting the quality of link information received from the MAC layer. Besides, it provides high TCP throughput by exploiting the reputation values of nodes acquired from the network layer into the transport layer. A case study on experiments and simulations shows that the CARE scheme incorporating vertical and horizontal cross-layer approaches yields better performance in terms of the low rate of packet loss, fast average packet delivery time, and high TCP throughput between end-to-end nodes.

  • PDF

A SES Alarmed Link Encryption Synchronization Method Having Optimized Threshold Value for High-Speed Video Data Encryption

  • Kim, Hyeong-Rag;Lee, Hoon-Jae;Kim, Ki-Hwan;Jung, Ju-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.57-64
    • /
    • 2017
  • CCSDS Standard is widely used in the international space telecommunication area. But standard recommendation of CCSDS is not restrictive, so, we can select an appropriate encryption protocol among the layer. For synchronization, encryption sync is attached in the beginning of the encrypted data. In the exceptional environmental condition, although the receiver can not decrypt the normal data, the sender have no conception of that situation. In this paper, we propose a two-stage SES alarmed link encryption synchronization method having optimized threshold value necessary to decide whether the receiver has a correct decryption or not. first, through the experiment of mutual relations between error rate and encryption synchronization detection error, we can predict worst communication environment for the selected encryption synchronization pattern. second, through the experiment for finding what number of consecutive frame synchronization error is an appropriate reference value and analysis of that experiment, we suggest an optimized threshold value for resynchronization request. lastly, through the output images we can predict the probability error that should be guaranteed by channel coder.

TSPEC Estimation Scheme Considering Random Loss for WiMedia UWB MAC (WiMedia UWB MAC에서의 무선 구간 손실을 고려한 TSPEC 추정 방안)

  • Kim, Jae-Wan;Lee, Hyun-Jeong;Huh, Jae-Doo;Lee, Sung-Chang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.9
    • /
    • pp.20-29
    • /
    • 2008
  • WLP(WiMedia Logical link control Protocol) is a protocol to support IP services on the WiMedia UWB platform. It defines that DRP needs to be employed using TSPEC parameters when the packets from upper layer transmit with QoS. However, there is no appropriate means to provide QoS when the TSPEC of the traffic is unknown. In this paper, we propose TSPEC estimation scheme to provide QoS for such unknown applications by monitoring the traffic in realtime. Also, the scheme to estimate the effective TSPEC is proposed that compensate the packet losses in the wireless environment to provide the required QoS. The performances of the proposed TSPEC estimation schemes are evaluate by simulation assuming random wireless packet loss and 1mm-ACK mechanism.

Ethernet with Virtual Polling Algorithm for real-Time Industrial Communication Network (실시간 산업용 네트워크를 위한 가상 폴링 기반 이더넷 구현)

  • Kim, T. J.;Lee, K. C;Lee, S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.602-605
    • /
    • 2001
  • This paper focus on a method to use Ethernet Network for Industrial Communication Network. Ethernet use the CSMA/CD MAC(Medium Access Control) Protocol at the Data-Link Layer, Which isn't suit for Industrial Communication Network requiring Real-Time Communication, periodic data processing, critical data processing characteristics. In this paper we proposed the Virtual Polling Algorithm at the Application Layer will be solution of using the Ethernet Network for the Industrial Communication Network, Proposed Algorithm terminate the Collision in the network thus Delay Time is reduced and Real-Time Communication will be implemented.

  • PDF

SR-ARQ Retramsission Persistence Management to Avoid TCP Spurious Timeout in a Wireless Environment (무선 환경에서 TCP 스퓨리어스 타임아웃 방지를 위한 SR-ARQ 재전송 지속성 관리 방안)

  • Kim, Beom-Joon;Han, Je-Chan
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.451-458
    • /
    • 2010
  • To detect and recover packet losses over wireless links is very important in terms of reliability in packet transmission. Most wireless communication systems adopt an automatic repeat request (ARQ) protocol operating at link layer. However, it has been constantly addressed that the interaction not harmonized sufficiently between ARQ and TCP rather degrades TCP performance. In this paper, therefore, we propose an improved scheme from the aspect of the interaction with TCP loss recovery mechanism that can be applied to selective repeat ARQ (SR-ARQ) protocol and prove that the proposed scheme improves TCP performance significantly by OPNET simulations.

The Performance Evaluation for PHY-LINK Data Transfer using SPI-4.2 (SPI-4.2 프로토콜을 사용한 PHY-LINK 계층간의 데이터 전송 성능평가)

  • 박노식;손승일;최익성;이범철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.577-585
    • /
    • 2004
  • System Packet Interface Level 4 Phase(SPI-4.2) is an interface for packet and cell transfer between a physical layer(PHY) device and a link layer device, for aggregate bandwidths of OC-192 ATM and Packet Over Sonet/SDH(POS), as well as 10Gbps Ethernet applications. In this paper, we performs the research for SPI-4.2. Also we analyze the performance of SPI-4.2 interface module after modeling using C programming language. This paper shows that SPI-4.2 interface module with 512-word FIFO depth is able to be adapted for the offered loads to 97% in random uniform traffic and 94% in bursty traffic with bursty length 32. SPI-4.2 interface module can experience an performance degradation due to heavy overhead when it massively receives small size packets less than 14-byte. SPI-4.2 interface module is suited for line cards in gigabit/terabit routers, and optical cross-connect switches, and SONET/SDH-based transmission systems.

Development of TDMA-Based Protocol for Safety Networks in Nuclear Power Plants (원전 안전통신망을 위한 TDMA 기반의 프로토콜 개발)

  • Kim, Dong-Hoon;Park, Sung-Woo;Kim, Jung-Hun
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.7
    • /
    • pp.303-312
    • /
    • 2006
  • This paper proposes the architecture and protocol of a data communication network for the safety system in nuclear power plants. First, we establish four design criteria with respect to determinability, reliability, separation and isolation, and verification/validation. Next we construct the architecture of the safety network for the following systems: PPS (Plant Protection System), ESF-CCS (Engineered Safety Features-Component Control System) and CPCS (Core Protection Calculator System). The safety network consists of 12 sub-networks and takes the form of a hierarchical star. Among 163 communication nodes are about 1600 origin-destination (OD) pairs created on their traffic demands. The OD pairs are allowed to exchange data only during the pre-assigned time slots. Finally, the communication protocol is designed in consideration of design factors for the safety network. The design factors include a network topology of star, fiber-optic transmission media, synchronous data transfer mode, point-to-point link configuration, and a periodic transmission schedule etc. The resulting protocol is the modification of IEEE 802.15.4 (LR-WPAN) MAC combined with IEEE 802.3 (Fast Ethernet) PHY. The MAC layer of IEEE 802.15.4 is simplified by eliminating some unnecessary (unctions. Most importantly, the optional TDMA-like scheme called the guaranteed time slot (GTS) is changed to be mandatory to guarantee the periodic data transfer. The proposed protocol is formally specified using the SDL. By performing simulations and validations using Telelogic Tau SDL Suite, we find that the proposed safety protocol fits well with the characteristics and the requirements of the safety system in nuclear power plants.

Link Adaptive MAC protocol for Wi-Fi (Wi-Fi 네트워크를 위한 매체적응 MAC 프로토콜)

  • Kim, Byung-Seo;Han, Se-Won;Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.69-74
    • /
    • 2009
  • A novel protocol is proposed to achieve sub-carner-based rate adaptation in OFDM-based wireless systems. The protocol requires the addition of one OFDM symbol to the Clear-to-Send (CTS) packet defined in the IEEE 802.11 standard_ When receiving a Ready-To-Send (RTS) packet, the receiver determines the number of bits to be allocated in each sub-carrier through channel estimation. This decision is delivered to the sender using an additional OFDM symbol. That is, bit-allocation over sub-carriers is achieved using only one additional OFDM symbol. The protocol also provides an error recovery process to synchronize the bit-allocation information between the sender and receiver. The protocol enhances the channel efficiency in spite of the overhead of one additional OFDM symbol.

  • PDF

Performance Evaluation of the new AODV Routing Protocol with Cross-Layer Design Approach (교차 계층 설계 기법을 사용한 새로운 AODV 라우팅 프로토콜 설계 및 성능평가)

  • Jang, Jaeshin;Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.768-777
    • /
    • 2020
  • In this paper, we describe recent research results on AODV routing protocol, which is widely deployed at mobile ad hoc networks, and AODV related routing protocols with multi-path routing schemes. We suggest the critical problems which minimum hop routing schemes have, such as AODV routing protocol, and then, propose a new C-AODV routing protocol with two routing metrics: the primary metric is the hop count, the secondary metric is the sum of link delay times. We implemented C-AODV protocol by modifying AODV at the NS-3, and thus, elaborate on how we change the original AODV source code of NS-3 in order to implement the C-AODV scheme. We show numerical comparison of C-AODV scheme with the original AODV scheme and then, discuss how much the C-AODV enhances routing performance over AODV protocol. In conclusion, we present future research items.