• 제목/요약/키워드: MAC(Media Access Control) protocol

검색결과 104건 처리시간 0.031초

Distributed Medium Access Control for N-Screen Multicast Services in Home Networks

  • Hur, Kyeong
    • 한국멀티미디어학회논문지
    • /
    • 제19권3호
    • /
    • pp.567-572
    • /
    • 2016
  • N-screen is an emerging technology to support multimedia multicasting, content sharing and content mobility. N-screen service providers should obtain the technology that provides the highest quality content seamlessly. Distributed nature of WiMedia distributed-MAC protocol can provide full mobility support, and achieves seamless medium access method in contrast to IEEE 802.15.3. So, in this paper, WiMedia distributed-MAC protocol is adopted and an asynchronous multicast transmission (AMT) technology is proposed to enhance performance of seamless N-screen wireless service based on distributed-MAC. The ACK frame transmissions are not required for multicast transmissions. By using this property in AMT, if a device is a multicast receiver, its reserved time slots can be reserved by the other devices with 1-hop distance. Furthermore, each N-screen device broadcasts and shares the information including an order in asynchronous traffic reservations to reduce conflicts in determining the transmission order of asynchronous N-screen packets. Therefore, AMT scheme expands the number of time slots available and throughputs for multicast and asynchronous traffic reservations when comparing with the distributed-MAC standard system. N-screen communications based on distributed-MAC with the proposed AMT shows a new framework for realizing N-screen wireless service with the full content mobility.

사물인터넷 환경을 위한 IEEE 802.15.4 프로토콜 모델링과 최적화 방안 (Modeling and Optimization of the IEEE 802.15.4 Protocol for Internet of Things)

  • 김태석
    • 한국콘텐츠학회논문지
    • /
    • 제16권10호
    • /
    • pp.299-310
    • /
    • 2016
  • 본 논문에서는 사물인터넷 환경에서 사용되는 저전력 통신 기술인 IEEE 802.15.4 MAC (Media Access Control) 프로토콜의 성능 분석을 수행한다. 사물인터넷 환경에서는 기기 종류가 다양하고 생성되는 트래픽 특성도 상이하기 때문에 기존 연구와는 달리 트래픽이 혼재되어 있는 heterogeneous traffic 환경을 고려한다. 마코프 체인을 통해 프로토콜의 성능을 MAC 파라미터의 함수로 도출하였고 이를 기반으로, 사용되고 있는 애플리케이션을 위한 에너지 효율적인 최적 MAC 파라미터를 실시간으로 찾는 프레임워크를 설계하였다. 제안 방식은 기존의 파라미터를 고정시켜 운용하는 방법 대비 에너지 이득이 있음을 애플리케이션 시나리오별 비교를 통해 보였고, 제안된 프레임워크가 연산 능력의 한계를 가지는 소형 기기에서도 충분히 사용될 수 있음을 정확도와 속도 측면에서 검증하였다.

A Packet-Based Channel Access Scheme in Wireless ATM Network

  • Ryu Jung-pil;Lee Byeong-jik;Lee Ick-soo;Ha Nam-koo;Noh Jae-hwan;Han Ki-Jun
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 ICEIC The International Conference on Electronics Informations and Communications
    • /
    • pp.165-169
    • /
    • 2004
  • This paper proposes a packet-based channel access scheme in Distributed-Queuing Request Update Multiple Access(DQRUMA) MAC(Media Access Control) protocol. To increase a channel access ratio, we eliminate the wait-to-transmit state that does not transmit Xmt_Req(Transmission Request) although the mobile terminal(MS) has new arrival packets in buffer.

  • PDF

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • 제15권1호
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.

Adaptive Range-Based Collision Avoidance MAC Protocol in Wireless Full-duplex Ad Hoc Networks

  • Song, Yu;Qi, Wangdong;Cheng, Wenchi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3000-3022
    • /
    • 2019
  • Full-duplex (FD) technologies enable wireless nodes to simultaneously transmit and receive signal using the same frequency-band. The FD modes could improve their physical layer throughputs. However, in the wireless ad hoc networks, the FD communications also produce new interference risks. On the one hand, the interference ranges (IRs) of the nodes are enlarged when they work in the FD mode. On the other hand, for each FD pair, the FD communication may cause the potential hidden terminal problems to appear around the both sides. In this paper, to avoid the interference risks, we first model the IR of each node when it works in the FD mode, and then analyze the conditions to be satisfied among the transmission ranges (TRs), carrier-sensing ranges (CSRs), and IRs of the FD pair. Furthermore, in the media access control (MAC) layer, we propose a specific method and protocol for collision avoidance. Based on the modified Omnet++ simulator, we conduct the simulations to validate and evaluate the proposed FD MAC protocol, showing that it can reduce the collisions effectively. When the hidden terminal problem is serious, compared with the existing typical FD MAC protocol, our protocol can increase the system throughput by 80%~90%.

항공용 이동 무선 데이터 통신에 적합한 매체접속제어 프로토콜에 관한 연구 (A study on the MAC protocol for an aeronautical mobile data communication)

  • 이은주;박효달
    • 한국통신학회논문지
    • /
    • 제22권11호
    • /
    • pp.2604-2612
    • /
    • 1997
  • 현재 항공기에서 사용중인 ACARS의 항공기국과 지상 통신국 사이의 MAC 프로토콜인 CSMA는 고정 터미날 라디오 통신이나 유선 LAN에서는 적합하지만 무선 이동 라디오 환경에는 부적합한 면이 있다. 본 논문에서는 이 문제의 해결을 위해 제안된 ICMA/CD를 살펴보고 이를 개선하기 위하여 별도의 제어 채널을 두지 않고 제어 신호를 메세지 신호에 삽입시키는 변형된 ICMA/CD를 제한하고 이의 성능을 분석한 후 시뮬레이션을 통해 검증하였다. 결과적으로 변형된 ICMA/CD는 CSMA의 성능을 저하시키는 잠복 터미날 문제를 해결하는것과 동시에 ICMA/CD의 성능을 저하시키는 패킷 감지 지연 시간이 제거되므로 유선통신에서 사용되는 CSMA/CD와 같은 좋은 채널 효율을 얻을 수 있다는 결론을 얻었다. 따라서, 이 결과는 변형된 ICMA/CD 프로토콜이 항공통신에서 사용하기에 적합하다는 것을 보여준다.

  • PDF

항공 감시용 다중접속방식 프로토콜 시뮬레이션 프로그램 설계 (The Design of STDMA(Self-Organized Time Division Multiple Access) Protocol Simulation Program)

  • 김인규;오경륜;송재훈
    • 한국항행학회논문지
    • /
    • 제12권6호
    • /
    • pp.554-558
    • /
    • 2008
  • 본 논문에서는 현재에 항공감시 통신링크로 사용되는 다중접속방식인 STDMA(Self -organized Time Division Multiple Access) 통신 프로토콜이 ICAO 규격에 따라 설계하였다. 다중접속방식 통신프로토콜은 감시데이터링크 시스템의 MAC 영역에서 사용된다. 통신시뮬레이션 프로그램을 이용하여 다중접속방식 프로토콜을 ICAO 규격서 제시된 순서에 맞게 프로그램을 구현하였고, 시뮬레이션 결과를 통해 확인하였다. 데이터 전송시 보고율에 따라서 슬롯할당과 예약이 발생되고, 슬롯 번지수도 계산되었다.

  • PDF

B-MAC통신 프로토콜에서 보안 리뷰 (Security Review of B-MAC Communication Protocol)

  • 홍진근
    • 디지털융복합연구
    • /
    • 제11권12호
    • /
    • pp.447-452
    • /
    • 2013
  • B-MAC 프로토콜은 WSN을 위해 설계된 적용적인 프리엠블 샘플링 기법을 사용하는 잘 알려진 MAC 프로토콜이다. 이 논문에서 우리는 B-MAC 보안 취약성에 관해 살펴보았으며, 슬립 거부 공격의 취약성과 재연공격 문제에 따른 B-MAC 프로토콜의 각 단계에 소비되는 전력을 분석하였다. 연구결과로부터 일반적인 B-MAC 통신을 위한 신뢰성, 효율성, 보안을 제공하는 전력에 효율적인 인증 기법의 필요성에 대해 고찰하였다. 이 연구는 B-MAC에서 전력소비와 가능한 서비스 거부 공격 취약점에 대한 사례연구이다.

스패닝 트리 프로토콜을 이용한 브릿지 시뮬레이션 (A Simulation of Bridge using the Spanning Tree Protocol)

  • 이숙영;이은화;이미정;채기준;최길영;강훈
    • 한국시뮬레이션학회논문지
    • /
    • 제6권2호
    • /
    • pp.45-57
    • /
    • 1997
  • MAC (media access control) bridge is used to interconnect separate LANs and to relay frames between the BLANs (bridged LANs). Bridge architecture consists of MAC entity, MAC relay entity and bridge protocol entity protocol entity and performs learning, filtering and forwarding functions using filtering database. In this paper, we simulate these functions of bridge and the STP (spanning tree protocol). The STP derives an active topology from an arbitrarily connected BLAN. Our simulation model assumes a BLAN consisted of three bridge forming a closed loop. In order to remove the loop, each bridge process exchanges configruation BPDU (bridge protocol data unit0 with other bridge processes connected to the bridge itself. To simulate the communication between bridges, we implement the IPC (inter-process communication) server using message queues. Our simulation results show that the assumed BLAN contains no closed loop and then there is no alternative route and no unnecessary traffic.

  • PDF

무선 근거리 통신망에서의 BRAM(The Broadcast Recognizing Access Method) 프로토콜 성능 분석 (Performance Analysis of a BRAM (The Broadcast Recognizing Aceess Method) Protocol in a Wireless LAN)

  • 김재현;이종규
    • 전자공학회논문지A
    • /
    • 제31A권1호
    • /
    • pp.1-8
    • /
    • 1994
  • In this paper, we have analyzed the performance of a BRAM (The Broadcasting Recognizing Access Method) protocol, as a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) scheme, which is widely used in wireles LAN systems. We have selected a Fair BRAM protocol among CSMA/CA schemes, considering the fairness of channel usage and the simplicity of the protocol. We have compared the performance of BRAM protocol to that of CSMA/CD. to research the characteristics of BRAM in wireless LAN system. In order to analyze the performance of this system, we have set up an imbedded Markov chain and calculated state transition probabilities. Then we have calculated steady state probabilities and finally derived the throughput of a Fair BRAM moder. To verify our analysis, we have simulated practical models. Then, we have found that analytic results are very close to simulation ones. Our analysis of the BRAM protocol will be expected to be very helpful to design and evaluate a MAC (Media Access Control) protocol in wireless LAN systems.

  • PDF