• Title/Summary/Keyword: MAC프로토콜

Search Result 793, Processing Time 0.03 seconds

CSMA/CA based Transmission Scheme for QoS Assurance and Energy Efficiency of WPAN Systems (CSMA/CA 경쟁방식 기반의 WPAN 시스템을 위한 QoS 보장 및 에너지 효율적 전송방식)

  • Joo, Yang-Ick;Lee, Yeon-Woo;Jung, Min-A;Jang, Bong-Seog;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3B
    • /
    • pp.135-143
    • /
    • 2008
  • In this paper, we propose a QoS guaranteed and energy-efficient transmission scheme for Wireless Personal Area Networks (WPANs), which operate in conjunction with contention-based access protocols such as CSMA/CA. Energy consumption is one of the most important issues in WPAN systems, because WPAN devices are often required to operate under limited battery capacity. Furthermore, if the WPAN adopts a contention-based medium access protocol, the energy consumption problem becomes even more critical due to the collisions caused by independent channel access trials. Therefore, in this paper, we propose an algorithm that selects the optimum fragment size, modulation level, and transmission power, in order to minimize the energy consumption and guaranteethe QoS (Quality of Service) requirements, simultaneously. Our simulation results show that the proposed algorithm has better performance than the previous ones.

Dynamic Multi-Rate Routing Sub-Layer for Mobile Ad hoc Networks (모바일 애드 혹 네트워크에서의 동적 다중전송속도 경로 배정 알고리즘)

  • Nam Yong-Sub;Choi Nak-Jung;Ryu Ji-Ho;Kwon Tae-Kyoung;Choi Yang-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.115-117
    • /
    • 2006
  • IEEE 802.11 표준은 채널 상태에 따라 다양한 전송 속도를 지원하며, 무선랜 환경에서 이러한 특성을 활용하는 연구들이 진행되어 왔다. 그러나, 모바일 애드 혹 네트워크 환경에서 다중전송속도를 활용하는 연구는 거의 이루어지지 않았다. 본 논문은 모바일 애드 혹 네트워크에서 동적으로 다중전송속도를 활용하여 채널 효율을 높이는 알고리즘을 제안한다. 제안 기법은 MAC 계층과 네트워크 계층 중간에 위치하며 각 계층에 독립적으로 동작한다. 라우팅 프로토콜에서 결정한 다음 홉에 더불어, 제안 기법은 더 빠른 전송 속도를 갖는 중계 경로를 탐색한다. 또한, 패킷의 크기에 따라 경쟁 부하를 고려하여 선택적으로 전송 경로를 변경한다. 모의 실험을 통한 성능 평가는 제안 기법의 우수한 성능을 입증한다.

  • PDF

A Token-Ring-Based MAC Protocol in IEEE 802.11 WLANs (IEEE 802.11 무선 랜에서의 토큰링 기반의 매체 접속 제어 프로토콜)

  • Lee, Eun Guk;Rhee, Seung Hyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.38-40
    • /
    • 2014
  • In this paper, proposed method achieves delay reduction and throughput improvement by utilizing token-ring method in infrastructure network. Access Point gives token passing effect by successively transmitting ACK frame including a node's Association ID. Not only can this method considerably reduce time for medium access, but also improve throughput. Furthermore, AP offers more frequent medium access opportunity to node having highest data queue among nodes associated by AP. these method can evenly offer medium access opportunity according to Queue's volumes.

EPON Bandwidth Allocation Scheme for Improved Utilization (Bandwidth 이용률을 높이기 위한 EPON 대역 할당 기법)

  • 윤춘희;이성창
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.89-94
    • /
    • 2003
  • Passive Optical Network(PON) architecture is a very simple. However media access protocol is necessary to the PON because the ONUs should share a channel in the upsteam direction. We propose the design of dynamic bandwidth allocation algorithm for improved bandwidth utilization in the broad bandwidth access network that uses Ethernet PON. The object of our study shall be to decrease a unused remainder bandwidth of granted timeslot for a upstream traffic transmission. We propose that OLT notifies ONU of maximum transmission window during discovery and ONU request a amount under maximum transmission window after it checks a frame length. We confirm that the proposed algorithm shown improving performance from bandwidth utilization and queueing delay point of view through the simulation result.

Pameter Analysis of IEEE 802.11e EDCF (IEEE 802.11e EDCF의 파라미터 분석)

  • Ko, dong-yub;Park, doo-jin;Lim, seok-ku
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.611-614
    • /
    • 2007
  • The IEEE 802.11 Task Group E has worked to enhance the legacy 802.11 MAC to expand support for applications with QoS requirements. EDCF(Enhanced Distributed Coordination Function) of IEEE 802.11e is enhanced from DCF(Distributed Coordination Function) of 802.11 and It has differential AC(Access Category). In this paper, we change parameters(AIFS, CWmax) and make an analysis of network performance. We use NS-2 to verify change of network performance.

  • PDF

Dynamic Packet Transmission Probability Control Scheme in CDMA S_ALOHA Systems (CDMA S_ALOHA 시스템에서 동적 패킷 전송 확률 제어 기법)

  • 임인택
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7A
    • /
    • pp.485-492
    • /
    • 2003
  • This paper proposes a transmission probability control scheme for guaranteeing fair packet transmissions in CDMA slotted ALOHA system. In CDMA slotted ALOHA system, the packets transmitted in the same slot act as multiple access interference, so that unsuccessful packet transmissions are caused entirely by multiple access interference. Therefore, in order to maximize the system throughput, the number of simultaneously transmitted packets should be kept at a proper level. In the proposed scheme, the base station calculates the packet transmission probability of mobile stations in the next slot according to the offered load and then broadcasts this probability to all the mobile stations. Mobile stations, which have a packet to transmit, attempt to transmit packet with the received probability. Simulation results show that the proposed scheme can offer better system throughput and average delay than the conventional scheme, and guarantee a good fairness among all mobile stations regardless of the offered load.

Throughput Analysis of R-NAD in MIL-STD-188-220 (MIL-STD-188-220의 R-NAD 처리율 분석)

  • Kim, Sangsoo;Gu, Sungmo;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.561-568
    • /
    • 2014
  • The Republic of Korea Army is using R-NAD of MIL-STD-188-220 as a Media Access Control protocol. Under urgent situations, almost all stations transmit data frames and then the network will reach a saturation state. Several articles have been devoted to the study of R-NAD performance. However, most of them focus on comparing the performance of some NADs using network simulation tools. We propose an analytical model to compute the throughput of R-NAD under the assumption of a network traffic saturation. Analytical results were verified by Monte Carlo methods. We have shown that the performance of a success probability and an average idle time remains almost unchanged as the total number of stations increases. We have also shown that Type 1/2/4 operation mode outperforms Type 3 operation mode in throughput. The results showed that the system with a squelch detection achieved a better performance than the one without it. The longer DATA time had a higher throughput.

A Design of Invite Flooding Attack Detection and Defense Using SIP in VoIP Service (SIP을 이용한 VoIP 서비스에서의 Invite Flooding 공격 탐지 및 방어 기법 설계)

  • Yun, Snag-Jun;Kim, Kee-Chen
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.215-218
    • /
    • 2011
  • VoIP(Voice over Internet Protocol) 서비스는 기존의 음성전화 서비스(Public Switched Telephone Network, PSTN)와 달리 IP 프로토콜을 이용한 저렴한 통신비용 등의 장점이 있는 음성통신 기술로써, 기존의 아날로그 음성전화 서비스를 대신하는 서비스이며, 새로운 인터넷 융합서비스로 많은 사용자가 이용하고 있다. 하지만 VoIP 서비스가 인터넷망을 이용함으로 IP Spoofing, DoS (Denial of Server) / DDoS(Distributed Denial of Service), 등의 여러 가지 보안의 문제점을 가지고 있다. VoIP 서비스에서 DDoS 공격은 Proxy 서버 등에 대량의 공격 메시지를 보냄으로써 서버의 자원을 고갈시켜 정상적인 서비스를 하지 못하게 한다. DoS, DDoS 공격 중 Invite Flooding 공격은 1분에 수천 개의 Invite 메시지를 보내 회선의 자원을 고갈시키는 공격이다. 특히 IP/Port 위조하여 공격 경우 공격 패킷 탐지하기 어려우므로 차단할 수 없다. 따라서 본 논문에서는 VoIP의 DoS/DDoS 중 하나인 Invite Flooding 공격 시 SIP Proxy Server에서 메시지 분산시키는 방법과 MAC Address와 사용자 번호 등 IP 이외의 고정적인 사용자 정보를 확인하여 공격을 탐지하고, 공격 Agent에 감염된 Phone을 공격차단서비스로 보내 복구시키는 방법을 제안한다.

Detection of Internal Illegal Query Using Packet Analysis (패킷 분석을 이용한 내부인 불법 질의 탐지)

  • Jang Gyong-Ohk;Koo Hyang-Ohk;Oh Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.259-265
    • /
    • 2005
  • The purpose of this study is for designing a illegal query detection system using Winpcap library for unauthorized access by internal person. The illegal query detection can be possible detecting the data in out of access control or searching illegal data by plagiarizing other user ID. The system used in this paper collects packets and analyzes the data related to SQL phrase among them, and selects the user's basic information by comparing the dispatch of MAC address and user's hardware information constructed previously. If the extracted information and user's one are different, it is considered as an illegal query. It is expected that the results of this study can be applied to reducing the snaking off unprotected data, and also contributed to leaving the audit records using user's access log which can be applied to the pattern analysis.

  • PDF

Effective Performance Evaluation of IEEE 802.11 WLAN DCF Under Normal Conditions (IEEE 802.11 무선랜 DCF의 정상상태에서의 효과적인 성능 분석)

  • Lee, Kye-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.261-266
    • /
    • 2009
  • We analyze the performances of the DCF, which is the medium access control protocol of IEEE 802.11 WLAN, assuming normal traffic condition. There have been much less research efforts under the normal condition than those under the saturated one. This paper proposes an analytical method of approximating the transmission attempt rate under normal condition as proportional to that under saturated condition. In result, we show that we can obtain the transmission attempt rate and the packet collision probability which quickly converge using iterative computations of relatively simple equations, and using these results we derive the network throughput and medium access delay. Numerical results show that our method is much less complex than those based on the Markov Chain while it can predict the performances quite accurately.