• Title/Summary/Keyword: MAC Address

Search Result 110, Processing Time 0.026 seconds

MAC layer based cross-layer solutions for VANET routing: A review

  • Nigam, Ujjwal;Silakari, Sanjay
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.636-642
    • /
    • 2021
  • Vehicular Ad hoc Networks (VANET's) are gaining popularity in research community with every passing year due to the key role they play in Intelligent Transportation System. Their primary objective is to provide safety, but their potential to offer a variety of user-oriented services makes them more attractive. The biggest challenge in providing all these services is the inherent characteristics of VANET itself such as highly dynamic topology due to which maintaining continuous communication among vehicles is extremely difficult. Here comes the importance of routing solutions which traditionally are designed using strict layered architecture but fail to address stringent QoS requirements. The paradigm of cross-layer design for routing has shown remarkable performance improvements. This paper aims to highlight routing challenges in VANET, limitations of single-layer solutions and presents a survey of cross-layer routing solutions that utilize the information from the MAC layer to improve routing performance in VANET.

Medium Access Control Protocols for Full-Duplex Communications in WLAN Systems: Approaches and Challenges (무선랜 시스템에서 전이중 통신을 위한 MAC 프로토콜 분석)

  • Kim, Wonjung;Song, Taewon;Kim, Taeyoon;Pack, Sangheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1276-1285
    • /
    • 2015
  • Full-duplex communications have emerged as a key technology for next-generation wireless local area networks (WLANs). Although the key enabling technology for full-duplex communications is the self-interference cancellation (SIC) technique in the physical layer, the employment of full-duplex communications has huge potentials to substantially increase the throughput at the medium access control (MAC) layer. At the same time, full-duplex communications pose non-trivial challenges to the MAC protocol design. In this article, we first identify salient problems in supporting full-duplex communications in WLAN MAC protocols. After that, we survey the state-of-the art to address those problems and analyze their pros and cons. Finally, we present open research challenges to improve the effectiveness of full-duplex communications in WLANs.

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).

Control System of a Remote Robot using PDA (PDA를 이용한 원격 로봇 제어 시스템)

  • Han, Jong-Hye;Lee, Kee-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.206-208
    • /
    • 2004
  • A new method to control a remote robot with PDA and wireless network is presented. The needs of remote control systems using a home network environments are increased in these days. To solve the shortage of IP address in network, authorized TCP/IP and unauthorized TCP/IP address are used. The unauthorized TCP/IP is obtained by using MAC Address in the system and Network Layer. The model in the system is similar to Sever&Client in structure. Using this system, it is very easy to combine one network device with other network system. A robot system and PDA are used to show the effectiveness of the control system in home network environments.

  • PDF

A Study on the Network Access Control of a System in Real Time by Network Address Authentication Based on Policy in the VLAN Environments (VLAN 환경에서 네트워크 주소 인증을 통한 정책 기반 실시간 시스템 제어 기술 연구)

  • Choi, Won-Woo;Ahn, Seong-Jin;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.35-43
    • /
    • 2005
  • It is need to control network access that a user personally change own IP or network devices in managing network address. Also, When we use new network devices or assign network address, we do them by design, not arbitrarily. And then, we can immediately control network's problems. It could be used network management and security in low level. But most of managers do this works by hand not automatically. This paper propose the solutions that improve the security by network address authentication in VLAN environment, such as corporations and public offices.

  • PDF

Implementation of an Ethernet Adapter for the G-PON TC Layer (G-PON TC 계층을 위한 이더넷 정합기의 구현)

  • Chung, Hae;Ahn, Eu-Kwang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.429-436
    • /
    • 2011
  • The G-PON is an efficient solution to implement the FTTH and have GEM frame to accomodate various protocols like Ethernet frames, IP packets, and TDM signals. Above all, the Ethernet is one of the most widely used 2nd layer protocol in the campus, the subscriber access, and the carrier service. So G-PON system has to provide an Ethernet interface with top priority. In this paper, we implement a gigabit Ethernet adapter based on Ethernet over GEM in the ITU-T G.984.3 to accommodate Ethernet protocol in the G-PON TC chip. The adapter maps each Ethernet frame to a single or multiple GEM frames and has several functions including generation of the GEM header, encapsulation of frames and the SAR. In particular, the adapter have converter (LUT) MAC address to port-ID which is a key to identify logical connections though it is not defined in specification but important. We implement the adapter with a FPGA and verify the functions of segmentation and reassembling, MAC address learning, and throughput with the logic analyzer and the Ethernet analyzer.

Self-organization Scheme of WSNs with Mobile Sensors and Mobile Multiple Sinks for Big Data Computing

  • Shin, Ahreum;Ryoo, Intae;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.943-961
    • /
    • 2020
  • With the advent of IoT technology and Big Data computing, the importance of WSNs (Wireless Sensor Networks) has been on the rise. For energy-efficient and collection-efficient delivery of any sensed data, lots of novel wireless medium access control (MAC) protocols have been proposed and these MAC schemes are the basis of many IoT systems that leads the upcoming fourth industrial revolution. WSNs play a very important role in collecting Big Data from various IoT sensors. Also, due to the limited amount of battery driving the sensors, energy-saving MAC technologies have been recently studied. In addition, as new IoT technologies for Big Data computing emerge to meet different needs, both sensors and sinks need to be mobile. To guarantee stability of WSNs with dynamic topologies as well as frequent physical changes, the existing MAC schemes must be tuned for better adapting to the new WSN environment which includes energy-efficiency and collection-efficiency of sensors, coverage of WSNs and data collecting methods of sinks. To address these issues, in this paper, a self-organization scheme for mobile sensor networks with mobile multiple sinks has been proposed and verified to adapt both mobile sensors and multiple sinks to 3-dimensional group management MAC protocol. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of the various usage cases. Therefore, the proposed self-organization scheme might be adaptable for various computing and networking environments with big data.

Power Saving Mechanisms for LTE Base Stations Using Traffic Characteristic (Traffic 특성을 이용한 LTE 기지국의 Power Saving 메커니즘)

  • Lee, Seung-Hwan;Lee, Seung-Hyong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.1
    • /
    • pp.49-54
    • /
    • 2010
  • 3GPP(Third Generation Partnership Project) LTE system that is the next step forward in cellular 3G services address the issues related to power saving at LTE base station. This is because that most of the energy in a typical telecommunication network is consumed by the wireless network's base station site. Power saving at LTE base station fall in with low-carbon green technology. This thesis proposes a power saving MAC protocol for LTE base station which utilizes different graded DRX/DTX(Discontinuous. Reception/Transmission). Considering traffic type in UE, proposed MAC protocol controls adaptive DRX/DTX cycle. The proposed method is more improve power saving performance than another method which is unchanged DRX/DTX by conditions. In this thesis, I propose an power saving MAC protocol in an environment where LTE base station are communicated with UE and prove improvement in performance through simulations.

Damage Detection of a Steel Member Using Modal Testing (강부재의 손상발견을 위한 모달실험 기법)

  • Jang, Jeong Hwan;Lee, Jung Whee;Kim, Sung Kon;Chang, Sung Pil
    • Journal of Korean Society of Steel Construction
    • /
    • v.9 no.4 s.33
    • /
    • pp.467-477
    • /
    • 1997
  • A series of experimental tests have been performed on a tube beam in which artificial damage is applied in order to address damage detectability using modal analysis. Modal parameters considered are frequency, displacement mode shape and strain mode shape CoMAC(Coordinate Modal Assurance Criterion) and Modal Vector Error have been adopted for presenting the change of displacement mode shape and strain mode shape. It is revealed strain mode shape is the most sensitive to damage.

  • PDF

Mathematics across the Curriculum - Educational Reform as a Problem Solving Activity -

  • Cerreto, Frank A.
    • Proceedings of the Korea Society of Mathematical Education Conference
    • /
    • 2007.06a
    • /
    • pp.7-19
    • /
    • 2007
  • During the past 20 years, a small but potentially powerful initiative has established itself in the mathematics education landscape: Mathematics Across the Curriculum (MAC). This curricular reform movement was designed to address a serious problem: Not only are students unable to demonstrate understanding of mathematical ideas and their applications, but also they harbor misconceptions about the meaning and purpose of mathematics. This paper chronicles the brief history of the MaC movement. The sections of the paper correspond loosely tn the typical steps one might take to solve a mathematics problem. The Problem Takes Shape presents a discussion of the social and economic forces that led to the need for increased articulation between mathematics and other fields in the American educational system. Understanding the Problem presents the potential value of exploiting these connections throughout the curriculum and the obstacles such action might encounter. Devising a Plan provides an overview of the support systems provided to early MAC initiatives by government and professional organizations. Implementing the Plan contains a brief description of early collegiate programs, their approaches and their differences. Extending the Solution details the adoption of MAC principles to the K-12 sector and throughout the world. The paper concludes with Retrospective, a brief discussion of lessons learned and possible next steps.

  • PDF