• Title, Summary, Keyword: MAC Address

Search Result 95, Processing Time 0.037 seconds

QoS Provisioning in Wireless Body Area Networks: A Review on MAC Aspects

  • Thapa, Anup;Shin, Seok-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1267-1285
    • /
    • 2012
  • Wireless Body Area Networks (WBANs) deal with variety of healthcare services with diverse Quality of Service (QoS) requirements. However, QoS handling is a challenging problem in such networks. In general, QoS related problems can be addressed from different layers in the networking protocol suite. Design of an efficient QoS aware Medium Access Control (MAC) protocol can address this problem in MAC layer. This paper analyzes the QoS requirements of WBAN, identifies the requisites of QoS handling system, and outlines the trends that are being followed for its advancement with focus on QoS issues at MAC layer. We review some prior works, compare them, and analyze the current research concerned with problem of providing QoS in WBAN. We also explore some open issues and discuss them.

Medium Access Control Protocols for Full-Duplex Communications in WLAN Systems: Approaches and Challenges (무선랜 시스템에서 전이중 통신을 위한 MAC 프로토콜 분석)

  • Kim, Wonjung;Song, Taewon;Kim, Taeyoon;Pack, Sangheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1276-1285
    • /
    • 2015
  • Full-duplex communications have emerged as a key technology for next-generation wireless local area networks (WLANs). Although the key enabling technology for full-duplex communications is the self-interference cancellation (SIC) technique in the physical layer, the employment of full-duplex communications has huge potentials to substantially increase the throughput at the medium access control (MAC) layer. At the same time, full-duplex communications pose non-trivial challenges to the MAC protocol design. In this article, we first identify salient problems in supporting full-duplex communications in WLAN MAC protocols. After that, we survey the state-of-the art to address those problems and analyze their pros and cons. Finally, we present open research challenges to improve the effectiveness of full-duplex communications in WLANs.

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm (마킹 알고리듬 기반 IP 역추적에서의 공격 근원지 발견 기법)

  • 김병룡;김수덕;김유성;김기창
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.

A Design of Network Management System for Efficiently Isolating Devices Infected with ARP Spoofing Virus (ARP spoofing 바이러스에 감염된 단말을 효율적으로 분리하기 위한 네트워크 관리시스템의 설계)

  • Ko, Bong-Koo;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.641-648
    • /
    • 2013
  • ARP spoofing is a typical Internet attack, in which an attacker sends data by changing his's MAC address with the other's one. Currently, this attack is usually dealt with separating the attacking PCs infected with ARP spoofing virus, by keeping network devices investigating by the network manager. However, this manual process has some limitations in time and accuracy. This paper proposes a new network management system to replace the effort of network manager who has to keep on inspecting the network. Along with designing an ARP analyzer and a disconnection notifier and adding them into the existing network management system, the proposed system provides a basement to identify and notify the PC infected by an ARP spoofing virus with fast and high accuracy. As a result, it is expected to minimize the network break off and to make easy the network management.

Method to Limit The Spread of Data in Wireless Content-Centric Network (무선 Content-Centric Network에서 Data 확산 제한 방법)

  • Park, Chan-Min;Kim, Byung-Seo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.1
    • /
    • pp.9-14
    • /
    • 2016
  • Since Devices such labtop, tablet, smartphone have been developed, a lots of huge data that can be classified as content is flooded in the network. According to changing Internet usage, Content-Centric Network(CCN) what is new concept of Internet Architecture is appeared. Initially, CCN is studied on wired network. but recently, CCN is also studied on wireless network. Since a characteristic of wireless environment is different from a characteristic of wired environment, There are issues in wireless CCN. In this paper, we discuss improvement method of Data spread issue on wireless CCN. The proposed scheme of this paper use MAC Address of nodes when Interest and Data Packet are forwarded. As using the proposed scheme, we reduce the spread of Data and offer priority of forwarding to nodes of shortest path, reduce delay by modifying retransmission waiting time.

An Ethernet Ring Protection Method to Minimize Transient Traffic by Selective FDB Advertisement

  • Lee, Kwang-Koog;Ryoo, Jeong-Dong;Min, Seung-Wook
    • ETRI Journal
    • /
    • v.31 no.5
    • /
    • pp.631-633
    • /
    • 2009
  • We introduce an improved Ethernet ring protection method, selective filtering database (FDB) advertisement, to minimize traffic overshoot in the event of a failure or recovery. On the protection switching event, the proposed method makes all ring nodes perform an FDB flush except the FDB entries associated with their client subnets. Then, ring nodes rapidly exchange their client MAC address lists so that their FDBs are immediately updated by indirect MAC address learning. The proposed scheme guarantees fast and reliable protection switching over the standard scheme.

A Study on Proxy Mobile IPv6 over WiBro (와이브로 네크워크에서 Proxy Mobile IPv6 적용방안)

  • Kim, Jong-Sun;Jeong, Min-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • /
    • pp.131-136
    • /
    • 2008
  • 와이브로는 IEEE 802.16e 기반으로 이동 중에도 사용자에게 고속 무선 데이터 서비스를 제공하는 기술로 IPv4 기반 인터넷을 통한 이동성 지원은 원활하게 제공되나 IPv6 환경에서는 많은 문제점을 가지고 있다. 와이브로 MAC은 유선망의 이더넷과 와이브로 망 구성요소 간 점대다 연결과 브로드 캐스트 기능을 지원하지 않는다. 또한 이더넷에서 사용하는 MAC 주소를 대체한 CID(Connection ID)를 사용하기 때문에 Mobile IPv6에서 CoA(Care of Address) 생성을 위한 IPv6 Address Auto-Configuration 기능을 이용하는 것은 매우 어렵다. 본 논문에서는 와이브로 서비스 제공을 위하여 Mobile IPv6의 Proxy 기능을 도입하고 이를 적용하는 방안을 제시한다. 제안된 방식을 통하여 와이브로 망에서 IPv6의 장점을 이용한 고속 핸드오버 서비스 제공이 가능하다.

  • PDF

Performance of Asynchronous MAC with an Efficient Preamble Sampling Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 효율적인 프리엠블 샘플링 기법을 사용하는 비동기 MAC의 성능 분석)

  • Byun, Kang-Ho;Yoon, Chong-Ho;Kim, Se-Han
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.1
    • /
    • pp.70-77
    • /
    • 2008
  • On the wireless sensor network MAC protocols, one of main issues is energy enciency. Since several asynchronous wireless sensor network MAC protocols with short preamble sampling scheme can be operated without setting the timing synchronization among neighbor nodes, it consumes a little energy for maintaining protocols. However, each node encounters either preamble or data overhearing problem, because each node wakes up in a different time and must check whether the frame is being sent to itself or not. To solve this overhearing problem, we newly propose B-MAC++ that can reduce the overhearing energy consumption by using short preambles with destination address and payload length. from simulation results, we show that the proposed B-MAC++ has advantageous in terms of power consumption efficiency over other asynchronous wireless sensor network MAC protocols.

A Design and Implementation of IP Collision Preventive Method using MAC Address (MAC 주소를 이용한 IP 충돌 방지 기법의 설계 및 구현)

  • Kim, Seong-Geol;Lim, Hyeong-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • /
    • pp.1315-1318
    • /
    • 2001
  • 이 논문은 TCP/IP 기반의 근거리 네트워크에서 사용되는 개인용 컴퓨터의 MAC 주소을 이용하여 인터넷 프로토콜 주소 충돌을 해결하는 방법에 대하여 연구한다. 네트워크에 접속된 컴퓨터의 증가에 따른 IP 주소의 부족 현상과 고의 또는 실수로 권한을 받지 않은 사용자의 IP 주소의 사용에 의하여, 정당한 IP 주소 사용자가 네트워크를 사용할 수 없게 되는 경우가 있다. 본 논문은 근거리 네트워크에 접속되어 있는 컴퓨터의 MAC 주소와 IP 주소를 데이터베이스화 하여 IP 주소 충돌을 방지한 수 있는 시스템을 구축함으로써. 비정상적인 IP 사용자가 네트워크를 사용할 수 없도록 설계되어 있다.

  • PDF

A Duplicate Address Resolution Protocol in Mobile Ad Hoc Networks

  • Lin Chunhung Richard;Wang Guo-Yuan Mikko
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.525-536
    • /
    • 2005
  • In an IP-based network, automated dynamic assignment of IP addresses is preferable. In most wired networks, a node relies on a centralized server by using dynamic host configuration protocol (DHCP) to obtain a dynamic IP address. However, the DHCP­based approach cannot be employed in a mobile ad hoc network (MANET) due to the uncertainty of any centralized DHCP server. That is, a MANET may become partitioned due to host mobility. Therefore, there is no guarantee to access a DHCP server. A general approach to address this issue is to allow a mobile host to pick a tentative address randomly, and then use duplicate address resolution (DAR) protocol to resolve any duplicate addresses. In this paper, an innovative distributed dynamic host configuration protocol designed to configure nodes in MANET is presented. The proposed protocol not only can detect the duplicate address, but also can resolve the problem caused by duplicate address. It shows that the proposed protocol works correctly and is more universal than earlier approaches. An enhanced version of DAR scheme is also proposed in this paper to solve the situation of duplicate MAC address. The new and innovative approach proposed in this paper can make the nodes in MANET provide services to other networks and avoid packets from being delivered to incorrect destinations.