• Title, Summary, Keyword: MAC Address

Search Result 95, Processing Time 0.093 seconds

Self-organization Scheme of WSNs with Mobile Sensors and Mobile Multiple Sinks for Big Data Computing

  • Shin, Ahreum;Ryoo, Intae;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.943-961
    • /
    • 2020
  • With the advent of IoT technology and Big Data computing, the importance of WSNs (Wireless Sensor Networks) has been on the rise. For energy-efficient and collection-efficient delivery of any sensed data, lots of novel wireless medium access control (MAC) protocols have been proposed and these MAC schemes are the basis of many IoT systems that leads the upcoming fourth industrial revolution. WSNs play a very important role in collecting Big Data from various IoT sensors. Also, due to the limited amount of battery driving the sensors, energy-saving MAC technologies have been recently studied. In addition, as new IoT technologies for Big Data computing emerge to meet different needs, both sensors and sinks need to be mobile. To guarantee stability of WSNs with dynamic topologies as well as frequent physical changes, the existing MAC schemes must be tuned for better adapting to the new WSN environment which includes energy-efficiency and collection-efficiency of sensors, coverage of WSNs and data collecting methods of sinks. To address these issues, in this paper, a self-organization scheme for mobile sensor networks with mobile multiple sinks has been proposed and verified to adapt both mobile sensors and multiple sinks to 3-dimensional group management MAC protocol. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of the various usage cases. Therefore, the proposed self-organization scheme might be adaptable for various computing and networking environments with big data.

Mathematics across the Curriculum - Educational Reform as a Problem Solving Activity -

  • Cerreto, Frank A.
    • Proceedings of the Korea Society of Mathematical Education Conference
    • /
    • /
    • pp.7-19
    • /
    • 2007
  • During the past 20 years, a small but potentially powerful initiative has established itself in the mathematics education landscape: Mathematics Across the Curriculum (MAC). This curricular reform movement was designed to address a serious problem: Not only are students unable to demonstrate understanding of mathematical ideas and their applications, but also they harbor misconceptions about the meaning and purpose of mathematics. This paper chronicles the brief history of the MaC movement. The sections of the paper correspond loosely tn the typical steps one might take to solve a mathematics problem. The Problem Takes Shape presents a discussion of the social and economic forces that led to the need for increased articulation between mathematics and other fields in the American educational system. Understanding the Problem presents the potential value of exploiting these connections throughout the curriculum and the obstacles such action might encounter. Devising a Plan provides an overview of the support systems provided to early MAC initiatives by government and professional organizations. Implementing the Plan contains a brief description of early collegiate programs, their approaches and their differences. Extending the Solution details the adoption of MAC principles to the K-12 sector and throughout the world. The paper concludes with Retrospective, a brief discussion of lessons learned and possible next steps.

  • PDF

Damage Detection of a Steel Member Using Modal Testing (강부재의 손상발견을 위한 모달실험 기법)

  • Jang, Jeong Hwan;Lee, Jung Whee;Kim, Sung Kon;Chang, Sung Pil
    • Journal of Korean Society of Steel Construction
    • /
    • v.9 no.4
    • /
    • pp.467-477
    • /
    • 1997
  • A series of experimental tests have been performed on a tube beam in which artificial damage is applied in order to address damage detectability using modal analysis. Modal parameters considered are frequency, displacement mode shape and strain mode shape CoMAC(Coordinate Modal Assurance Criterion) and Modal Vector Error have been adopted for presenting the change of displacement mode shape and strain mode shape. It is revealed strain mode shape is the most sensitive to damage.

  • PDF

MMSE Transmit Optimization for Multiuser Multiple-Input Single-Output Broadcasting Channels in Cognitive Radio Networks

  • Cao, Huijin;Lu, Yanhui;Cai, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2120-2133
    • /
    • 2013
  • In this paper, we address the problem of linear minimum mean-squared error (MMSE) transmitter design for the cognitive radio (CR) multi-user multiple-input single-output (MU-MISO) broadcasting channel (BC), where the cognitive users are subject to not only a sum power constraint, but also a interference power constraint. Evidently, this multi-constraint problem renders it difficult to solve. To overcome this difficulty, we firstly transform it into its equivalent formulation with a single constraint. Then by utilizing BC-MAC duality, the problem of BC transmitter design can be solved by focusing on a dual MAC problem, which is easier to deal with due to its convexity property. Finally we propose an efficient two-level iterative algorithm to search the optimal solution. Our simulation results are provided to corroborate the effectiveness of the proposed algorithm and show that this proposed CR MMSE-based scheme achieves a suboptimal sum-rate performance compared to the optimal DPC-based algorithm with less computational complexity.

CRM using short range location based technology

  • Yoo, Jihyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.91-96
    • /
    • 2016
  • In this paper, we propose the CRM service model for analyzing and managing location based data collected by Wi-Fi and BLE. As mobile devices became personalized, enterprises became interested in individual location, and location based mobile marketing started to stand on spotlight. Location based proximity marketing is developing along with contactless data transmission technology, and payment system that uses NFC, Beacon that utilizes BLE, as well as advertisement via Wi-Fi are being serviced. We suggest the model that mobile devices can be detected and identified by MAC address with the need of being connected to Wi-FI or Bluetooth interface. MAC addresses are not associated with any specific user account or mobile phone number. The idea is to be able to measure the amount of people which are present in a certain point at a specific time, allowing the study of the evolution of data analysis and offers effective information for decision-makings.

Ethernet Ring Protection Using Filtering Database Flip Scheme For Minimum Capacity Requirement

  • Rhee, June-Koo Kevin;Im, Jin-Sung;Ryoo, Jeong-Dong
    • ETRI Journal
    • /
    • v.30 no.6
    • /
    • pp.874-876
    • /
    • 2008
  • Ethernet ring protection is a new technology introduced in ITU-T Recommendation G.8032, which utilizes the generic Ethernet MAC functions. We introduce an alternative enhanced protection switching scheme to suppress penalty in the switching transient, in which the Ethernet MAC filtering database (FDB) is actively and directly modified by information disseminated from the nodes adjacent to failure. The modified FDB at all nodes are guaranteed to be consistent to form a complete new ring network topology immediately. This scheme can reduce the capacity requirement of the G.8032 by several times. This proposed scheme can be also applied in IP protection rings.

  • PDF

Automatic Update of Navigation Contents (네비게이션의 콘텐츠 자동 업데이트 시스템)

  • Paek, Seonuck;Sung, Min-Young;Ahn, Sung-Hye;Nam, Gibong;Lee, Gilhwan;Yoo, Seungpill
    • Proceedings of the Korea Contents Association Conference
    • /
    • /
    • pp.743-747
    • /
    • 2009
  • We designed and implemented an automatic update system of 네비게이션 contents. Currently car users are updating map contents of their 네비게이션 system by using SD memory card. In the implemented system, map contents are downloaded via WI-FI internet access while served in a gas station. To prevent free rider at gas stations, we adopted authentication mechanism based on MAC address.

  • PDF

Branch Predictor Design and Its Performance Evaluation for A High Performance Embedded Microprocessor (고성능 내장형 마이크로프로세서를 위한 분기예측기의 설계 및 성능평가)

  • Lee, Sang-Hyuk;Kim, Il-Kwan;Choi, Lynn
    • Proceedings of the IEEK Conference
    • /
    • /
    • pp.129-132
    • /
    • 2002
  • AE64000 is the 64-bit high-performance microprocessor that ADC Co. Ltd. is developing for an embedded environment. It has a 5-stage pipeline and uses Havard architecture with a separated instruction and data caches. It also provides SIMD-like DSP and FP operation by enabling the 8/16/32/64-bit MAC operation on 64-bit registers. AE64000 processor implements the EISC ISA and uses the instruction folding mechanism (Instruction Folding Unit) that effectively deals with LERI instruction in EISC ISA. But this unit makes branch prediction behavior difficult. In this paper, we designs a branch predictor optimized for AE64000 Pipeline and develops a AES4000 simulator that has cycle-level precision to validate the performance of the designed branch predictor. We makes TAC(Target address cache) and BPT(branch prediction table) seperated for effective branch prediction and uses the BPT(removed indexed) that has no address tags.

  • PDF

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis (뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법)

  • Ryu, Byoung-Hyun;Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.

Authenticated IPv4 Address Allocation Using Human Recognition in DSTM Server (Human Recognition 방법을 적용한 DSTM 서버의 IPv4 주소 할당 인증 방법)

  • Choi, Jae-Duck;Kim, Young-Han;Kwon, Taek-Jung;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.979-986
    • /
    • 2006
  • DSTM is one of the 1Pv6/IPv4 transition mechanisms using IPv4-in-IPv6 tunneling for communication between IPv6 node with dual stack and Ipv4-only node. In DSTM, the DSTM server using the DHCPv6 is vulnerable to DoS attacks which can exhaust the IPv4 address pool. In this paper, an authentication model using a HRAA (Human Recognition Address Allocation) scheme was proposed to protect DHCP server against DoS attacks. The proposed authentication model in DSTM that uses an image file for verification is effective because only human can respond to the challenge for authenticated address allocation. The proposed model can be used anytime and anywhere in a DSTM domain, and is secure against DoS attacks.