• Title, Summary, Keyword: MAC Address

Search Result 95, Processing Time 0.035 seconds

An Approach to Improve the End-to-end Performance for Mobile Ad hoc Networks (이동 애드 혹 망을 위한 종단간의 성능 개선 방안)

  • 이용석;최웅철
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.327-334
    • /
    • 2004
  • In this paper, we make MAC protocol improvements for performance enhancement of multi-hop ad-hoc wireless networks. A node in ad-hoc wireless networks can transmit a packet only when the medium is available, and while a packet is being transmitted, no other nodes are allowed to transmit a packet if they are in carrier sensing range. Carrier sensing range can be divided into two disjoint areas of transmission range and carrier sensing zone(9), and we address the importance of the protocol behavior when a node is in carrier sensing zone. The characteristic of the carrier sensing zone is that a node can not know when the remaining time of the on-going transmission session expires or exactly when the media becomes available. Current MAC protocol does not behave in much different way between when a node is in transmission range and in carrier sensing zone. We have conducted a comprehensive simulation to study the performance improvements. The simulation results indicate that the performance is increased and the number of dropped packets due to collision is significantly reduced as much as a half.

Model Validation of a Fast Ethernet Controller for Performance Evaluation of Network Processors (네트워크 프로세서의 성능 예측을 위한 고속 이더넷 제어기의 상위 레벨 모델 검증)

  • Lee Myeong-jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.92-99
    • /
    • 2005
  • In this paper, we present a high-level design methodology applied on a network system-on-a-chip(SOC) using SystemC. The main target of our approach is to get optimum performance parameters for high network address translation(NAT) throughput. The Fast Ethernet media access controller(MAC) and its direct memory access(DMA) controller are modeled with SystemC in transaction level. They are calibrated through the cycle-based measurement of the operation of the real Verilog register transfer language(RTL). The NAT throughput of the model is within $\pm$10% error compared to the output of the real evaluation board. Simulation speed of the model is more than 100 times laster than the RTL. The validated models are used for intensive architecture exploration to find the performance bottleneck in the NAT router.

Relative Location based Risk Calculation to Prevent Identity Theft in Electronic Payment Systems (전자지불거래에서 상대위치와 연동한 도용 위험성 산출방법)

  • Suh, Hyo-Joong;Hwang, Hoyoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.455-461
    • /
    • 2020
  • Electronic payment system using Internet banking is a very important application for users of e-commerce environment. With rapidly growing use of fintech applications, the risk and damage caused by malicious hacking or identity theft are getting significant. To prevent the damage, fraud detection system (FDS) calculates the risk of the electronic payment transactions using user profiles including types of goods, device status, user location, and so on. In this paper, we propose a new risk calculation method using relative location of users such as SSID of wireless LAN AP and MAC address. Those relative location information are more difficult to imitate or copy compared with conventional physical location information like nation, GPS coordinates, or IP address. The new method using relative location and cumulative user characteristics will enable stronger risk calculation function to FDS and thus give enhanced security to electronic payment systems.

A Study on the Performance Improvement in SEcure Neighbor Discovery (SEND) Protocol (보안 이웃 탐색 프로토콜 성능 향상 기법에 관한 연구)

  • Park, Jin-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.85-96
    • /
    • 2008
  • Neighbor Discovery(ND) protocol is used to exchange an information of the neighboring nodes on the same link in the IPv6 protocol environment. For protecting the ND protocol, firstly utilizing Authentication Header(AH) of the IPsec protocol was proposed. But the method has some problems-uses of key exchange protocol is not available and it is hard to distribute manual keys. And then secondly the SEcure Neighbor Discovery(SEND) protocol which protects all of the ND message with digital signature was proposed. However, the digital signature technology on the basis of public key cryptography system is commonly known as requiring high cost, therefore it is expected that there is performance degradation in terms of the availability. In the paper, to improve performance of the SEND protocol, we proposed a modified CGA(Cryptographically Generated Address) which is made by additionally adding MAC(Media Access Control) address to the input of the hash function. Also, we proposed cache mechanism. We compared performance of the methods by experimentation.

Efficient Transmission Mode Selection Scheme for MIMO-based WLANs

  • Thapa, Anup;Kwak, Kyung Sup;Shin, Seokjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2365-2382
    • /
    • 2014
  • While single-user spatial multiplexing multiple-input multiple-output (SU-MIMO) allows spatially multiplexed data streams to be transmitted to one node at a time, multi-user spatial multiplexing MIMO (MU-MIMO) enables the simultaneous transmission to multiple nodes. However, if the transmission time required to send packets to each node varies considerably, MU-MIMO may fail to utilize the available MIMO capacity to its full potential. The transmission time typically depends upon two factors: the link quality of the selected channel and the data length (packet size). To utilize the cumulative capacity of multiple channels in MIMO applications, the assignment of channels to each node should be controlled according to the measured channel quality or the transmission queue status of the node.A MAC protocol design that can switch between MU-MIMO and multiple SU-MIMO transmissions by considering the channel quality and queue status information prior to the actual data transmission (i.e., by exchanging control packets between transmitter and receiver pairs) could address such issues in a simple but in attractive way. In this study, we propose a new MAC protocol that is capable of performing such switching and thereby improve the system performance of very high throughput WLANs. The detailed performance analysis demonstrates that greater benefits can be obtained using the proposed scheme, as compared to conventional MU-MIMO transmission schemes.

Energy-Efficient Voice Data Broadcast Method in Wireless Personal Area Networks for IoT (IoT-WPAN 환경에서 에너지 효율적 음성 데이터 Broadcast 기법)

  • Lee, Jaeho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2178-2187
    • /
    • 2015
  • Bluetooth Low Energy (Bluetooth LE) is a representative break-through communication technology for wireless personal area networks on nowaday. In this environment, most of significant performance should be aiming to energy efficiency due to the policy for manufacturing light-weighted communication devices derived from requirement of world IoT market, and many researches have been developed to satisfy this requirement. While Bluetooth LE has been leading the low power communication technology required from the current market by employing duty cycle and frequency hopping approaches, it couldn't address the problem of reliability on broadcast transmissions. The main goal of this paper is aiming to addressing this problem by suggesting a new method. Furthermore analytic evaluations would also be proceeded to find objective results in the view point of broadcast transmission efficiency from Master device.

Information Right Management System using Secret Splitting of Hardware Dependent Encryption Keys (하드웨어에 종속된 암호키 비밀 분할을 이용한 정보권한관리 시스템)

  • Doo, So-Young;Kong, Eun-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.345-351
    • /
    • 2000
  • This paper presents a right management scheme using secret splitting protocol. Right management schemes combat piracy of proprietary data (such as digital music). In these schemes, encryption has been used and it is essential to protect the keys used in encryption. We introduce a new key protection method in which a secret encryption key is generated using both user's hardware-dependent unique information (such as MAC address) and cryptographically secure random bit strings provided by data owner. This scheme prevents piracy by checking hardware-dependent information during rendering and improves the secrecy of the data by individualizing the encryption key for each data.

  • PDF

The Design of STDMA(Self-Organized Time Division Multiple Access) Protocol Simulation Program (항공 감시용 다중접속방식 프로토콜 시뮬레이션 프로그램 설계)

  • Kim, In-Kyu;Ohn, Kyoung-Ryoon;Song, Jae-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.554-558
    • /
    • 2008
  • In this paper, we show that the SIDMA(Self-organized Time Division Multiple Access) protocol using aviation surveillance data link now, designs to the ICAO DO 9816 documentation sequence. This protocol makes use of the VDL(VHF Data Link) Mode 4 and UAT(Universal Access Transceiver) system's MAC(Media Access Control) layer. We make sure of the simulation result and implementation of STDMA protocol program in accompany with the ICAO documentation sequence. This program operates the slot allocation and reservation with report rate when protocol transmits data and calculates slot address.

  • PDF

Log-based Wireless Sensor Network Simulator (로그 기반 무선 센서 네트워크 시뮬레이터)

  • Cho, Min-Hee;Son, Cheol-Su;Kim, Won-Jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.845-848
    • /
    • 2008
  • In case of application test in wireless sensor network, there are many difficulties in power supplying to wireless sensor node, installing and deploying of sensor nodes, maintaining and debugging. For efficient development and maintenance of wireless sensor network-based application, a simulator is essentially needed. However, the existing wireless sensor network simulators are focused to distribution of MAC address, routing, power management, it is not suitable to test the function of application in host which processes message through sink node. In this paper, we designed and implemented a log-based simulator for application running in host connected sink node.

  • PDF

Point-to-Multipoint Services and Hierarchical QoS on PBB-TE System (PBB-TE 기반의 패킷전송시스템에서 멀티캐스트 서비스와 계층적 QoS 구현)

  • Lee, Won-Kyoung;Choi, Chang-Ho;Kim, Sun-Me
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.433-442
    • /
    • 2012
  • We have proposed a solution to multicast services and an advanced quality of service (QoS) mechanism on a packet transport system (PTS) based on PBB-TE. The point-to-multipoint (PtMP) connection in the PBB-TE system have been realized by grouping point-to-point (PtP) PTL trunks and mapping a BSI onto the PtP PTL trunks using a multicast backbone destination address. To provide end-to-end QoS of the PtMP services, the hierarchical QoS scheme for backbone service instances and connection-oriented paths has been implemented in the PTS. For providing different capabilities for service selection and priority selection, the PTS offers to customers three basic types of the port-based, C-tagged, and S-tagged service interface defined by the IEEE 802.1ah. To offer to customers different capabilities of the layer 3 applications and services, moreover, an IP-flow service interface have been added. In order to evaluate traffic performance for PtMP services in the PTS, the PtMP throughputs for the link capacity of 1 Gbps at the four service interfaces were measured in the leaves of the ingress edge node, the transit node, and the egress edge node. The throughputs were about 96 % because the B-MAC overhead of 22 bytes occupies 4% of the 512-byte packet. The QoS performance is ability to guarantee an application or a user a required bandwidth, and could be evaluated by the accuracy of policing or shaping. The accuracy of the policing scheme and the accuracy of the shaping scheme were 99% and 99.3% respectively.