• Title/Summary/Keyword: Medium access

Search Result 723, Processing Time 0.023 seconds

A Dynamic Precedence Queue Mechanism to Improve Transmission Efficiency in CAN Networks

  • Yun, Jae-Mu;Choi, Ho-Seek;Lee, Jang-Myung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.761-766
    • /
    • 2005
  • This paper presents a dynamic precedence queue mechanism to resolve unexpected transmission delay of a lower priority transaction in a CAN based system which keeps a fixed priority in data transactions. The mechanism is implemented in the upper sub-layer of the data link layer (DLL), which is fully compatible with the original medium access control layer protocol of CAN. Thus the mechanism can be implemented dynamically while the data transactions are going on without any hardware modification. The CAN protocol was originally developed to be used in the automotive industry and it was recently applied for a broader class of automated factories. Even though CAN is able to satisfy most of real-time requirements found in automated environments, it is not to enforce either a fair subdivision of the network bandwidth among the stations or a satisfactory distribution of the access delays in message transmissions. The proposed solution provides a superset of the CAN logical link layer control, which can coexist with the older CAN applications. Through the real experiments, effectiveness of the proposed mechanism is verified.

  • PDF

Throughput Analysis Based on Collision Probability in 802.11 Networks (802.11 네트워크의 충돌확률 기반 성능 분석)

  • Jin, Hyun-Joon;Song, Myong-Lyol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.93-100
    • /
    • 2014
  • IEEE 802.11 Wireless LAN Medium Access Control(MAC) supports two transmission methods, a DCF basic and a RTS/CTS in contention-based access. Even though the RTS/CTS method has been optionally introduced to solve the hidden terminal problem, it is able to produce better performance in some network environments than the basic transmission method. In this paper, the collision probability of wireless channel is mathematically analyzed and applied to measure network throughput using real transmission parameters so that a reference value between throughputs of two methods is obtained. We also confirmed that control signal rates affect overall network throughput and evaluated network throughputs considering collision probability, number of stations, and contention window size of Backoff between two methods respectively.

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

An Efficient Directional MAC Protocol for Vehicular Ad-hoc Networks (차량 Ad-hoc에서 효율적인 메시지 전달을 위한 지향성 MAC 프로토콜)

  • Ji, Soonbae;Kim, Junghyun;You, Cheolwoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.9-16
    • /
    • 2015
  • Quick and safe message transmission is an important research topic of vehicular ad hoc networks (VANET). Most studies assume that the periodic broadcast of beacon-frames between vehicles increases the safety of the driver. In this paper, we propose a medium access control (MAC) protocol and location-based clustering for the VANET to support reliable data transfer. In our proposal, the cluster heade (CH) manage the access and allocate the resources of the node. Our proposal uses simulation to confirm the reduction of the transmission delay and the collision rate of the signal.

An Ileal Amino Acid Digestibility Assay for the Growing Meat Chicken-Effect of Feeding Method and Digesta Collection Procedures

  • Yap, K.H.;Kadim, I.T.;King, R.D.;Moughan, P.J.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.10 no.6
    • /
    • pp.671-678
    • /
    • 1997
  • The objective was to evaluate method of feeding (free access or intubation), method of slaughter (carbon dioxide gas or barbiturate) and digesta flushing medium (distilled water or physiological saline), in the development of an ileal amino acid digestibility assay for 4 week-old broiler chickens. Three diets were used (commercial (C), semi-synthetic meat-and bone meal (MBM) or wheat (W)). For the coarser C and W diets but not for the MBM diet, feeding method had a significant effect on concentrations of chromium (Cr), nitrogen (N), acid detergent fibre (ADF) and neutral detergent fibre (NDF) in the crop contents at a set time after a meal. There appeared to be a selection of food particles under free-access feeding. For birds receiving the wheat diet there was an effect (p < 0.05) of sampling time after feeding on the concentrations of Cr, N, ADF and NDF/Cr in the crop contents. Flushing ileal digesta with distilled water or saline led to similar apparent ileal N digestibility coefficients. Birds given the MBM diet, and killed by inhalation of $CO_2$, had significantly (p < 0.05) lower apparent ileal N digestibility coefficients (73 versus 80%) than those killed by barbiturate overdose.

Debt Finance among Vietnamese Enterprises: The Influence of Managers' Gender

  • HO, Hoang Lan;DAO, Minh Hoa;PHAN, The Cong
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.229-239
    • /
    • 2020
  • This paper examines the impact of gender on access to debt finance among Vietnamese enterprises. The paper investigates data and variables retrieved from the World Bank Enterprise Survey dataset using five Probit models. The regression results suggest that there exist more unfavourable debt financing conditions for women-led firms (WLF), measured as a lower probability of having loan applications fully approved. Firm's age, working sector, and perception of access to finance as a difficulty are found to have explanatory power on the discrimination. More importantly, the perception of debt finance as a difficulty or firms' level of confidence significantly explains the variance of the dependent variable of probability of loan approval, or gender effect would be more pronounced if the firm already has a low level of confidence. The paper also contributes in testing for the gender effect on Vietnamese enterprises from different sectors and scale, unlike other prior research papers focusing on specific sectors and/or small and medium enterprises only. The findings are highly useful for Vietnamese credit institutions to set out a specific business policy to attract more WLFs and help promoting gender equality in the working environment, especially in debt financing, which is often neglected in existing regulation and policy frameworks.

MAC Protocol based on Spreading Code Status-Sensing Scheme for Integrated Voice/Data Services (확산코드 상태 감지 기법에 의한 통합 음성/데이터 서비스 MAC 프로토콜)

  • 임인택
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.916-922
    • /
    • 2001
  • A medium access control protocol is proposed for integrated voice and data services in the packet CDMA network with a small coverage. Uplink channels are composed of time slots and multiple spreading codes for each slot. This protocol gives higher access priority to the delay-sensitive voice traffic than to the data traffic. During a talkspurt, voice terminals reserve a spreading code to transmit multiple voice packets. On the other hand, whenever generating a data packet, data terminals transmit a packet based on the status Information of spreading codes in the current slot, which is received from base station. In this protocol, voice packet does not come into collision with data packet. Therefore, this protocol can increase the maximum number of voice terminals.

  • PDF

A Derivation of Resource Level Domain Names (자원단위 도메인이름의 도출)

  • Han, Young-S.
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.179-186
    • /
    • 2008
  • The access to web applications has continuously evolved toward the adoption of content centric interfaces. Services and information items are much of user's concern than web sites. For an efficient accommodation of increasing needs of content oriented operations, the scope of domain names is extended in two directions. A naming scheme is derived that is suitable for resource level access units and the semantics of domain names is conceived as very flexible functions. First extension regards the removal of unnecessary TLD's of domain names for resource level binding. Second extension makes the resource level domain names rich in functional binding and consequently various applications can be directly triggered by the invocation of domain names without intervening medium. These extensions may lay a certain direction for the future internet evolution.

  • PDF

The Method of Reducing the Delay Latency to Improve the Efficiency of Power Consumption in Wireless Sensor Networks

  • Ho, Jang;Son, Jeong-Bong
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.199-204
    • /
    • 2008
  • Sensor nodes have various energy and computational constraints because of their inexpensive nature and ad-hoc method of deployment. Considerable research has been focused at overcoming these deficiencies through faster media accessing, more energy efficient routing, localization algorithms and system design. Our research attempts to provide a method of improvement MAC performance in these issues. We show that traditional carrier-sense multiple access(CSMA) protocols like IEEE 802.11 do not handle the first constraint adequately, and do not take advantage of the second property, leading to degraded latency and throughput as the network scales in size, We present more efficient method of a medium access for real-time wireless sensor networks. Proposed MAC protocol is a randomized CSMA protocol, but unlike previous legacy protocols, does not use a time-varying contention window from which a node randomly picks a transmission slot. To reduce the latency for the delivery of event reports, it carefully decides a fixed-size contention window, non-uniform probability distribution of transmitting in each slot within the window. We show that it can offer up to several times latency reduction compared to legacy of IEEE 802.11 as the size of the sensor network scales up to 256 nodes using widely used simulator ns-2. We, finally show that proposed MAC scheme comes close to meeting bounds on the best latency achievable by a decentralized CSMA-based MAC protocol for real-time wireless sensor networks which is sensitive to latency.

  • PDF

A Traffic Adaptive MAC Scheduling for Bluetooth with Maximized throughput and Guaranteed fairness

  • Kim Tae suk;Choi Sung-Gi;Kim Sehun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.418-425
    • /
    • 2002
  • Bluetooth is an emerging technology expected to provide users with short range, low cost, pico-cellular wireless connectivity. The access to the medium for Bluetooth is based on a Master driven Time Division Duplexing (TDD) scheme. A slave transmits packets in the reverse slot only after the master polls the slave (or transmits a packet to the slave) in a forward slot. The master transmits packets to a slave in even slots while the slave transmits packets to the master in an odd slot. The way in which the master schedules packets transmission to slaves or polls them determines system performance. In this paper. we propose a traffic adaptive MAC scheduling scheme for Bluetooth. The proposed scheme adopts the ISAR (Intelligent Segmentation and Reassembly) policy, which adjusts the packet size to the traffic patterns, to adapt the polling frequency to the traffic conditions. Also for achieving fairness among master-slave connections our scheme includes a priority policy assinging prioritised service tlimes to each connection. By considering a scenario where a Bluetooth master is used as wireless access point to the Internet, we show that our scheme improve the system throughput and average queue delay with regard to a naive Round Robin (RR) scheme.

  • PDF