• Title/Summary/Keyword: Message Transmission Protocol

Search Result 228, Processing Time 0.027 seconds

Cooperative Incumbent System Protection MAC Protocol for Multi-channel Ad-hoc Cognitive Radio Networks

  • Yi, Ke;Hao, Nan;Yoo, Sang-Jo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1976-1996
    • /
    • 2011
  • Cognitive radio (CR) MAC protocol provides access control of unused spectrum resources without causing interference to primary users. To achieve this goal, in this paper a TDMA based cooperative multi-channel cognitive radio MAC (MCR-MAC) protocol is proposed for wireless ad hoc networks to provide reliable protection for primary users by achieving cooperative detection of incumbent system signals around the communication pair. Each CR node maintains transmission opportunity schedules and a list of available channels that is employed in the neighbor discovery period. To avoid possible signal collision between incumbent systems and cognitive radio ad hoc users, we propose a simple but efficient emergency notification message exchanging mechanism between neighbor CR nodes with little overhead. Our simulation results show that the proposed MCR-MAC can greatly reduce interference with primary users and remarkably improve the network throughput.

Performance Analysis of Backoff Algorithm in Wireless LANs with Prioritized Messages (무선랜 환경에서 우선순위를 고려한 백오프 알고리듬 성능분석)

  • Jeong Seok-Yun;Heo Seon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.1656-1660
    • /
    • 2006
  • Distributed coordination function(DCF) is the primary random access mechanism of IEEE 802.11, which is the basic protocol of wireless LAN based on the CSMA/CA protocol. It enables fast installation with minimal management and maintenance costs and is a very robust protocol for the best effort service in wireless medium. The current DCF, however, is known to be unsuitable for real-time applications such as voice message transmission. In this paper, we focus on the performance issues of IEEE 802.11 which accommodate the prioritized messages. Existing results use the initial window size and backoff window-increasing factor as tools to handle the priority of the messages. Instead, we introduce a novel scheme which chooses the backoff timer with arbitrary probabilities. By this, one can greatly reduce the backoff delay of the lower priority messages without degrading the performance of higher priority.

  • PDF

Performance Comparison of CDMA and TDMA protocols in radio access system for Integrated Voice/Data Services (음성 및 데이터서비스를 위한 무선접속시스템에서 CDMA와 TDMA방식의 성능비교)

  • 고종하;양영님;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6A
    • /
    • pp.820-831
    • /
    • 1999
  • In this paper, we have compared the performance of a D-TDMA protocol with that of a CDMA protocol, in radio access system for integrated voice/data services.The D-TDMA protocol is based on a generic dynamic channel assignment approach to be followed a combination of “circuit mode” reservation for voice calls, along with dynamic first-come-first served assignment of remaining capacity for data messages. In the CDMA protocol, we have used the voice activity detection to reduce the interface power of other mobiles in internal and external cells, and analyzed the interference power ratio. Also we have computed BER(Bit Error Rate) by using this interference power ratio and evaluated voice blocking probability(voice packet loss probability) and data transmission delay, according to average data length and average data arrival rate.We have found the CDMA protocol achieves comparatively higher performance for short data length, regardless of data arrival rate. Otherwise, the data transmission delay of D-TDMA protocol is shorter than that of the CDMA protocol for long data message.

  • PDF

Digital Legal Seal for Message Authentication Code (메시지 인증 코드를 위한 디지털 인감)

  • Jung, ChangHun;Shin, DongOh;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.345-358
    • /
    • 2016
  • In this paper, we present a security tool which called Digital Legal Seal. The Digital Legal Seal scans a barcode on a paper and print it with the tag generated by Hash-based Message Authentication Code(HMAC) in text format on a display device. The result of HMAC can be used for user authentication or secure message transmission on both online and offline. We examine not only how the Digital Legal Seal can make up the weak points of security card and OTP (One Time Password), but also the possibility of reducing the forgery of promissory note on offline.

A study on implementation and performance evaluation of the TCN/WTB for KHST (고속전철 제어 시스템을 위한 TCN/WTB 구현 및 성능 평가에 관한 연구)

  • 심세섭;박재현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.155-155
    • /
    • 2000
  • A high performance control and monitoring system for a high speed railway train requires a reliable the real-time communication network. TCN/WTB is designed for the data transmission over the train bus, and UIC556 defines that all the data be transmitted over TCN/WTB. This paper evaluates the performance of the link layer of WTB(Wired Train Bus). The evaluated results can be used for the selection of parameters for the sporadic message data.

  • PDF

Design and Implementation of a protocol for stable transmission of emergency information in WBAN environment (WBAN 환경에서 응급 정보의 안정적 전송을 위한 프로토콜 설계 및 구현)

  • Lee, Dong Ho;Wang, Jong Soo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.57-65
    • /
    • 2010
  • Application of WBAN technology in medical field facilitates the prevention of diseases by collecting the vital signs remotely. It also enables to prevent the accidental emergency situation in advance plus long-tem monitoring of patients with chronic diseases such as heart diseases, hypertension, or the elderly and infirm. For emergency patients, major vital signal information collected by the 'Sensing' should have the top priority and such information should be transferred as promptly as possible without competition. In addition, when an emergency occurs to a patient, a priority mechanism is necessitated for a urgent message to get through to the final destination. However, LR-WPAN IEEE 802.15.4 technology does not consider such emergency message handling features. To deal with aforementioned issues, the IEEE 802.15.4 super frame protocol structure has been designed for stable transfer of emergency information in WBAN environment in this study, and alternation to super frame structures have been made, allowing GTS(Guaranteed Time Slot) can be used first at CFP (Contention Free Period) by reserving the resources in advance and prioritize the emergency signals. NS-2 has been utilized for the performance test and analysis.

Performance Comparison of MISP-based MANET Strong DAD Protocol

  • Kim, Sang-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3449-3467
    • /
    • 2015
  • A broadcast operation is the fundamental transmission technique in mobile ad-hoc networks (MANETs). Because a broadcast operation can cause a broadcast storm, only selected forwarding nodes have the right to rebroadcast a broadcast message among the one-hop and two-hop neighboring nodes of a sender. This paper proposes the maximum intersection self-pruning (MISP) algorithm to minimize broadcasting redundancy. Herein, an example is given to help describe the main concept of MISP and upper bounds of forward node have been derived based on induction. A simulation conducted demonstrated that when conventional blind flooding (BF), self-pruning (SP), an optimized link state routing (OLSR) multipoint relay (MPR) set, and dominant pruning (DP), are replaced with the MISP in executing Strong duplicate address detection (DAD), the performances in terms of the energy consumption, upper bounds of the number of forward nodes, and message complexity have been improved. In addition, to evaluate the performance in reference to the link error probability, Pe, an enhancement was achieved by computing a proposed retransmission limit, S, for error recovery based on this probability. Retransmission limit control is critical for efficient energy consumption of MANET nodes operating with limited portable energy where Strong DAD reacts differently to link errors based on the operational procedures.

Design of an $SpO_2$ Transmission Agent based on ISO/IEEE 11073 Standard Protocol (ISO/IEEE 11073 표준 프로토콜 기반의 산소포화도 전송 에이전트 설계)

  • Pak, Ju-Geon;Im, Sung-Hyun;Park, Kee-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.462-465
    • /
    • 2011
  • A pulse oximeter is a device which provides non-invasive estimate of percentage oxygen saturation of haemoglobin (SpO2). Due to the limitations of resources of personal health devices (PHDs) including pulse oximeters, they generally transmit the estimated data to a remote monitoring server through a close manager (e.g. mobile device or PC). Therefore, communication protocols between PHDs and a manager is an important research topic in terms of interoperability. In this paper, we present design results of an SpO2 transmission agent based on the ISO/IEEE 11073 (X73) protocol. The protocol is an international standard for PHDs. The agent is an embedded program which generates X73 messages from the estimated pulse rates and SpO2, and transmits the messages to a close manager. The agent consists of a Session, Message and Memory Handler. The Session Handler manages a communication session with the manager, and the Message Handler generates and analyzes the exchanged messages according to the X73 protocol. The Memory Handler extracts pulse rates and SpO2s which are stored in a memory of the pulse oximeter. The SpO2 transmission agent allows pulse oximeters to communicate with managers based on x73 standard. Consequently, the interoperability between the pulse oximeters and the managers is guaranteed.

  • PDF

Design and Implementation of A Location-based Energy-Efficient Routing Protocol using Quantity of Energy Consumed (에너지 사용량을 이용한 위치 기반 에너지 효율적인 라우팅 프로토콜 설계 및 구현)

  • Jang, You-Jin;Kim, Yong-Ki;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.12 no.1
    • /
    • pp.1-9
    • /
    • 2010
  • Recently, wireless sensor networks(WSNs) technology has been considered as one of the most critical issues in the ubiquitous computing age. The sensor nodes have limited battery power, so they should consume low energy through their operation for the long-lasting lifetime. Therefore, it is essential to use energy efficient routing protocol. For this, we propose a location-based energy-efficient routing protocol which constructs the energy efficient route by considering the quantity of Energy consumed. In addition, we propose a route reconstruction algorithm to handle the disconnection of message transmission. Finally, we show from performance analysis using TOSSIM that our protocol outperforms the existing location based routing protocols in terms of energy efficiency.

Design and Evaluation of a New Multicast Protocol in Large Micro-Mobility Environments (대규모 마이크로 모빌리티 환경에서의 멀티캐스트 프로토콜의 구현과 평가)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.51-60
    • /
    • 2008
  • Micro-mobility protocols have been developed to reduce the control message overhead due to movements of mobile nodes. With the spread of mobile devices, services using mobile nodes are increasing and multicast services are becoming more important in providing multimedia services. In this paper we propose a new multicast protocol suitable for micro-mobility environments. The proposed protocol is designed to maintain optimal multicast routing paths and continue to provide multicast services without disruption in spite of frequent handoffs due to movements of mobile nodes. We used simulation to evaluate the proposed protocol, compared its performance with existing multicast protocols for mobile environments including bi-directional tunneling, remote subscription, and MMA, and observed that the proposed protocol exhibited better performance in terms of transmission success ratio and overhead on the network.