• Title/Summary/Keyword: Multi-protocol

Search Result 1,148, Processing Time 0.025 seconds

Traffic Engineering Based on Local States in Internet Protocol-Based Radio Access Networks

  • Barlow David A.;Vassiliou Vasos;Krasser Sven;Owen Henry L.;Grimminger Jochen;Huth Hans-Peter;Sokol Joachim
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.377-384
    • /
    • 2005
  • The purpose of this research is to develop and evaluate a traffic engineering architecture that uses local state information. This architecture is applied to an Internet protocol radio access network (RAN) that uses multi-protocol label switching (MPLS) and differentiated services to support mobile hosts. We assume mobility support is provided by a protocol such as the hierarchical mobile Internet protocol. The traffic engineering architecture is router based-meaning that routers on the edges of the network make the decisions onto which paths to place admitted traffic. We propose an algorithm that supports the architecture and uses local network state in order to function. The goal of the architecture is to provide an inexpensive and fast method to reduce network congestion while increasing the quality of service (QoS) level when compared to traditional routing and traffic engineering techniques. We use a number of different mobility scenarios and a mix of different types of traffic to evaluate our architecture and algorithm. We use the network simulator ns-2 as the core of our simulation environment. Around this core we built a system of pre-simulation, during simulation, and post-processing software that enabled us to simulate our traffic engineering architecture with only very minimal changes to the core ns-2 software. Our simulation environment supports a number of different mobility scenarios and a mix of different types of traffic to evaluate our architecture and algorithm.

An Efficient Downlink MAC Protocol for Multi-User MIMO WLANs

  • Liu, Kui;Li, Changle;Guo, Chao;Chen, Rui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4242-4263
    • /
    • 2017
  • Multi-User Multiple-Input Multiple-Output (MU-MIMO) technology has recently attracted significant attention from academia and industry because of it is increasingly important role in improving networks' capacity and data rate. Moreover, MU-MIMO systems for the Fifth Generation (5G) have already been researched. High Quality of Service (QoS) and efficient operations at the Medium Access Control (MAC) layer have become key requirements. In this paper, we propose a downlink MU-MIMO MAC protocol based on adaptive Channel State Information (CSI) feedback (called MMM-A) for Wireless Local Area Networks (WLANs). A modified CSMA/CA mechanism using new frame formats is adopted in the proposed protocol. Specifically, the CSI is exchanged between stations (STAs) in an adaptive way, and a packet selection strategy which can guarantee a fairer QoS for scenarios with differentiated traffic is also included in the MMM-A protocol. We then derive the expressions of the throughput and access delay, and analyze the performance of the protocol. It is easy to find that the MMM-A protocol outperforms the commonly used protocols in terms of the saturated throughput and access delay through simulation and analysis results.

Multi-channel MAC Protocol for Improving Channel Efficiency in Wireless Networks (무선 네트워크에서 채널 효율성을 높이기 위한 멀티채널 MAC 프로토콜)

  • Kim, Young-Kyoung;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.549-560
    • /
    • 2008
  • In this paper, we propose a new multi-channel MAC protocol to improve the channel efficiency by using two interfaces. Most of previous researches that have considered multi-channel wireless network environments use a common control channel to exchange control signals and they have a bottle neck problem at common control channel as increasing the number of data channels. In the proposed MAC protocol, we separate receiving and transmitting channels so that sending and receiving data and control packets at the same time is possible. It increases the total network throughput. Since there is no common control channel, the network does not suffer from the bottle neck problem. By applying a TDMA scheme, we can avoid packet collisions between data packets and control packets and reduce the possibility of CTS or ACK packet collisions. Simulation results show that the proposed multi-channel MAC protocol improves the total network throughput and channel efficiency compared with the existing method.

Priority Based Multi-Channel MAC Protocol for Real-Time Monitoring of Weapon Flight Test Using WSNs

  • Min, Joonki;Kim, Joo-Kyoung;Kwon, Youngmi;Lee, Yong-Jae
    • Journal of Sensor Science and Technology
    • /
    • v.22 no.1
    • /
    • pp.18-27
    • /
    • 2013
  • Real-time monitoring is one of the prime necessities in a weapon flight test that is required for the efficient and timely collection of large amounts of high-rate sampled data acquired by an event-trigger. The wireless sensor network is a good candidate to resolve this requirement, especially considering the inhospitable environment of a weapon flight test. In this paper, we propose a priority based multi-channel MAC protocol with CSMA/CA over a single radio for a real-time monitoring of a weapon flight test. Multi-channel transmissions of nodes can improve the network performance in wireless sensor networks. Our proposed MAC protocol has two operation modes: Normal mode and Priority Mode. In the normal mode, the node exploits the normal CSMA/CA mechanism. In the priority mode, the node has one of three grades - Class A, B, and C. The node uses a different CSMA/CA mechanism according to its grade that is determined by a signal level. High grade nodes can exploit more channels and lower backoff exponents than low ones, which allow high grade nodes to obtain more transmission opportunities. In addition, it can guarantee successful transmission of important data generated by high grade nodes. Simulation results show that the proposed MAC exhibits excellent performance in an event-triggered real-time application.

Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections

  • Tin, Phu Tran;Nam, Pham Minh;Duy, Tran Trung;Voznak, Miroslav
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.3
    • /
    • pp.200-209
    • /
    • 2017
  • In this paper, we investigate the tradeoff between security and reliability for a multi-hop protocol in cluster-based underlay cognitive radio networks. In the proposed protocol, a secondary source communicates with a secondary destination via the multi-hop relay method in the presence of a secondary eavesdropper. To enhance system performance under the joint impact of interference constraint required by multiple primary users and hardware impairments, the best relay node is selected at each hop to relay the source data to the destination. Moreover, the destination is equipped with multiple antennas and employs a selection combining (SC) technique to combine the received data. We derive closed-form expressions of the intercept probability (IP) for the eavesdropping links and the outage probability (OP) for the data links over a Rayleigh fading channel. Finally, the correction of our derivations is verified by Monte-Carlo simulations.

Group Average-consensus and Group Formation-consensus for First-order Multi-agent Systems (일차 다개체 시스템의 그룹 평균 상태일치와 그룹 대형 상태일치)

  • Kim, Jae Man;Park, Jin Bae;Choi, Yoon Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.12
    • /
    • pp.1225-1230
    • /
    • 2014
  • This paper investigates the group average-consensus and group formation-consensus problems for first-order multi-agent systems. The control protocol for group consensus is designed by considering the positive adjacency elements. Since each intra-group Laplacian matrix cannot be satisfied with the in-degree balance because of the positive adjacency elements between groups, we decompose the Laplacian matrix into an intra-group Laplacian matrix and an inter-group Laplacian matrix. Moreover, average matrices are used in the control protocol to analyze the stability of multi-agent systems with a fixed and undirected communication topology. Using the graph theory and the Lyapunov functional, stability analysis is performed for group average-consensus and group formation-consensus, respectively. Finally, some simulation results are presented to validate the effectiveness of the proposed control protocol for group consensus.

The effect of acupuncture on hot flushes : A study protocol of multi-center randomized controlled clinical trial (갱년기 여성의 안면홍조에 대한 침치료 다기관 임상시험 : 프로토콜)

  • Park, Ji-Eun;Oh, Dal-Seok;Kang, Kyung-Won;Kim, Dong-Il;Choi, Sun-Mi
    • Korean Journal of Acupuncture
    • /
    • v.24 no.3
    • /
    • pp.33-45
    • /
    • 2007
  • Background : Hot flushes are general postmenopausal symptoms which about 75% of climacteric women undergo. They affect hotness, perspirations, systemic weakness, panic disorders, insomnia. Acupuncture is effective in alleviating hot flushes in practice. Assessment effectiveness and safety of acupuncture in hot flushes would be needed through multi-center trial. Objectives : Purpose of this study is to develope the protocol of effects of acupuncture on hot flushes, a postmenopausal symptom in climacteric women. Methods & Results : It will be a multi-centered, randomized, sham controlled, comparative trial. It will be performed by Good Clinical Practice after approval of Institutional Review Board. Selection criteria will be set according those of FDA above moderate degree. There will be a notice on concomitant medication, other herbs, dietary supplements. Superficial needling on sham points will be used for control group. Treatment period will be 8 weeks with 12 weeks' follow up. Some questionnaire scale will be used as the primary and secondary outcome. Conclusions : The clinical trials based on this protocol will be performed.

  • PDF

Adaptive Multi-routing Protocol for a High Mobility MANET (변동성이 높은 이동 애드 혹 네트워크를 위한 적응적 다중 라우팅 프로토콜 적용 기법)

  • Deepak, G.C.;Heo, Ung;Choi, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.2
    • /
    • pp.103-110
    • /
    • 2008
  • When there is uncertainty in topological rate of change, motility model and terrain condition, the performance severely degrades in MANET. The concept of transition of routing protocol on the fly according to the network parameters such as coverage, connectivity and mobility etc. may counterbalance the problems stated above. The mathematical modeling of feedback parameters has been derived, and the architecture for the multi-routing protocol system providing an adaptation from one routing protocol to another is also investigated. This paper is extensively devoted on the analysis of mobility, connectivity and their effects on the network and finally transition into another routing protocol according to them.

A Vulnerability Analysis of Multi-Context RFID Mutual Authentication Protocol (다중 컨텍스트 RFID 상호 인증 프로토콜의 보안 취약점 분석)

  • Kim, Young-Back;Kim, Sung-Soo;Chung, Kyung-Ho;Kim, Soo-Yong;Yun, Tae-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.71-80
    • /
    • 2013
  • In this paper, we analyze the security vulnerability through the several attack scenarios for the MCR-MAP(Multi-Context RFID Mutual Authentication Protocol) proposed by Ahn et al. And we propose the secure mutual authentication protocol that improved a prior MCR-MAP. The suggested protocol uses the ID of the legal tag and the timestamp generated by the server, when the tag tries to authenticate. And when the tag creates the credential, we create the new secret key computing the XOR operation between the secret key shared with the server and the tag timestamp generated by the server. As a result, the proposed protocol provides the secure mutual authentication and then is safe to spoofing attack. Also it provides forward-secrecy and then is safe to offline brute-burst attack. In this paper, we compare and verify the security vulnerability of the prior and the proposed protocol through the security analysis.

Development of RTSP Media Server Using IOCP &Multi-Thread (IOCP와 Multi-Thread를 이용한 RTSP Media Server 개발)

  • 김수진;김익형;권장우
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.767-770
    • /
    • 2002
  • 본 논문에서는 RTSP 프로토콜을 제어하기 위한 서버 시스템을 IOCP 기반의 Multi-Thread 기법을 이용하여 구현하는 방법을 소개한다. 다수의 클라이언트에 대한 응답을 Thread로 구성하는 부분에서 Multi-Threading을 이용함으로써 수행 속도를 높이고 Winsock2에서 제공하는 IOCP(T/O Completion Port)를 이용하여 견고하고 확장이 용이한 RTSP(Real Time Streaming Protocol) 스트리밍 서버를 개발하였다.

  • PDF