• Title/Summary/Keyword: Real MAC

Search Result 226, Processing Time 0.029 seconds

Development of MAC layer of Network for KTX high-speed train system (고속 열차용 네트워크의 MAC 계층 개발)

  • Lee, Bum-Yong;Kim, Hyung-In;Jung, Sung-Youn;Park, Jae-Hyun
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.2015-2020
    • /
    • 2008
  • Real-time communication network is important for KTX high speed train system because small problem can make a huge accident. Communication network for KTX high speed train system consists of IEEE 802.4 token bus network and FM0 encoding. The network device is developed by using MC68824 TBC, MC68185 TPM and MC68020 MPU. The network device make available to analysis of the network protocol among vehicles for Kyung-Boo high-speed train system.

  • PDF

Wireless Fieldbus for Networked Control Systems using LR-WPAN

  • Choi, Dong-Hyuk;Kim, Dong-Sung
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.1
    • /
    • pp.119-125
    • /
    • 2008
  • This paper examines the use of a wireless Fieldbus based on IEEE 802.15.4 MAC protocol. The superframe of IEEE 802.15.4 is applied to a transmission scheme of real-time mixed data. The transmission and bandwidth allocation scheme are proposed for real-time communication using a superframe. The proposed wireless Fieldbus protocol is able to transmit three types of data (periodic data, sporadic data, and non real-time messages), and guarantee realtime transmission simultaneously within a limited timeframe.

A Medium Access Control Protocol for rt- VBR Traffic in Wireless ATM Networks

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • This paper proposes a MAC protocol for real-time VBR (rt-VBR) services in wireless ATM networks. The proposed protocol is characterized by a contention-based mechanism of the reservation request, a contention-free polling scheme for transferring the dynamic parameters, and a priority scheme of the slot allocation. The design objective of the proposed protocol is to guarantee the real-time constraint of rt-VBR traffic. The scheduling algorithm uses a priority scheme based on the maximum cell transfer delay parameter. The wireless terminal establishes an rt-VBR connection to the base station with a contention-based scheme. The base station scheduler allocates a dynamic parameter minislot to the wireless terminal for transferring the residual lifetime and the number of requesting slots as the dynamic parameters. Based on the received dynamic parameters, the scheduler allocates the uplink slots to the wireless terminal with the most stringent delay requirement. The simulation results show that the proposed protocol can guarantee the delay constraint of rt-VBR services along with its cell loss rate significantly reduced.

Design of HD-MAC Decoding Filter (HD-MAC 디코더용 필터설계)

  • Nam, B.H.;Kim, H.J.;Lee, J.M.;Kim, H.J.;Jee, G.I.;Kim, G.T.
    • Proceedings of the KIEE Conference
    • /
    • 1991.07a
    • /
    • pp.833-836
    • /
    • 1991
  • This paper proposes several types of 2-D interpolation lifters for HD-MAC decoder. Filters considered here are FIR, IIR, median, and FMH. Their structure and coefficients have been determined to be appropriate for real-time computation as well as to have good reconstructability. Results or computer simulation are also presented to show the performance of those filters.

  • PDF

Analysis of IEEE 802.11n System adapting SVD-MIMO Method based on Ns(Network simulator)-2 (Ns-2 기반의 SVD-MIMO 방식을 적용한 IEEE 802.11n 시스템 분석)

  • Lee, Yun-Ho;Kim, Joo-Seok;Choi, Jin-Kyu;Kim, Kyung-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1109-1119
    • /
    • 2009
  • WLAN(Wireless Local Area Network) standard is currently developing with increased wireless internet demand. Though existing IEEE 802.11e demonstrates that data rates exceed 54Mbps with assuring QoS(Quality of Service), wireless internet users can't be satisfied with real communication system. After IEEE 802.11e system, Study trends of IEEE 802.11n show two aspects, enhanced system throughput using aggregation among packets in MAC (Medium Access Control) layer, and better data rates adapting MIMO(Multiple-Input Multiple-Output) in PHY(Physical) layer. But, no one demonstrates IEEE 802.11n system performance results considering MAC and PHY connection. Therefore, this paper adapts MIMO in PHY layer for IEEE 802.11n system based on A-MPDU(Aggregation-MAC Protocol Data Unit) method in MAC layer considering MAC and PHY connection. SVD(Singular Value Decomposition) method with WLAN MIMO TGn Channel is used to analyze MIMO. Consequently, Simulation results show enhanced throughput and data rates compared to existing system. Also, We use Ns-2(Network Simulator-2) considering MAC and PHY connection for reality.

  • PDF

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF

A Design for Improving Performance of Dynamic Traffic in High Rate WPAN (고속 WPAN의 동적 트래픽 성능 개선을 위한 구조 설계)

  • Kim, Ji-Eun;Lee, Sang-Jae;Jeon, Young-Ae;Choi, Sang-Sung
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2005.11a
    • /
    • pp.121-124
    • /
    • 2005
  • The High Rate Wireless Personal Area Networks (WPAN) is mainly targeted to consumer electronics and portable communication devices which need high rates and QoS. To achieve these goals, the WPAN provides data rates up to 1Gbps and adopts a Time Division Multiple Access (TDMA) MAC protocol. Since IEEE 802.15.3 MAC is based on TDMA scheme, it has good performance in dealing with real traffics. But it does not give better results for dynamic traffic. For dynamic traffic, IEEE 802.15.3 MAC needs a kind of request and response policy that brings about the degradation of performance in order to adapt to network changes. To overcome this problem and enhance the data throughput, this paper proposes a superframe structure which uses the Enhanced Contention Access Period (ECAP) to transmit data during sleep-CTA in PM mode.

  • PDF

Growth of Venture Company and Knowledge Management: The Case of K-MAC(Korea Materials & Analysis Corp.) (벤처기업의 성장과 지식경영: 케이맥(주) 사례를 중심으로)

  • Choi, Jong-in;Kang, Seokjin
    • Knowledge Management Research
    • /
    • v.14 no.5
    • /
    • pp.1-14
    • /
    • 2013
  • This paper is aimed at investigating the factors to grow the new technology based firm(NTBF), K-MAC. NTBFs need an environment in which novelty is encouraged, employees find work meaningful and controllable, learning is incorporated into work, ideas and process improvements are implemented and a balanced focus of the internal and external to the company is fostered. With collaboration between industry and academia, Lynda Aiman-Smith made an instrument of VIQ(Value Innovation Quotient), which is consist of 9 factors, 33 items. VIQ Results can help the company to develop a better understanding of the organization's culture, and its formal subgroups. That is to identify subcultures in the organization, to diagnose potential problems or inhibitors of innovation, to identify organizational strengths for innovation and set a quantitative baseline. Using the VIQ,K-MAC analysed the subculture of innovation potential capability. K-MAC organized the COP(community of practice) with the young employees' participation and try to solve the real problem in the working place. This paper explained the diverse growing trajectory through the TPM concept and suggest for the future strategy.

  • PDF

MAC Protocol for Bursty Traffic in Wireless ATM Networks (무선 ATM망에서 버스트 트래픽을 위한 MAC 프로토콜)

  • 임인택;양성룡;허정석
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.117-120
    • /
    • 2001
  • In this paper, a contention-based reservation MAC protocol is proposed for non-real-time bursty traffic services in the wireless ATM networks. In order to reduce the collisions of the reservation request packets, the base station scheduler calculates the transmission probability using the number of RAS minislots and the estimated load of the reservation request packets. And it broadcasts the calculated transmission probability through the downlink control channel. Mobile terminals, which have a traffic burst, select randomly a RAS minislot and transmit the reservation request packet with the received transmission probability. The reservation request packet contains the number of packets in the buffer. The base station allocates slots based on the buffer status of the received reservation request packets.

  • PDF

A Study of English Fantasy Novels in the 19th Century: Focus on Lewis Carroll and George MacDonald (19세기 영국 판타지소설 연구 -루이스 캐럴과 조지 맥도널드를 중심으로)

  • Yang, Yun-Jeong
    • Journal of English Language & Literature
    • /
    • v.56 no.5
    • /
    • pp.999-1026
    • /
    • 2010
  • There was a Golden Age of Fantasy novels in the United Kingdom in the 19th Century, which had the major writers, Lewis Carroll and George MacDonald. These writers pushed the boundaries of imagination and created a new world in which explore their own selves and societies. Fantasy novels flowered in the 1860s when a group of writers including Carroll and MacDonald published their works. These writers used the trait of dream framing to create their own fantasy world in which they took the action against the complicated and oppressive Victorian reality. Carroll's fantasy worlds of Alice in Wonderland and Through the Looking-Glass were an insane and chaotic world where the certainty of the real world was overturned. MacDonald's dream worlds of At the Back of the North Wind and the Princess books including The Princess and the Goblin and The Princess and Curdie were ideal societies in which imaginative characters could create harmony between fantasy and reality. Fantasy writers engaged in making journey to other lands to do philosophical and moral discussion critiquing Victorian society and to find insights into those problems in their works. Thus, their fantasy journey traverses time and place can produce some suggestive answers to the questions that lie in other times and realities as well as theirs.