• Title/Summary/Keyword: access channel

Search Result 1,522, Processing Time 0.03 seconds

A Survey on Admission Control Mechanisms for providing QoS in the IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜에서 QoS 제공을 위한 허가 제어 연구)

  • Lee, Kye-Sang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.535-538
    • /
    • 2005
  • Wireless LANs based on the IEEE 802.11 standard are widely spread for use nowadays. Traffic which are conveyed over the WLANs change rapidly from normal data such a Email and Web pages, to multimedia data of high resolution video and voice. To meet QoS (Quality of Service) required by these multimedia traffic, the IEEE 802 committee recently has developed a new standard, IEEE 802.11e. IEEe 802.11.e contains two MAC mechanisms for providing QoS: EDCA(Enhanced Distributed Channel Access) and HCCA (HCF Controlled Channel Access). Using these standardized MAC mechanisms as a building platform, various admission control mechanisms can be combined to offer QoS gurantees for multimedia traffic. This paper surveys these research efforts.

  • PDF

Throughput and Delay Analysis of a Reliable Cooperative MAC Protocol in Ad Hoc Networks

  • Jang, Jaeshin;Kim, Sang Wu;Wie, Sunghong
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.524-532
    • /
    • 2012
  • In this paper, we present the performance evaluation of the reliable cooperative media access control (RCO-MAC) protocol, which has been proposed in [1] by us in order to enhance system throughput in bad wireless channel environments. The performance of this protocol is evaluated with computer simulation as well as mathematical analysis in this paper. The system throughput, two types of average delays, average channel access delay, and average system delay, which includes the queuing delay in the buffer, are used as performance metrics. In addition, two different traffic models are used for performance evaluation: The saturated traffic model for computing system throughput and average channel access delay, and the exponential data generation model for calculating average system delay. The numerical results show that the RCO-MAC protocol proposed by us provides over 20% more system throughput than the relay distributed coordination function (rDCF) scheme. The numerical results show that the RCO-MAC protocol provides a slightly higher average channel access delay over a greater number of source nodes than the rDCF. This is because a greater number of source nodes provide more opportunities for cooperative request to send (CRTS) frame collisions and because the value of the related retransmission timer is greater in the RCO-MAC protocol than in the rDCF protocol. The numerical results also confirm that the RCO-MAC protocol provides better average system delay over the whole gamut of the number of source nodes than the rDCF protocol.

Performance analysis of BTB-TDMA considering asymmetry of propagation delays in UANets (수중 네트워크의 전파 비대칭성을 고려한 BTB-TDMA 성능 분석)

  • Cho, A-Ra;Yun, Changho;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.50-60
    • /
    • 2015
  • A Block-Time-Bounded Time Division Multiple Access (BTB-TDMA) medium access control protocol, which estimates the propagation delay of nodes according to their location and moving velocity information, has been proposed for underwater acoustic networks. BTB-TDMA provides nodes with their transmission schedules by a time block that is a time unit, newly designed for BTB-TDMA. In this paper, we investigate how the receiver collision, that is induced by the asymmetry between node's uplink and downlink propagation delay due to its mobility, affects the performance of BTB-TDMA. To do this, we analytically obtain the collision rate, the channel access delay, and the channel utilization by considering the asymmetry of propagation delay. Then, simulations are extensively performed with respect to the length of a time block by varying the number of nodes, the network range, and the node's velocity. Thus, the simulation results can suggest performance criteria to determine the optimal length of a time block which minimizes the collision rate and concurrently maximizes the channel access delay and the channel utilization.

Design of Link Cost Metric for IEEE 802.11-based Mesh Routing (IEEE 802.11 MAC 특성을 고려한 무선 메쉬 네트워크용 링크 품질 인자 개발)

  • Lee, Ok-Hwan;Kim, Seong-Kwan;Choi, Sung-Hyun;Lee, Sung-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.456-469
    • /
    • 2009
  • We develop a new wireless link quality metric, ECOT(Estimated Channel Occupancy Time) that enables a high throughput route setup in wireless mesh networks. The key feature of ECOT is to be applicable to diverse mesh network environments where IEEE 802.11 MAC (Medium Access Control) variants are used. We take into account the exact operational features of 802.11 MAC protocols, such as 802.11 DCF(Distributed Coordination Function), 802.11e EDCA(Enhanced Distributed Channel Access) with BACK (Block Acknowledgement), and 802.11n A-MPDU(Aggregate MAC Protocol Data Unit), and derive the integrated link metric based on which a high throughput end-to-end path is established. Through extensive simulation in random-topology settings, we evaluate the performance of proposed link metric and present that ECOT shows 8.5 to 354.4% throughput gain over existing link metrics.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

Cyclic Contention Free Access Scheme for IEEE802.15.4 WPAN (IEEE802.15.4 WPAN에서의 Cyclic Contention Free Access 기법)

  • Kwak, Woon-Geun;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.455-462
    • /
    • 2007
  • The GTS(Guaranteed Time Slot) of IEEE802.15.4 standard, which is the contention free access mechanism, has some problems such as the limited number of deployed devices, the low channel utilization and the service confirm delay. The proposed Cyclic-CFA(Contention Free Access) scheme is a modified polling algorithm that allows a large number of devices to be served Contention Free Access without polling packets. The Cyclic-CFA scheme improves the channel utilization dramatically and also reduces service delay time.

Performance Improvement Method of Multi-Port Memory Controller Using An Effective Multi-Channel Direct memory Access Management (효과적인 다채널 직접 메모리 접근 관리를 통한 멀티포트 메모리 컨트롤러의 성능 향상 방법)

  • Chun, Ik-Jae;Lyuh, Chun-Gi;Roh, Tae Moon;Lee, Moon-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.4
    • /
    • pp.33-41
    • /
    • 2014
  • This paper presents an effective memory access method for a high-speed data transfer on mobile systems using a direct memory access controller that considers the characteristics of a multi-port memory controller. The direct memory access controller has an integrated channel management function to control multiple direct memory access channels. The channels are physically separated and operate independently from each other. Experimental results show that the proposed direct memory access method improves the transfer performance by up to 72% and 69% on read and write transfer cycles, respectively. The total number of transfer cycles of the proposed method is 63% less than in a commercial method under 4-channel access.

Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic

  • Sui, Nannan;Wang, Cong;Xie, Wei;Xu, Youyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.687-708
    • /
    • 2017
  • The machine-to-machine (M2M) communication is featured by tremendous number of devices, small data transmission, and large uplink to downlink traffic ratio. The massive access requests generated by M2M devices would result in the current medium access control (MAC) protocol in LTE/LTE-A networks suffering from physical random access channel (PRACH) overload, high signaling overhead, and resource underutilization. As such, fairness should be carefully considered when M2M traffic coexists with human-to-human (H2H) traffic. To tackle these problems, we propose an adaptive Slotted ALOHA (S-ALOHA) and time division multiple access (TDMA) hybrid protocol. In particular, the proposed hybrid protocol divides the reserved uplink resource blocks (RBs) in a transmission cycle into the S-ALOHA part for M2M traffic with small-size packets and the TDMA part for H2H traffic with large-size packets. Adaptive resource allocation and access class barring (ACB) are exploited and optimized to maximize the channel utility with fairness constraint. Moreover, an upper performance bound for the proposed hybrid protocol is provided by performing the system equilibrium analysis. Simulation results demonstrate that, compared with pure S-ALOHA and pure TDMA protocol under a target fairness constraint of 0.9, our proposed hybrid protocol can improve the capacity by at least 9.44% when ${\lambda}_1:{\lambda}_2=1:1$and by at least 20.53% when ${\lambda}_1:{\lambda}_2=10:1$, where ${\lambda}_1,{\lambda}_2$ are traffic arrival rates of M2M and H2H traffic, respectively.

Tone-Based Access Scheme with Repetitive Contention in Contention-Based Medium Access Control (경쟁 기반 MAC에서의 반복적 톤 기반 경쟁 기법)

  • Ahn, Jae-Hyun;Yun, Jeong-Kyun;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5A
    • /
    • pp.460-466
    • /
    • 2007
  • There are two coordination functions in IEEE 802.11 standard. One is PCF, polling based function, and the other is DCF, contention based function. DCF is simpler than PCF but the performance is similar with the latter. That's the reason why DCF is more popular than PCF. However, DCF has a risk of collision with other nodes in the network because the function is a distributed contention based one. CSMA/CA of DCF has collision avoidance algorithm in it, but the performance of avoidance algorithm has limitations. In this paper we proposed a new scheme called TAR(Tone-based Access scheme with Repetitive conention). In TAR, there is narrow contention-only channel other than original data transmitting channel, so that both a data transmission and the contention can be performed simultaneously. The TAR uses the same contention concept with the CSMA/CA, but it has the originality for the narrow contention channel and the repetitive contention scheme which greatly reduce the collision probability. We proved the performance of TAR by some simulations, and it showed good results.

Simultaneous Transmission of Multiple Unicast and Multicast Streams Using Non-orthogonal Multiple Access (비직교 다중접속 방식을 이용한 다중 유니캐스트와 멀티캐스트 스트림 동시 전송)

  • Shin, Changyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.11-19
    • /
    • 2021
  • In this paper, we propose a non-orthogonal multiple access (NOMA) method based on channel alignment to simultaneously transmit multiple unicast and multicast streams in frequency-efficient manner. In this method, all receivers in a multicast cluster use the receive beamforming vectors that align their channels, and the base station uses the aligned channel information to design the transmit beamforming vectors that eliminate interference between multicast clusters. Using the effective receive channel information combined with the transmit beamforming vectors, unicast receivers design their own receive beamforming vectors that eliminate interference between unicast receivers. Since the proposed method effectively eliminates the interference, it achieves a higher sum rate than the existing orthogonal multiple access (OMA) method in high SNR regions. In addition, we present a hybrid method that exploits the benefits of the proposed NOMA method and the existing OMA method. Depending on the channel state, the hybrid method adaptively employs the existing OMA method, which improves the received signal power, in low SNR regions and the proposed NOMA method, which effectively eliminates the interference, in high SNR regions, thereby achieving a good sum rate over the entire SNR region.