• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.037 seconds

A MAC Enhancement Technique for Quality of Service Guarantee in Wireless Local Area Networks (무선 네트워크에서 QoS 보장을 위한 MAC 향상 기법)

  • Lee, Dong-Geon;Kim, Byoung-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1446-1459
    • /
    • 2008
  • In an infrastructure-based wireless network, an access point is used for all communications among mobile devices. However, when a mobile device moves into a dead Bone, a connectivity disruption between the mobile device and the access point occurs. Such connectivity disruption consequently leads to another connectivity disruption between the mobile device moving toward the dead zone and other wireless-enabled devices located within the area of the infrastructure-based wireless network. To cope with the connectivity disruption in the infrastructure-based wireless network the ad hoc network that dynamically forms a network without any preexisting communication infrastructure needs to be set up to provide seamless connections among mobile devices. In this paper, we propose the DNSQ-MAC (Dynamic Network State aware QoS-Medium Access Control) technique that meets the deadlines of MAC frames forwarded over hop-by-hop multipaths and guarantees the QoS performance of an ad hoc-based wireless network. Mobile devices incorporating the DNSQ-MAC technique are capable of adjusting to the new dynamic network status in order to enhance the QoS performance in the ad hoc-based wireless network. A case study which exploits the Qualnet simulator shows that the proposed DNSQ-MAC technique can guarantee the deadlines of MAC frames forwarded over hop-by-hop multipaths and enhance the QoS performance of various routing protocols and packet schedulers running on the network layer above the MAC layer.

  • PDF

Resolution Scheme of CRP Reservation Conflicts for Supporting QoS in ECMA-392-Based Ship Area Networks (ECMA-392 기반 선박 내 네트워크에서 QoS를 지원하는 CRP 예약 충돌 해결 방안)

  • Lee, Seong Ro;Oh, Joo-Seong;Kim, Beom-Mu;Lee, Yeonwoo;Jeong, Min-A;Lee, Seung Beom
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1298-1306
    • /
    • 2014
  • In this paper, we use the ECMA-392 standard, the first cognitive radio networks to meet the demand for IT services in the ship. And, we investigate about the conflicts of devices that support multi-hop network based on the ECMA-392. Therefore, we propose the resolution scheme of CRP reservation conflicts to solve this. The current CRP reservation approaches does not solve the CRP reservation conflicts of ECMA-392 between devices that move at a distance of three hops. Therefore, it is not possible to guarantee the QoS of real time services such as multimedia streaming. So, we provide a new CRP reservation scheme to avoid conflict through a new 2-hop CRP Availability IE and the change of CRP Control field. From the simulation results, we know that the proposed method of 3 hops CRP reservation conflicts resolution improves the throughput of device.

Availability based Scheduling Scheme for Fair Data Collection with Mobile Sink in Wireless Sensor Networks (무선 센서 네트워크에서 모바일 싱크를 통한 데이터 수집의 균등성 보장을 위한 가용성 기반 스케줄링 기법)

  • Lee, Joa-Hyoung;Jo, Young-Tae;Jung, In-Bum
    • The KIPS Transactions:PartA
    • /
    • v.16A no.3
    • /
    • pp.169-180
    • /
    • 2009
  • With fixed sinks, the network stability could be improved while the network life time could be decreased by the rapid energy dissipation around the fixed sink because of the concentrated network traffic from sensor nodes to the fixed sink in wireless sensor network. To address this problem, mobile sinks, which decentralize the network traffic, has received a lot of attention from many researchers recently. Since a mobile sink has a limited period to communicate with each sensor nodes, it is necessary for a scheduling algorithm to provide the fairness of data collection from each sensor nodes. In the paper, we propose the new scheduling algorithm, ASF(Availability based Scheduling scheme for Fair data collection), for the fair data collection by a mobile in the sensor networks. The ASF takes account of the distance between each sensor nodes and the mobile sink as scheduling metric, as well as the amount of collected data from each sensor nodes. Experiment results shows that the ASF improves the fairness of data collection among the sensor nodes, comparing to existing algorithm.

Mutual Exclusion based Localization Technique in Mobile Wireless Sensor Networks (이동 무선 센서 네트워크에서 상호배제 기반 위치인식 기법)

  • Lee, Joa-Hyoung;Lim, Dong-Sun;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1493-1504
    • /
    • 2010
  • The localization service which provides the location information of mobile user, is one of important service provided by sensor network. Many methods to obtain the location information of mobile user have been proposed. However, these methods were developed for only one mobile user so that it is hard to extend for multiple mobile users. If multiple mobile users start the localization process concurrently, there could be interference of beacon or ultrasound that each mobile user transmits. In the paper, we propose LME, the localization technique for multiple mobile nodes in mobile wireless sensor networks. In LME, collision of localization between sensor nodes is prevented by forcing the mobile node to get the permission of localization from anchor nodes. For this, we use CTS packet type for localization initiation by mobile node and RTS packet type for localization grant by anchor node. NTS packet type is uevento reject localization by anchor node for interference avoidance.nghe experimental result shows that the number of interference between nodes are increased in proportion to the number of mobile nodes and LME provides efficient localization.

Design and Performance Analysis of a new MAC Protocol for Providing Real-time Traffic Information using USN (USN 기반 실시간 주행 상황 정보 제공을 위한 MAC 설계 및 성능 분석)

  • Park, Man-Kyu;So, Sang-Ho;Lee, Jae-Yong;Lim, Jae-Han;Son, Myung-Hee;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.5
    • /
    • pp.38-48
    • /
    • 2007
  • In ubiquitous environment, sensor networks that sense and transmit surrounding data without human intervention will become more important. If sensors are installed for detecting vehicles and measuring their speed in the road and that real-time information is given to drivers, it will be very effective for enhancing safety and controlling traffic in the road. In this paper, we proposed a new reliable and real-time sensor MAC protocol between AP and sensor nodes in order to provide real-time traffic flow information based on ubiquitous sensor networks. The proposed MAC allocates one TDMA slot for each sensor node on the IEEE 802.15.4 based channel structure, introduces relayed communication for distant sensors, and adopts a frame structure that supports retransmission for the case of errors. In addition, the proposed MAC synchronizes with AP by using beacon and adopts a hybrid tracking mode that supports economic power consumption according to various traffic situations, We implemented a simulator for the proposed MAC by using sim++ and evaluated various performances. The simulation results show that the proposed MAC reduces the power consumption and reveals excellent performance in real-time application systems.

Performance Analysis of MBMS and Wi-Fi Priority Policy in Heterogeneous Networks having a dispersed Single-cell MBMS (분산된 단일 셀 MBMS을 지원하는 이종 네트워크 환경에서 MBMS와 와이파이 사용자 우선 정책에 대한 성능 분석)

  • Jeong, Un Ho;Lee, Jung Moon;Kim, Gi Taek;Nam, Boo Hee;Kim, Dong Hoi
    • Journal of Broadcast Engineering
    • /
    • v.18 no.2
    • /
    • pp.215-224
    • /
    • 2013
  • With the rising popularity of smart-phones, the supply of Internet protocol television is largely increased and it causes the wireless communication network load to be increased. To overcome such an overloading problem, 3GPP is now working on the standardization of MBMS since LTE Release 6 specification. MBMS has good performance in bandwidth efficiency by sharing the same bandwidth with the mulitple MBMS users having the same content. According to the proposed algorithm, in heterogeneous networks having a dispersed Single-cell MBMS where 3GPP network and Wi-Fi network are mixed, if the number of MBMS users, who are belonging to cells supporting a dispersed Single-cell MBMS, is more than a specified threshold, the MBMS priority policy is operated. Otherwise, the Wi-Fi priority policy is executed. As the simulation results show both the increase of total available bandwidth ratio and the decrease of network usage cost, it is confirmed that the proposed scheme allows the network efficiency to be maximized.

Sensing the Stress: the Role of the Stress-activated p38/Hog1 MAPK Signalling Pathway in Human Pathogenic Fungus Cryptococcus neoformans

  • Bahn, Yong-Sun;Heitman, Joseph
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 2007.05a
    • /
    • pp.120-122
    • /
    • 2007
  • All living organisms use numerous signal-transduction pathways to sense and respond to their environments and thereby survive and proliferate in a range of biological niches. Molecular dissection of these signalling networks has increased our understanding of these communication processes and provides a platform for therapeutic intervention when these pathways malfunction in disease states, including infection. Owing to the expanding availability of sequenced genomes, a wealth of genetic and molecular tools and the conservation of signalling networks, members of the fungal kingdom serve as excellent model systems for more complex, multicellular organisms. Here, we employed Cryptococcus neoformans as a model system to understand how fungal-signalling circuits operate at the molecular level to sense and respond to a plethora of environmental stresses, including osmoticshock, UV, high temperature, oxidative stress and toxic drugs/metabolites. The stress-activated p38/Hog1 MAPK pathway is structurally conserved in many organisms as diverse as yeast and mammals, but its regulation is uniquely specialized in a majority of clinical Cryptococcus neoformans serotype A and D strains to control differentiation and virulence factor regulation. C. neoformans Hog1 MAPK is controlled by Pbs2 MAPK kinase (MAPKK). The Pbs2-Hog1 MAPK cascade is controlled by the fungal "two-component" system that is composed of a response regulator, Ssk1, and multiple sensor kinases, including two-component.like (Tco) 1 and Tco2. Tco1 and Tco2 play shared and distinct roles in stress responses and drug sensitivity through the Hog1 MAPK system. Furthermore, each sensor kinase mediates unique cellular functions for virulence and morphological differentiation. We also identified and characterized the Ssk2 MAPKKK upstream of the MAPKK Pbs2 and the MAPK Hog1 in C. neoformans. The SSK2 gene was identified as a potential component responsible for differential Hog1 regulation between the serotype D sibling f1 strains B3501 and B3502 through comparative analysis of their meiotic map with the meiotic segregation of Hog1-dependent sensitivity to the fungicide fludioxonil. Ssk2 is the only polymorphic component in the Hog1 MAPK module, including two coding sequence changes between the SSK2 alleles in B3501 and B3502 strains. To further support this finding, the SSK2 allele exchange completely swapped Hog1-related phenotypes between B3501 and B3502 strains. In the serotype A strain H99, disruption of the SSK2 gene dramatically enhanced capsule biosynthesis and mating efficiency, similar to pbs2 and hog1 mutations. Furthermore, ssk2, pbs2, and hog1 mutants are all hypersensitive to a variety of stresses and completely resistant to fludioxonil. Taken together, these findings indicate that Ssk2 is the critical interface protein connecting the two-component system and the Pbs2-Hog1 pathway in C. neoformans.

  • PDF

DDoS Attack Analysis Using the Improved ATMSim (개선된 ATMSim을 이용한 DDoS 공격 분석)

  • Jeong, Hae-Duck J.;Ryu, Myeong-Un;Ji, Min-Jun;Cho, You-Been;Ye, Sang-Kug;Lee, Jong-Suk R.
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.19-28
    • /
    • 2016
  • Internet traffic has been significantly increasing due to the development of information and communication networks and the growing numbers of cell phone users that access networks. This paper connects to this issue by presenting a way to detect and analyze a typical DDoS attack that results in Internet breaches and network attacks, which are on the increase. To achieve this goal, we improve features and GUI of the existing ATMSim analysis package and use it. This package operates on a network flow-based analysis method, which means that normal traffic collected through an internal LAN at the Korean Bible University campus as well as anomaly traffic with DDoS attacks are generated. Self-similarity processes are used to analyze normal and anomaly traffic that are collected and generated from the improved ATMSim. Our numerical results obtained from three Hurst parameter estimate techniques show that there is quantitatively a significant difference between normal traffic and anomaly traffic from a self-similarity perspective.

Real-Time Object Tracking Algorithm based on Pattern Classification in Surveillance Networks (서베일런스 네트워크에서 패턴인식 기반의 실시간 객체 추적 알고리즘)

  • Kang, Sung-Kwan;Chun, Sang-Hun
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.183-190
    • /
    • 2016
  • This paper proposes algorithm to reduce the computing time in a neural network that reduces transmission of data for tracking mobile objects in surveillance networks in terms of detection and communication load. Object Detection can be defined as follows : Given image sequence, which can forom a digitalized image, the goal of object detection is to determine whether or not there is any object in the image, and if present, returns its location, direction, size, and so on. But object in an given image is considerably difficult because location, size, light conditions, obstacle and so on change the overall appearance of objects, thereby making it difficult to detect them rapidly and exactly. Therefore, this paper proposes fast and exact object detection which overcomes some restrictions by using neural network. Proposed system can be object detection irrelevant to obstacle, background and pose rapidly. And neural network calculation time is decreased by reducing input vector size of neural network. Principle Component Analysis can reduce the dimension of data. In the video input in real time from a CCTV was experimented and in case of color segment, the result shows different success rate depending on camera settings. Experimental results show proposed method attains 30% higher recognition performance than the conventional method.

Design of Adaptive Security Framework based on Carousel for Cognitive Radio Network (인지무선네트워크를 위한 회전자 기반 적응형 보안프레임워크 설계)

  • Kim, Hyunsung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.165-172
    • /
    • 2013
  • Convergence is increasingly prevalent in the IT world which generally refers to the combination of two or more different technologies in a single device. Especially, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio (CR) is a convergence technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. However, the very process of convergence is likely to expose significant security issues due to the merging of what have been separate services and technologies and also as a result of the introduction of new technologies. The main purpose of this research is focused on devising an adaptive security framework based on carousel for CR networks as a distinct telecommunication convergence application, which are still at the stage of being developed and standardized with the lack of security concerns. The framework uses a secure credential, named as carousel, initialized with the location related information from objects position, which is used to design security mechanisms for supporting privacy and various securities based on it. The proposed adaptive security framework could be used as a security building block for the CR network standards and various convergence applications.