• Title/Summary/Keyword: exponential protocol

Search Result 68, Processing Time 0.021 seconds

Efficiency of Exponential Deperm Protocol

  • Kim, Yongmin;Kim, Young-Hak;Shin, Kwang-Ho
    • Journal of Magnetics
    • /
    • v.18 no.3
    • /
    • pp.326-330
    • /
    • 2013
  • Magnetic treatment of surface vessels and submarines (Deperm) is required to camouflage them against magnetic detection from enemy marine force. So far, deperm has been accomplished by applying an alternating magnetic field of which amplitude decreases linearly. However, the reduction of the residual flux density in the direction of magnetic field is not linear in the case of the linear protocol, since the ferromagnetic material used to construct a surface vessel, mainly Fe-C, shows a nonlinear behavior in an alternating magnetic field. This is one of main reasons to make an ordinary deperm protocol inefficient. In this paper, we propose the exponential deperming protocol and compare the exponential protocol to conventional linear protocol within the framework of deperm performance. We found out that step number could be reduced in the exponential protocol compare with in the linear protocol, because the larger numbers of deperm steps are dedicated in the irreversible domain process region on the magnetic hysteresis.

Performance Evaluation of X-MAC/BEB Protocol for Wireless Sensor Networks

  • Ullah, Ayaz;Ahn, Jong-Suk
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.857-869
    • /
    • 2016
  • This paper proposes an X-MAC/BEB protocol that runs a binary exponential backoff (BEB) algorithm on top of an X-MAC protocol to save more energy by reducing collision, especially in densely populated wireless sensor networks (WSNs). X-MAC, a lightweight asynchronous duty cycle medium access control (MAC) protocol, was introduced for spending less energy than its predecessor, B-MAC. One of X-MAC 's conspicuous technique is a mechanism to allow senders to promptly send their data when their receivers wake up. X-MAC, however, has no mechanism to deal with sudden traffic fluctuations that often occur whenever closely located nodes simultaneously diffuse their sense data. To precisely evaluate the impact of the BEB algorithm on X-MAC, this paper builds an analytical model of X-MAC/BEB that integrates the BEB model with the X-MAC model. The analytical and simulation results confirmed that X-MAC/BEB outperformed X-MAC in terms of throughput, delay, and energy consumption, especially in congested WSNs.

Performance Evaluation of the HomePNA 3.0 Asynchronous MAC Mode with Collision Management Protocol (HomePNA 3.0 비동기 MAC 모드의 Collision Management Protocol 성능 분석)

  • 김희천;정민영;이태진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.727-734
    • /
    • 2004
  • Collision Management Protocol (CMP) efficiently resolves collisions when data frames are transmitted in networks consisting of HomPNA 3.0 asynchronous MAC mode device with random access. Unlike Distributed Fair Priority Queueing (DFPQ) algorithm in HomePNA 2.0 or Binary Exponential Backoff (BEB) algorithm in IEEE 802.11, order of retransmission is decided according to Collision Signaling Sequence (CSS) values allocated to each device. Thus, CMP can minimize the number of mean collisions because order of retransmission is decided in a deterministic way. In this paper. we evaluate the saturation performance of CMP in HomePNA 3.0 using an analytic method.

MDA-SMAC: An Energy-Efficient Improved SMAC Protocol for Wireless Sensor Networks

  • Xu, Donghong;Wang, Ke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4754-4773
    • /
    • 2018
  • In sensor medium access control (SMAC) protocol, sensor nodes can only access the channel in the scheduling and listening period. However, this fixed working method may generate data latency and high conflict. To solve those problems, scheduling duty in the original SMAC protocol is divided into multiple small scheduling duties (micro duty MD). By applying different micro-dispersed contention channel, sensor nodes can reduce the collision probability of the data and thereby save energy. Based on the given micro-duty, this paper presents an adaptive duty cycle (DC) and back-off algorithm, aiming at detecting the fixed duty cycle in SMAC protocol. According to the given buffer queue length, sensor nodes dynamically change the duty cycle. In the context of low duty cycle and low flow, fair binary exponential back-off (F-BEB) algorithm is applied to reduce data latency. In the context of high duty cycle and high flow, capture avoidance binary exponential back-off (CA-BEB) algorithm is used to further reduce the conflict probability for saving energy consumption. Based on the above two contexts, we propose an improved SMAC protocol, micro duty adaptive SMAC protocol (MDA-SMAC). Comparing the performance between MDA-SMAC protocol and SMAC protocol on the NS-2 simulation platform, the results show that, MDA-SMAC protocol performs better in terms of energy consumption, latency and effective throughput than SMAC protocol, especially in the condition of more crowded network traffic and more sensor nodes.

A Verifiable and Traceable Secondhand Digital Media Market Protocol

  • Chen, Chin-Ling;Chen, Chin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1472-1491
    • /
    • 2011
  • As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer's secret key, the new buyer's watermark to embed in resold digital content, and the reseller's encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.

Efficient Anonymous Fingerprinting with Improved Automatic Identification of Redistributors (재분배자의 자동 식별기능을 갖는 효율적인 익명성을 제공하는 핑거프린팅)

  • 정찬주;오수현;양형규;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.47-57
    • /
    • 2000
  • This paper proposes efficient anonymous fingerprinting with improved automatic identification of redistributors in electronic commerce of digital contents. The proposed scheme by Domingos in Eletronic Letters is inefficient in electronic commerce, because of pass numbers in registration protocol and exponential computations in identification protocol. Our scheme is reduced 2-pass in registraton protocol and is required only 1 time exponential computation than his in identification protocol. According to electronic commerce of digital contents used in ordinary life, our schemes values are increased.

A CSMA/CA with Binary Exponential Back-off based Priority MAC Protocol in Tactical Wireless Networks (전술 무선망에서 2진 지수 백오프를 사용하는 CSMA/CA 기반 우선순위 적용 MAC 프로토콜 설계)

  • Byun, Ae-Ran;Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.12-19
    • /
    • 2015
  • In network-centric warfare, the communication network has played a significant role in defeating an enemy. Especially, the urgent and important data should be preferentially delivered in time. Thus, we proposed a priority MAC protocol based on CSMA/CA with Binary Exponential Back-off for tactical wireless networks. This MAC protocol suggested a PCW(Prioritized Contention Window) with differentiated back-off time by priority and a RBR(Repetitive Back-off Reset) to reset the remaining back-off time. The results showed that this proposed MAC has higher performance than those of DCF(Distributed Coordination Function) in the transmission success rate and the number of control packet transmission by reducing the packet collision. Thus, it produced more effective power consumption. In comparison with DCF, this proposed protocol is more suitable in high-traffic network.

Privacy Aware Authentication Protocol for Cognitive Radio Networks (인지무선 네트워크를 위한 프라이버시가 강화된 인증 프로토콜)

  • Kim, Hyun-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.33-40
    • /
    • 2010
  • Recently, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio is a technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. Kuroda et al. proposed a radio-independent authentication protocol for cognitive radio networks. This paper first shows the privacy weaknesses in the authentication protocol by Kuroda et al. and proposes a privacy aware authentication protocol to solve the weaknesses.

A Comparative Estimation of Performance of Average Loss Interval Calculation Method in TCP-Friendly Congestion Control Protocol (TFRC 프로토콜의 평균 손실 구간 계산방식의 비교평가)

  • Lee, Sang-Chul;Jang, Ju-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.495-500
    • /
    • 2002
  • We propose a new estimation method for rate adjustment in the face of a packet loss in the TFRC protocol, a TCP-Friendly congestion control protocol for UDP flows. Previous methods respond in a sensitive way to a single packet loss, resulting in oscillatory transmission behavior. This is an undesirable for multimedia services demanding constant bandwidth. The proposed TFRC provides more smooth and fair (against TCP flows) transmission through collective response based on multiple packets loss events. We show our "Exponential smoothing method" performs better than known "Weight smoothing method" in terms of smoothness and fairness.

A Modified DCF Protocol for Real-Time Multimedia Data (Real-Time MultiMedia Data 전송을 위한 새로운 방식의 DCF 프로토콜)

  • 신세영;심승섭;조경익;윤석진
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.157-163
    • /
    • 2003
  • IEEE 802.11a Distributed Coordination Function(DCF) Protocol을 사용하여 Real-Time MultiMedia Data의 전송을 수행할 경우, DCF Protocol의 적합하지 못한 Mechanism에 의하여, Data 전송의 극대화를 이루지 못한다. Retransmission이 반복되는 경우, Binary Slotted Exponential Backoff Mechanism은 거대한 Packet Delay와 Jitter의 원인이 되며 Automatic Repeat Request(ARQ) 방식의 Ack Mechanism은 MultiMedia Data를 전송하기에 적합하지 못하다. 본 논문은 위와 같은 문제점을 해결하기 위하여 Real-Time MultiMedia Data을 주로 전송하는 STA에 따른 Real-Time/Non-Real-Time(RT/NRT) Station(STA)의 구분과 보내고자 하는 Real-Time MultiMedia Data의 Network Traffic Load(The Required Bandwidth)를 고려하여, Modified DCF(mDCF) Protocol의 Modified Backoff(mBackOff), Modified BlockAck(mBlockAck) Mechanism을 제시함으로서, Data 전송의 극대화를 제공하며, 또한 IEEE 802.11a와의 호환성을 제공한다.

  • PDF