• 제목/요약/키워드: medium access control (MAC) protocol

Search Result 253, Processing Time 0.026 seconds

Queuing Analysis of IEEE 802.15.4 GTS Scheme for Bursty Traffic (Bursty Traffic을 위한 IEEE 802.15.4 GTS 기법의 대기 해석)

  • Le, Nam-Tuan;Choi, Sun-Woong;Jang, Yeong-Min
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.87-91
    • /
    • 2010
  • The IEEE 802.15.4 and IEEE 802.15.7 standard are the typical of low rate wireless and Visible Light Wireless personal area networks. Its Medium Access Control protocol can support the QoS traffic flows for real-time application through guaranteed time slots (GTS) in beacon mode. However, how to achieve a best allocation scheme is not solved clearly. The current analytical models of IEEE 802.15.4 MAC reported in the literature have been mainly developed under the assumption of saturated traffic or non-bursty unsaturated traffic conditions. These assumptions don't capture the characteristics of bursty multimedia traffic. In this paper, we propose a new analytical model for GTS allocation with burst Markov modulated ON-OFF arrival traffic.

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.

Multiple token-based neighbor discovery for directional sensor networks

  • Nagaraju, Shamanth;Gudino, Lucy J.;Sood, Nipun;Chandran, Jasmine G.;Sreejith, V.
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.351-365
    • /
    • 2020
  • Directional sensor networks (DSNs) can significantly improve the performance of a network by employing energy efficient communication protocols. Neighbor discovery is a vital part of medium access control (MAC) and routing protocol, which influences the establishment of communication between neighboring nodes. Neighbor discovery is a challenging task in DSNs due to the limited coverage provided by directional antennas. Furthermore, in these networks, communication can only take place when the beams of the directional antennas are pointed toward each other. In this article, we propose a novel multiple token-based neighbor discovery (MuND) protocol, in which multiple tokens are transmitted based on an area exploration algorithm. The performance of the protocol is evaluated using the Cooja simulator. The simulation results reveal that the proposed MuND protocol achieves lower neighbor discovery latency, with a 100% neighbor discovery ratio, and has a relatively low communication overhead and low energy consumption.

Implementation of Adaptive MCS in The IEEE 802.11ac/ad Wireless LAN (IEEE 802.11ac/ad 무선 LAN의 적응형 MCS 구현 연구)

  • Lee, Ha-cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1613-1621
    • /
    • 2015
  • This paper analyzes the rate adaptation scheme and suggests applicable strategy of the MCS(Modulation and Coding Scheme) for improving DCF throughput in the IEEE 802.11ad and 802.11ad wireless LAN. IEEE 802.11ac and 802.11ad wireless LAN provide MCS technique that dynamically adjusts modulation level and code rate to the time-varying channel conditions in order to obtain considerably high data rates. But these standards did not provide rate adaptation algorithm, so this paper surveyes rate adaptation algorithm and suggests MCS scheme applied to IEEE 802.11ac and 802.11ad wireless LAN. Specially A MAC(Medium Access Control) layer throughput is evaluated over error-prone channel in the IEEE 802.11ac-based wireless LAN. In this evaluation, DCF (Distributed Coordination Function) protocol and A-MPDU (MAC Protocol Data Unit Aggregation) scheme are used. Using theoretical analysis method, the MAC saturation throughput is evaluated with the PER (Packet Error Rate) on the condition that the number of station, transmission probability, the number of parallel beams and the number of frames in each A-MPDU are variables.

Wireless Audio-visual Interface over UWB

  • Cui, Wei
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.1491-1494
    • /
    • 2008
  • Typically internal mobile LCD display modules are connected to the mobile product baseband PCB with flexible printed circuit board equipped with board-to-board connector. This solution has a drawback of limiting the product concept work to certain solutions that are based on connector size, location, flexible PCB length, bending, etc. in the display module. Also flexible printed circuit board based solutions are not completely optimized from reliability point of view, causing flex circuit board breakings. For the external displays in the PC or Home entertainment market, the cable solution is too expensive and resource demanding. The wireless solution has obvious advantages over reliability, low cost and flexibility. This paper describes a wireless audio-visual interface solution.

  • PDF

Ethernet with Virtual Polling Algorithm for real-Time Industrial Communication Network (실시간 산업용 네트워크를 위한 가상 폴링 기반 이더넷 구현)

  • Kim, T. J.;Lee, K. C;Lee, S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.602-605
    • /
    • 2001
  • This paper focus on a method to use Ethernet Network for Industrial Communication Network. Ethernet use the CSMA/CD MAC(Medium Access Control) Protocol at the Data-Link Layer, Which isn't suit for Industrial Communication Network requiring Real-Time Communication, periodic data processing, critical data processing characteristics. In this paper we proposed the Virtual Polling Algorithm at the Application Layer will be solution of using the Ethernet Network for the Industrial Communication Network, Proposed Algorithm terminate the Collision in the network thus Delay Time is reduced and Real-Time Communication will be implemented.

  • PDF

Mixed Contention Method for a Quick Reservation Request in a WATM MAC Protocol (WATM 매체접근제어 프로토콜의 신속한 예약 요청을 위한 분산 및 중앙 경재 혼합 방식)

  • 유태화
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1999.10a
    • /
    • pp.12-17
    • /
    • 1999
  • WATM(Wireless ATM)에서의 매체접근제어(Medium Access Control)는 QoS를 보장하기 위해 다양한 방식들이 제안되어 왔다. 현재까지 제안되어 온 매체접근제어 방식들은 시분할 다중화 방식 (TDMA)과 예약경쟁방식을 주로 사용하고 있다. 이때 활용되는 기능에는 QoS를 보장하기 위해 통계적 다중화, 스케쥴링 또는 예약 방식 등이 있는데 경쟁 방식은 아직까지 slotted-ALOHA를 그대로 사용하고 있다. Slotted-ALOHA방식의 단점을 개선하기 위하여 통계적 방식으로 경쟁을 제어하거나 물리적 방식으로 경쟁을 분리시켜 그 효율을 향상 시켜왔으나 우선 순위가 같은 이동국들이 많을 경우에는 해결할 방법이 없었다. 이러한 문제점들은 기지국 중심의 경쟁방식이라는 점이 그 문제를 해결하는데 있어서의 걸림돌이다. 본 논문에서는 이미 슬롯을 할당받은 동료 이동국에게 예약요청을 피기백킹(piggybacking)함으로써 신속하게 슬롯을 할당을 받을 수 있는 분산 경쟁방식을 제안한다.

  • PDF

TCP Acknowledgement Compression for Fairness Among Uplink TCP Flows in IEEE 802.11n WLANs (IEEE 802.11n 무선랜에서 상향링크 TCP 플로우간 형평상 향상을 위한 TCP ACK 압축기법)

  • Kim, Minho;Park, Eun-Chan;Kim, Woongsup
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.7
    • /
    • pp.653-660
    • /
    • 2013
  • This paper deals with the problem of unfairness among uplink TCP (Transmission Control Protocol) flows associated with frame aggregation employed in IEEE 802.11n WLANs (Wireless Local Area Networks). When multiple stations have uplink TCP flows and transmit TCP data packets to an AP (Access Point), the AP has to compete for channel access with stations for the transmission of TCP ACK (acknowledgement) packets to the stations. Due to this contention-based channel access, TCP ACKs tend to be accumulated in the AP's downlink buffer. We show that the frame aggregation in the MAC (Medium Access Control) layer increases TCP ACK losses in the AP and leads to the serious unfair operation of TCP congestion control. To resolve this problem, we propose the TAC (TCP ACK Compression) mechanism operating at the top of the AP's interface queue. By exploiting the properties of cumulative TCP ACK and frame aggregation, TAC serves only the representative TCP ACK without serving redundant TCP ACKs. Therefore, TAC reduces queue occupancy and prevents ACK losses due to buffer overflow, which significantly contributes to fairness among uplink TCP flows. Also, TAC enhances the channel efficiency by not transmitting unnecessary TCP ACKs. The simulation results show that TAC tightly assures fairness under various network conditions while increasing the aggregate throughput, compared to the existing schemes.

QoS Improvement Method for Real Time Traffic in Wireless Networks (무선망에서 실시간 트래픽을 위한 QoS 향상 기법)

  • Kim, Nam-Hee;Kim, Byun-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.34-42
    • /
    • 2008
  • MAC(Medium Access Control) is demanded to provide end-to-end QoS(Quality of Service) for a variety of traffic in the wireless networks. When all the traffic is integrated in the channel, the main difficulty of the MAC protocol is how to efficiently support multi-class traffic in the limited bandwidth wireless channel. In this paper, we proposed the dynamic bandwidth slot method for improving QoS of the real time traffics. In this paper, we used in-band scheme to send dynamic parameter and considering buffer size and delay variation, we enabled 2 state bits to send to base station in mobile station. The proposed algorithm is to guarantee QoS of real time traffic and maximize transfer efficiency in wireless networks.

Self-organization Scheme of WSNs with Mobile Sensors and Mobile Multiple Sinks for Big Data Computing

  • Shin, Ahreum;Ryoo, Intae;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.943-961
    • /
    • 2020
  • With the advent of IoT technology and Big Data computing, the importance of WSNs (Wireless Sensor Networks) has been on the rise. For energy-efficient and collection-efficient delivery of any sensed data, lots of novel wireless medium access control (MAC) protocols have been proposed and these MAC schemes are the basis of many IoT systems that leads the upcoming fourth industrial revolution. WSNs play a very important role in collecting Big Data from various IoT sensors. Also, due to the limited amount of battery driving the sensors, energy-saving MAC technologies have been recently studied. In addition, as new IoT technologies for Big Data computing emerge to meet different needs, both sensors and sinks need to be mobile. To guarantee stability of WSNs with dynamic topologies as well as frequent physical changes, the existing MAC schemes must be tuned for better adapting to the new WSN environment which includes energy-efficiency and collection-efficiency of sensors, coverage of WSNs and data collecting methods of sinks. To address these issues, in this paper, a self-organization scheme for mobile sensor networks with mobile multiple sinks has been proposed and verified to adapt both mobile sensors and multiple sinks to 3-dimensional group management MAC protocol. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of the various usage cases. Therefore, the proposed self-organization scheme might be adaptable for various computing and networking environments with big data.