• Title/Summary/Keyword: random access MAC

Search Result 55, Processing Time 0.034 seconds

Dynamic Random Channel Allocation Algorithm by Limiting the Number of Minimum RCH in HIPERLAN/2 (HIPERLAN/2에서 최소 RCH 수를 제한한 동적 랜덤채널 할당 기법)

  • Kang, Jae-Eun;Lee, Jong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1A
    • /
    • pp.58-64
    • /
    • 2009
  • In this paper, we propose an dynamic random channel allocation scheme increasing probability of channel acquisition and reducing delay by limiting the number of minimum RCHs(Random CHannels) as an optimal factor $\beta$. The MAC protocol of HIPERLAN/2 is based on TDMA/TDD and MT(Mobile Terminal) can obtain chance of traffic transmission through channel competition in RCH period. And AP(Access Point) can dynamically schedule the number of RCHs based on the number of the collision in each RCH of the previous frame. Therefore, the proposed scheme increases a probability of channel acquisition and reduces delay by means of guaranteeing the number of minimum RCHs. With a practical Internet traffic, it is concluded that by the proposed scheme the delay reduction of the order of 19% and slightly better throughput are obtained compared to the conventional algorithm.

An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks

  • Liu, Chang;Chung, Sang-Hwa;Jeong, Han-You;Jung, Ik-Joo
    • Journal of Information Processing Systems
    • /
    • v.11 no.3
    • /
    • pp.465-482
    • /
    • 2015
  • IEEE 802.11p is a standard MAC protocol for wireless access in vehicular environments (WAVEs). If a packet collision happens when a safety message is sent out, IEEE 802.11p chooses a random back-off counter value in a fixed-size contention window. However, depending on the random choice of back-off counter value, it is still possible that less important messages are sent out first while more important messages are delayed longer until sent out. In this paper, we present a new scheme for safety message scheduling, called the enhanced message priority mechanism (EMPM). It consists of the following two components: the benefit-value algorithm, which calculates the priority of the messages depending on the speed, deceleration, and message lifetime; and the back-off counter selection algorithm, which chooses the non-uniform back-off counter value in order to reduce the collision probability and to enhance the throughput of the highly beneficial messages. Numerical results show that the EMPM can significantly improve the throughput and delay of messages with high benefits when compared with existing MAC protocols. Consequently, the EMPM can provide better QoS support for the more important and urgent messages.

Protocol-Aware Radio Frequency Jamming inWi-Fi and Commercial Wireless Networks

  • Hussain, Abid;Saqib, Nazar Abbas;Qamar, Usman;Zia, Muhammad;Mahmood, Hassan
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.397-406
    • /
    • 2014
  • Radio frequency (RF) jamming is a denial of service attack targeted at wireless networks. In resource-hungry scenarios with constant traffic demand, jamming can create connectivity problems and seriously affect communication. Therefore, the vulnerabilities of wireless networks must be studied. In this study, we investigate a particular type of RF jamming that exploits the semantics of physical (PHY) and medium access control (MAC) layer protocols. This can be extended to any wireless communication network whose protocol characteristics and operating frequencies are known to the attacker. We propose two efficient jamming techniques: A low-data-rate random jamming and a shot-noise based protocol-aware RF jamming. Both techniques use shot-noise pulses to disrupt ongoing transmission ensuring they are energy efficient, and they significantly reduce the detection probability of the jammer. Further, we derived the tight upper bound on the duration and the number of shot-noise pulses for Wi-Fi, GSM, and WiMax networks. The proposed model takes consider the channel access mechanism employed at the MAC layer, data transmission rate, PHY/MAC layer modulation and channel coding schemes. Moreover, we analyze the effect of different packet sizes on the proposed jamming methodologies. The proposed jamming attack models have been experimentally evaluated for 802.11b networks on an actual testbed environment by transmitting data packets of varying sizes. The achieved results clearly demonstrate a considerable increase in the overall jamming efficiency of the proposed protocol-aware jammer in terms of packet delivery ratio, energy expenditure and detection probabilities over contemporary jamming methods provided in the literature.

Throughput Analysis of ETSI BRAN HIPERLAN/2 MAC Protocol Taking Guard Timing Spaces into Consideration

  • Ko, You-Chang;Son, Yong-Tae;Shin, Yong-Eok;Lee, Hyong-Woo;Cho, Choong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.515-517
    • /
    • 2003
  • In this paper we examine the effects of the required portions of guard timing spaces in a MAC frame of ETSI BRAN HIPERLAN/2 system such as inter-mobile guard timing space in UL(Up Link) duration, inter-RCH(Random CHannel) guard timing space, sector switch guard timing space. In particular, we calculate the number of OFDM(Orthogonal Frequency Division Multiplexing) symbols required for these guard timing spaces in a MAC frame. We them evaluate the throughput of HIPERLAN/2 system as we vary parameter such as the guard time values defined in [2], the number of DLCCs(Data Link Control Connections), and the number of RCHs. Finally we show by numerical results that the portions for the 새심 summation of required guard timing spaces in a MAC frame are not negligible, and that they should be properly considered when trying to evaluate the performance of MAC protocol of HIPERLAN/2 system and also when determining the number of RCHs as well as the number of DLCCs in UL PDU trains at an AP/CC(Access Point/Central Controller).

  • PDF

Development of a Real-time Communication Service over Random Medium Access Scheme Networks

  • Choo, Young-Yeol;Kwon, Jang-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.350-353
    • /
    • 2004
  • The increasing use of Ethernet-TCP/IP network in industry has led to the growing interest in its reliability in real-time applications such as automated manufacturing systems and process control systems. However, stochastic behavior of its medium access scheme makes it inadequate for time-critical applications. In order to guarantee hard real-time communication service in Ethernet-TCP/IP network, we proposed an algorithm running over TCP/IP protocol stack without modification of protocols. In this paper, we consider communication services guaranteeing deadlines of periodic real-time messages over MAC protocols that have unbounded medium access time. We propose a centralized token scheduling scheme for multiple access networks. The token is used to allow a station to transmit its message during the time amount that is appended to the token. The real-time performance of the proposed algorithm has been described.

  • PDF

Design and Performance Analysis of an Enhanced MAC Algorithm for the IEEE 802.11 DCF (IEEE 802.11 DCF 성능 개선을 위한 매체접근제어 알고리즘의 설계 및 성능 분석)

  • Hwang, An-Kyu;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.10 s.340
    • /
    • pp.39-50
    • /
    • 2005
  • In this paper, we propose a performance improving MAC algerian for the IEEE 802.11 DCF. WLAN based IEEE 802.11 uses two control methods called 'Distributed Coordination Function(UF)' and 'Point Coordination Function(PCF)'. The nF controls the Urnsmission based on carrier sense multiple access with collision detection(CSMA/CA), that decides a random backoff time with the range of contention window for each terminal. Normally, each terminal the CW double after collision, and reduces the CW to the minimum after successful transmission. This paper proposes an enhanced DCF algorithm that decreases the CW smoothly after successful transmission in order to reduce the collision Probability by utilizing the current status information of WLAN. We also analyze the throughput and delay performance for the unsaturated case mathematically. Simulation results show that our algorithm enhances the saturation throughput of WLAN. They also coincide well with the analytical results.

Design and Implementation of Indoor Location Recognition System based on Fingerprint and Random Forest (핑거프린트와 랜덤포레스트 기반 실내 위치 인식 시스템 설계와 구현)

  • Lee, Sunmin;Moon, Nammee
    • Journal of Broadcast Engineering
    • /
    • v.23 no.1
    • /
    • pp.154-161
    • /
    • 2018
  • As the number of smartphone users increases, research on indoor location recognition service is necessary. Access to indoor locations is predominantly WiFi, Bluetooth, etc., but in most quarters, WiFi is equipped with WiFi functionality, which uses WiFi features to provide WiFi functionality. The study uses the random forest algorithm, which employs the fingerprint index of the acquired WiFi and the use of the multI-value classification method, which employs the receiver signal strength of the acquired WiFi. As the data of the fingerprint, a total of 4 radio maps using the Mac address together with the received signal strength were used. The experiment was conducted in a limited indoor space and compared to an indoor location recognition system using an existing random forest, similar to the method proposed in this study for experimental analysis. Experiments have shown that the system's positioning accuracy as suggested by this study is approximately 5.8 % higher than that of a conventional indoor location recognition system using a random forest, and that its location recognition speed is consistent and faster than that of a study.

Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic

  • Sui, Nannan;Wang, Cong;Xie, Wei;Xu, Youyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.687-708
    • /
    • 2017
  • The machine-to-machine (M2M) communication is featured by tremendous number of devices, small data transmission, and large uplink to downlink traffic ratio. The massive access requests generated by M2M devices would result in the current medium access control (MAC) protocol in LTE/LTE-A networks suffering from physical random access channel (PRACH) overload, high signaling overhead, and resource underutilization. As such, fairness should be carefully considered when M2M traffic coexists with human-to-human (H2H) traffic. To tackle these problems, we propose an adaptive Slotted ALOHA (S-ALOHA) and time division multiple access (TDMA) hybrid protocol. In particular, the proposed hybrid protocol divides the reserved uplink resource blocks (RBs) in a transmission cycle into the S-ALOHA part for M2M traffic with small-size packets and the TDMA part for H2H traffic with large-size packets. Adaptive resource allocation and access class barring (ACB) are exploited and optimized to maximize the channel utility with fairness constraint. Moreover, an upper performance bound for the proposed hybrid protocol is provided by performing the system equilibrium analysis. Simulation results demonstrate that, compared with pure S-ALOHA and pure TDMA protocol under a target fairness constraint of 0.9, our proposed hybrid protocol can improve the capacity by at least 9.44% when ${\lambda}_1:{\lambda}_2=1:1$and by at least 20.53% when ${\lambda}_1:{\lambda}_2=10:1$, where ${\lambda}_1,{\lambda}_2$ are traffic arrival rates of M2M and H2H traffic, respectively.

Fast Retransmission Scheme for Overcoming Hidden Node Problem in IEEE 802.11 Networks

  • Jeon, Jung-Hwi;Kim, Chul-Min;Lee, Ki-Seok;Kim, Chee-Ha
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.324-330
    • /
    • 2011
  • To avoid collisions, IEEE 802.11 medium access control (MAC) uses predetermined inter-frame spaces and the random back-off process. However, the retransmission strategy of IEEE 802.11 MAC results in considerable time wastage. The hidden node problem is well known in wireless networks; it aggravates the consequences of time wastage for retransmission. Many collision prevention and recovery approaches have been proposed to solve the hidden node problem, but all of them have complex control overhead. In this paper, we propose a fast retransmission scheme as a recovery approach. The proposed scheme identifies collisions caused by hidden nodes and then allows retransmission without collision. Analysis and simulations show that the proposed scheme has greater throughput than request-to-send and clear-to-send (RTS/CTS) and a shorter average waiting time.

Performance Comparison between Interference Minimization and Signal Maximization in Multi-Cell Random Access Networks (다중 셀 랜덤 액세스 네트워크에서 간섭 최소화 기법과 신호 최대화 기법의 성능 비교)

  • Jo, Han-Seong;Jin, Hu;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2014-2021
    • /
    • 2015
  • Opportunistic interference alignment (OIA) has been proposed for multi-cell random access networks (RAN), which minimizes the generating interference to neighboring RANs and yields better performance compared with the conventional techniques. The OIA for RANs considers both physical (PHY) and medium access control (MAC) layers. In this paper, we introduce a protocol of which each user maximizes the transmit signal regardless of the generating interference to neighboring RANs, contrary to the OIA technique. In addition, we compare the performance of the signal-maximization technique with the OIA technique.