• Title/Summary/Keyword: random access MAC

Search Result 55, Processing Time 0.03 seconds

Effective Channel Assignment Scheme for Performance Enhancement in HiperLAN/2 Wireless LAN (HiperLAN/2 무선랜의 성능향상을 위한 효율적인 채널 할당방안연구)

  • Jang, Soon-Gun;Jang, Jae-Hwan;Lim, Seog-Ku
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.453-456
    • /
    • 2009
  • HiperLAN Type2에서의 MAC 프로토콜은 TDMA/TDD을 기반으로 하며, 무선채널은 중앙제어방식으로 운영되는 AP(Access Point)에 의해서 할당된다. 상향링크로 데이터 전송이 필요한 이동단말은 RCH 채널을 통하여 AP에게 무선자원을 요청한다. 각 MAC 프레임마다 RCH 수를 동적으로 변경하는 것이 중요한데, RCH 수가 많이 할당되면 무선자원의 낭비를 초래하며, RCH 수가 적게 할당되면 이동단말간의 충돌이 증가하고 AP에 접속하는 시간도 길어진다. 따라서 RCH 수는 트래픽에 따라 적절하게 할당되어야 한다. 본 논문에서는 HiperLAN/2에서의 성능향상을 위해 충돌과 성공을 고려하여 RCH(Random CHannel)수를 고정적인 ${\beta}$값만큼 증감하는 방법을 제안하였다. 제안한 방법의 효율성을 입증하기 위해 시뮬레이션을 수행하였으며, 처리율과 접속지연 관점에서 분석하였다.

  • PDF

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

Reservation based Multichannel CSMA Protocol for Improvement of Energy Consumption and QoS in Wireless Sensor Networks (무선 센서 네트워크 환경에서 에너지 소비 및 QoS를 고려한 예약기반 Multichannel CSMA 프로토콜)

  • Han, Jung-Ahn;Kim, Yun-Hyung;Lee, Moon-Ho;Kim, Byung-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2A
    • /
    • pp.143-151
    • /
    • 2007
  • One of the consideration things to design protocol in wireless sensor networks is to maximize lifetime of sensor node as reducing energy consumption. In this paper propose reserve based multichannel CSMA mac protocol for minimizing energy consumption which arise from collision and waiting retransmission at channel access process in mac layer Each sensor node which constitute sensor networks has data channel and control channel. And as sensor node reserve channel for data transmission by using control channel and receipt node allow reservation node to use data channel, sending node can abbreviate try of retransmission after random interval time. Also, When sending node delivers selects option channel in available channels to receipt node, the receipt node decide whether the channel is available to oneself and through the result select transmission channel ultimately. Performance evaluation compare with previous simple multichannel CSMA.

Performance Evaluation of a New Helper Node Selection Scheme for Cooperative Communications (협력통신용 신규 도움노드 선정기법 설계 및 성능평가)

  • Jang, Jaeshin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1811-1819
    • /
    • 2013
  • In this paper, we carried out a study on how to find an appropriate helper node for cooperative communications, the role of which is very import to enhance system throughput of wireless communication system. The busy tone cooperative MAC (BT-COMAC) protocol proposed in this paper is a new cooperative MAC protocol with a reactive helper node scheme and maximizes the benefits of existing schemes while making up for their shortcomings. We conducted performance evaluation of this new protocol using computer simulation experiment. System throughput in bps and channel access delay are utilized as performance measures. We used a random way point mobility model where every communication node moves independently one another, and slow fading channel where every communication node decided its transmission rate with received power basis. Numerical results show that the new MAC protocol enhances system throughput as much as 15% of the existing scheme.

Performance Evaluation of the HIPERLAN Type 2 Media Access Control Protocol (HIPERLAN 타입 2 매체접근제어 프로토콜의 성능평가)

  • Cho, Kwang-Oh;Park, Chan;Lee, Jong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.11-17
    • /
    • 2003
  • In this paper, we presented the dynamic random access channel allocation method under the priority based scheduling policy in order to improve the system performance of HIPERLAN/2 standardized by ETSI According to the scheduling policy, AP scheduler primarily allocates the resource to the collision MT This scheduling policy bring about decreasing the transmission delay of collision MT Dynamic RCH(random access channel) allocation method decreases the collision probability by increasing the number of RCH slots in case of low traffic. While it increases the maximum throughput by increasing the number of the data transmission slots in case of high traffic Therefore dynamic allocation method of RCH slots decreases the scheduling delay and increases the throughput When we evaluate the performance of presented method based on standards, we saw that the presented method improve the performance of the MAC protocol in terms of throughput and transmission delay.

Adaptive Packet Scheduling Scheme to Support Real-time Traffic in WLAN Mesh Networks

  • Zhu, Rongb;Qin, Yingying;Lai, Chin-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1492-1512
    • /
    • 2011
  • Due to multiple hops, mobility and time-varying channel, supporting delay sensitive real-time traffic in wireless local area network-based (WLAN) mesh networks is a challenging task. In particular for real-time traffic subject to medium access control (MAC) layer control overhead, such as preamble, carrier sense waiting time and the random backoff period, the performance of real-time flows will be degraded greatly. In order to support real-time traffic, an efficient adaptive packet scheduling (APS) scheme is proposed, which aims to improve the system performance by guaranteeing inter-class, intra-class service differentiation and adaptively adjusting the packet length. APS classifies incoming packets by the IEEE 802.11e access class and then queued into a suitable buffer queue. APS employs strict priority service discipline for resource allocation among different service classes to achieve inter-class fairness. By estimating the received signal to interference plus noise ratio (SINR) per bit and current link condition, APS is able to calculate the optimized packet length with bi-dimensional markov MAC model to improve system performance. To achieve the fairness of intra-class, APS also takes maximum tolerable packet delay, transmission requests, and average allocation transmission into consideration to allocate transmission opportunity to the corresponding traffic. Detailed simulation results and comparison with IEEE 802.11e enhanced distributed channel access (EDCA) scheme show that the proposed APS scheme is able to effectively provide inter-class and intra-class differentiate services and improve QoS for real-time traffic in terms of throughput, end-to-end delay, packet loss rate and fairness.

Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning

  • Seo, Jeonghoon;Cho, Chaeho;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.541-556
    • /
    • 2020
  • Wireless networks have become integral to society as they provide mobility and scalability advantages. However, their disadvantage is that they cannot control the media, which makes them vulnerable to various types of attacks. One example of such attacks is the evil twin access point (AP) attack, in which an authorized AP is impersonated by mimicking its service set identifier (SSID) and media access control (MAC) address. Evil twin APs are a major source of deception in wireless networks, facilitating message forgery and eavesdropping. Hence, it is necessary to detect them rapidly. To this end, numerous methods using clock skew have been proposed for evil twin AP detection. However, clock skew is difficult to calculate precisely because wireless networks are vulnerable to noise. This paper proposes an evil twin AP detection method that uses a multiple-feature-based machine learning classification algorithm. The features used in the proposed method are clock skew, channel, received signal strength, and duration. The results of experiments conducted indicate that the proposed method has an evil twin AP detection accuracy of 100% using the random forest algorithm.

A Study on New DCF Algorithm in IEEE 802.11 WLAN by Simulation (시뮬레이션에 의한 IEEE 802.11 WLAN에서의 새로운 DCF 알고리즘에 관한 연구)

  • Lim, Seog-Ku
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.61-67
    • /
    • 2008
  • In this paper, MAC algorithm for the IEEE 802.11 DCF improving the performance is proposed and analyzed by simulation. The MAC of IEEE 802.11 WLAN to control data transmission uses two control methods called DCF(Distributed Coordination Function) and PCF(Point Coordination Function). The DCF controls the transmission based on CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance), that decides a random backoff time with the range of CW(Contention Window) for each station. Normally, each station increase the CW to double after collision, and reduces the CW to the minimum after successful transmission. The DCF shows excellent performance relatively in situation that competition station is less but has a problem that performance is fallen from throughput and delay viewpoint in situation that competition station is increased. This paper proposes an enhanced DCF algorithm that increases the CW to maximal CW after collision and decreases the CW smoothly after successful transmission in order to reduce the collision probability by utilizing the current status information of WLAN. To prove efficiency of proposed algorithm, a lots of simulations are conducted and analyzed.

  • PDF

A Study on the MAC Protocol for ABR Service in Wireless environments (무선 환경에서 ABR 서비스를 위한 MAC 프로토콜에 관한 연구)

  • 강상욱;정종혁
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2000.11a
    • /
    • pp.463-470
    • /
    • 2000
  • In this paper, we describe a wireless MAC protocol named APRMA(Abitrary Period Reservation Multiple Access), which is capable of supporting the ABR type data service and maximizing channel utilization. In original PRMA protocol, data terminals with random data packets cannot reserve slot. That is, slot reservation is applicable to the. time constraint voice packet exclusively. But the reservation scheme have to be performed for loss sensitive data packet, so data packets can get their quality of service. The aspects of service, if fixed bandwidth is allocated to data terminals, time constraint voice packets may have a low efficiency So in this study, the terminal which wants to request for ABR type service, acquires a minimum bandwidth from system for the first time. If the system have extra available bandwidth, ABR terminals would acquire additional bandwidth slot by slot. As a result, APRMA protocol can support the data service with loss sensitivity and maintain their channel utilization highly. Also high Priority services like voice can be satisfied with their QoS by APRMA.

  • PDF

Performance Evaluation of Underwater Code Division Multiple Access Scheme on Forward-Link through Water-Tank and Lake Experiment (수조 및 저수지 실험을 통한 수중 코드 분할 다중 접속 기법 순방향 링크 성능 분석)

  • Seo, Bo-Min;Son, Kweon;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.199-208
    • /
    • 2014
  • Code division multiple access (CDMA) is one of the promising medium access control (MAC) schemes for underwater acoustic sensor networks because of its robustness against frequency-selective fading and high frequency-reuse efficiency. As a way of performance evaluation, sea or lake experiment has been employed along with computer simulation.. In this study, we design the underwater CDMA forward-link transceiver and evaluate the feasibility aginst harsh underwater acoustic channel in water-tank first. Then, based on the water-tank experiment results, we improved the transceiver and showed the improvements in a lake experiment. A pseudo random noise code acquisition process is added for phase error correction before decoding the user data by means of a Walsh code in the receiver. Interleaving and convolutional channel coding scheme are also used for performance improvement. Experimental results show that the multiplexed data is recovered by means of demultiplexing at receivers with error-free in case of two users while with less than 15% bit error rate in case of three and four users.