• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.029 seconds

Performance Improvement of IEEE 802.15.4 MAC For WBAN Environments in Medical (의료 WBAN 환경을 위한 IEEE 802.15.4 MAC 성능 개선)

  • Lee, Jung-Jae;Hong, Jae-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.1
    • /
    • pp.103-110
    • /
    • 2015
  • WBAN(Wireless Body Area Network) is a Wireless Sensor Network for supporting various applications around body within 2~3m which consists of medical and non-medical device. MAC in WBAN environment should satisfy requirements such as low power consumption, various transmission rate, QoS, and duty-cycle, efficiently distribute frequency band, be strong at traffic load and save energy. This paper proposes AQ(Adaptive Queuing) MAC superframe structure for efficient energy use, considering the increase of traffic load. The simulation result also show that transmission rate and average MAC delay rate is improved comparing IEEE 802.15.4 MAC with AQ MAC.

Enhancements to the fast recovery Algorithm of TCP NewReno using rapid loss detection (빠른 손실 감지를 통한 TCP NewReno의 Fast Recovery 개선 알고리듬)

  • 김동민;김범준;김석규;이재용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.650-659
    • /
    • 2004
  • Domestic wireless network environment is changing rapidly while adapting to meet service requirements of users and growth of market. As a result, reliable data transmission using TCP is also expected to increase. Since TCP assumes that it is used in wired networt TCP suffers significant performance degradation over wireless network where packet losses are not always result of network congestion. Especially RTO imposes a great performance degradation of TCP. In this paper, we propose DAC$^{+}$ and EFR in order to prevent performance degradation by quickly detecting and recovering loss without RTO during fast recovery. Compared with TCP NewReno, proposed scheme shows improvements in steady-state in terms of higher fast recovery Probability and reduced response time.

IP router-based W-PAN (Wireless Personal Area Network) Authentication Control Technology (IP 공유기 기반 W-PAN(Wireless Personal Area Network) 인증 제어기술 개발)

  • Choi, Jung-In;Lee, Sun-Sook;Lee, Ha-Kyung;Lee, Jun-Hyeong;Jeong, Jung-Su;Young, Hwan-Seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.311-313
    • /
    • 2013
  • 본 논문에서는 W-PAN 환경에서 IP공유기를 표준설계하고 구현하며 효율적인 실시간 사용자 웹기반 인증 기법을 연구하였다. 또한 W-PAN Device & Service Application 인증과 접근, 권한제어를 위한 인증 Client 모듈과 Server 모듈, Supplicant를 개발하고 제안하였다. 이를 통해 IP 공유기 기반 환경에서의 W-PAN 환경에서 인증 제어 솔루션에 대한 개발로 생산되는 단말기의 서비스 품질을 향상시키고 무선 접속 기술을 표준화 할 수 있다. 또한 유해한 트래픽을 검색하고 보호하는 안정적인 시스템 관리가 가능해졌다. W-PAN Device와 Service Application 인증, 접근 및 권한 제어를 위한 인증 시스템의 플랫폼 구축으로 향후 관련 기술의 통합과 융합 기술을 적용할 수 있는 능력을 확보하였다.

  • PDF

Performance Evaluation of Wireless Network based on Mobile Multi-hop (모바일 다중 홉 기반의 무선 네트워크의 성능 평가)

  • Roh, Jae-Sung;Kim, Wan-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.634-639
    • /
    • 2008
  • In mobile communication networks, the main power consumption is due to the actual transmissions power. Therefore, power efficiency network structures have gained considerable importance in mobile multi-hop systems and networks in recent years. In this paper, the performance of mobile multi-hop wireless system with M-QAM signal and forward error control (FEC) technique are analyzed The FEC technique uses extra processing power related to encoding and decoding, it is need complex functions to be built into the communication node. The probability of receiving a correct bit and codeword for relaying a data frame over h hop relay station to the final station is evaluated as a function of channel parameter and number of hops, and the distance between the different station.

  • PDF

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

An Efficient On-Demand Routing Approach with Directional Flooding for Wireless Mesh Networks

  • Kum, Dong-Won;Le, Anh-Ngoc;Cho, You-Ze;Toh, Chai Keong;Lee, In-Soo
    • Journal of Communications and Networks
    • /
    • v.12 no.1
    • /
    • pp.67-73
    • /
    • 2010
  • Current on-demand ad-hoc routing protocols are not appropriate for wireless mesh networks (WMNs), because flooding-based route discovery is both redundant and expensive in terms of control message overhead. In this paper, we propose an efficient on-demand routing approach with directional flooding (DF), which is suitable for the WMNs with limited mobility. In the route discovery process to reach a gateway, our DF scheme can reduce the number of route request (RREQ) packets broadcast by using a restricted directional flooding technique. Simulation results show that ad hoc on-demand distance vector (AODV) with DF (AODV-DF) can significantly reduce routing overhead by RREQ packets and enhance overall performance compared with the original AODV.

Adaptive Scanning Scheme for Mobile Broadband Wireless Networks based on the IEEE 802.16e Standard (802.16e 표준 기반 광대역 무선 이동 망을 위한 동적 스캐닝 기법)

  • Park, Jae-Sung;Lim, Yu-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.151-159
    • /
    • 2008
  • Mobile broadband wireless network is emerging as one of the hottest research areas due to technical advances, and the demands of users who wish to enjoy the same network experience on the move. In this paper, we investigate the handover process at the medium access control (MAC) layer in an IEEE 802.16e-based system. In particular, we identify problems concerned with the scan initiation Process called cell reselection and propose a received signal strength (RSS) estimation scheme to dynamically trigger a scanning process. We show how the RSS estimation scheme can timely initiate a scanning process by anticipating RSS values considering scan duration required.

  • PDF

Power-efficient MAC protocol for energy harvesting wireless sensor networks (에너지하베스팅 무선센서네트워크를 위한 전력효율적인 매체접근제어 프로토콜)

  • Shim, Kyu-Wook;Park, Hyung-Kun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.580-581
    • /
    • 2018
  • In order to reduce end-to-end delay in EH-WSN (energy harvestin wireless sensor netowk), medium access control protocols using multi-hop routing technique have been studied. In a real environment, there are many situations where it is difficult to harvest enough energy than the energy consumed. Therefore, it is required to design a MAC protocol that allows nodes to reliably relay data without exhausting power in multi-hop transmission. In this paper, we propose a power-efficient MAC protocol that can select the relay node according to the residual power and the energy collection rate to increase network lifetime.

  • PDF

Standardization Trends on High Rate Wireless Personal Area Network (고속 WPAN 표준화 동향)

  • Kim, Jin-Tae;Park, Jong-Dae;Chu, Moo-Jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.985-988
    • /
    • 2005
  • The international standards of high-rate WPAN (Wireless Personal Area network) are under development by IEEE802.15 WPAN TG3 (Task Group 3). The study area of TG3 mainly consists of three parts: high rate physical and media access control layer in 2.4GHz ISM (Industrial Scientific Medical) non licensed frequency band; an alternative high rate physical layer by using UWB (Ultra Wide Band); and another alternative high rate physical layer based on millimeter wave. This paper describes the standardization trends of UWB and millimeter wave.

  • PDF

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.