• Title/Summary/Keyword: wireless local area networks

Search Result 170, Processing Time 0.028 seconds

A Study on Local Area Weather Condition Monitoring System in WSN and CDMA (무선센서네트워크와 CDMA망을 이용한 국지적 기상모니터링 시스템)

  • Chung, Wan-Young;Jung, Sang-Joong;Kim, Jong-Jin;Kwon, Tae-Ha
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1713-1720
    • /
    • 2009
  • An local area weather condition monitoring system to minimize many disasters from the sudden change of weather condition in local and mountain ales is proposed. Firstly, the comparison of present state of the related monitoring systems and the possibility of realization with some merits are investigated. Moreover, this paper present direction of local area weather condition monitoring system based on integration of wireless sensor network and CDMA network following some case study. The sensor node for wireless sensor network and an interface dongle are fabricated for the system. The stand-alone software in cellular phone is also developed. Through the efficient integration of both networks, the measured weather condition data from sensors can be transmitted to the server or mobile to monitor with high reliability. The proposed monitoring system will guide new type of project in wireless sensor network and support alarm service of the sudden change of weather condition to mobile user from central official regulations.

The IEEE 802.11 MAC Protocol to solve Unfairness Problem in Multihop Wireless Ad Hoc Networks (다중 무선 에드혹 네트워크에서 불공정 문제를 해결하기 위한 802.11 MAC 프로토콜)

  • Nam, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.229-234
    • /
    • 2007
  • In the IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time. which is uniformly selected from the Contention Window (CW) This contention window is dynamically controlled by the Binary Exponential Backoff (BEB) algorithm. The BEB scheme suffers from a unfairness problem and low throughput under high traffic load. In this paper, I propose a new backoff algorithm for use with the IEEE 802.11 Distributed Coordination Function.

  • PDF

The IEEE 802.11 MAC Protocol to solve Unfairness Problem in Multihop Wireless Ad Hoc Networks (다중 무선 에드혹 네트워크에서 불공정 문제를 해결하기 위한 802.11 MAC 프로토콜)

  • Nam, Jae-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.91-94
    • /
    • 2007
  • In the IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Binary Exponential Backoff (BEB) algorithm. The BEB scheme suffers from a fairness problem and low throughput under high traffic load. In this paper, I propose a new backoff algorithm for use with the IEEE 802.11 Distributed Coordination Function.

  • PDF

Impact of the human body in wireless propagation of medical implants for tumor detection

  • Morocho-Cayamcela, Manuel Eugenio;Kim, Myung-Sik;Lim, Wansu
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.19-26
    • /
    • 2020
  • This paper analyses the feasibility of using implantable antennas to detect and monitor tumors. We analyze this setting according to the wireless propagation loss and signal fading produced by human bodies and their environment in an indoor scenario. The study is based on the ITU-R propagation recommendations and prediction models for the planning of indoor radio communication systems and radio local area networks in the frequency range of 300 MHz to 100 GHz. We conduct primary estimations on 915 MHz and 2.4 GHz operating frequencies. The path loss presented in most short-range wireless implant devices does not take into account the human body as a channel itself, which causes additional losses to wireless designs. In this paper, we examine the propagation through the human body, including losses taken from bones, muscles, fat, and clothes, which results in a more accurate characterization and estimation of the channel. The results obtained from our simulation indicates a variation of the return loss of the spiral antenna when a tumor is located near the implant. This knowledge can be applied in medical detection, and monitoring of early tumors, by analyzing the electromagnetic field behavior of the implant. The tumor was modeled under CST Microwave Studio, using Wisconsin Diagnosis Breast Cancer Dataset. Features like the radius, texture, perimeter, area, and smoothness of the tumor are included along with their label data to determine whether the external shape has malignant or benign physiognomies. An explanation of the feasibility of the system deployment and technical recommendations to avoid interference is also described.

Formal Modeling and Verification of an Enhanced Variant of the IEEE 802.11 CSMA/CA Protocol

  • Hammal, Youcef;Ben-Othman, Jalel;Mokdad, Lynda;Abdelli, Abdelkrim
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.385-396
    • /
    • 2014
  • In this paper, we present a formal method for modeling and checking an enhanced version of the carrier sense multiple access with collision avoidance protocol related to the IEEE 802.11 MAC layer, which has been proposed as the standard protocol for wireless local area networks. We deal mainly with the distributed coordination function (DCF) procedure of this protocol throughout a sequence of transformation steps. First, we use the unified modeling language state machines to thoroughly capture the behavior of wireless stations implementing a DCF, and then translate them into the input language of the UPPAAL model checking tool, which is a network of communicating timed automata. Finally, we proceed by checking of some of the safety and liveness properties, such as deadlock-freedom, using this tool.

Cooperative MAC Protocol Using Active Relays for Multi-Rate WLANs

  • Oh, Chang-Yeong;Lee, Tae-Jin
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.463-471
    • /
    • 2011
  • Cooperative communications using relays in wireless networks have similar effects of multiple-input and multiple-output without the need of multiple antennas at each node. To implement cooperation into a system, efficient protocols are desired. In IEEE 802.11 families such as a/b/g, mobile stations can automatically adjust transmission rates according to channel conditions. However throughput performance degradation is observed by low-rate stations in multi-rate circumstances resulting in so-called performance anomaly. In this paper, we propose active relay-based cooperative medium access control (AR-CMAC) protocol, in which active relays desiring to transmit their own data for cooperation participate in relaying, and it is designed to increase throughput as a solution to performance anomaly. We have analyzed the performance of the simplified AR-CMAC using an embedded Markov chain model to demonstrate the gain of AR-CMAC and to verify it with our simulations. Simulations in an infrastructure network with an IEEE 802.11b/g access point show noticeable improvement than the legacy schemes.

A MAC Enhancement Technique for Quality of Service Guarantee in Wireless Local Area Networks (무선 네트워크에서 QoS 보장을 위한 MAC 향상 기법)

  • Lee, Dong-Geon;Kim, Byoung-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1446-1459
    • /
    • 2008
  • In an infrastructure-based wireless network, an access point is used for all communications among mobile devices. However, when a mobile device moves into a dead Bone, a connectivity disruption between the mobile device and the access point occurs. Such connectivity disruption consequently leads to another connectivity disruption between the mobile device moving toward the dead zone and other wireless-enabled devices located within the area of the infrastructure-based wireless network. To cope with the connectivity disruption in the infrastructure-based wireless network the ad hoc network that dynamically forms a network without any preexisting communication infrastructure needs to be set up to provide seamless connections among mobile devices. In this paper, we propose the DNSQ-MAC (Dynamic Network State aware QoS-Medium Access Control) technique that meets the deadlines of MAC frames forwarded over hop-by-hop multipaths and guarantees the QoS performance of an ad hoc-based wireless network. Mobile devices incorporating the DNSQ-MAC technique are capable of adjusting to the new dynamic network status in order to enhance the QoS performance in the ad hoc-based wireless network. A case study which exploits the Qualnet simulator shows that the proposed DNSQ-MAC technique can guarantee the deadlines of MAC frames forwarded over hop-by-hop multipaths and enhance the QoS performance of various routing protocols and packet schedulers running on the network layer above the MAC layer.

  • PDF

A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks

  • Liu, Xiyao;Ge, Yu;Zhu, Yuesheng;Wu, Dajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4643-4660
    • /
    • 2014
  • Integrity authentication of biometric data in Wireless Body Area Network (WBAN) is a critical issue because the sensitive data transmitted over broadcast wireless channels could be attacked easily. However, traditional cryptograph-based integrity authentication schemes are not suitable for WBAN as they consume much computational resource on the sensor nodes with limited memory, computational capability and power. To address this problem, a novel lightweight integrity authentication scheme based on reversible watermark is proposed for WBAN and implemented on a TinyOS-based WBAN test bed in this paper. In the proposed scheme, the data is divided into groups with a fixed size to improve grouping efficiency; the histogram shifting technique is adopted to avoid possible underflow or overflow; local maps are generated to restore the shifted data; and the watermarks are generated and embedded in a chaining way for integrity authentication. Our analytic and experimental results demonstrate that the integrity of biometric data can be reliably authenticated with low cost, and the data can be entirely recovered for healthcare applications by using our proposed scheme.

Simulation model of a multihomed node with WiMAX and WLAN (WiMAX - WLAN 멀티홈드 노드의 시뮬레이션 모델)

  • Zhang, Xiao-Lei;Wang, Ye;Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.111-119
    • /
    • 2010
  • With the rapid progress of wireless technologies today, mobile terminals with multiple access interfaces are emerging. In recent years, WLAN (Wireless Local Area Networks) has become the premier choice for many homes and enterprises. WiMAX (Worldwide Interoperability for Microwave Access) has also emerged as the wireless standard that aims to deliver data over long distances. Therefore, it is important to explore efficient integration methods for delivering multimedia data between heterogeneous wireless networks. In this paper, we developed the simulation models and environments for the mobile multihomed node that has both WiMAX and WLAN interfaces and can move around in both networks by using mobile IP. In order to verify the developed models, we designed and constructed several simulation scenarios, e.g. movement in WiMAX/WLAN, group mobility, MANET, and nested MIP under the various traffic environments such as oneway or bothway UDP packets, FTP traffic, and voice with SIP protocol. The simulation results show that the developed models are useful for mobility studies in various integrated wireless networks.

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks

  • Kim, Ji-In;Koh, Seok-Joo
    • Journal of Information Processing Systems
    • /
    • v.7 no.4
    • /
    • pp.627-634
    • /
    • 2011
  • This paper addresses the Proxy Mobile IPv6 (PMIP) handover using bicasting in mobile/wireless networks. The bicasting scheme can be used to support the PMIP handover, which tends to waste the network resources of wireless links and incurs data losses during handover. We propose an enhanced scheme of PMIP handover, called the partial bicasting with buffering for PMIP (PBB-PMIP). In the PBB-PMIP handover, the bicasting is performed in the "partial" region between the Local Mobility Anchor (LMA) and the Mobile Access Gateway (MAG), when a mobile node is in the handover area. The data packets are buffered at the new MAG during handover to reduce data losses and are then forwarded to mobile nodes after handover. By ns-2 simulations, the proposed PBB-PMIP scheme is compared with the existing schemes of PMIP and PMIP with bicasting. The proposed scheme can benefit from the reduction of handover delay and packet loss, and the effective use of the network resources of wireless links, as compared to the existing handover schemes.