• Title/Summary/Keyword: 무선링크 연관 기법

Search Result 2, Processing Time 0.02 seconds

A Selection Method of Access Points to Improve IPTV Service Quality in WLAN Environments (무선랜 환경에서 IPTV 서비스 품질 향상을 위한 AP 선택 기법)

  • Park, Jae-Sung;Lim, Yu-Jin
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.251-254
    • /
    • 2011
  • In a WLAN, the data reception rate of a user station depends not only on the received signal strength (RSS) from an AP (Access Point) but also on the contention level of the AP. However, since only the RSSs measured at the physical layer have been used for a station to select an AP to associate with, the station may not satisfy the minimum quality requirements necessary for a seamless IPTV service. Thus, in this paper, we propose an AP selection method to support quality requirements of the IPTV service in a wireless LAN without modifying the IEEE 802.11 standard. A user station keeps monitoring a contention level of APs around it and a quality of an ongoing IPTV service. If the quality deteriorates below a threshold, the station reassociates with another AP having the least load so that the ongoing IPTV program is played without disruption.

Security Characteristics of D-MAC in Convergence Network Environment (융합망 환경에서 D-MAC의 보안 특성)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.323-328
    • /
    • 2014
  • D-MAC protocol is used convergence network, which is designed to connect wireless link between things. This protocol is supported to local data exchange and aggregation among neighbor nodes, and distributed control packet from sink to sensor node. In this paper, we analysis about efficiency of power consumption according to whether or not security authentication of D-MAC in convergence network. If authentication scheme is applied to MAC communication, it is related to power consumption of preamble whether or not with and without authentication process. It is reduced to energy consumption against denial attack of service, when it is applied to authentication. Future work will take the effort to deal with security authentication scheme.