• Title/Summary/Keyword: Access Time

Search Result 3,949, Processing Time 0.027 seconds

A Discriminative Collision Resolution Scheme for Wireless MAC Protocol (무선 MAC 프로토콜을 위한 차별적인 충돌해결 기법)

  • Hwang, Seong-Ho;Han, Gi-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.5
    • /
    • pp.225-231
    • /
    • 2002
  • This paper proposes a discriminative collision resolution scheme for the wireless Medium Access Control (MAC) protocols to support the Quality of Service (QoS) requirements of real-time applications. Our scheme deals with access requests in different ways depending on their delay requirements. In our scheme, a Collision Resolution Period (CRP) is used to quickly resolve collisions for the delay sensitive traffic in order to support their delay requirements. Performance analysis and simulation results show that our algorithm may successfully meet the delay requirements of real time applications by reducing access delays and collisions.

Exact Bit Error Rate Calculation of UWB-TH PPM Multiple Access Communication systems (UWB-TH PPM 다중 통신시스템의 정확한 비트 오율의 계산)

  • Park, Jang-Woo;Cho, Sung-Eon;Choi, Yong-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1174-1181
    • /
    • 2005
  • The exact bit error rate(BER) calculation of an UWB-TH PPM multiple access communication system, which is known to be suitable for the fast transmission of massive information data, is introduced. The statistic feature of the multiple access intereference (MAI) of the system is precisely modeled by the characteristic function technique. The concrete expression for the MAI allows the exact expression for BER to be derived. In addition, we propose the approximate expression for the BER which reveals superior accuracy to the expression from the previous Gaussian approximation of the MAI. The validity of the proposed expressions is confirmed from the comparison of proposed results with the results from Monte-Carlo simulation.

Temporary Access Selection Technology in WIFI Networks

  • Lu, Yang;Tan, Xuezhi;Mo, Yun;Ma, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4269-4292
    • /
    • 2014
  • Currently, increasing numbers of access points (AP) are being deployed in enterprise offices, campuses and municipal downtowns for flexible Internet connectivity, but most of these access points are idle or redundant most of the time, which causes significant energy waste. Therefore, with respect to power conservation, applying energy efficient strategies in WIFI networks is strongly advocated. One feasible method is dynamically managing network resources, particularly APs, by powering devices on or off. However, when an AP is powered on, the device is initialized through a long boot time, during which period clients cannot be associated with it; therefore, the network performance would be greatly impacted. In this paper, based on a global view of an entire WLAN, we propose an AP selection technology, known as Temporary Access Selection (TAS). The criterion of TAS is a fusion metric consisting of two evaluation indexes which are based on throughput and battery life, respectively. TAS is both service and clients' preference specific through balancing the data rate, battery life and packet size. TAS also works well independently in traditional WLANs in which no energy efficient strategy is deployed. Moreover, this paper demonstrates the feasibility and performance of TAS through experiments and simulations with Network Simulator version 3 (NS3).

A Study on Parallel Processing System for Automatic Segmentation of Moving Object in Image Sequences

  • Lee, Hyung;Park, Jong-Won
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.429-432
    • /
    • 2000
  • The new MPEG-4 video coding standard enables content-based functionalities. In order to support the philosophy of the MPEG-4 visual standard, each frame of video sequences should be represented in terms of video object planes (VOP’s). In other words, video objects to be encoded in still pictures or video sequences should be prepared before the encoding process starts. Therefore, it requires a prior decomposition of sequences into VOP’s so that each VOP represents a moving object. A parallel processing system is required an automatic segmentation to be processed in real-time, because an automatic segmentation is time consuming. This paper addresses the parallel processing: system for an automatic segmentation for separating moving object from the background in image sequences. The proposed parallel processing system comprises of processing elements (PE’s) and a multi-access memory system (MAMS). Multi-access memory system is a memory controller to perform parallel memory access with the variety of types: horizontal, vertical, and block access way. In order to realize these ways, a multi-access memory system consists of a memory module selection module, data routing modules, and an address calculation and routing module. The proposed system is simulated and evaluated by the CADENCE Verilog-XL hardware simulation package.

  • PDF

The study for improvement of traffic performance based on load balancing in wireless LAN (로드발랜싱기반 무선랜의 트래픽 성능 향상에 관한 연구)

  • Park, Chi-Ho;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.2 s.344
    • /
    • pp.1-6
    • /
    • 2006
  • This paper proposes association algorithm using load balancing for efficient AP selection under environment of wireless local area network(WLAN). Our scheme measures arrival time of association information when establishing the connection between access points and access terminal, analyzes the load condition of AP, and applies load balancing. AT selects and sets up low traffic AP by measuring traffic of connected access terminal, which can prevent over-franc of access points under hotspot environment that users access simultaneously. According to the above-described selection in a high speed wireless Internet service based on public WLAN technologies that are currently in operations. Further, it is possible to improve the efficiency of network management.

AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran;Jia, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2052-2072
    • /
    • 2012
  • Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used directly and even become disabled in an emergency situation. This paper proposes an adaptive Access Control model for Emergences (AC4E) for mission-critical CPSs. The principal aim of AC4E is to control the criticalities in these systems by executing corresponding responsive actions. AC4E not only provides the ability to control access to data and services in normal situations, but also grants the correct set of access privileges, at the correct time, to the correct set of subjects in emergency situations. It can facilitate adaptively responsive actions altering the privileges to specific subjects in a proactive manner without the need for any explicit access requests. A semiformal validation of the AC4E model is presented, with respect to responsiveness, correctness, safety, non-repudiation and concurrency, respectively. Then a case study is given to demonstrate how the AC4E model detects, responds, and controls the emergency events for a typical CPS adaptively in a proactive manner. Eventually, a wide set of simulations and performance comparisons of the proposed AC4E model are presented.

A Design and Implementation of Java Library for Multiple Access Control Models (다중 접근제어 모델을 위한 Java 라이브러리의 설계 및 구현)

  • Oh, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1394-1401
    • /
    • 2007
  • Secure access control is a hot issue of large-scale organizations or information systems, because they have numerous users and information objects. In many cases, system developers should implement an access control module as a part of application. This way induces difficult modification of the module and repeated implementation for new applications. In this paper we implement a Java API library for access control to support system developers who use Java. They can easily build up access control module using our library. Our library supports typical access control models, and it can offer new types of access control. Furthermore, it is able to run multiple access control models at the same time.

  • PDF

The Development of the Automatic Computation Module for Optimum Stories of Apartment Buildings to Assure the Solar Access Right for Neighboring Areas (인근지역 일조권 확보를 위한 공동주택 층계획 자동화 모듈 개발에 관한 연구)

  • Seong, Yoon-Bok;Yeo, Myoung-Souk;Kim, Kwang-Woo
    • Journal of the Korean Solar Energy Society
    • /
    • v.25 no.1
    • /
    • pp.65-78
    • /
    • 2005
  • The objective of this paper is to develop a automatic computation module for optimum stories in apartment buildings in order to assure the solar access right for neighboring areas. Compared to the existing solar access right analysis programs, the proposed solar access right analysis program is more improved and expanded by automating the computing process of optimum stories in apartment buildings. With the result of this research, it would be possible to furnish advanced information for an amicable settlement against the civil petition and disputes, to reduce waste of the time and money, and to improve the efficiency of solar access right analysis works.

PERIODIC SENSING AND GREEDY ACCESS POLICY USING CHANNEL MODELS WITH GENERALLY DISTRIBUTED ON AND OFF PERIODS IN COGNITIVE NETWORKS

  • Lee, Yutae
    • Journal of applied mathematics & informatics
    • /
    • v.32 no.1_2
    • /
    • pp.129-136
    • /
    • 2014
  • One of the fundamental issues in the design of dynamic spectrum access policy is the modeling of the dynamic behavior of channel occupancy by primary users. Under a Markovian modeling of channel occupancy, a periodic sensing and greedy access policy is known as one of the simple and practical dynamic spectrum access policies in cognitive radio networks. In this paper, the primary occupancy of each channel is modeled as a discrete-time alternating renewal process with generally distributed on- and off-periods. A periodic sensing and greedy access policy is constructed based on the general channel occupancy model. Simulation results show that the proposed policy has better throughput than the policies using channel models with exponentially distributed on- or off-periods.

Pricing Strategy for Access Charge of IPTV Network : A Dynamic Analysis (IPTV 망 임대의 가격책정 전략 : 동태적 분석)

  • Kim, Dong-Hee;Cha, Jeong-Hyun;Oh, Jung-Suk;Kim, Soo-Wook
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.35 no.3
    • /
    • pp.45-58
    • /
    • 2010
  • Due to rapid developments of IT technologies, convergence services like IPTV (Internet protocol television) are shown up. Even though expert and customer had great expectations for this innovative service, commercialization was delayed for years by the legal dispute between industry players. One of the biggest problems was that whether internet backbone providers have to share their internet network backbone with IPTV service providers (which don't have network backbone) or not. As other countries, Korean government set the rules that ISP have to offer indiscriminate access to other IPTV service provider. At the same time, internet backbone providers can charge access charge based on cost by way of compensation. Thus access charge is very critical to the IPTV industry players. The objective of this paper is to provide model that can calculate the reasonable access charge by system dynamics, based upon real data in Korean telecommunication industry.