• Title/Summary/Keyword: Access Time

Search Result 3,946, Processing Time 0.029 seconds

An Energy Efficient MAC Protocol Providing Guaranteed Service for Wireless Sensor Network

  • Kim, Dong-Won;Park, Tae-Geon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.123-140
    • /
    • 2011
  • In this paper, we propose an Energy Efficient Media Access Control (EE-MAC) protocol for wireless sensor networks. The proposed scheme is designed to save power consumption and guarantee quality-of-service for real-time traffic. EE-MAC uses the superframe structure which is bounded by the transmission of a beacon frame and can have an active and an inactive portion. The active period is divided into the contention free period (CFP) for real-time traffic transmission and the contention access period (CAP) for non-real-time traffic transmission. We propose the exclusively allocated backoff scheme which assigns a unique backoff time value to each real-time node based on bandwidth allocation and admission control. This scheme can avoid collision between real-time nodes by controlling distributed fashion and take effect a statistical time division multiple access. We also propose the algorithm to change the duty cycle adaptively according to channel utilization of media depending on network traffic load. This algorithm can prolong network lifetime by reducing the amount of energy wasted on idle listening.

A Study on the Performance of the Various Multiple Access for the Mobile Computer Network (이동 컴퓨터 통신망용 다중 엑세스 방식의 성능 연구)

  • 백지현;조동호;이영웅
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.7
    • /
    • pp.641-655
    • /
    • 1992
  • In this paper, the performance of the various multiple accesstechniques for the mobile computer network has been studied in the consideration of the characteristics. Of the mobile communication channel. In the case of the hidden node occurring, it could be seen that the performance of the code division multiple access(CDMA) technique. With simultaneous access function is better than that of the other packet access methods such as carrier sensed multiple access(CAMA). Busy tone mulitiple access(BTMA)and idle signal muitiple access(ISMA) in the view of the throuhtput and mean delay time. Also it has been shown that the performance of the CDMA method is superior to that of other packet access techniques such as multiple access(CSMA).etc when the fading effect or impulsive noise exists in the mobile channel. Especially in the case of the distributed mobile network. It has been shown that the receiver-transmitter based CDMA method using the characteristics of CDMA effectively has better throughput and less mean delay time than the commontransmitter based CDMA technique.

  • PDF

An Empirical Study on E-learning Participation Affected by Flow Experience and Internet Addiction (플로우 경험과 인터넷 중독이 이러닝 참여에 미치는 영향)

  • Lee, Ju-Yang;Jang, Phil-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.341-346
    • /
    • 2012
  • This paper reports the findings of research into the effect of flow experience and internet addiction on e-learning participation. The total number of access, playing time of contents and lag time (time between content upload and first access) were investigated as e-learning participation by analyzing web log data. The paper also examines the relationship between academic achievement and e-learning participation. The results suggest that the flow experience significantly correlates with all variables related with e-learning participation and internet addiction significantly correlates with lag time. It is found that female students significantly access more, longer and have shorter lag time than their male counterparts. It also suggest total number of access, lag time and gender difference have significant effect on academic achievement.

Enhanced TDMA based MAC Protocol for Adaptive Data Control in Wireless Sensor Networks

  • Alvi, Ahmad Naseem;Bouk, Safdar Hussain;Ahmed, Syed Hassan;Yaqub, Muhammad Azfar;Javaid, Nadeem;Kim, Dongkyun
    • Journal of Communications and Networks
    • /
    • v.17 no.3
    • /
    • pp.247-255
    • /
    • 2015
  • In this paper, we propose an adaptive time division multiple access based medium access control (MAC) protocol, called bitmap-assisted shortest job first based MAC (BS-MAC), for hierarchical wireless sensor networks (WSNs). The main contribution of BS-MAC is that: (a) It uses small size time slots. (b) The number of those time slots is more than the number of member nodes. (c) Shortest job first (SJF) algorithm to schedule time slots. (d) Short node address (1 byte) to identify members nodes. First two contributions of BS-MAC handle adaptive traffic loads of all members in an efficient manner. The SJF algorithm reduces node's job completion time and to minimize the average packet delay of nodes. The short node address reduces the control overhead and makes the proposed scheme an energy efficient. The simulation results verify that the proposed BS-MAC transmits more data with less delay and energy consumption compared to the existing MAC protocols.

Performance analysis of BTB-TDMA considering asymmetry of propagation delays in UANets (수중 네트워크의 전파 비대칭성을 고려한 BTB-TDMA 성능 분석)

  • Cho, A-Ra;Yun, Changho;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.50-60
    • /
    • 2015
  • A Block-Time-Bounded Time Division Multiple Access (BTB-TDMA) medium access control protocol, which estimates the propagation delay of nodes according to their location and moving velocity information, has been proposed for underwater acoustic networks. BTB-TDMA provides nodes with their transmission schedules by a time block that is a time unit, newly designed for BTB-TDMA. In this paper, we investigate how the receiver collision, that is induced by the asymmetry between node's uplink and downlink propagation delay due to its mobility, affects the performance of BTB-TDMA. To do this, we analytically obtain the collision rate, the channel access delay, and the channel utilization by considering the asymmetry of propagation delay. Then, simulations are extensively performed with respect to the length of a time block by varying the number of nodes, the network range, and the node's velocity. Thus, the simulation results can suggest performance criteria to determine the optimal length of a time block which minimizes the collision rate and concurrently maximizes the channel access delay and the channel utilization.

Realization of Fractal/Angle Multiplexing using X-Y Galvano Mirrors and Evaluation of Random Access Performance in Holographic Digital Data Storage (X-Y 갈바노 미러를 이용한 홀로그래픽 저장 장치의 프랙탈/각 다중화 구현 및 임의 탐색 성능의 평가)

  • Choi, Jin-Young;Lee, Jae-Sung;Kim, Sang-Hoon;Kim, Jang-Hyun;Yang, Hyun-Seok;Park, No-Cheol;Park, Young-Pil;Park, Joo-Youn
    • Transactions of the Society of Information Storage Systems
    • /
    • v.2 no.1
    • /
    • pp.43-49
    • /
    • 2006
  • Fractal/angle multiplexing is a $LiNBO_3$ crystal using a X-Y Galvano mirror, and the random access concept in fractal/angle multiplexing are discussed in this paper. First, the brief introduction of the designed holographic digital data storage system is presented. Then, the average access time concept for the storage system is newly defined, and the comparison of the average access time between the holographic storage and a conventional optical disk is performed. Second, the basic simulation and experiment to find the X-Y Galvano mirror dynamics are conducted. From this analysis, we find that the average access time in our HDDS which has 6 degree scan angle is about 5 msec. This result is very high performance when it compared with the average access time of a conventional optical disk. Finally, some recording results using fractal/angle multiplexing are presented, then, the relationship between bit error rate and angle mismatch for the each multiplexing are discussed.

  • PDF

Real-Time File Access Event Collection Methodology for Zero Trust Environment (제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구)

  • Han, Sung-Hwa;Lee, Hoo-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1391-1396
    • /
    • 2021
  • The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.

Ad-hoc based Multiple Access Scheme for VHF Oceanic Network (VHF 대양 네트워크를 위한 Ad-hoc 기반 다중접속기법)

  • Koo, Jayeul;Baek, Hoki;Lim, Jaesung
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.21 no.1
    • /
    • pp.15-22
    • /
    • 2013
  • In oceanic flight routes, HF radio and satellite data links have weather restrictions, long propagation delay and low data throughput. In this paper, we propose oceanic aeronautical communications scheme in the VHF band based on ad-hoc communication. The proposed scheme organizes autonomously a multi-hop network that is divided into multiple local network using aircraft to fly long-distance communication and supports a hybrid type of multiple access, which consists of random access and TDMA (Time Division Multiple Access) scheme. In addition, several algorithms to apply spatial reuse of transmission to multi-hop long range communication environments have been proposed. The proposed system proves performance improvement on delay time as an effective solution to communicate end-to-end on the oceanic flight routes and strengthens the reliability of oceanic aeronautical communication.

The Analysis of an Opportunistic Spectrum Access with a Strict T-preemptive Priority Discipline (엄격한 T-축출 우선순위 대기행렬을 이용한 기회 주파수 접근 방식의 성능 분석)

  • Kim, Kilhwan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.4
    • /
    • pp.162-170
    • /
    • 2012
  • We propose a new priority discipline called the strict T-preemptive priority discipline, and derive the waiting time distributions of each class in the strict T-preemptive priority M/G/1 queue. Using this queueing analysis, we evaluate the performance of an opportunistic spectrum access in cognitive radio networks, where a communication channel is divided into time slots, a licensed primary user is assigned to one channel, and multiple unlicensed secondary users may opportunistically exploit time slots unused by the primary user. We also present a numerical example of the analysis of the opportunistic spectrum access where the arrival rates and service times distributions of each users are identical.

Unified Optimal Power Allocation Strategy for MIMO Candidates in 3GPP HSDPA

  • Kim, Sung-Jin James;Kim, Ho-Jin;Lee, Kwang-Bok
    • ETRI Journal
    • /
    • v.27 no.6
    • /
    • pp.768-776
    • /
    • 2005
  • We compare the achievable throughput of time division multiple access (TDMA) multiple-input multiple-output (MIMO) schemes illustrated in the 3rd Generation Partnership Project (3GPP) MIMO technical report, versus the sum-rate capacity of space-time multiple access (STMA). These schemes have been proposed to improve the 3GPP high speed downlink packet access (HSDPA) channel by employing multiple antennas at both the base station and mobile stations. Our comparisons are performed in multi-user environments and are conducted using TDMA such as Qualcomm's High Data Rate and HSDPA, which is a simpler technique than STMA. Furthermore, we present the unified optimal power allocation strategy for HSDPA MIMO schemes by exploiting the similarity of multiple antenna systems and multi-user channel problems.

  • PDF