• Title/Summary/Keyword: Acknowledgement Control

Search Result 62, Processing Time 0.023 seconds

Performance Analysis of Directional CSMA/CA for IEEE 802.15.3c under Saturation Environments

  • Kim, Mee-Joung;Kim, Yong-Sang;Lee, Woo-Yong
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.24-34
    • /
    • 2012
  • In this paper, the directional carrier sense multiple access/collision avoidance (CSMA/CA) protocol in the immediate acknowledgement mode for IEEE 802.15.3c is analyzed under saturation environments. For the analysis, a sensing region and an exclusive region with a directional antenna are computed probabilistically and a Markov chain model in which the features of IEEE 802.15.3c and the effects of using directional antennas are incorporated is analyzed. An algorithm to find the maximal number of concurrently transmittable frames is proposed. The system throughput and the average transmission delay are obtained in closed forms. The numerical results show the impact of directional antennas on the CSMA/CA media access control (MAC) protocol. For instance, the throughput with a small beamwidth of antenna is more than ten times larger than that for an omnidirectional antenna. The overall analysis is verified by a simulation. The obtained results will be helpful in developing an MAC protocol for enhancing the performance of mmWave wireless personal area networks.

Middleware services for structural health monitoring using smart sensors

  • Nagayama, T.;Spencer, B.F. Jr.;Mechitov, K.A.;Agha, G.A.
    • Smart Structures and Systems
    • /
    • v.5 no.2
    • /
    • pp.119-137
    • /
    • 2009
  • Smart sensors densely distributed over structures can use their computational and wireless communication capabilities to provide rich information for structural health monitoring (SHM). Though smart sensor technology has seen substantial advances during recent years, implementation of smart sensors on full-scale structures has been limited. Hardware resources available on smart sensors restrict data acquisition capabilities; intrinsic to these wireless systems are packet loss, data synchronization errors, and relatively slow communication speeds. This paper addresses these issues under the hardware limitation by developing corresponding middleware services. The reliable communication service requires only a few acknowledgement packets to compensate for packet loss. The synchronized sensing service employs a resampling approach leaving the need for strict control of sensing timing. The data aggregation service makes use of application specific knowledge and distributed computing to suppress data transfer requirements. These middleware services are implemented on the Imote2 smart sensor platform, and their efficacy demonstrated experimentally.

A Study on The Acknowledgement of A Criterion and Subjective Symptom of Musculoskeletal Diseases by Dental Hygienists works (치과위생사 업무 중 근·골격계 질환의 자각 증상과 업무상 재해 인정기준에 관한 연구)

  • Lee, Sook-Jeong
    • Journal of Korean society of Dental Hygiene
    • /
    • v.5 no.2
    • /
    • pp.235-245
    • /
    • 2005
  • The changes in korean economic environment, from quantitative to qualitative growth of economy, go with making desperate efforts, that is, companies have put through many technical improvements, quality control, improvement of service, and so forth. Enterprises cut the number of employees through labor-management adjustment, so that a shortage of labor caused. An increase in intension of labor brought about growing the proportion of occupational diseases which is musculoskeletal diseases. Because of a rapid change in society and a change in our circumstances, we have many difficulties in examine a business disease closely. In support corroboration of relevance on admission of business, a criterion for dudging afford a basis for a causal relationship of medical science, take the state of working conditions into consideration, and at the same time, give a adaptable decision based on the purpose and point of "The Labor Standard Law" as well as "The Law about Industrial Accident Compensation insurance". In conclusion, it is necessary for the dental hygienists 10 reduce the on-duty hours a day, to make good postures in working, and to remove the stressful conditions in order to reduce the incidence of the lumbago. Good working postures, appropriate rest time, and early detection, care and education of the lumbago could be recommended for the dental hygienists.

  • PDF

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

The Performance Improvement using Rate Control in End-to-End Network Systems (종단간 네트워크 시스템에서 승인 압축 비율 제어를 이용한 TCP 성능 개선)

  • Kim, Gwang-Jun;Yoon, Chan-Ho;Kim, Chun-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.45-57
    • /
    • 2005
  • In this paper, we extend the performance of bidirectional TCP connection over end-to-end network that uses transfer rate-based flow and congestion control. The sharing of a common buffer by TCP packets and acknowledgement has been known to result in an effect called ack compression, where acks of a connection arrive at the source bunched together, resulting in unfairness and degraded throughput. The degradation in throughput due to bidirectional traffic can be significant. Even in the simple case of symmetrical connections with adequate window size, the connection efficiency is improved about 20% for three levels of background traffic 2.5Mbps, 5.0Mbps and 7.5Mbps. Otherwise, the throughput of jitter is reduced about 50% because round trip delay time is smaller between source node and destination node. Also, we show that throughput curve is improved with connection rate algorithm which is proposed for TCP congetion avoidance as a function of aggressiveness threshold for three levels of background traffic 2.5Mbps, 5Mbps and 7.5Mbps. By analyzing the periodic bursty behavior of the source IP queue, we derive estimated for the maximum queue size and arrive at a simple predictor for the degraded throughput, applicable for relatively general situations.

TCP Congestion Control of Transfer Rate-based in End-to-End Network Systems (종단간 네트워크 시스템에서 전송율 기반 TCP 혼잡제어)

  • Bae, Young-Geun;Yoon, Chan-Ho;Kim, Gwang-Jun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.1 no.2
    • /
    • pp.102-109
    • /
    • 2006
  • In this paper, we improve the performance of bidirectional TCP connection over end-to-end network that uses transfer rate-based flow and congestion control. The sharing of a common buffer by TCP packets and acknowledgement has been known to result in an effect called ack compression, where acks of a connection arrive at the source bunched together, resulting in unfairness and degraded throughput. The degradation in throughput due to bidirectional traffic can be significant. For example, even in the simple case of symmetrical connections with adequate window size, the connection efficiency is improved about 20% for three levels of background traffic 2.5Mbps, 5.0Mbps and 7.5Mbps. Otherwise, the throughput of jitter is reduced about 50% because round trip delay time is smaller between source node and destination node. Also, we show that throughput curve is improved with connection rate algorithm which is proposed for TCP congestion avoidance as a function of aggressiveness threshold for three levels of background traffic 2.5Mbps, 5Mbps and 7.5Mbps.

  • PDF

An Error Recovery Mechanism for Communications with Reliability in Sensor Network (센서 네트워크에서 신뢰성 있는 통신을 위한 에러 복구 기법)

  • Min, Byung-Ung;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.360-363
    • /
    • 2007
  • In sensor network, the importance of transporting data with reliability is growing gradually to support communications. Data flow from sink to nodes needs reliability for the control or management, that is very sensitive and intolerable, however relatively, data flow from nodes to sink is tolerable. In this paper, with emphasis of the data flow from sink to nodes, we proposed the mechanism that establishes confidence interval for transport. Establishing confidence interval hop-by-hop, not end to end, if errors happen or there's missing data, this mechanism recovers them with selective acknowledgement using fixed window. In addition, this mechanism supports traffic congestion control depending on the buffer condition. Through the simulation, we showed that this mechanism has an excellent performance for error recovery in sensor network.

  • PDF

Adaptive Error Control Based on Traffic Type and Channel Error Rate in Wireless ATM (무선 ATM에서의 트래픽 형태 및 채널 오율에 기반한 적응 오류 제어)

  • 김영웅;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1532-1538
    • /
    • 1999
  • In general, because error rate of wireless link is higher than that of wired link, DLC layer protocol for wired network with low error rate is not proper for wireless environments. In addition, the conventional DLC layer protocol for wireless network is optimized for the low-speed data service, so it is difficult to use conventional DLC protocol in the current mobile communication environments handing high-speed and multimedia services. Therefore, a DLC layer protocol that is suitable to current wireless communication environments is required. In this paper, we propose a novel error control scheme that supports a variety of traffic attribute and is applicable to high-speed and multimedia data service in WATM. The proposed scheme provides enhanced throughput performance for real-time traffic by using modified ASR ARQ without ACK and reduces loss rate by using FEC in the case of high error condition. Also, for non real-time traffic, the use of ASR ARQ without ACK enhances throughput performance and delay time is decreased by using FEC in the case of high error rate channel. As a result of simulation, the proposed scheme has better performance than conventional ASR ARQ protocol in view of delay and throughput.

  • PDF

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.

Improving Loss Recovery Performance of TCP SACK by Retransmission Loss Recovery (재전송 손실 복구를 통한 TCP SACK의 성능 향상 모델링 및 분석)

  • 김범준;김동민;이재용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.667-674
    • /
    • 2004
  • The performance of transmission control protocol (TCP) is largely dependent upon its loss recovery. Therefore, it is a very important issue whether the packet losses may be recovered without retransmission timeout (RTO) or not. Although TCP SACK can recover multiple packet losses in a window, it cannot avoid RTO if a retransmitted packet is lost again. In order to alleviate this problem, we propose a simple change to TCP SACK, which is called TCP SACK+ in simple. We use a stochastic model to evaluate the performance of TCP SACK+, and compare it with TCP SACK. Numerical results evaluated by simulations show that SACK+ can improve the loss recovery of TCP SACK significantly in presence of random losses.