• Title/Summary/Keyword: B-MAC

Search Result 312, Processing Time 0.023 seconds

Interaction Between TCP and MAC-layer to Improve TCP Flow Performance over WLANs (유무선랜 환경에서 TCP Flow의 성능향상을 위한 MAC 계층과 TCP 계층의 연동기법)

  • Kim, Jae-Hoon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.99-111
    • /
    • 2008
  • In recent years, the needs for WLANs(Wireless Local Area Networks) technology which can access to Internet anywhere have been dramatically increased particularly in SOHO(Small Office Home Office) and Hot Spot. However, unlike wired networks, there are some unique characteristics of wireless networks. These characteristics include the burst packet losses due to unreliable wireless channel. Note that burst packet losses, which occur when the distance between the wireless station and the AP(Access Point) increase or when obstacles move temporarily between the station and AP, are very frequent in 802.11 networks. Conversely, due to burst packet losses, the performance of 802.11 networks are not always as sufficient as the current application require, particularly when they use TCP at the transport layer. The high packet loss rate over wireless links can trigger unnecessary execution of TCP congestion control algorithm, resulting in performance degradation. In order to overcome the limitations of WLANs environment, MAC-layer LDA(Loss Differentiation Algorithm)has been proposed. MAC-layer LDA prevents TCP's timeout by increasing CRD(Consecutive Retry Duration) higher than burst packet loss duration. However, in the wireless channel with high packet loss rate, MAC-layer LDA does not work well because of two reason: (a) If the CRD is lower than burst packet loss duration due to the limited increase of retry limit, end-to-end performance is degraded. (b) energy of mobile device and bandwidth utilization in the wireless link are wasted unnecessarily by Reducing the drainage speed of the network buffer due to the increase of CRD. In this paper, we propose a new retransmission module based on Cross-layer approach, called BLD(Burst Loss Detection) module, to solve the limitation of previous link layer retransmission schemes. BLD module's algorithm is retransmission mechanism at IEEE 802.11 networks and performs retransmission based on the interaction between retransmission mechanisms of the MAC layer and TCP. From the simulation by using ns-2(Network Simulator), we could see more improved TCP throughput and energy efficiency with the proposed scheme than previous mechanisms.

Reproduction of vibration patterns of elastic structures by block-wise modal expansion method (BMEM)

  • Jung, B.K.;Cho, J.R.;Jeong, W.B.
    • Smart Structures and Systems
    • /
    • v.18 no.4
    • /
    • pp.819-837
    • /
    • 2016
  • The quality of vibration pattern reproduction of elastic structures by the modal expansion method is influenced by the modal expansion method and the sensor placement as well as the accuracy of measured natural modes and the total number of vibration sensors. In this context, this paper presents an improved numerical method for reproducing the vibration patterns by introducing a block-wise modal expansion method (BMEM), together with the genetic algorithm (GA). For a given number of vibration sensors, the sensor positions are determined by an evolutionary optimization using GA and the modal assurance criterion (MAC). Meanwhile, for the proposed block-wise modal expansion, a whole frequency range of interest is divided into several overlapped frequency blocks and the vibration field reproduction is made block by block with different natural modes and different modal participation factors. A hollow cylindrical tank is taken to illustrate the proposed improved modal expansion method. Through the numerical experiments, the proposed method is compared with several conventional methods to justify that the proposed method provides the improved results.

Computation of Turbulent Appendage-Flat Plate Juncture Flow (부가물-평판 접합부 주위의 난류유동 계산)

  • Sun-Young Kim;Kazu-hiro Mori
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.32 no.2
    • /
    • pp.43-55
    • /
    • 1995
  • The turbulent flow around the strut mounted on the plate is studied numerically. The main objective of this paper is to validate the numerical scheme by the comparison of the computed results with the measured one, especially, to investigate the applicability of the Baldwin-Lomax(B-L) model to the juncture flow. Computations are made by solving Reynolds-averaged wavier-Stokes equation with MAC method. The computed results are compared with experimental data of Dickinson, collected in the wind tunnel at DTRC. Comparisons show good agreements generally except at the region of wake and very near the juncture. Reynolds stress model seems to be required to improve the accuracy applicable to the juncture flow in spite of the many simplification of the turbulence modelling in B-L model.

  • PDF

On the Basis Number of the Semi-Strong Product of Bipartite Graphs with Cycles

  • Jaradat, M.M.M.;Alzoubi, Maref Y.
    • Kyungpook Mathematical Journal
    • /
    • v.45 no.1
    • /
    • pp.45-53
    • /
    • 2005
  • A basis of the cycle space C (G) is d-fold if each edge occurs in at most d cycles of C(G). The basis number, b(G), of a graph G is defined to be the least integer d such that G has a d-fold basis for its cycle space. MacLane proved that a graph G is planar if and only if $b(G)\;{\leq}\;2$. Schmeichel showed that for $n\;{\geq}\;5,\;b(K_{n}\;{\bullet}\;P_{2})\;{\leq}\;1\;+\;b(K_n)$. Ali proved that for n, $m\;{\geq}\;5,\;b(K_n\;{\bullet}\;K_m)\;{\leq}\;3\;+\;b(K_n)\;+\;b(K_m)$. In this paper, we give an upper bound for the basis number of the semi-strong product of a bipartite graph with a cycle.

  • PDF

A Joint Wakeup Scheduling and MAC Protocol for Energy Efficient Data Forwarding in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 데이터 전송을 위한 스케줄링/ MAC 통합 프로토콜)

  • Cho, Jae-Kyu;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4B
    • /
    • pp.207-214
    • /
    • 2008
  • Under future internet environment, wireless sensor networks will be used in a wide range of applications. A major problem for designing sensor protocol is developing the most energy efficient technique to monitor an area of interest for a long time since sensors have some constraints such as small and a limited energy level. In addition, data latency is often a critical issue since sensory data is transmitted via multi hop fashion and need to be delivered timely for taking an appropriate action. Our motivation for designing a data forwarding protocol is to minimize energy consumption while keeping data latency bound in wireless sensor networks. In this paper, we propose a data forwarding protocol that consists of wakeup scheduling and MAC protocols, the latter of which is designed to achieve load balancing. Simulation results show that the proposed framework provides more energy-efficient delivery than other protocol.

Dynamic Frequency Selection Method for Medium Access Control in Cognitive Radio Networks (지능형 무선 인지 기술 기반 네트워크 환경에서 MAC 계층 동적 주파수 선택 방법)

  • Jo Kyoung-Jin;Kim Hyun-Ju;Roh Kweon-Mun;Yoo Snag-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7B
    • /
    • pp.632-641
    • /
    • 2006
  • Recently FCC has considered about the unlicensed device operation in licensed bands. However, this operation can give the harmful interference to the existent licensed system while unlicensed devices operate. Therefore, there should be strict requirements to protect licensed system. So in this paper we propose dynamic frequency selection method in the MAC layer, which is based on the cognitive radio technology. The proposed dynamic frequency selection method creates channel lists after sensing the licensed channels. And it helps the CR base station immediately to moves the current channels that are used by the unlicensed system to other available bands dynamically when a licensed system's signal is detected. This method can reduce interference that is caused by unlicensed devices. In addition, it can maximize channel utilization with enabling coexistence of unlicensed system and licensed system.

An Approach to Improve the End-to-end Performance for Mobile Ad hoc Networks (이동 애드 혹 망을 위한 종단간의 성능 개선 방안)

  • 이용석;최웅철
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.327-334
    • /
    • 2004
  • In this paper, we make MAC protocol improvements for performance enhancement of multi-hop ad-hoc wireless networks. A node in ad-hoc wireless networks can transmit a packet only when the medium is available, and while a packet is being transmitted, no other nodes are allowed to transmit a packet if they are in carrier sensing range. Carrier sensing range can be divided into two disjoint areas of transmission range and carrier sensing zone(9), and we address the importance of the protocol behavior when a node is in carrier sensing zone. The characteristic of the carrier sensing zone is that a node can not know when the remaining time of the on-going transmission session expires or exactly when the media becomes available. Current MAC protocol does not behave in much different way between when a node is in transmission range and in carrier sensing zone. We have conducted a comprehensive simulation to study the performance improvements. The simulation results indicate that the performance is increased and the number of dropped packets due to collision is significantly reduced as much as a half.

Medium Access Control Using Channel Reservation Scheme in Underwater Acoustic Sensor Networks (해양센서네트워크에서 채널예약방식을 이용한 매체접근제어)

  • Jang, Kil-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.955-963
    • /
    • 2009
  • In this paper, we propose a medium access control(MAC) protocol for reducing the energy efficiency and for improving the transmission efficiency in underwater acoustic sensor networks. In underwater environment, the transmission delay is longer and bandwidth is smaller than terrestrial environment. Considering these points, we propose a new MAC protocol to enhance throughput and to manage efficiently the energy of nodes. The proposed protocol operates as a channel reservation scheme to decrease data collisions, and uses a mechanism to control the hidden node problem and the exposed node problem occurred in ad hoc networks. The proposed protocol consists of the slotted based transmission frame and reduces data collisions between nodes by putting separately the reservation period in the transmission frame. In addition, it is able to solve the hidden node problem and the exposed node problem by reservation information between nodes. We carry out the simulation to evaluate the proposed protocol in terms of the average energy consumption, the ratio of collision, throughput, and the average transmission delay, and compare the proposed protocol to a traditional MAC protocol in the underwater environment. The simulation results show that the proposed protocol outperforms the traditional protocol under a various of network parameters.

An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer (EPON MAC 계층의 안전한 데이터 전송을 위한 인증 및 키관리 프로토콜)

  • Kang, In-kon;Lee, Do-Hoon;Lee, Bong-Ju;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.1-10
    • /
    • 2003
  • An EPON which is going on standardization in IEEE 802.3ah, is tree topology consists of a OLT and multiple ONU using passive optical components, so this network is susceptible to variable security threats - eavesdropping, masquerading, denial of service and so on. In this paper, we design a security protocol supporting authentication and confidentiality services in MAC layer in order to prevent these security threats and to guarantee secure data exchange The designed security protocol introduce public-key based authentication and key management protocols for efficient key management, and choose Rijndael algorithm, which is recent standard of AES, to provide the confidentiality of EPON Proposed authentication and key management protocols perform authentication and public-key exchange at a time, and are secure protocols using derived common cipher key by exchanging public random number To implement the designed security protocol, we propose the procedures of authentication and public-key exchange, session key update, key recovery. This proposed protocol is verified using unknown session key, forward secrecy, unknown key-share, key-compromise impersonation.

Prevention Scheme of DDoS Attack in Mobile WiMAX Networks Using Shared Authentication Information (Mobile WiMAX 네트워크에서 공유 인증 정보를 이용한 분산 서비스 거부 공격 방어)

  • Kim, Young-Wook;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.162-169
    • /
    • 2009
  • Message Authentication Code (MAC) assures integrity of messages. In Mobile WiMAX, 128-bit Cipher-based MAC (CMAC) is calculated for management messages but only the least significant half is actually used truncating the most significant 64 bits. Naming these unused most significant 64bits Shared Authentication Information (SAI), we suggest that SAI can be applied to protect the network from DDoS attack which exploits idle mode vulnerabilities. Since SAI is the unused half of CMAC, it is as secure as 64bits of CMAC and no additional calculations are needed to obtain it. Moreover, SAI doesn't have to be exchanged through air interface and shared only among MS, BS, and ASN Gateway. With these good properties, SAI can efficiently reduce the overheads of BS and ASN GW under the DDoS attack.