• Title/Summary/Keyword: B-MAC

Search Result 312, Processing Time 0.019 seconds

An Efficient Flooding Algorithm with Adaptive Retransmission Node Selection for Wireless Sensor Networks (무선 센서 네트워크에서의 적응적 재전송 노드 선택에 의한 효율적인 Flooding 알고리즘)

  • Choi, Seung-Joon;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11B
    • /
    • pp.673-684
    • /
    • 2007
  • In this paper, we introduce an FARNS (Flooding algorithm with Adaptive Retransmission Nodes Selection). It is an efficient cross layer-based flooding technique to solve broadcast storm problem that is produced by simple flooding of nodes in wireless sensor network. FARNS can decrease waste of unnecessary energy by preventing retransmission action of whole network node by deciding retransmission candidate nodes that are selected by identification in MAC and distance with neighborhood node through received signal strength information in PHY. In simulation part, we show the results that FARNS has excellent performance than the other flooding schemes in terms of broadcast forwarding ratio, broadcast delivery ratio, number of redundancy packets and overhead. And FARNS can adjust of node ratio for retransmission operation, it can solve broadcast storm problem as well as meet the requirements of various network environments.

A Buffer Management Algorithm based on the GOP Pattern and the Importance of each Frame to Provide QoS for Streaming Services in WLAN (WLAN에서 스트리밍 서비스이 QoS를 제공하기 위한 GOP 패턴 및 프레임 중요도에 따른 버퍼 관리 기술)

  • Kim, Jae-Hyun;Lee, Hyun-Jin;Lee, Kyu-Hwan;Roh, Byeong-Hee
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.372-375
    • /
    • 2008
  • IEEE 802.11e standardized the EDCA mechanism to support the priority based QoS. And the virtual collision handler schedules the transmission time of each MAC frame using the internal back-off window according to the access category(AC). This can provides the differentiated QoS to real-time services at the medium traffic load condition. However, the transmission delay of MAC frame for real-time services may be increased as the traffic load of best effort service increases. It becomes more critical when the real-time service uses a compressed mode video codec such as moving picture experts group(MPEG) 4 codec. That is because each frame has the different importance. That is, the I-frame has more information as compared with the P- and the B-frame. In this paper, we proposed a buffer management algorithm based on the frame importance and the delay bound. The proposed algorithm is consisted of the traffic regulator based on the dual token bucket algorithm and the active queue management algorithm. The traffic regulator reduces the transmission rate of lower AC until that the virtual collision handler can transmit an I-frame. And the active queue management discards frame based on the importance of each frame and the delay bound of head of line(HoL) frame when the channel resource is insufficient.

  • PDF

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

A Token-Ring-Based MAC Protocol in IEEE 802.11 WLANs (IEEE 802.11 무선 랜에서의 토큰링 기반의 매체 접속 제어 프로토콜)

  • Lee, Eun Guk;Rhee, Seung Hyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.38-40
    • /
    • 2014
  • In this paper, proposed method achieves delay reduction and throughput improvement by utilizing token-ring method in infrastructure network. Access Point gives token passing effect by successively transmitting ACK frame including a node's Association ID. Not only can this method considerably reduce time for medium access, but also improve throughput. Furthermore, AP offers more frequent medium access opportunity to node having highest data queue among nodes associated by AP. these method can evenly offer medium access opportunity according to Queue's volumes.

A Study on the Implemention of a Mini-MAP Network Interface Module for CIM (CIM을 위한 Mini-MAP 네트워크 접속장치의 구현에 관한 연구)

  • 김현기;이전우;하정현;정하재;채영도
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.10
    • /
    • pp.59-68
    • /
    • 1993
  • This paper describes implemation of 'General-purpose ETRI MAP interface module' (GEM) for Mini-MAP network. GEM operates as a Mini-MAP node in our FA system. To communicate between GEM and programmable devices(PD) such as PLC and CNC, serial communication is used. Application programs of a MiNi-MAP host system control and monitor programmable devices via GEM. GEM is implemented and tested on the basis of the MAP 3.0. TBC in the Nini-MAP board performs the function of the MAC sublayer. The LLC sublayer is implemented according to the specification of Class 3 that includes Type 1 and 3. And the MMS services are designed within the scope of implementation class MAP3. All the softwares are implemented under the real-time multitask OS for real-time application of the Mini-MAP and they are loaded into PROMs at the network board of GEM. We tested the LLC functions to make use of a protocol analyzer for the token-passing protocol. Also the MMS conformance test was carried out by exchanging primitives between GEM and a MMS product that had already passed the conformance test. Therefore GEM is proposed as a network tool of Computer Integrated Manufacturing (CIM) to integrate PDs which don't support MAP functions.

  • PDF

The Global Publication Output in Augmented Reality Research: A Scientometric Assessment for 1992-2019

  • Gupta, B.M.;Dhawan, S.M.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.2
    • /
    • pp.51-69
    • /
    • 2020
  • This paper describes global research in the field of augmented reality (22078) as indexed in Scopus database during 1992-2019, using a series of bibliometric indicators. The augmented reality (AR) research registered high 54.23% growth, averaged citation impact of 8.90 citations per paper. Nearly 1% of global output in the subject (226 papers) registered high-end citations (100+) per paper. The top 15 countries accounted for 87.05% of global publications output in the subject. The USA is in leadership position for its highest publications productivity (19.25% global share). The U.K. leads the world on relative citation index (2.05). International collaboration has been a major driver of AR research pursuits; between 11.89% and 44.04% of national share of top 15 countries in AR research appeared as international collaborative publications. AR research productivity by application types was the largest across sectors, such as education, industry and medical. Computer science has emerged as the most popular areas in AR research pursuits. Technical University of Munich, Germany and Osaka University, Japan have been the most productive organizations and Nara Institute of S&T, Japan (66.55 and 7.48) and Imperial College, London, U.K. (57.14 and 6.42) have been the most impactful organizations. M. Billinghurst and N. Navab have been the most productive authors and S. Feiner and B. MacIntyre have been the most impactful authors. IEEE Transactions on Visualization & Computer Graphics, Multimedia Tools & Applications and Virtual Reality topped the list of most productive journals.

Design of an Optimized 32-bit Multiplier for RSA Cryptoprocessors (RSA 암호화 프로세서에 최적화한 32비트 곱셈기 설계)

  • Moon, Sang-Ook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.75-80
    • /
    • 2009
  • RSA cryptoprocessors equipped with more than 1024 bits of key space handle the entire key stream in units of blocks. The RSA processor which will be the target design in this paper defines the length of the basic word as 128 bits, and uses an 256-bits register as the accumulator. For efficient execution of 128-bit multiplication, 32b*32b multiplier was designed and adopted and the results are stored in 8 separate 128-bit registers according to the status flag. In this paper, a fast 32bit modular multiplier which is required to execute 128-bit MAC (multiplication and accumulation) operation is proposed. The proposed architecture prototype of the multiplier unit was automatically synthesized, and successfully operated at the frequency in the target RSA processor.

On the Design of a WiFi Direct 802.11ac WLAN under a TGn MIMO Multipath Fading Channel

  • Khan, Gul Zameen;Gonzalez, Ruben;Park, Eun-Chan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1373-1392
    • /
    • 2017
  • WiFi Direct (WD) is a state of the art technology for a Device-to-Device (D2D) communication in 802.11 networks. The performance of the WD system can be significantly affected by some key factors such as the type of application, specifications of MAC and PHY layer parameters, and surrounding environment etc. It is, therefore, important to develop a system model that takes these factors into account. In this paper, we focus on investigating the design parameters of the PHY layer that could maximize the efficiency of the WD 802.11 system. For this purpose, a basic theoretical model is formulated for a WD network under a 2x2 Multiple In Multiple Out (MIMO) TGn channel B model. The design level parameters such as input symbol rate and antenna spacing, as well as the effects of the environment, are thoroughly examined in terms of path gain, spectral density, outage probability and Packet Error Rate (PER). Thereafter, a novel adaptive algorithm is proposed to choose optimal parameters in accordance with the Quality of Experience (QoE) for a targeted application. The simulation results show that the proposed method outperforms the standard method thereby achieving an optimal performance in an adaptive manner.

Effect of Hydroxocobalamin on Contractile Responses to Phenylephrine during Administration of Inhalational Anesthetics in Lipopolysaccharide-Treated Rat Aortae (흡입마취제 투여시 내독소혈증흰쥐 대동맥 수축반응에 미치는 Hydroxocobalamin의 효과)

  • Kim, In-Kyeom;Yang, Eun-Kyoung
    • The Korean Journal of Pharmacology
    • /
    • v.32 no.3
    • /
    • pp.381-388
    • /
    • 1996
  • The hemodynamic changes in septic patients produced by inhalational anesthetics are sufficient to threaten the anesthesiologists. The effect of hydroxocobalamin, a vitamin $B_{12a}$, on contractile responses to phenylephrine during administration of inhalational anesthetics were evaluated in aortic ring preparations obtained from LPS-treated rats. The sepsis was developed by intraperitoneal injection of LPS (1.5 mg/kg for l8h) and confirmed by iNOS expression using RT-PCR. Statistical significances (P<0.05) were analyzed by Student's t-test or paired t-test according to data characteristics. The blood pressure, but not heart rate, was decreased in LPS-treated rats as compared to control rats. The contractile response to phenylephrine were dose-dependently increased from the doses of $10^{-8}\;M$ to that of $10^{-5}$ and were attenuated in LPS-treated rings. Both halothane and enflurane, at the doses of 1 MAC, decreased the contractile responses to phenylephrine while isoflurane did not significantly affect the contractile responses. Hydroxocobalamin ($10^{-5}$ M) significantly potentiated the contractile responses in the LPS-treated aortic ring preparations during administration of each inhalational anesthetic or not. From these results, it is suggested that hydroxocobalamin may improve the hemodynamics of septic patients during inhalational anesthesia. Abbreviations: LPS, lipopolysaccharide; RT-PCR, reverse transcription-polymerase chain reaction; MAC, minimum alveolar concentration; iNOS, inducible nitric oxide synthase; GAPDH, glyceraldehyde 3-phosphate dehydrogenase

  • PDF

An Energy Efficient Transmission Scheme based on Cross-Layer for Wired and Wireless Networks (유.무선 혼합망에서 Cross-Layer기반의 에너지 효율적인 전송 기법)

  • Kim, Jae-Hoon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.6
    • /
    • pp.435-445
    • /
    • 2007
  • Snoop protocol is one of the efficient schemes to compensate TCP packet loss and enhance TCP throughput in wired-cum-wireless networks. However, Snoop protocol has a problem: it cannot perform local retransmission efficiently under the bursty-error prone wireless link. To solve this problem, SACK-Aware-Snoop and SNACK mechanism have been proposed. These approaches improve the performance by using SACK option field between base station and mobile host. However in the wireless channel with high packet loss rate, SACK-Aware-Snoop and SNACK mechanism do not work well because of two reason: (a) end-to-end performance is degraded because duplicate ACKs themself can be lost in the presence of bursty error, (b) energy of mobile device and bandwidth utilization in the wireless link are wasted unnecessarily because of SACK option field in the wireless link. In this paper, we propose a new local retransmission scheme based on Cross-layer approach, called Cross-layer Snoop(C-Snoop) protocol, to solve the limitation of previous localized link layer schemes. C-Snoop protocol includes caching lost TCP data and performing local retransmission based on a few policies dealing with MAC-layer's timeout and local retransmission timeout. From the simulation result, we could see more improved TCP throughput and energy efficiency than previous mechanisms.