• Title/Summary/Keyword: Blocking of Access

Search Result 141, Processing Time 0.021 seconds

A Performance Modeling of Wireless Sensor Networks as a Queueing Network with On and Off Servers

  • Ali, Mustafa K. Mehmet;Gu, Hao
    • Journal of Communications and Networks
    • /
    • v.11 no.4
    • /
    • pp.406-415
    • /
    • 2009
  • In this work, we consider performance modeling of a wireless sensor network with a time division multiple access (TDMA) media access protocol with slot reuse. It is assumed that all the nodes are peers of each other and they have two modes of operation, active and sleep modes. We model the sensor network as a Jackson network with unreliable nodes with on and off states. Active and sleep modes of sensor nodes are modeled with on and off states of unreliable nodes. We determine the joint distribution of the sensor node queue lengths in the network. From this result, we derive the probability distribution of the number of active nodes and blocking probability of node activation. Then, we present the mean packet delay, average sleep period of a node and the network throughput. We present numerical results as well as simulation results to verify the analysis. Finally, we discuss how the derived results may be used in the design of sensor networks.

A Study on the Traffic Characterizations of a Integrated Type Concentrator Accommodating ISDN Basic Access Traffic (ISDN 기본 액서스 트래픽을 수용하는 통합형 집선장치의 트래픽 특성 고찰에 관한 연구)

  • 양해권;성단근;김동용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.5
    • /
    • pp.426-433
    • /
    • 1990
  • In this study, we propose a integrated type concentrator and compare with the separated type concentrating method, to accommodate 2B+D ISDN basic access traffic. This system's blocking probabilities are analyzed in terms of each class of bit rate, number of output channels, number of subscriber lines, and offered traffic. The result shows that the proposed method can significantly increase the maximum number of subscriber lines connecting to the system via a T1 carrier, compared with that of the "CCITT proposed" multiplexing scheme or the separated type concentrating method.ng method.

  • PDF

A Study on the Traffic Characterizations of a Seperated Type Concentrator Accommodating ISDN Basic Access Traffic (ISDN 기본 액세스 트래픽을 수용하는 분리형 집선장치의 트래픽 특성 고찰에 관한 연구)

  • 양해권;성단근;김동용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.5
    • /
    • pp.413-425
    • /
    • 1990
  • In this study, we propose a separated type concentrator to accommodate 2B+D ISDN basic access traffic. This system's blocking probabilities are analyzed in terms of each class of bit rate, number of output channels, number of subscriber lines, and offered traffic. The result shows that the proposed method can significantly increase the maximum number of subscriber lines connecting to the system via a T1 crrier, compared with that of the "CCITT proposed" multiplexing scheme.ng scheme.

  • PDF

Rate Control Based Call Admission Control Scheme for CDMA2000 System (CDMA2000시스템에서 전송률 제어에 기반한 호 수락제어 기법)

  • Park, Hyung-Kun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9B
    • /
    • pp.771-777
    • /
    • 2004
  • In a COMA system, the capacity is variable and mainly depends on multiple access interference. The multiple access interference has a deep relationship with transmitted or received power. The capacity of COMA2000 system is considered to be limited by the forward link capacity. In this paper, we show that the forward link cell load can be represented by the total transmitted power of base station and we propose a forward link call admission control (CAC) strategy for COMA2000 system. The proposed call admission scheme adopts the rate control algorithm for data call. This call admission scheme enables the system to utilize radio resource dynamically by controlling data rate according to the cell load status, and enhance the system throughput and grade of service (GoS). quality of service(QoS) such as blocking and outage probability.

A study on the allocation of Radio Resource in Mobile Communication. (이동 통신에서의 무선 자원 할당에 관한 연구)

  • 조석팔
    • The Journal of Information Technology
    • /
    • v.4 no.3
    • /
    • pp.65-75
    • /
    • 2001
  • Code-division multiple access has been widely accepted as the major multiple access scheme in mobile communication systems. Wide-band CDMA and its hybrid associate time-division CDMA are key elements in the mobile communication. Since 10 years ago, there has been enormous research activity in analysis of the capacity of these CDMA-based systems. Recently, upgrading service, high quality and the different service classes in radio resource allocation has recently increased. This paper presents an overview of Radio Resource Allocation on the CDMA-based systems that are flexible, support traffic services, minimize call blocking rate and have acceptable radio resource utilization.

  • PDF

Performance Comparisons of Two DCF Methods in the IEEE 802.11 Protocol (IEEE 802.11 프로토콜에서 두 DCF 방식의 성능 비교)

  • Park, Chul-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1320-1328
    • /
    • 2007
  • In recent year, the popularity of WLAN has generated much interests on improvement and performance analysis of the IEEE 802.11 protocol. In this paper, we analyze two medium access methods of the IEEE 802.11 MAC protocol by investigating the MAC layer packet service times when arrival packet sizes have a general probability distribution. We use the M/G/1/K queueing model to analyze the throughput and the delay performance of IEEE 802.11 MAC protocol in a wireless LAN. We compare the performances of Basic access method and RTS/CTS access method. We take some numerical examples for the system throughput and the queue dynamics including the mean packet delay and packet blocking probability.

An Improvement of the Schedulability Condition in Dynamic Priority Ceiling Protocol (동적 우선순위 상한 프로토콜의 스케줄링 가능성 조건 개선)

  • O, Seong-Heun;Yang, Seung-Min
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.11
    • /
    • pp.573-580
    • /
    • 2001
  • When tasks access shared resources in real-time systems, the unbounded priority inversion may occur. In such cases it is impossible to guarantee the schedulability of real-time tasks. Several resource access protocols have been proposed to bound the duration of priority inversion and sufficient conditions are given to guarantee the schedulability of periodic task set. In this paper, we show an improved sufficient condition for schedulability when the dynamic priority ceiling protocol is used. Our approach exploits the fact that a lower priority task can continue to execute as far as the higher priority tasks do not miss their deadlines. This permitting execution time of the higher priority tasks for a lower priority task can be excluded from the worst-case blocking time of the higher priority tasks. Since the worst-case blocking time of tasks can be reduced, the sufficient condition for schedulability of dynamic priority ceiling protocol becomes further tight.

  • PDF

Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray (적외선 기반 피기백킹 방지 기법을 적용한 네트워크 그룹 접근통제 시스템)

  • Kim, JongMin;Choi, KyongHo;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.109-114
    • /
    • 2012
  • Information society in recent times, lots of important information have been stored in information systems. In this situation, unauthorized person can obtains important information by piggy-backing and shoulder surfing in specific area of organization. Therefore, in this study, we proposed network group access control system by combining RFID and infrared-ray for blocking information leakage due to unauthorized access by internal threats and enhancing personnel security. So it can provides a more secure internal network environment.

Design of the Specific IP Access Deny for the Database (데이터베이스에서 지정된 IP 주소 접근 금지를 위한 기능 설계)

  • Jang, Seung-Ju;Kim, Sung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.716-721
    • /
    • 2014
  • This paper proposes how to prevent of vulnerability from IP address attack of Oracle DB by C program environments. An attacker may try to login DB by connectng remote IP address. Recently an attacker use foreign IP address and try to connect to DB using known DB account. Therefore, DB data is frequently disclosed. I propose a new idea that develops specific IP address blocking module in C program in the Oracle DB. By this module, we can use the Oracle DB safely.

Handoff Scheme based on User Service Profile between WLAN and Cellular Mobile System (셀룰러이동망과 WLAN 간의 사용자 프로파일 기반 핸드오프 기법)

  • Kwon, Soo-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1265-1270
    • /
    • 2011
  • Different wireless technologies have been developed for various mobile applications. To offer seamless service in next mobile communication systems, it needs handoff service between heterogeneous mobile access networks. A high data rate handoff call from WLAN to cellular mobile network can increase rapidly the blocking probability of BS of cellular mobile network. To solve this problem, this paper proposes a new handoff scheme based on user service profiles. The performances of the proposed scheme are evaluated using computer simulations.