• Title/Summary/Keyword: IEEE 802

Search Result 2,718, Processing Time 0.03 seconds

Performance Analysis of the IEEE 802.11 DCF on Applying Maximum Contention Window at Collision (충돌시 최대 경쟁 원도우를 적용한 IEEE 802.11 DCF 성능분석)

  • Lim, Seog-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.34-41
    • /
    • 2011
  • The MAC of IEEE 802.11 WLAN to control data transmission uses two control methods called DCF and PCF. The DCF uses BEB backoff algorithm based on CSMA/CA. The BEB backoff algorithm shows excellent performance relatively in situation that competition between stations is less, but its performance is decreases as the competition increases. This paper proposes and analyses mathematically an enhanced backoff algorithm. To reduce the collision probability, the proposed algorithm increases the contention window to maximum after collision and decreases the contention window smoothly after successful transmission. To prove efficiency of proposed algorithm, simulations are conducted and analyzed.

Design and Implementation of User Authentication Schemes for Roaming in Public Wireless LAM Systems (공중 무선랜 시스템에서 로밍을 고려한 사용자 인증방식의 설계 및 구현)

  • Lee, Hyun-Woo;Kim, Jeong-Hwan;Ryu, Won;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8B
    • /
    • pp.755-761
    • /
    • 2004
  • Currently, Wireless LAN(WLAN) service is widely deployed to provide high speed wireless Internet access through the mobile stations such as notebook and PDA. To provide enhanced security and user access control in the public WLAN area, WLAM access points should have the capability of IEEE 802.1x-based user authentication and authorization functionality. In this paper, we provide a brief understanding of IEEE 802. 1x standards and related protocols likeEAPoL(Extended Authentication Protocol Over LAN), EAP, RADIUS and describe how the IEEE 802.1x is designed and implemented in our embedded linux-based WLAN AP which is named i-WiNG.(Intelligent Wireless Internet Gateway).

New Energy Efficient Clear Channel Assessment for Wireless Network

  • Shin, Soo-Young;Ramachandran, Iyappan;Roy, Sumit
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1404-1422
    • /
    • 2011
  • In this paper, a new clear channel assessment (CCA) method: cascaded-CCA, is proposed. The primary motivation for the proposed approach is to integrate the respective advantages of two standard CCA mechanisms, energy detect and preamble detect, to arrive at a new dual threshold CCA family that can provide greater flexibility towards tuning MAC performance. Cascaded-CCA integrates energy efficiency of the energy detector (ED) and the reliability of the preamble detector (PD). The probability of detection/false alarm and power consumption of cascaded-CCA in the CCA modules of IEEE 802.11b are analyzed and compared with ED and PD as an example. The performance of cascaded-CCA is explored via MATLAB simulations that implement the CCA modules and medium access control (MAC) protocol for IEEE 802.11 and IEEE 802.15.4. Simulation results showed that cascaded-CCA improves the energy efficiency significantly compared to ED-only or PD-only CCA. In addition, ED, PD, and cascaded CCA are applied to a cognitive network scenario to validate the effectiveness of the proposed cascaded-CCA.

A Modified-PLFS Packet Scheduling Algorithm for Supporting Real-time traffic in IEEE 802.22 WRAN Systems (IEEE 802.22 WRAN 시스템에서 실시간 트래픽 지원을 위한 Modified-PLFS 패킷 알고리즘)

  • Lee, Young-Du;Koo, In-Soo;Ko, Gwang-Zeen
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.1-10
    • /
    • 2008
  • In this paper, a packet scheduling algorithm, called the modified PLFS, is proposed for real-time traffic in IEEE 802.22 WRAN systems. The modified PLFS(Packet Loss Fair Scheduling) algorithm utilizes not only the delay of the Head of Line(HOL) packets in buffer of each user but also the amount of expected loss packets in the next-next frame when a service will not be given in the next frame. The performances of the modified PLFS are compared with those of PLFS and M-LWDF in terms of the average packet loss rate and throughput. The simulation results show that the proposed scheduling algorithm performs much better than the PLFS and M-LWDF algorithms.

  • PDF

A Study on Improvement of Mechanism for Secure Handoff in Wireless Networks (무선랜 환경에서 안전한 핸드오프를 위한 메커니즘 개선에 관한 연구)

  • Cho, Ji-Hoon;Jeon, Joon-Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1047-1055
    • /
    • 2005
  • One of major characteristics in wireless LAN is terminal's frequent mobility, so it makes many overheads in the process of authentications repeatedly at each handoffs. So I propose IAPP(Inter Access Point Protocol) of IEEE 802.11f, modified context block and 4 way handshake of IEEE 802.11i, in order to implement secure and rapid handoff. The context block. I proposed, doesn't makes any communication with RADIUS server at handoff period. Therefore, it guarantee higher efficiency than existing handoff mechanisms. Also it can improve security vulnerability by padding authentication field in the context block for providing in advance against Replay and DoS(Denial of Service) attacks.

Analysis of Neighbor Discovery Process with Directional Antenna for IEEE 802.15.3c (IEEE 802.15.3c 기반에서 지향성 안테나를 사용했을 때의 이웃장치 탐지과정 분석)

  • Kim, Mee-Joung;Lee, Woo-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1B
    • /
    • pp.9-14
    • /
    • 2012
  • The neighbor discovery using directional antennas in mmWave band is a prerequisite for communications and this issue is crucial and urgent. In this paper, the synchronized, direct, two-way directional neighbor discovery process is analyzed mathematically for mmWave WPANs. The analysis is based on the values which are derived from the effect of using directional antennas. The neighbor discovery probability for a given amount of time is considered and several performance measures such as the optimal sojourn time are derived in closed forms. Numerical results are obtained using parameters based on the IEEE 802.15.3c. The mathematical analysis provides the theoretical basis for the directional neighbor discovery process.

Centralized Downlink Scheduling using Directional Antennas in IEEE 802.16 based Wireless Mesh Networks (IEEE 802.16 기반의 무선 메쉬 네트워크에서 지향성 안테나를 사용하는 중앙 집중형 하향링크 스케줄링)

  • Lee, Sang-Joon;Lee, Hyong-Woo;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2A
    • /
    • pp.134-141
    • /
    • 2010
  • In this paper, we propose a scheduling algorithm to improve the performance of IEEE 802.16 based wireless mesh networks using directional antenna. The performance is presented in terms of throughput of system and delay between each node by varying number of users. The result show that proposed scheduling algorithm improving the performance by reducing the delay of mesh network system. Our work may be useful as a guideline to control the fairness between SSs for multi-hop systems such as multi-hop relay and mesh networks.

IEEE 802.22 시스템을 위한 다중 안테나 기법의 성능 비교, 분석

  • Jeong Ho-Cheol;Park Hyeong-Rae;Song Myeong-Seon;Kim Chang-Ju
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.2 s.58
    • /
    • pp.61-70
    • /
    • 2006
  • In this paper, we compare the performance of representative MIMO techniques such as space-time block code, closed-loop transmit diversity, and V-BLAST, etc., in IEEE 802.22 environments. We first develope deco-ding algorithms of the representative MIMO techniques and design a MIMO-OFDM system employing QPSK, 16 QAM, 64 QAM to cover several transmission rates. Since the frequency band used for IEEE 802.22 systems belongs mostly to V/UHF band and the angular spread of the received signal at the base station is very small, there Is a significant correlation between the signals from transmit antennas. Thus, in this paper, we compare the performance of MIMO-OFDM systems employing only two Tx antennas in correlated fading environments.

Performance Evaluation of IEEE 802.16m MIMO Modes (IEEE 802.16m MIMO 모드 성능평가)

  • Kim, Nu-Li-Byul;Kim, Iae-Kwon;Bang, Young-Ok;Park, Youn-Ok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5C
    • /
    • pp.326-335
    • /
    • 2011
  • In this paper, we evaluate the performance of multi-antenna techniques adopted for the IEEE 802.16m standard. Base station is equipped with 4 or 8 antennas, and each mobile station (MS) has 2, 4, 8 antennas. The number of MSs is 4, and MIMO modes 0, 1, and 4 are evaluated. For each mimo mode, various number of data streams can be implemented, and the selected number of streams in the paper corresponds to the parameters adopted for hardware implementation. The error performance of various mimo modes presented in this paper was used as reference performance to verify successful hardware implementation.

Analysis of MIMD Backoff Algorithm for IEEE 802.11 DCF (IEEE 802.11 DCF를 위한 MIMD 백오프 알고리즘 분석)

  • Lim, Seog-Ku
    • Journal of Digital Contents Society
    • /
    • v.12 no.3
    • /
    • pp.299-307
    • /
    • 2011
  • The MAC of IEEE 802.11 WLAN to control data transmission uses two control methods called DCF and PCF. The DCF controls the transmission based on CSMA/CA The BEB backoff algorithm of DCF shows relatively excellent performance in situation that the number of competing station is less, but has a problem that performance of throughput and delay is degraded in situation that the number of competing station is increased. This paper mathematically analyzes an MIMD backoff algorithm considering retry limit that increases the CW to doubled after collision and decreases smoothly the CW to halves after successful transmission in order to reduce the collision probability. To prove efficiency of the MIMD backoff algorithm, lots of simulations are conducted and analyzed.