• Title/Summary/Keyword: IEEE 802.11 DCF

Search Result 156, Processing Time 0.022 seconds

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis (뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법)

  • Ryu, Byoung-Hyun;Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.

An improvement of Medium Access Control Protocol in Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크의 매체 접근 제어 기법에 대한 개선 방안)

  • Jang, Ho;Lee, Myung-Sub;Jeon, Woo-Sang
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.373-382
    • /
    • 2009
  • we present more efficient method of a medium access for real-time ubiquitous sensor networks. Proposed MAC protocol is like the randomized CSMA/CA protocol, but unlike previous legacy protocols, it does not use a time-varying contention window from which a node randomly picks a transmission slot. To reduce the latency for the delivery of event reports from sensor nodes, we carefully decide to select a fixed-size contention window with non-uniform probability distribution of transmitting in each slot. We show that the proposed method can offer up to several times latency reduction compared to legacy of IEEE 802.11 as the size of the sensor network scales up to 256 nodes using a widely-used network simulation package, NS-2. We finally show that proposed MAC scheme comes close to meet bounds on the best latency being achieved by a decentralized CSMA-based MAC protocol for real-time ubiquitous sensor networks which is sensitive to latency.

TCP Fairness Improvement Scheme using Adaptive Contention Window in Wireless Mesh Networks (무선 메쉬 네트워크에서 적응적 경쟁 윈도우를 이용한 TCP Fairness 개선 방안)

  • Jang, In Sik;Min, Seok Hong;Kim, Bong Gyu;Choi, Hyung Suk;Lee, Jong Sung;Kim, Byung Chul;Lee, Jae Yong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.322-331
    • /
    • 2013
  • Wireless Mesh Networks(WMNs) is generally composed of radio nodes in the mesh topology. WMNs consists of mesh client, mesh router and gateway connected to a wired network. Each client and router relay messages to the gateway for communication. WMNs is widely used recently in many areas can provide extended coverage based on multi-hop communication and ubiquitous communication at any time and any location. However the competition and collision between each node to transmit data is inevitable when the same channel is used for transmission. The transmission opportunities and the throughput of nodes located far from gateway decrease more if the communication channel is accessed based on competitive CSMA/CA scheme using DCF(Distributed Coordination Function) provided by IEEE 802.11 MAC. In this paper, we improve the performance of the TCP fairness and throughput of the nodes with more than 2 hops by applying various algorithms for controlling contention window values. Also, we evaluate the performance using ns-2 simulator, According to the results, proposed scheme can enhance the fairness characteristic of each node irrespective of data to the gateway.

A method to reduce collision by interference in MANETs (멀티홉 애드혹 환경에서 간섭 영향을 줄이기 위한 mac개선 방안 연구)

  • Lee, Hye-Jin;Kim, Min--Kyu;Kim, Jae-Wan;In, Jeong-Sik;Eom, Doo-Seop
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.289-292
    • /
    • 2005
  • IEEE802.11 DCF에서는 hidden node문제를 해결하기 위하여 RTS/CTS 교환을 사용한다. 그러나 실제로는 전송에 필요한 파워보다 간섭을 일으킬 수 있는 파워가 작다. 따라서 RTS나 CTS를 받지 않은 노드에서 전송을 시작할 경우에도 간섭에 의해 충돌이 발생할 수 있다. 멀티홉 애드혹 환경에서는 이 현상이 더 큰 성능 저하를 불러 일으킬 수 있다. 본 논문에서는 기존의 RTS/CTS 교환에서 CTS를 받은 노드들이 STS 패킷을 보내고 STS를 받은 노드가 자신이 전송을 시작할 경우 데이터를 받는 노드에서의 간섭 효과를 계산해 간섭 효과가 클 경우 전송을 지연시키는 과정을 추가하였다. 따라서 간섭에 의한 충돌이 발생하지 않도록 하였다. 또한 시뮬레이션 결과를 통하여 이 방식이 멀티홉 애드혹 환경에서 성능을 향상 시켰음을 보였다.

  • PDF

Modeling End-to-End Throughput of Multiple Flows and Efficient Route Selection in Wireless Mesh Networks (무선 메쉬 네트워크에서의 다중 트래픽 흐름을 위한 종단간 처리량 모델링 및 효율적인 라우팅 경로 선택 기법)

  • Wang, Xiaofei;Kwon, Ted Tae-Kyoung;Choi, Yang-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.4
    • /
    • pp.272-283
    • /
    • 2010
  • Wireless Mesh Networks (WMNs) have gained a lot of attention recently. Based on the characteristic of WMNs as a highly connected wireless infrastructure, many efforts from research organizations are made in order to improve the performance of the flow throughput in WMNs. Therefore, it is very critical issue to establish efficient routing paths for multiple concurrent ongoing flows. In this paper, we propose a general modeling methodology to analyze the end-to-end throughput of multiple concurrent flows by analytical calculation taking into account the carrier sensing behaviors, interference and the IEEE 802.11 Distributed Coordination Function mechanism. After the comparison of the average service time for each successful transmission at each node, we analyze the bottlenecks of flows, and hence obtain the maximum end-to-end throughput of them. By using our proposed model, it is possible to predicate the throughput of several candidate routing paths for multiple concurrent ongoing data flows, so we can select the most efficient route that can achieve the highest throughput. We carry out simulations with various traffic patterns of multiple flows in WMNs to validate our modeling and our efficient route selection mechanism.

Performance analysis and saturation bound research of cyclic-quorum multichannel MAC protocol based on Markov chain model

  • Hu, Xing;Ma, Linhua;Huang, Shaocheng;Huang, Jinke;Sun, Kangning;Huang, Tianyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3862-3888
    • /
    • 2017
  • In high diversity node situation, single-channel MAC protocols suffer from many collisions. To solve this problem, the research of multichannel MAC protocol has become a hotspot. And the cyclic quorum-based multichannel (CQM) MAC protocol outperformed others owing to its high frequency utilization. In addition, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF), is proposed. The metrics (throughput and average packet transmission delay) are calculated in performance analysis, with respect to node number, packet rate, channel slot length and channel number. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm (BSA). Finally, the Markov chain model and saturation bound are verified by Qualnet platform. And the simulation results show that the analytic and simulation results match very well.