• Title/Summary/Keyword: IEEE802.11s

Search Result 475, Processing Time 0.047 seconds

IEEE 802.16 WMAN MAC Protocol for the Coexistence with WLAN in Shared Bands (공유대역에서 무선 LAN과의 공존을 위한 IEEE 802.16 WMAN의 MAC 프로토콜)

  • Han, Ho-Seong;Rhee, Seung-Hyong;Park, Su-Won;Han, Ki-Young;Kang, Hyon-Goo;Yoon, Soon-Young
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.142-149
    • /
    • 2010
  • In this paper, we propose to modify the IEEE 802.16 MAC protocol in order to allow the coexistence of IEEE 802.11 and IEEE 802.16 wireless networks in shared bands. Our suggested protocol enables 802.16 WMAN to control WLAN devices for the coexistence. That is, in the downlink subframes(BS to SS), SS(Subscriber Station) prohibits WLAN to transmit by using CTS(Clear to Send) in order to protect it's burst. In the uplink subframes(SS to BS), on the other hand, BS(Base Station) sends CTS to block WLAN's communications. Our proposals enables the coexistence between WLAN and WMAN, and simulation results show that our protocols enhance the throughput of the entire system.

A Study on Development of UHF RFID R/W Using AT91SAM7S256 (AT91SAM7S256을 이용한 UHF RFID R/W 전용 단말기 개발에 관한 연구)

  • Hwang, Gi-Hyun;Jang, Wan-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.7
    • /
    • pp.1301-1307
    • /
    • 2008
  • In this paper, we developed UHF RFID R/W system using AT91SAM7S256(ARM chip), UHF RFID R/W module (WJ7090) and wireless LAN(IEEE 802.11.a/b). And we developed a transmission/receiving packet which is send to UHF R/W module in AT91SAM7S256. In order to show the usefulness of UHF RFID R/W system, we executed a performance test. The developed UHF RFID R/W system shows better performance for reading of RFID tag and data transmission through wireless LAN.

An Adaptive Contention-window Adjustment Technique Based on Individual Class Traffic for IEEE 802.11e Performance (802.11e의 성능 향상을 위한 개별적 클래스 트래픽에 기반한 동적 충돌 윈도우 크기 조절 기법)

  • Um, Jin-Yeong;Oh, Kyung-Sik;Ahn, Jong-Suk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.191-195
    • /
    • 2008
  • This paper proposes a technique for improving IEEE 802.11e EDCA's performance by dynamically adjusting each class's contention window size based on each class's traffic amount. For providing differentiated service differently from 802.11, 802.11e EDCA maintains four classes each of which specifies different static minimum and maximum contention window sizes. Since the initial window sites significantly affect the 802.11e performance, several window adjustment schemes have been proposed. One of the schemes known as CWminAS (CWmin Adaptation Scheme) dynamically and synchronously determines the four windows' site based on the periodically measured collision rate. This method, however, can lower the send probability of high priority classes since it can't differentiate their collisions from those of low priority classes, leading to the channel underutilization. For solving this problem, we propose ACATICT(Adaptive Contention-window Adjustment Technique based on Individual Class Traffic) algorithm which adapts each class window size based on each individual collision rate rather than one average collision rate. Our simulation experiments show that ACATICT achieves better utilization by around 10% at maximum.

Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN (802.11 무선랜에서 1 비트를 이용한 패킷 인증 방안)

  • Lee Sungryoul;Kang Jimyung;Moon hogun;Lee myungsoo;Kim Chong-Kwon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.465-472
    • /
    • 2005
  • IEEE 802.11 wireless LAN technology is essential for wireless internet, next generation converged network and home network. But, it is certain that user's privacy must be provided to expand the applicable area in IEEE 802.11 WLAN. Recently, WEP and 802.11i security scheme can be used in MAC Layer. But with VPN technology which is applied to WLAN user, it means that suity mechanism is used redundantly. One bit authentication mechanism was already proposed to solve this redundancy. In this paper, we analyze problems of 1-bit Authentication mechanism which are failure of synchronization and waste of packet. And we propose new algorithm which synchronizes sender with receiver, at once, using duplicated-packet-count information. We show that our algorithm improves success probability of packet authentication up to $98\%$ and efficiency of authentication bit stream up to $97\%$.

A Secure and Efficient Roaming Mechanism for Centralized WLAN Environment (중앙집중식 WLAN 환경에서의 안전하고 효율적인 로밍 메커니즘)

  • Park, Chang-Seop;Woo, Byung-Duk;Lim, Jeong-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.81-92
    • /
    • 2009
  • Recently, there is a drastic increase in users interested in real-time multimedia services in the WLAN environment, as the demand of IEEE 802.11 WLAN-based services increases. However, the handoff delay based on 802.11i security policy is not acceptable for the seamless real-time multimedia services provided to MS frequently moving in the WLAN environment, and there is a possibility of DoS attacks against session key derivation process and handoff mechanism. In this paper, a secure and efficient handoff mechanism in the centralized WLAN environment is introduced to solve the security problems. The 4-way Handshake for both mutual authentication and session key derivation is replaced by the 2-way Reassociation process.

Implementation of WAVE system for ITS (지능형 도로 교통망을 위한 WAVE 시스템 구현)

  • Lee, Se-Yeun;Jeong, Han-Gyun;Shin, Dae-Kyo;Lim, Ki-Taeg;Lee, Joo-Shin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.933-942
    • /
    • 2009
  • In this paper, the WAVE technology for IT based on Intelligent Transport System(ITS) which using by IEEE 802.11a PHY, IEEE 802.11p MAC(Medium Access Control) and IEEE P1609.3 was implemented. The WAVE system was designed that has maximum 0.5km communication range for RSU(Road Side Equipment) between vehicle, 12Mbps transfer speed when downlink at maximum 120km/h vehicle speed. To verify suitableness of the WAVE system for ITS, we measured several parameters on the real road: communication range when low and high speed, link establishment time, data transfer speed, PER (Percent Error Rate), and latency. From the experiment results, we demonstrated that WAVE is a suitable technology for IT based on ITS.

  • PDF

A Study on Improved Backoff Algorithm using ARQ in IEEE 802.11 Wireless LAN (IEEE 802.11 Wireless LAN 에서의 ARQ 를 적용한 개선된 Backoff Algorithm)

  • Su, Seo-Mun;Joe, In-Whee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1248-1250
    • /
    • 2007
  • IEEE 802.11 WLAN(Wireless LAN)은 그 편리함과 효율성으로 인해 급격히 시장에 보급되었다. 이에 따라 다양한 멀티미디어 서비스를 위해 QoS(Quality of Service)의 지원이 필요하게 되었다. 본 논문에서는 IEEE 802.11 WLAN 에서의 기존의 Backoff 방식을 분석하고, 여기에 기존의 재전송 기법에 ARQ 방식을 도입한 새로운 알고리즘을 제시하여 에너지 효율 (Energy Efficiency)의 향상을 도모한다. 또한, 기존의 Backoff 방식과 제안한 알고리즘의 처리율을 비교하여 기존의 방식 보다 제안된 알고리즘이 에너지 효율(Energy Efficiency)를 향상시키는 것을 확인하였다.

  • PDF

Survey on IEEE 802.11 DCF Game Theoretic Approaches (IEEE 802.11 DCF에서의 게임 이론적 접근방법 소개)

  • Choi, Byeong-Cheol;Kim, Jung-Nyeo;Ryu, Jae-Cheol
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.240-242
    • /
    • 2007
  • The game theoretic analysis in wireless networks can be classified into the jamming game of the physical layer, the multiple access game of the medium access layer, the forwarder's dilemma and joint packet forwarding game of the network layer, and etc. In this paper, the game theoretic analysis about the multiple access game that selfish nodes exist in the IEEE 802.11 DCF(Distributed Coordination Function) wireless networks is addressed. In this' wireless networks, the modeling of the CSMA/CA protocol based DCF, the utility or payoff function calculation of the game, the system optimization (using optimization theory or convex optimization), and selection of Pareto-optimality and Nash Equilibrium in game strategies are the important elements for analyzing how nodes are operated in the steady state of system. Finally, the main issues about the game theory in the wireless network are introduced.

  • PDF

The Design and Development of IEEE 802.11 Wireless MAC Protocol Emulation Using UC/OS System (UC/OS을 사용하여 IEEE 802.11 무선 맥 프로토콜 에뮬레이션의 설계 및 개발)

  • Wang, Jian;Park, Ji-Min;Chung, Joong-Soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2013.05a
    • /
    • pp.245-246
    • /
    • 2013
  • 본 논문에서는 UC/OS 시스템을 사용하는 IEEE802.11 무선 MAC프로토콜의 처리과정중탐색, 인증, 결합 과정을 이더넷으로 동작하는 하드웨어 위에 에뮬레이션하였다. 에뮬레이션 환경은ADSv1.2을 사용하고, RTOS는UC / OS를, 사용언어는 C언어를 활용하였다. 검증과정으로는 이더넷으로 구동되는AP와 단말 하드웨어에 각각PC를 하이퍼 터미널으로 접속하여 탐색, 인증, 결합과정에 해당하는 절차를 수행하였다.

  • PDF

A New IEEE 802.11 DCF Utilizing Freezing Experiences in Backoff Interval and Its Saturation Throughput

  • Sakakibara, Katsumi;Taketsugu, Jumpei
    • Journal of Communications and Networks
    • /
    • v.12 no.1
    • /
    • pp.43-51
    • /
    • 2010
  • IEEE 802.11 defines distributed coordination function (DCF), which is characterized by CSMA/CA and binary exponential backoff (BEB) algorithm. Most modifications on DCF so far have focused on updating of the contention window (CW) size depending on the outcome of own frame transmission without considering freezing periods experienced in the backoff interval. We propose two simple but novel schemes which effectively utilize the number of freezing periods sensed during the current backoff interval. The proposed schemes can be applied to DCF and its family, such as double increment double decrement (DIDD). Saturation throughput of the proposed schemes is analyzed by means of Bianchi's Markovian model. Computer simulation validates the accuracy of the analysis. Numerical results based on IEEE 802.11b show that up to about 20% improvement of saturation throughput can be achieved by combining the proposed scheme with conventional schemes when applied to the basic access procedure.