• Title/Summary/Keyword: MAC layer

Search Result 364, Processing Time 0.022 seconds

Knowledge Based Underwater Acoustic Communication Smart Decision Block Mechanism (지식기반 시스템을 활용한 수중음파통신 Smart Decision Block 매커니즘)

  • Shin, Soo-Young;Park, Soo-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.5
    • /
    • pp.631-639
    • /
    • 2014
  • Recently, research on Media Access Control (MAC) techniques for underwater acoustic communication has been conducted actively. For successful acoustic communication in underwater conditions, development of environmentally adaptive MAC techniques, which is taking narrow bandwidth, distance, depth, noise level, salinity, multipath and etc into account, is an especially important work. In this paper, knowledge based system is introduced not only to obtain adaptive and optimal communication parameters but also increase network efficiency and availability by requesting change of MAC techniques based on decisions from knowledge-based system Smart Decision Block (SDB). Computer simulations were also conducted to verify the performance of the proposed system in underwater conditions.

A Fairness and QoS Supporting MAC(FQSM) Protocol for Wireless Sensor Networks (무선 센서 네트워크에서 공평성과 QoS를 지원하는 MAC 프로토콜)

  • Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.191-197
    • /
    • 2012
  • In this paper we propose the FQSM(Fairness and QoS Supporting MAC) protocol that supports fairness and Quality of Service(QoS). The received or measured data traffics will be assigned a priority level according to its transmission urgency in the FQSM. And the load prediction algorithm is used to support the fairness between different priority traffics. For this, the buffer length values of the nodes are continuously monitored for a some period. Based on the buffer length variations for this period, the order of transmission is determined. FQSM also adapts cross-layer concept to rearrange the data transmission order in each sensor node's buffer, saves energy consumption by allowing few nodes in data transmission, and prolongs the network lifetime.

Performance Analysis of DSRC Transmission Efficiency at MAC Layer (MAC 계층에서의 DSRC 전송 효율 분석)

  • Kwag Su-Jin;Ahn Jin-Ho;Lee Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.527-533
    • /
    • 2006
  • In this paper, we analyze the performance of MAC (Media Access Control) layer in DSRC (Dedicated Short Range Communication). It will be widely applied for ITS (Intelligent Transportation System) services; for example ETC (Electric Toll Control), BIS (Bus Information System) etc., needed to small packet size. But If ITS service is evolving to advance ITS, ADIS (Advanced Driver Information Systems) and AVHS (Advanced Vehicle Highway System) etc, be needed larger packet size. In the future, it may offer more various services such as traffic information, collection, and multimedia information. There are two kind of physical media, IR(Infrared) and RF(Radio frequency). And each system has their own protocol that is adaptive in special characteristics of physical medium for using efficiently limited radio resources. In this paper, we analyze the special characteristics of each system. And we study practical use of some related services expected to be used in the near future, by analyzing the transmission efficiency in each DSRC system.

A Study on Cross-Layer Network Synchronization Architecture for TDMA-Based Mobile Ad-Hoc Networks (TDMA 기반 MANET을 위한 계층교차적 네트워크 동기 아키텍처 연구)

  • Seo, Myung-Hwan;Kim, Joung-Sik;Cho, Hyung-Weon;Jung, Sung-Hun;Park, Jong-Ho;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.647-656
    • /
    • 2012
  • TDMA MAC protocol in MANET requires precise network synchronization between nodes though network topology changes continuously due to node mobility and the effect of propagation environment. In this paper we propose in-band cross-layer network synchronization architecture for TDMA-based MANETs. In the proposed architecture TDMA MAC protocol and proactive routing protocol cooperate closely to rapidly detect network partition and merge caused by node mobility and to precisely maintain network synchronization. We also implement the proposed synchronization architecture in OPNET simulator and evaluate the performance of it in various simulation scenarios. Simulation results show that our architecture stably maintains network time synchronization in both network partition and merge situations.

An Integrated QoS Support Architecture of Wireless Home Network Based on IEEE 802.11 Wireless LAN for Multimedia Services (IEEE 802.11 무선랜을 기반으로 하는 무선 홈 네트워크 환경에서의 멀티미디어 서비스를 위한 통합적인 QoS 제공 구조)

  • Hong, Sung-Hwa;Kim, Byoung-Kug;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3B
    • /
    • pp.100-111
    • /
    • 2008
  • In this paper, to support a QoS level appropriate for the user in Wireless Home Network based Wireless LAN, we propose a QoS support architecture which includes Wired Network and Wireless Network. Actually, an important problem to support QoS in Wireless Home Network is approached not only on a MAC level in Wireless LAN but on a integrated method to combine Network layer with Datalink layer. Applying the integrated QoS support method. It is possible to provide QoS support architecture using a Wireless LAN terminal with a minimum changing, the proposed scheme has advantage of QoS support method, which is more superior than a existing scheme to support QoS in MAC level of Wireless LAN. Simulation results that overall performance of the proposed scheme can be improved.

MAC Scheduling Scheme for VoIP Traffic Service in 3G LTE (3G LTE VoIP 트래픽 서비스를 위한 MAC 스케줄링 기법)

  • Jun, Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.558-564
    • /
    • 2007
  • 3G Long Term Evolution, which aims for various mobile multimedia service provision by enhanced wireless interface, proposes VoIP-based voice service through a Packet Switching (PS) domain. As delay and loss-sensitive VoIP traffic flows through the PS domain, more challenging technical difficulties are expected than in Circuit Switching (CS) domain based VoIP services. Moreover, since 3G LTE, which adopts the OFDM as its physical layer, introduces Physical Resource Block (PRB) as a unit for transmission resources, new types of resource management schemes are needed. This paper proposes a PRB scheduling algorithm of MAC layer for VoIP service in 3G LTE and shows the simulation results. The proposed algorithm has two key parts; dynamic activation of VoIP priority mode to satisfy VoIP QoS requirements and adaptive adjustment of the priority mode duration in order to minimize the degradation of resource utilization.

The core information protection mechanism in the BcN(Broadband Convergence Network) (BcN(Broadband Convergence Network) 환경에서의 중요정보에 대한 도청방지 메카니즘)

  • Oh, Sek-Hoan;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.14-26
    • /
    • 2008
  • IP over Ethernet technology widely used as Internet access uses the ARP(Address Resolution Protocol) that translates an ip address to the corresponding MAC address. recently, there are ARP security attacks that intentionally modify the IP address and its corresponding MAC address, utilizing various tools like "snoopspy". Since ARP attacks can redirect packets to different MAC address other than destination, attackers can eavesdrop packets, change their contents, or hijack the connection. Because the ARP attack is performed at data link layer, it can not be protected by security mechanisms such as Secure Shell(SSH) or Secure Sockets Layer(SSL). Thus, in this paper, we classify the ARP attack into downstream ARP spoofing attack and upstream ARP redirection attack, and propose a new security mechanism using DHCP information for acquisition of IP address. We propose a "DHCP snoop mechanism" or "DHCP sniffing/inspection mechanism" for ARP spoofing attack, and a "static binding mechanism" for ARP redirection attack. The proposed security mechanisms for ARP attacks can be widely used to reinforce the security of the next generation internet access networks including BcN.

A Proposal for Improving Techniques of GTS Utilization Based on WBAN (WBAN 기반의 GTS 채널 이용률 향상기법 제안)

  • Park, Joo-Hee;Jung, Won-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.73-81
    • /
    • 2011
  • The WBAN(Wireless Body Area Network) technology is a short distance wireless network which provides each device's interactive communication by connecting devices inside and outside of body located within 3 meters. Standardization on the physical layer, data link layer, network layer and application layer is in progress by IEEE 802.15.6 TG BAN. The The WBAN servides consists of both medical and non-medical applications. The medical application service uses the sensor that transfer the periodic traffic and have different data rates. It uses GTS method to guarantee QoS. In this paper, a new method is proposed, which are suitable design for MAC Protocol. Firstly, MAC frame structure and a primitive based on the WBAN are proposed. Secondly, we proposed the GTS algorithm improved the channel utilization based on the WFQ(Weighted Fair Queuing). The proposed scheduling method is improved channel utilization compared with i-Game(Round Robin scheduling method).

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

Interaction TCP and MAC-layer to Improve TCP Flow Performance over WLANs (무선 랜 환경에서 TCP Flow의 성능향상을 위한 MAC계층과 TCP계층의 연동기법)

  • Kim, Jae-Hoon;Jeong, Kyu-Min;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.273-278
    • /
    • 2007
  • Snoop 프로토콜은 유 무선 혼합망에서 무선 링크에서 발생하는 TCP 패킷 손실을 효과적으로 보상하여 TCP 전송률을 향상시킬 수 있는 효율적인 프로토콜이다. 하지만, 무선 링크에서 연집한 패킷 손실이 발생하는 경우에는 지역 재전송을 효과적으로 수행하지 못하여 전송 효율이 떨어진다는 문제점이 있다. 본 논문에서는 Snoop 프로토콜의 이러한 문제점을 개선하기위해 MAC 계층의 재전송 메커니즘인 Stop &Wait ARQ 기법을 기반으로 하는 $A^2Snoop$ (ARQ Assistance Snoop) 프로토콜을 제안한다. $A^2Snoop$ 프로토콜은 현재 유 무선 혼합망에서 가장 널리 사용되는 IEEE 802.11 MAC 프로토콜 기반의 지역 재전송 메커니즘으로서, MAC 계층의 ARQ 기법과 TCP의 혼잡제어 메커니즘의 연동을 통해 효율적인 재전송을 수행한다. ns-2 시뮬레이터를 이용한 실험을 통해 $A^2Snoop$의 지역 재전송 기법은 무선 구간의 연집적인 패킷 손실에 대해 효율적인 보상을 수행하며, 전송률을 유지하는 것을 확인할 수 있었다.

  • PDF