• Title/Summary/Keyword: MAC layer

Search Result 364, Processing Time 0.023 seconds

Design and Application of LoRa-based Network Protocol in IoT Networks (사물 네트워크에서 LoRa 기반 네트워크 프로토콜 설계 및 적용)

  • Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1089-1096
    • /
    • 2019
  • Recently, small-scale IoT services using a small amount of information through low-performance computing have been spread. It requires low cost, low-power, and long-distance communication technologies with wide communication radius, relatively low power consumption. This paper proposes a MAC layer and routing protocol that supports multi-hop transmission in small-scale IoT environment distributed over a large area based on LoRa communication and delivering a small amount of sensing data. The terminal node is mobile and the communication type provides bidirectional transmission between the terminal node and the network application server. By applying the proposed protocol, a production line monitoring system for smart factory was implemented. It was confirmed that the basic monitoring functions are normally performed.

Multi-channel QoS scheduling algorithm in IEEE 802.15.4e (IEEE 802.15.4e 멀티 채널 QoS 스케줄링 알고리즘)

  • Wu, Hyuk;Kim, Hak-Kyu;Lee, Dong-Jun;Kang, Ho-Yong
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.764-773
    • /
    • 2011
  • IEEE 802.15.4 is a standard for LWPAN based on TDMA. IEEE 802.15.4 has not been used widely because of restrictions on the QoS, scalability, and reliability. IEEE 802.15.4 utilizes GTS for one-hop QoS transmission. However GTS is not an effective method to satisfy QoS in multi-hop environments. Currently IEEE 802.15.4e, an extended version of IEEE 802.15.4 MAC sub-layer, is being developed to satisfy more diverse performance requirements than IEEE 802.15.4. IEEE 802.15.4e provides muti-hop QoS transmission functionality and uses multiple frequency channels. In this paper, a multi-channel TDMA scheduling scheme is proposed to satisfy end-to-end transmission delay in IEEE 802.15.4e. The performance of the proposed scheme is evaluated using simulation.

Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN (802.11 무선랜에서 1 비트를 이용한 패킷 인증 방안)

  • Lee Sungryoul;Kang Jimyung;Moon hogun;Lee myungsoo;Kim Chong-Kwon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.465-472
    • /
    • 2005
  • IEEE 802.11 wireless LAN technology is essential for wireless internet, next generation converged network and home network. But, it is certain that user's privacy must be provided to expand the applicable area in IEEE 802.11 WLAN. Recently, WEP and 802.11i security scheme can be used in MAC Layer. But with VPN technology which is applied to WLAN user, it means that suity mechanism is used redundantly. One bit authentication mechanism was already proposed to solve this redundancy. In this paper, we analyze problems of 1-bit Authentication mechanism which are failure of synchronization and waste of packet. And we propose new algorithm which synchronizes sender with receiver, at once, using duplicated-packet-count information. We show that our algorithm improves success probability of packet authentication up to $98\%$ and efficiency of authentication bit stream up to $97\%$.

PLC-Based Smart grid Home Network System Design and Implementation using OPNET Simulation

  • Huh, Jun-Ho;Seo, Kyungryong
    • Journal of Multimedia Information System
    • /
    • v.1 no.2
    • /
    • pp.111-118
    • /
    • 2014
  • The Smart grid refers to the technology that enables efficient usage of electric power by collecting information concerning the power usage and power lines grafting information and communications technology to onto power grids. There are Zigbee, PLC or IEEE 802.11 WLAN MAC as a core technology of the Smart grid, but in this paper, the discussion is focused on the PLC. The PLC is the technology that carries out data communications using power lines and put into practical use in the field of lights or home appliances control recently but PLC-applied communications between electronic devices are rarely seen. For the reason that the PLC uses high-voltage power lines and has a disadvantage of experiencing higher data loss rate caused by the noises produced by going through transformers, the technology is yet to be used in many areas. Nevertheless, the PLC has been studied widely recently in respect that it's the low-cost communication solution for the Smart Metering [1]. Moreover, this technology is emerging as a novel data communication method and discussed as an important technology lately due to the developments of the Smart grid systems and Internet of things (IoT). Thus, in this paper, the results obtained from designing and performing implementation scenario for the PLC-based Smart grid home network system were compared and analyzed with that of IEEE 802.11 WLAN MAC (the foundation technology at Jeju Smart grid Test bed)-based Smart grid home network. Thus, in this paper, OPNET 14.5 PL8, OSI 7 layer, PLC router nodes and PLC nodes had been used for the designing and implementation simulations of both systems. Additionally, QoS was not considered in order to guarantee that all the traffics would not have the same processing priority.

  • PDF

Cognitive Radio MAC Protocol for Hidden Incumbent System Detection (무선 인지 기술 기반의 WRAN 시스템에서 숨겨진 인컴번트 시스템 검출 MAC 프로토콜)

  • Kim, Hyun-Ju;Jo, Kyoung-Jin;Hyon, Tae-In;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1058-1067
    • /
    • 2006
  • In this paper, we propose a inband/outband broadcast method for hidden incumbent system detection of medium access control layer for wireless regional area network systems using cognitive radio technology. Through some extra channels that are not currently used, a short message is broadcasted. The message allows CPE detecting an appearance of incumbent system to send sensing report to CR BS. For the hidden incumbent system report message, the BS needs a process or method for allocation of upstream resource to CPEs. And transmitting multiple out-band signals has a possibility to collide with out-band signals of other co-located WRAN BSs. To avoid out-band signal collision, BSs randomly select it out-band signal broadcasting time within the pre-defined explicit out-band signaling, period. And fractional Bandwidth Usage allows WRAN BSs to efficiently use bandwidth.

An Uplink Scheduling Algorithm for VoIP in IEEE 802.16d Systems (IEEE 802.160에서 상향링크 VoIP 스케줄링 알고리즘 방식 연구)

  • Kang, Min-Seok;Jang, Jae-Shin
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.87-91
    • /
    • 2006
  • With the growth of the internet, the number of wireless internet users has increased continuously up to date. However, mobile communications could not support high speed transmission rate with cheap communication fee and wireless LAN has problems in providing terminal mobility and wide area connectivity, respectively. So the WMAN standard has been newly designed to make up for these limits. The initial 802.16 specification effectively offers a solution for providing fixed users with high speed wireless communication but it does not offer terminal mobility. So the 802.16d and 802.16e have been developed as the next generation solution that can support various PHY layer (SC, SCa, OFDM, OFDMA) and offer the terminal mobility. In this paper, we propose an effective uplink scheduling algorithm for VoIP with using UGS, and we show that our proposed algorithm is superior in view of average delay and management of uplink bandwidth to conventional rtPS algorithm and the scheme in reference, with using NS-2 network simulator.

  • PDF

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types (위조 ARP 응답 유니캐스트 스푸핑을 이용한 서버 유형별 네트워크 해킹 및 구현기술 연구)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.61-71
    • /
    • 2017
  • ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing.

Development of TDMA-Based Protocol for Safety Networks in Nuclear Power Plants (원전 안전통신망을 위한 TDMA 기반의 프로토콜 개발)

  • Kim, Dong-Hoon;Park, Sung-Woo;Kim, Jung-Hun
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.7
    • /
    • pp.303-312
    • /
    • 2006
  • This paper proposes the architecture and protocol of a data communication network for the safety system in nuclear power plants. First, we establish four design criteria with respect to determinability, reliability, separation and isolation, and verification/validation. Next we construct the architecture of the safety network for the following systems: PPS (Plant Protection System), ESF-CCS (Engineered Safety Features-Component Control System) and CPCS (Core Protection Calculator System). The safety network consists of 12 sub-networks and takes the form of a hierarchical star. Among 163 communication nodes are about 1600 origin-destination (OD) pairs created on their traffic demands. The OD pairs are allowed to exchange data only during the pre-assigned time slots. Finally, the communication protocol is designed in consideration of design factors for the safety network. The design factors include a network topology of star, fiber-optic transmission media, synchronous data transfer mode, point-to-point link configuration, and a periodic transmission schedule etc. The resulting protocol is the modification of IEEE 802.15.4 (LR-WPAN) MAC combined with IEEE 802.3 (Fast Ethernet) PHY. The MAC layer of IEEE 802.15.4 is simplified by eliminating some unnecessary (unctions. Most importantly, the optional TDMA-like scheme called the guaranteed time slot (GTS) is changed to be mandatory to guarantee the periodic data transfer. The proposed protocol is formally specified using the SDL. By performing simulations and validations using Telelogic Tau SDL Suite, we find that the proposed safety protocol fits well with the characteristics and the requirements of the safety system in nuclear power plants.

Partitioned Contention Access Mechanism to Enhance the Performance of IEEE 802.15.4 MAC Layer (IEEE 802.15.4 MAC 계층의 성능 향상을 위한 분할 경합 접근 방식)

  • Bae, Sueng-Jae;Ki, Hyung-Joo;Lee, Tae-Jin;Chung, Min-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.436-440
    • /
    • 2008
  • In IEEE 802.15.4 beacon-enabled mode, performance decreases as the number of devices competing in the contention access period(CAP) increases. In this letter, we propose partitioned contention access mechanism(PCAM) to compensate performance degradation. In PCAM, the PAN coordinator divides CAP into two sub-periods and activity of devices is delimited in their assigned sub-periods. Since PCAM reduces the number of devices which compete at the same time by half, collision probability between transmitted frames can be reduced. In addition, devices can save their power consumption because PCAM shorten the duration that devices stay in active state into half. We perform simulations to compare the performance of PCAM with that of the IEEE 802.15.4 standard. From the result, PCAM yields better performance than IEEE 802.15.4 standard.

EFFECT OF COBALT-CHROMIUM ALLOY SURFACE TREATMENT WHEN BONDING WITH 4-META/MMA-TBB RESIN (Cobalt-Chromium 합금의 표면처리가 4-META/MMA-TBB 레진과의 접착에 미치는 영향)

  • Jin, Jae-Sik;Kim, Kyo-Han;Lee, Cheong-Hee;Jo, Kwang-Hun
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.38 no.4
    • /
    • pp.510-525
    • /
    • 2000
  • The effects of pretreatment of Co-Cr alloy, including two adhesive primers that contain either MDP or MAC-10, and silicoating on the bond The result sobtained as follows; o Strength of 4-META/MMA-TBB resin were investigated using FT-IR, SEM, and EDAX. o In the SEM observation of surface morphologies, the sandblasted specimen exibited a very rough surface, whereas the surfaces of the two groups primed with either MDP or MAC-10 were covered with a layer of primer, and the surface morphology of the silicoated specimen remained almost the same after sandblasting. o Before the thermocycling tests, the group treated with MDP demonstrated the highest mean tensile bond strength and the sandblasted group showed the lowest bond strength. o After 20,000 thermocyling, the mean tensile bond strength of the sandblasted group exhibited a 50% reduction in bond strength, while the others showed a $20\sim30%$ reduction. o Observation of the metal-resin interface revealed that in all groups the resin permeated the rough surface formed by sandblasting thereby producing a mechanical bond between the metal and the resin. It was also found that thermocycling resulted in a gap formation at the metal-resin interface of the specimens, and the sandblasted group exhibited a larger gap width than the other groups. o In fracture mode, all specimens indicated a cohesive fracture within the resin before thermocycling. However, thermocyling produced adhesive failure at the edge of the resin-metal interface in most specimens. The sandblasted group, which exhibited the lowest bond strength after thormocycling, also demonstrated the largest area of adhesive failure.

  • PDF