• 제목/요약/키워드: Media Access Control

Search Result 276, Processing Time 0.023 seconds

A Study on Control Scheme for Media Access in Wireless Sensor Network (무선 센서 네트워크를 위한 미디어 엑세스 처리에 관한 연구)

  • Yun, Jung-Mee;Kim, Dae-Hwan;Park, Jin-Hee;Kim, Yong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.705-708
    • /
    • 2003
  • 본 논문에서는 무선 센서 네트워크의 특성을 고려한 미디어제어 프로토콜의 설계에 있어서의 고려사항 및 설계기법에 대해서 제안하고 있다. 무선 센서 네트워크는 제한된 에너지를 가지는 배터리를 에너지원으로 사용하는 센싱 디바이스들로 구성되어 있으며, 이러한 디바이스들로 구성된 네트워크는 하나 혹은 그 이상의 공통의 작업을 수행하는데 그 목적이 있다. 일반적으로 무선 센서네트워크는 ad hoc 헝태의 구조를 가지며, 각각의 노드들은 장시간동안 비활성화 상태에 머무르게 되며, 센싱을 하기 위한 특정 이벤트가 발생하였을 때만 활성 상태로 전이하게 된다. 이와 같은 센서 네트워크의 특성은 IEEE802.11 과 같은 기존의 무선 미디어 제어 프로토콜과는 차별성을 띄게 된다. 센서 네트워크는 노드별 미디어 접근 공정성이나 시간지연보다는 에너지절약과 위상자동설정에 더 중점을 두고 있기 때문에 이에 적합한 미디어 제어 기술이 필요한 것이다. 본 고에서는 에너지 소모를 최소화하고 위상 자동 설정을 지원하기 위한 3 가지의 기법들에 대해서 제안하고자 한다. 첫째로 이벤트 발생 여부에 따른 노드의 신호감지 및 Sleep 상태 전이 및 이웃 노드들과의 가상동기화기법을 이용한 에너지 절약 기법에 대해서 제안하고, 충돌회피 기법에 대해서 살펴보도록 하겠다.

  • PDF

A Layered Protection Scheme for Scalable Video Coding (스케일러블 비디오 부호화에 대한 계층적 보호 기법)

  • Hendry, Hendry;Kim, Mun-Churl;Hahm, Sang-Jin;Lee, Keun-Sik;Park, Keung-Soo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.307-312
    • /
    • 2006
  • Protection to the multimedia contents is inevitable to ensure that only authorized users be able to access the protected contents for consumption. Since protection mechanisms need to be designed efficiently by exploiting the type of the contents, we propose a protection scheme for the video bitstream encoded by Scalable Video Coding (SVC) technique. Our scheme exploits the property of SVC in which a video is encoded into spatial, temporal, and quality scalability layers. By applying our proposed protection scheme to the appropriate scalability layers we can effectively control the SVC contents completely or partially. Each layer can be flexibly protected with different encryption keys or even with different encryption algorithms. The algorithms that are used to protect each layer are described by the standardized protection description tool, which is the MPEG-21 Intellectual Property Management and Protection (IPMP) Components. In this paper, we present the design of the proposed layered SVC protection scheme, its implementation and experimental results. The experiment result shows that the proposed layered SVC protection scheme is very effective and can easily be applied.

  • PDF

Media Access Control Mechanism for Efficient Wireless Communication in Underwater Environments (수중 환경에서 효율적인 무선 통신을 위한 매체접근제어 메커니즘)

  • Jeong, Yoo-Jin;Shin, Soo-Young;Park, Soo-Hyun
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.79-86
    • /
    • 2006
  • Data transmission in poor environment like underwater has considerably serious delay rate and ewer rate. Like this environment usually has heavy fluctuation of error rate and limited wireless communication state. Therefore, mechanism using in such environment has to be efficient and simple. This paper suggests a new block ack mechanism, called the Pervasive Block ACK (PBA), which transmits aggregated ACKs. This mechanism takes effect on reducing number of traffic, decreasing overhead and delay rate in poor environment networks like underwater. Additionally, we can expect energy consumption. We verify propriety and efficiency of PBA through describing numerical result based analytical formula in this paper.

  • PDF

A Study on the Intelligent System Development for Apartment Housing corresponding to the Resident Group Characteristics (인텔리전트아파트 시스템에 대한 수요자 그룹별 요구 분석 연구)

  • Lee, You-Mi;Yim, Mi-Sook;Kim, Suk-Kyung
    • Journal of the Korean housing association
    • /
    • v.18 no.5
    • /
    • pp.33-43
    • /
    • 2007
  • This study aimed to analyze residential demands on intelligent systems for apartments and suggest space design directions of intelligent apartment complexes. Data collection was done through mail-in surveys by five respondent groups. Outcomes of this study would provide basic data for developing intelligent apartment housing corresponding to the residential characteristics and demands of the five respondent groups. The sample size for the questionnaire survey was 592. The types of the target residents in this study were classified into five categories; nuclear families, dual income families, single households and the handicapped needing special environmental supports, and workers at home who need the new home design with a home office. The primary findings of this study were as follows. 1) For the controllers of intelligent system, nuclear families preferred TV, single households prefer home-pad which is movable and provides access to the internet. Dual income families, the handicapped and workers at home preferred remote control panels. 2) For the desirable space for computer equipment, regardless of the types of target residents, bedroom and living room were preferred. 3) For the desirable space for a home theater system, most of respondent groups preferred living rooms, but many rather wanted to have media rooms only for this system.

A Study on Multi-Media Contents Security using Smart Phone (스마트 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Kim, Dong-Ryool;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.675-682
    • /
    • 2013
  • This paper tries to solve the problems which previous methods have the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

Standardization Trends on High Rate Wireless Personal Area Network (고속 WPAN 표준화 동향)

  • Kim, Jin-Tae;Park, Jong-Dae;Chu, Moo-Jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.985-988
    • /
    • 2005
  • The international standards of high-rate WPAN (Wireless Personal Area network) are under development by IEEE802.15 WPAN TG3 (Task Group 3). The study area of TG3 mainly consists of three parts: high rate physical and media access control layer in 2.4GHz ISM (Industrial Scientific Medical) non licensed frequency band; an alternative high rate physical layer by using UWB (Ultra Wide Band); and another alternative high rate physical layer based on millimeter wave. This paper describes the standardization trends of UWB and millimeter wave.

  • PDF

A Study on CSMA/CA for WLAN Environment

  • Moon Il-Young;Cho Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.530-533
    • /
    • 2006
  • Recently, a basic access method about IEEE 802.11 MAC layer protocol using IEEE 802.11 wireless LANs is the DCF thatis based on the CSMA/CA. But, cause of IEEE 802.11 MAC layer uses original backoff algorithm (exponential backoff method), when collision occurred, the size of contention windows increases the double size. Also, a time of packet transmission delay increases and efficiency is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs a proposed enhanced backoff algorithm. It is considered the transmission time of transmission control protocol (TCP) packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (AWGN) and Rician fading channel. From the results, a proposed enhanced backoff algorithm produces a better performance improvement than an original backoff in wireless LAN environment. Also, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between packet size and the transmission time, allowing for an inference of the optimal packet size in the TCP layer.

  • PDF

A QoS Improved MAC Protocol for UWASN with Multi-Gateway (다수의 게이트웨이를 갖는 수중 센서네트워크환경에서 QoS향상을 위한 MAC 프로토콜)

  • Lee, Dong-Won;Kim, Sun-Myeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.250-253
    • /
    • 2010
  • Underwater sensor network has attracted more and more attention from the networking research community recently. Most of traditional studies focus on the topology with a single gateway. Underwater sensor network consists of a variable number of sensors and multi-gateway to ensure the reliability of the network. In this paper, we propose a new MAC protocol that can reduce collisions among sensor nodes and improve QoS(Quality of Service) for underwater sensor network with multi-gateway. We evaluate the performance of the proposed scheme through simulation. Simulation results show that the proposed scheme outperforms the existing MAC protocol.

  • PDF

Multimedia Document Databases : Representation, Query Processing and Navigation

  • Kalakota, Ravi S.;Whinston, Andrew B.
    • The Journal of Information Technology and Database
    • /
    • v.1 no.1
    • /
    • pp.31-62
    • /
    • 1994
  • Information systems for application areas like office automation, customer service or computer aided manufacturing are usually highly interactive and deal with complex document structures composed of multiple media formats. For the realization of these systems, nonstandard database systems, which we call document databases, need to handle different types of coarse-and fine-grained document objects(like full-text documents, graphics and images), hierarchical and non-hierarchical relationships between objects(like composition-links and cross-references using hypertext structures) and document attributes of different types such as formatting/presentation information and access control. In this paper, we present the underlying data model for document databases based on descriptive markup languages that provide mechanisms for specifying the logical structure(or schema) of individual documents stored in the database. We then describe extensions to the data model for supporting notion of composite structures("join" operators for documents) --composition and hyperlinking mechanisms for representing compound documents and inter-linked documents as unique entites separate from their components. Furthermore, due to the interactive nature of the application domains, the database system in conjunction with clients(or browsers) has to support visual navigation and graphical query mechanisms. We describe the functionality of a new user interface paradigm called HyBrow for meeting the above mentioned requirements. The underlying implementation strategy is also discussed.discussed.

  • PDF

A Study Mode of Synchronous & Asynchronous for Multimedia Distance Education System (동기 및 비동기 겸용모드의 멀티미디어 원격교육 시스템 개발에 관한 연구)

  • Kim, Sang-Jin;Kim, Seok-Soo;Park, Gil-Cheol;Hwang, Dae-Joon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.2985-2995
    • /
    • 1997
  • In this paper, we proposed the "synchronous & asynchronous distance education system" which is able to interact among teachers and students for open education in cyberspace, and it is based telecommunication technology and multimedia technology. Specially, This system gets rid of the nufamiliarity and inconvenient feeling during the distance education. Also it supports the mediation of floor mode, for a group lecture and supports the synchronous mode for face-to-face effective and asynchronous mode for self-learning. The asynchronous mode has the down load function and the consultant mode (between teacher and student). The element technologies of this system consists of application sharing technique, whiteboard, various video window display, audio support, user interface, environment setup, session management, access control, network control and media control for collaborative distance education.

  • PDF