• Title/Summary/Keyword: Multicast MAC

Search Result 30, Processing Time 0.024 seconds

Address Mapping Scheme between Layer 3 and Layer 2 for Multicast over IEEE 802.16 Networks (IEEE 802.16 네트워크에서 멀티캐스트 전달을 위한 주소 정보 매핑 방법)

  • Kim, Sang-Eon;Yoon, Joo-Young;Jin, Jong-Sam;Lee, Seong-Choon;Lee, Sang-Hong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.336-340
    • /
    • 2007
  • This paper proposes a multicast scheme over IEEE 802.16 networks which support multiple upper layer protocols such as ATM, IPv4 packets, IPv6 packets, IEEE 802.3 over IPv4 and so on. The multicast capabilities over IEEE 802.16 are important both control plane and data plane. The proposed multicast scheme can be divided into two types: direct mapping and indirect mapping. The direct mapping scheme is that layer 3 address is directly mapped into CID information which is used for connection identifier at IEEE 802.16 link layer. The indirect mapping scheme has two steps for mapping between layer 3 address and layer 2 CID. Firstly, a layer 3 address translates to Ethernet MAC address with group MAC address. Secondly, a group MAC address is mapped into CID. The mapping scheme depends on the upper layer protocols.

  • PDF

Reliable Multicast MAC Protocol with Low Probability of Detection for Survivability in Tactical Ad-hoc Networks (생존성 향상을 위해 신뢰성 및 저피탐을 보장하는 멀티캐스팅 MAC 프로토콜 기법)

  • Kim, Jeong-Hun;Jung, Jun-Woo;Kim, Jung-Bin;Lim, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1685-1695
    • /
    • 2010
  • In this paper, we propose a new reliable multicast MAC protocol over the IEEE 802.11-based tactical ad hoc networks. The major contribution compared to the previous reliable multicast schemes using consecutive CTSs/ACKs is that the proposed scheme can send multiple CTS/ACK messages concurrently assisted by MC-DS/CDMA mechanisms. When multiple receivers receive the RTS/DATA message from a sender, they respond with the CTS/ACK message spread with pre-assigned code in the same time interval. The proposed scheme can reduce the overhead of multiple CTSs/ACKs. It is also possible to alleviate the received signal strength at the enemy detector and thus it improves low probability of detection performance. Through simulations and analysis, the proposed scheme outperforms that of the multiple CTSs/ACks in terms of the throughput, transmission delay and low probability of detection.

A Study on MAC Layer Multicast in Wireless LAN's (무선랜의 MAC 계층 멀티캐스트에 관한 연구)

  • Lee, Yun-Seok;Jung, Min-Soo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.297-300
    • /
    • 2009
  • 유비쿼터스 사회로 발전해 감에 따라 다양한 서비스를 특정 사용자에게 제공하는 그룹 서비스의 중요성이 부각되고 있다. 이러한 그룹 서비스를 제공하는 멀티캐스트는 다양한 계층에서 논의 및 개발 되고 있다. 하지만 이런 활발한 멀티캐스트에 대한 논의에도 불구하고 아직 MAC 계층에서의 멀티캐스트는 무선랜 환경의 브로드캐스트 특성에 의해 아직도 많은 프로토콜들이 연구되고 있다. 본 논문에서는 이러한 802.11 표준에서 정의하고 있는 멀티캐스트 기법과, 기존의 논문에서 제시된 MAC 계층의 멀티캐스트 기법의 장단점을 확인하고, 효율적인 MAC 계층에서의 멀티캐스트 프로토콜을 제안한다.

  • PDF

Spreading Codes Based Multicast Feedback Scheme for Reliable Multicast Services (신뢰성 있는 멀티캐스트 서비스를 위한 스프레딩 코드 기반 피드백 기법)

  • Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.787-793
    • /
    • 2015
  • In order to support reliable medium access control (MAC) layer multicast services in Broadband Wireless Access (BWA) networks, we here propose spreading codes (Cumulative ACK (CA) code and ARQ Feedback Request (AFR) code) based reliable multicast feedback scheme. The status indications based on the automatic repeat request (ARQ) mechanism are needed in some multicast services. In accordance with various wireless channel environments, we demonstrate the performance excellency of our proposed scheme with respect to required uplink resources compared with the original feedback scheme based on unicast ARQ feedback messages. In addition, we analyze packet error rate (PER) against the various wireless channel environments.

A Group-aware Multicast Scheme in 60GHz WLANs

  • Park, Hyun-Hee;Kang, Chul-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.1028-1048
    • /
    • 2011
  • The relation of multicast transmission and directional antennas is an open problem that has been debated for a long period of time. In this paper, we propose a group-aware multicast scheme of efficient multicast communication using the directional antennas for 60GHz millimeter wave wireless networks. For this purpose, we first derive the relation among beamwidth, distance between devices and most suitable data rate in the 60GHz frequency-based wireless network. In addition, for the dynamic beamforming of multicast communication, the x and y coordinates of any point with sender device at the center is generated, and a best-chosen group is deduced based on the Euclidean distance. Then the most suitable data rate for the group is obtained using the law of cosine. Using the Standard IEEE 802.11ad MAC protocol as an example, extensive simulation results demonstrate that the proposed scheme outperforms the existing multicast communication schemes with directional antennas under different situations.

Multicast Transmission Scheme in Wireless USB-based N-screen MAC with Contents Security Guarantee (콘텐츠 보안성을 갖는 무선 USB 기반 N-스크린 MAC에서의 멀티캐스트 전송기법 설계)

  • Hur, Kyeong;Lee, Joo-Yeol;Lee, Hye-Min;Lee, Hae-Sang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.110-111
    • /
    • 2016
  • 디바이스 간 저장콘텐츠에 대해 ASMD (Adaptive Source Multi Device) 무선 N-스크린 공유 서비스를 제공하기 위해서는 콘텐츠 보안성을 갖는 무선 USB 기반 N-스크린 MAC에서의 멀티캐스트 전송기법이 반드시 요구된다. 본 논문에서는 ASMD N-스크린 공유 서비스를 위한 무선 통신 MAC 구조로서, WiMedia Distributed-MAC 기반의 Wireless USB 프로토콜을 적용하고, ASMD N-스크린 통신을 위해, 무선 USB 기반 N-스크린 MAC에서의 멀티캐스트 전송 기술을 제안하였다.

Data Transmission Rate Improvement Scheme Using Multicast ACK in IEEE 802.15.3 (IEEE 802.15.3에서 Multicast ACK를 이용한 전송률 향상 기법)

  • Jeong, Pil-Seong;Kim, Hwa-Sung;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.10
    • /
    • pp.35-42
    • /
    • 2011
  • WPAN(Wireless Personal Area Network) have many advantages such as using low power and cheap price, small size. So it is recently increasing application range such as personal portable device, home network and sensor network so and on. IEEE 802.15.3 basically has the point to point or peer to peer UM(Usage Model). But using devises that need data transmission is increasing in the house and office. Therefor UM of point to multipoint is proposed. In this paper, I proposed Multicast ACK mechanism on the point to multipoint UM. So it is able to transfer data to multiple devices as this Multicast transfer method at a time. Thus, throughput performance is improved. But the problem that increases data transfer delay is appeared because of adding Multicast ACK traffic. We compared the performance between standard and proposed mechanism through a numerical analysis.

Adaptive Error Recovery in cdma2000 1xEV-DO Broadcast and Multicast Networks (cdma2000 1xEV-DO를 위한 모바일 브로드캐스트/멀티캐스트 네트워크에서의 능동적인 에러 교정 방법에 관한 연구)

  • Kang Kyungtae;Park Hosang;Cho Yongwoo;Shin Heonshik
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.91-102
    • /
    • 2006
  • We analyze the performance of MAC-layer Reed-Solomon error recovery in the cdma2000 1xEV-DO Broadcast and Multicast Services (BCMCSs) environment, with respect to the size of the ECB (Error Control Block) and the air-channel condition, and establish the relationship between ECB size, error recovery capacity and service latency. From this we propose an adaptive error recovery scheme which adjusts the size of the ECB to reflect the environment of the mobile nodes so as to meet the required service quality (target bit error-rate), while reducing the latency of real-time applications. Extensive simulation results show the effectiveness of our approach compared to the current static scheme. Proposed adaptive schemes achieves near optimal solution with respect to service latency while satisfying the required service quality.

A New Multicast MAC Protocol for Wireless Ad Hoc Network (무선 Ad Hoc 네트워크의 새로운 멀티캐스트 매체접근제어 프로토콜)

  • Lim Jae-Hwan;Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.4 no.2
    • /
    • pp.203-210
    • /
    • 2003
  • In this paper we proposed a new MAC protocol to improve QoS(Quality of Service) for real-time traffic in wireless Ad Hoc networks. NMAC protocol have a contention period reservation scheme and a priority control scheme to provide fairness of nodes and QoS. Through simulation, the NMAC protocol compared with existing CSMA MAC protocols shows improvement in performance.

  • PDF

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.