• Title/Summary/Keyword: Multiple Access Protocol

Search Result 337, Processing Time 0.026 seconds

A Non-Periodic Synchronization Algorithm using Address Field of Point-to-Point Protocol in CDMA Mobile Network (CDMA이동망에서 점대점 프로토콜의 주소영역을 이용한 비주기적 동기 알고리즘)

  • Hong, Jin-Geun;Yun, Jeong-O;Yun, Jang-Heung;Hwang, Chan-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.918-929
    • /
    • 1999
  • 동기식 스트림 암호통신 방식을 사용하는 암호통신에서는 암/복호화 과정 수행시 암호통신 과정에서 발생하는 사이클슬립으로 인해 키수열의 동기이탈 현상이 발생되고 이로 인해 오복호된 데이타를 얻게된다. 이러한 위험성을 감소하기 위한 방안으로 현재까지 암호문에 동기신호와 세션키를 주기적으로 삽입하여 동기를 이루는 주기적인 동기암호 통신방식을 사용하여 왔다. 본 논문에서는 CDMA(Cellular Division Multiple Access) 이동망에서 데이타서비스를 제공할 때 사용되는 점대점 프로토콜의 주소영역의 특성을 이용하여 단위 측정시간 동안 측정된 주소비트 정보와 플래그 패턴의 수신률을 이용하여 문턱 값보다 작은경우 동기신호와 세션키를 전송하는 비주기적인 동기방식을 사용하므로써 종래의 주기적인 동기방식으로 인한 전송효율성 저하와 주기적인 상이한 세션키 발생 및 다음 주기까지의 동기이탈 상태의 지속으로 인한 오류확산 등의 단점을 해결하였다. 제안된 알고리즘을 링크계층의 점대점 프로토콜(Point to Point Protocol)을 사용하는 CDMA 이동망에서 동기식 스트림 암호 통신방식에 적용시 동기이탈율 10-7의 환경에서 주기가 1sec인 주기적인 동기방식에서 요구되는 6.45x107비트에 비해 3.84x105비트가 소요됨으로써 전송율측면에서의 성능향상과 오복호율과 오복호 데이타 비트측면에서 성능향상을 얻었다. Abstract In the cipher system using the synchronous stream cipher system, encryption / decryption cause the synchronization loss (of key arrangement) by cycle slip, then it makes incorrect decrypted data. To lessen the risk, we have used a periodic synchronous cipher system which achieve synchronization at fixed timesteps by inserting synchronization signal and session key. In this paper, we solved the problem(fault) like the transfer efficiency drops by a periodic synchronous method, the periodic generations of different session key, and the incorrectness increases by continuing synchronization loss in next time step. They are achieved by the transfer of a non-periodic synchronous signal which carries synchronous signal and session key when it is less than the threshold value, analyzing the address field of point-to-point protocol, using the receiving rate of address bits information and flag patterns in the decision duration, in providing data services by CDMA mobile network. When the proposed algorithm is applied to the synchronous stream cipher system using point-to-point protocol, which is used data link level in CDMA mobile network, it has advanced the result in Rerror and Derror and in transmission rate, by the use of 3.84$\times$105bits, not 6.45$\times$107bits required in periodic synchronous method, having lsec time step, in slip rate 10-7.

Performance Analysis of IEEE 802.11n System adapting Frame Aggregation Methods (Frame Aggregation 기법을 적용한 IEEE 802.11n 시스템 성능 분석)

  • Lee, Yun-Ho;Kim, Joo-Seok;Kim, Kyung-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.515-527
    • /
    • 2009
  • IEEE 802.11n is an ongoing next-generation WLAN(Wireless Local Area Network) standard that supports a very high-speed connection with more than 100Mb/s data throughput measured at the MAC(Medium Access Control) layer. Study trends of IEEE 802.11n show two aspects, enhanced data throughput using aggregation among packets in MAC layer, and better data rates adapting MIMO(Multiple-Input Multiple-Output) in PHY(Physical) layer. But, the former doesn't consider wireless channel and the latter doesn't consider aggregation among packets for reality. Therefore, this paper analyzes data throughput for IEEE 802.11n considering MAC and PHY connection. A-MPDU(Aggregation-MAC Protocol Data Unit) and A-MSDU(Aggregation-MAC Service Unit) is adapted considering multi-service in MAC layer, WLAN MIMO TGn channel using SVD(Singular Value Decomposition) is adapted considering MIMO and wireless channel in PHY layer. Consequently, Simulation results shows throughput between A-MPDU and A-MSDU. Also, We use Ns-2(Network simulator-2) for reality.

Analysis of IEEE 802.11n MAC and PHY Integration Method for High Throughput Performance based on NS-2 (고속 처리량을 위한 NS-2 기반 IEEE 802.11n MAC/PHY 연동 기법분석)

  • Kim, Joo-Seok;Lee, Yun-Ho;Song, Jae-Su;Kim, Kyung-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.67-75
    • /
    • 2009
  • IEEE 802.11 WLAN(Wireless Local Area Network) standard is currently developing with increased wireless internet demand. Study trends of IEEE 802.11n for high throughput show two aspects, enhanced system throughput using aggregation among packets in MAC(Medium Access Control) layer, and better data rates adapting MIMO(Multiple-Input Multiple-Output) in PRY(Physical) layer. But, no one demonstrates IEEE 802.11n system performance results considering MAC and PRY connection. This paper adapts A-MPDU(Aggregation-MAC Protocol Data Unit) method in MAC layer and MIMO in PRY layer for IEEE 802.11n system. Consequently, Simulation results show enhanced throughput and data rates compared to existing system. Also, We use NS-2(Network Simulator-2) considering MAC and PRY connection for reality.

Design and Implementation of a Multiple Client Remote Management System using WMI (WMI를 이용한 다중 클라이언트 원격 관리 시스템 설계 및 구현)

  • Yeo, Myung-Ho;Park, Jun-Ho;Kang, Gwang-Goo;Kwon, Hyun-Ho;Lee, Jin-Ju;Lee, Ji-Hee;Choi, Hyoung-Rak;Jang, Su-Min;Seo, Won-Seok;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.10
    • /
    • pp.26-35
    • /
    • 2010
  • Recently, multi client PC technologies that several users can use one set of computer at the same time are being designed to use the surplus computer resource. In general, as the existing PC management system considers only a single client PC that only one user uses a computer, various kinds of complicated problems may be arisen. This paper designs and realizes a remote management system that can monitor and control the information used in the windows based OS multi-client using WMI technology. The proposed system herein uses WMI technology and newly defined client management protocol and provides the monitoring and control functions on individual resource use information of multi-client. As well, it provides a communication function between the server and the client, and locking setting and access control functions.

Design of Hybrid V2X Communication Module for Cooperative Automated Driving (자율협력주행을 위한 하이브리드 V2X 통신모듈 설계)

  • Lim, Ki-taeg;Jin, Seong-keun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.3
    • /
    • pp.213-219
    • /
    • 2018
  • In this paper, we propose a design method and process for hardware and software of hybrid V2X communication module that supports both C-ITS communication protocol designed for vehicle environment and Legacy LTE communication technology. C-ITS is suitable for safety service applications due to its low latency characteristics, and Legacy LTE is a technology suitable for non-safety applications such as traffic information and infotainment due to high latency and high capacity. The hybrid V2X communication module supports multiple communication technologies of WAVE and LTE, in which WAVE supports multiple channels, so that it is designed to transmit road information such as LDM and positioning correction information to an autonomous vehicle in real time. The main design results presented in this paper will be applied to the implementation of future hybrid V2X communication terminals for vehicles.

Performance Analysis of Peer Aware Communications with CSMA/CA Based on Overhearing (Overhearing을 적용한 CSMA/CA 기반 대상인식통신 성능 분석)

  • Lee, Jewon;Ahn, Jae Min;Lee, Keunhyung;Park, Tae-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.251-259
    • /
    • 2014
  • In this paper, we propose Low Energy Service Discovery (LESD) protocol for common discovery mode of IEEE 802.15.8 Peer Aware Communications (PAC). In order to minimize power consumption, Basic Repetition Block (BRB) is defined. Device is able to select operating mode and synchronize other devices through it. Proposed MAC procedure is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based on overhearing technique. Even if device has not been received response signal since transmitted request signal, it is able to discover other devices of same group through the overhearing technique. IEEE 802.15.8 PAC has required that performances of common discovery mode are presented about discovered devices during the simulation time, discovery latency and average power consumption. By considering the number of devices per group and channel environment, two scenarios are evaluated through system level simulation and the simulation results of proposed scheme are compared with CSMA/CA in same simulation conditions. As a result, proposed scheme is able to get high energy efficiency of devices as well as increase the number of discovered devices during simulation time when the longer the number of devices is distributed over a limited area.

Update Propagation of Replicated Spatial Data using New Locking Techniques in Distributed Geographic Information System (분산된 지리정보시스템에서 새로운 잠금기법을 이용한 중복된 공간 데이터의 변경 전파)

  • Choe, Jin-O;Hong, Bong-Hui
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.9
    • /
    • pp.1061-1072
    • /
    • 1999
  • 한 개 이상의 사이트에 공간 데이타가 중복 저장된 분산 공간 DB에서, 동시에 수행될 수 있는 긴 트랜잭션의 변경은 일관성 제어를 위해 다른 사이트에 전파되어야 한다. 이때 같은 영역의 공간 데이타를 서로 다른 사이트에서 동시에 변경할 경우, 변경 상충 문제가 발생하거나 잠금 기법에 의한 오랜 대기 시간이 초래되는 문제가 있다. 또한 공간 객체는 잠금의 대상이 아닌 공간 관련성에 의한 종속성을 가진다.이 논문은 긴 트랜잭션으로 중복된 공간 데이타를 변경할 경우 중복 제어를 위한 변경 전파와 동시성 제어 문제를 다룬다. 중복된 공간 데이타의 변경 병렬성을 향상시키기 위해 영역 잠금 및 SR-bound WRITE 잠금 기법을 제시한다. 한 사이트에서 수정하는 객체들과 다른 사이트에서 수정하는 객체들 사이에 공간 관련성에 의한 종속성이 없을 경우 병렬 수정을 허용하도록 제어하며, 공간 관련성에 의한 종속성이 있을 경우 SR-based 2PC라 불리는, 확장된 2단계 완료 프로토콜로 협동작업을 수행해서 변경 상충을 해결하는 새로운 중복 제어 기법을 설계하고 구현한다.Abstract The update of a long transaction should be propagated to the other sites for consistency control, when spatial database are replicated at multiple sites to achieve availability, reliability, and performance. When the replicated spatial data are updated at the same time, the update of one site would be conflicted with the other or a user would not be able to access the replicated spatial data under the control of locking. Two spatial objects having spatial relationships should be cooperatively updated even if there are no conflicts of locking for them.This paper deals with the issues of concurrency control and update propagation of replicated spatial data. We present the concept of region lock and SR-bound WRITE lock for enhancing the parallelism of updating the replicated spatial data. If there are no spatial relationships between one site's objets and the other's objects, parallel update would be allowed. Concurrent update of two spatial objects having spatial relationships should be propagated and cooperated by using an extended two-phase commit protocol, called spatial relationship-based 2PC.

Cognitive Radio MAC Protocol for Hidden Incumbent System Detection (무선 인지 기술 기반의 WRAN 시스템에서 숨겨진 인컴번트 시스템 검출 MAC 프로토콜)

  • Kim, Hyun-Ju;Jo, Kyoung-Jin;Hyon, Tae-In;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1058-1067
    • /
    • 2006
  • In this paper, we propose a inband/outband broadcast method for hidden incumbent system detection of medium access control layer for wireless regional area network systems using cognitive radio technology. Through some extra channels that are not currently used, a short message is broadcasted. The message allows CPE detecting an appearance of incumbent system to send sensing report to CR BS. For the hidden incumbent system report message, the BS needs a process or method for allocation of upstream resource to CPEs. And transmitting multiple out-band signals has a possibility to collide with out-band signals of other co-located WRAN BSs. To avoid out-band signal collision, BSs randomly select it out-band signal broadcasting time within the pre-defined explicit out-band signaling, period. And fractional Bandwidth Usage allows WRAN BSs to efficiently use bandwidth.

A Design Study of Standard Indicators for Evaluating the Technical Performance of an NCS Core Vocational Competence System (직업기초능력 평가시스템의 기술성능 평가를 위한 표준지표 설계 연구)

  • Kim, Seung-Hee;Chang, Young-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.111-117
    • /
    • 2017
  • The National Competency Standards (NCS) was designed to implement a competence-based society and solve the problem of inconsistency between the industrial field and education, training, and certification system. This study designed and developed the Korean NCS core vocational competence system, in accordance with the NCS, as an infrastructure to solve fundamental problems such as re-education and the social costs that are incurred in the workplace. Further, this study designed and developed standard indicators to evaluate the technical performance of the system for the global advancement of the Korean NCS core vocational competence system. The NCS core vocational competence system has been developed as an appropriate response type for multiple devices such as computers, tablet PCs, and cellular phones. For the global advancement of the Korean NCS core vocational competence system, this study designed and developed 10 performance evaluation indicators in accordance with 10 global standards, such as linkage-target operating system, interface protocol, packet format, encryption, class component, simultaneous access number, supervisor-to-testtaker response speed, server-to-admin response speed, auto-recovery speed for test answers, and real-time answer transmission speed.

A Sutdy on the Multiple Access Protocol and Middleware Algorithm USN Foundation (USN기반 다중접속 프로토콜 및 미들웨어에 적합한 알고리즘에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1A
    • /
    • pp.67-73
    • /
    • 2008
  • Our research is aimed at developing an architectural frame-work of USN sensor network discovery service systems. The research is fo-cused on the four areas a survey of USN technology, development of a USN software model, development of the design space of the USN sensor network discovery service, and finally the architectural framework of the USN sensor network dicovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology, USN networking technology, and USN middleware along with the service platform, With respect to each technological division, domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research output To provide a means to analyze sensor network discovery services, we devel-oped the design space of the sensor network discovery services by exploring the scalability with respect to query scope, lookup performance, and resolution network.