• Title/Summary/Keyword: Network Protocol

Search Result 4,959, Processing Time 0.031 seconds

Load-based Dynamic Backoff Algorithm in Contention-based Wireless Shared Medium (단일 경쟁 매체에서의 새로운 로드 기반 동적 매체 접속 제어 백오프 알고리즘)

  • Seo Chang-Keun;Wang Weidong;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.406-415
    • /
    • 2005
  • The standards which use shared medium like IEEE 802.11 wireless LAN have transmission opportunity by contention in contention period. If there are collisions in contention period, medium access control protocol may solve problem by using backoff algorithm. Backoff algorithm is important part in medium access control, but legacy backoff method which is used under IEEE 802.11 standards is not adjusted when load is heavy because of increasing collisions. In this paper, we propose a new load-based dynamic backoff algorithm in contention-based wireless shared medium to improve throughput of medium and to reduce the number of collisions. Proposed backoff algorithm can increase the network utilization about $20\%$ higher than that of binary exponential backoff algorithm.

Neighbor Node Discovery and Load Balancing Schemes for Energy-Efficient Clustering in Wireless Sensor Networks (주변 노드 발견을 통한 무선 센서 네트워크에서의 에너지 효율적인 클러스터링 및 전력 균형 분산 기법)

  • Choi, Ji-Young;Kang, Chung-Gu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1147-1158
    • /
    • 2006
  • Clustering algorithm is an essential element to implement a hierarchical routing protocol, especially for a large-scale wireless sensor network. In this paper, we propose a new type of energy-efficient clustering algorithm, which maximizes the physical distance between cluster head and gateway by a neighbor node discovery mechanism. Furthermore, a slave/master patching scheme is introduced as a useful means of further improving the energy-efficiency. It has been shown that the number of cluster heads can be reduced by as many as 21% as compared with the existing clustering algorithms.

Frequency-Code Domain Contention in Multi-antenna Multicarrier Wireless Networks

  • Lv, Shaohe;Zhang, Yiwei;Li, Wen;Lu, Yong;Dong, Xuan;Wang, Xiaodong;Zhou, Xingming
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.218-226
    • /
    • 2016
  • Coordination among users is an inevitable but time-consuming operation in wireless networks. It severely limit the system performance when the data rate is high. We present FC-MAC, a novel MAC protocol that can complete a contention within one contention slot over a joint frequency-code domain. When a node takes part in the contention, it generates randomly a contention vector (CV), which is a binary sequence of length equal to the number of available orthogonal frequency division multiplexing (OFDM) subcarriers. In FC-MAC, different user is assigned with a distinct signature (i.e., PN sequence). A node sends the signature at specific subcarriers and uses the sequence of the ON/OFF states of all subcarriers to indicate the chosen CV. Meanwhile, every node uses the redundant antennas to detect the CVs of other nodes. The node with the minimum CV becomes the winner. The experimental results show that, the collision probability of FC-MAC is as low as 0.05% when the network has 100 nodes. In comparison with IEEE 802.11, contention time is reduced by 50-80% and the throughput gain is up to 200%.

Power Allocation Strategy for Soft-Decision-and-Forward Cooperative Communication System (연판정 후 전달 방식에 대한 전력 분배 전략)

  • Song, Kyoung-Young;Kim, Jae-Hong;No, Jong-Seon;Chung, Ha-Bong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1C
    • /
    • pp.1-7
    • /
    • 2010
  • In this paper, the performance of the soft-decision-and-forward (SDF) protocol in the cooperative communication network with one source, one relay, and one destination, where each node has two transmit and receive antennas, is analyzed in terms of the bit error rate (BER) obtained from the pairwise error probability (PEP). For the slow-varying Rayleigh fading channel, the optimal and suboptimal power allocation ratios are determined without feedback. The optimal power allocation can be obtained by minimizing the average PEP. For the tractability, an alternative strategy of maximizing the product SNR of direct and relay links, which we call the suboptimal power allocation, is considered. Through the numerical analysis, we show that the performance gap between the suboptimal and the optimal power allocation is negligible in the high SNR region.

Decentralized TDM-PON MAC Protocol Based on Power Detection (파워검출 기반의 분산형 TDM-PON MAC 프로토콜)

  • Lee, Sung-Kuen;Kim, Eal-Lae;Lee, Yong-Won;Lee, Sang-Rok;Jung, Dae-Kwang;Hwang, Seong-Taek;Oh, Yun-Je;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2B
    • /
    • pp.83-89
    • /
    • 2007
  • In this paper, we have proposed the power detection (PD)-based TDM-PON architecture, which is implemented with a hardware-based decentralized DBA (Dynamic Bandwidth Allocation) algorithm among ONUs, without OLT's intervention. Of particular importance in the proposed approach is that the hardware-based power detection scheme is used to manage the distributed MAC algorithm without any complex, time-consuming and costly software-processing elements for DBA in ONUs and OLT. We evaluate the performance of average packet end-to-end delay in a statistical analysis and numerical analysis. In addition, through simulations with various traffic models, we verified the superior performance of the proposed approach by comparing with the results of other E-PONs.

USN Secure Communication Design Using Chaotic System Feedback Synchronization (혼돈계의 피드백 동기화를 이용한 USN 보안통신 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1011-1016
    • /
    • 2018
  • Ubiquitous services for the convenience and safety of human beings along with the development of society are being realized through RFID technology and sensor network, and its application range of fields is also broaden. However, since the USN contains all the information of individuals and things, all of its private spaces can be attacked by external attacks; so, that the problem of security continues to arise. We designed a one-way chaotic feedback synchronization method as a secure communication method to fit the USN composed of one sync node and n number of sensor nodes. We designed the method by which the sensor node is synchronized in one direction of the sync node. This method solves the problem that all sensor nodes need to be resynchronized when the sync node is changed, which is shown in bidirectional synchronization. This is a security method that can be effectively applied to 1:n communication such as USN.

Design of Quantum Key Distribution System without Fixed Role of Cryptographic Applications (암호장치의 송·수신자 역할 설정이 없는 양자키분배 시스템 설계)

  • Ko, Haeng-Seok;Ji, Se-Wan;Jang, Jingak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.771-780
    • /
    • 2020
  • QKD(Quantum Key Distribution) is one of the protocols that can make two distant parties safely share secure keys against the threat of quantum computer. Generally, cryptographic applications which are connected to the QKD device have fixed roles as a transmitter and a receiver due to the race condition and complexity of implementation. Because the conventional QKD system is mainly applied to the link encryptor, there are no problems even if the roles of the cryptographic devices are fixed. We propose a new scheme of QKD system and protocol that is easy to extend to the QKD network by eliminating quantum key dependency between cryptographic device and QKD node. The secure keys which are generated by the TRNG(True Random Number Generator) are provided to the cryptographic applications instead of quantum keys. We design an architecture to transmit safely the secure keys using the inbound and outbound quantum keys which are shared between two nodes. In this scheme, since the dependency of shared quantum keys between two QKD nodes is eliminated, all cryptographic applicatons can be a master or a slave depending on who initiates the cryptographic communications.

A Medium Access Control Protocol for Sensor Data in Powerline Communications (전력선통신방식에서 센서데이터 전달을 위한 MAC 프로토콜 설계)

  • Jin, Kyo-Hong;Choi, Pyung-Suk;Park, Mu-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.257-263
    • /
    • 2006
  • With the ever increasing demand for data communication methods, powerline communication has become in interesting alternative method for data communication in home networking. For the purpose of home safety, several sensors will be installed at door, windows, gas alarm, etc. When considering home networking, the sensor data as well as other types of data should be supported in powerline communication. Usually the sensor data do not have priority over isochronous traffics (voice, video traffic), but in the case of urgent situation at home, the data of sensor being aware of the situation should be transmitted earlier than others. The objective in this paper is to develop a method for supporting an urgent data in home networking using powerline communication. We propose a modified algorithm of HomePlug 1.0 and show the results of computer simulation.

Relaying Device Decision Algorithm for Multi-hop Routing in WiMedia (WiMedia에서 멀티홉 라우팅을 위한 중계 디바이스 선정 알고리즘)

  • Jung, Jin-Uk;Jin, Kyo-Hong;Hwang, Min-Tae;Jeon, Young-Ae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.109-113
    • /
    • 2011
  • In intelligent subway systems, UWB-based WiMedia D-MAC Protocol can be considered to send and receive multimedia data which requires high data rate. However, network devices which do not exist within 10 meters, the limited communication rage, can not communicate with each other because WiMedia does not support multi-hop communications. In this paper, we developed the algorithm to select a relaying device for multi-hop routing on WiMedia networks. In the first step, each device acquires information of neighbors through beacon and decides whether it is a normal or relaying device using the acquired information. In the next step, all devices can create the 2-hop routing table using the information received via relaying devices and the whole routing table for all devices on networks, eventually.

  • PDF

A Study on VoIP Security Risk Analysis and Countermeasure (VoIP 보안 위협 분석 및 대책 연구)

  • Kim, Hyun-Chul;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.277-280
    • /
    • 2011
  • VoIP is a technology of voice communication, using the existing internet network which sends and receives voice packets. VoIP has an advantage that VoIP is cheaper than an existing telephony, and the tech is vitalized lately. But recently you can download Volp Application in the Market that have a vulnerability(Anyone Can Upload). This weakness is wrongfully used that People are downloaded by encouraging about malignant code is planted. Signal intercepts indicates from this case. and paralysis by DDoS Attack, bypass are charged for hacking. Judging from, security threat of VolP analysis and take countermeasures. In the thesis we analyze the VoIP security caused on 'Soft Phone' and 'Smart Phone', and figure out security policies and delineate those policies on the paper.

  • PDF