• Title/Summary/Keyword: One-Time MAC

Search Result 115, Processing Time 0.031 seconds

Media Access Control Protocol based on Dynamic Time Slot Assignment in Underwater Mobile Ad-hoc Network (동적 타임 슬롯 할당에 기반한 수중 모바일 Ad-hoc 네트워크에서의 매체접근제어 프로토콜)

  • Shin, Seung-Won;Kim, Yung-Pyo;Yun, Nam-Yeol;Park, Soo-Hyun
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.81-89
    • /
    • 2011
  • Underwater wireless network can be useful in various fields such as underwater environment observation, catastrophe prevention, ocean resources exploration, ocean organism research, and vessel sinking exploration. We need to develop an efficient design for Medium Access Control (MAC) protocol to improve multiple data communication in underwater environment. Aloha protocol is one of the basic and simple protocols, but it has disadvantage such as collision occurs oftenly in communication. If there is collision occured in RF communication, problem can be solved by re-sending the data, but using low frequency in underwater, the re-transmission has difficulties due to slow bit-rate. So, Time Division Multiple Access (TDMA) based MAC protocol is going to be used to avoid collisions, but if there is no data to send in existing TDMA, time slot should not be used. Therefore, this paper proposes dynamic TDMA protocol mechanism with reducing the time slots by sending short "I Have No Data" (IHND) message, if there is no data to transmit. Also, this paper presents mathematic analysis model in relation to data throughput, channel efficiency and verifies performance superiority by comparing the existing TDMA protocols.

Visualization of the Water Column Collapse by using SMAC Method (SMAC법을 이용한 물기등 붕괴의 가시화)

  • Kim, Nam-Hyeong;Kim, Nam-Guk
    • Journal of Korea Water Resources Association
    • /
    • v.34 no.6
    • /
    • pp.605-615
    • /
    • 2001
  • SMAC method, one of the numerical simulation techniques, is modified from the original MAC method for the time-dependent variation of fluid flows. The Navier-Stokes equations for incompressible time-dependent viscous flow is applied, and marker particles which present the visualization of fluid flaws are used. In this study, two-dimensional numerical simulations of the water column collapse are carried out by SMAC method, and the simulation results are compared with Martin and Moyce's experimental data and result of the MPS method. A good results are obtained. This numerical simulation could also be applied to the breaking phenomenon of hydraulic structures such as dam break.

  • PDF

Performance Evaluation of IEEE 802.11p Based WAVE Communication Systems at MAC Layer (MAC 계층에서의 IEEE 802.11p 기반 WAVE 통신 시스템의 성능 평가)

  • Choi, Kwang Joo;Kim, Jin Kwan;Park, Sang Kyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.5
    • /
    • pp.526-531
    • /
    • 2014
  • Vehicular communications have been receiving much attention in intelligent transport systems(ITS) by combining communication technology with automobile industries. In general, vehicular communication can be used for vehicle-to-vehicle(V2V) and vehicle-to-infrastructure( V2I) communication by adopting IEEE802.11p/1609 standard which is commonly known as wireless access in vehicular environment(WAVE). WAVE system transmits signal in 5.835~5.925 GHz frequency band with orthogonal frequency division multiplexing(OFDM) signaling. In this paper, after 32 bit processed the channel monitoring in MAC(Media Access Control) layer of WAVE system implemented according to IEEE 802.11p standard, data were received and we evaluated the performance, we built the test bed consisting of OBU(On Board Unit) in the real expressway. We transmitted WSM(WAVE Short Message) and received WSM between OBU wirelessly. And then, we calculated channel occupancy time per one frame and throughput, and evaluated the performance.

A Design of Traceable and Privacy-Preserving Authentication in Vehicular Networks (VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜)

  • Kim, Sung-Hoon;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.115-124
    • /
    • 2008
  • In vehicular networks, vehicles should be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. however, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies the several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonym and MAC (Message Authentication Code) chain. And also by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

Suggestion to Improve Power Efficiency by Changing Sleep-Wakeup Period in Wireless Network Environment for Internet of things

  • Woo, Eun-Ju;Moon, Yu-Sung;Choi, Jae-Hyun;Kim, Jae-Hoon;Kim, Jung-Won
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.862-865
    • /
    • 2018
  • The proposed scheme minimizes the Idle time under the residual energy of the sensor node to adjust the Sleep-Wakeup period and minimize unnecessary energy consumption. It is The proposed scheme minimizes the Idle time under the residual energy of the sensor node to adjust the Sleep-Wakeup period and minimize unnecessary energy consumption. It is an important process to control the Application Packet Framework including the PHY and the MAC layer at each node's Idle time with the Idle time mechanism state before the proposed function is executed. The Current Control Level of the Report Attribute is fixed at one sending / receiving node where power consumption can occur, by changing Sleep-Wakeup time, the low power consumption efficiency was improved while satisfying the transmission requirement of the given delay time constraint.

Performance of an Efficient Backoff Retransmission Algorithm with a Proactive Jamming Scheme for Realtime transmission in Wireless LAN (재밍 기반의 재전송 방식을 사용한 무선 LAN에서의 효율적인 실시간 트래픽 전송 방안의 성능 분석)

  • Koo Do-Jung;Yoon Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2B
    • /
    • pp.98-106
    • /
    • 2006
  • In order to provide a realtime transmission over a wireless LAM, we here present a new jamming based retransmission mechanism. In a legacy wireless LAN system, all stations use the binary exponential backoff algorithm to avoid collisions among frames. It is well known that the backoff algorithm causes more collisions as the numbers of active stations increases. This makes transmission of real time traffic hard. In the proposed scheme, when each station senses collisions, it promptly allows to send a jamming signal during a unique jamming window period which is determined by its own channel access count database(CACDB). This jamming windows is chosen not to be overlapped each other by using of CACDB, and thus channel access of another station is prevented. Hereafter the station gets the ownership of the medium when the wireless medium becomes idle after sending the jamming signal and sensing carrier, and then sends frame in medium. In our proposal, repeating collisions is never happened. We here assume that real time traffic use a frame of fixed length in order to make the time for receiving its ACK frame same. Comparing the proposed jamming-based retransmission scheme with the the 802.11 and 802.11e MAC by simulation. one can find that the proposed scheme have advantages in terms of delay, average backoff time, and average number of collisions per frame. One can find that the proposed scheme might be practically applicable to several applications of realtime traffic transmission in wireless LAN systems.

Seamless Handover with Motion Prediction in 802.16e (휴대인터넷에서 움직임 예측을 이용한 seamless handover 방법)

  • Lee, Ho-Jeong;Yun, Chan-Young;Oh, Young-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.397-399
    • /
    • 2005
  • Handover is one of the most important factors that may degrade the performance of TCP connections and real-time applications in wireless data networks. We proposed a seamless handover with Motion Prediction in IEEE 802.16e-based broadband wireless access networks. By intergrating MAC and network layer handovers efficiently, this scheme minimizes the handover delay and eliminates packet losses during handover Simulations show that this scheme achieves loss-free packet delivery without packet duplication and increases TCP throughput significantly.

  • PDF

A New Bandwidth Allocation Scheme for Hard Real-time Communication on Dual IEEE 802.11 WLANs (이중 IEEE 802.11 WLAN에서 경성 실시간 통신을 위한 대역폭 할당)

  • Lee, Jung-Hoon;Kang, Mi-Kyung
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.633-640
    • /
    • 2005
  • This paper proposes and analyzes a message scheduling scheme and corresponding bandwidth allocation method for the hard real-time communication on dual standard 802.11 Wireless LANs. By making the superframeof one network precede that of the other by half, the dual network architecture can minimize the effect of deferred beacon and reduce the worst case waiting timeby half. The effect of deferred beacon is formalized and directly considered to decide the polling schedule of PCF phase. Simulation results executed via ns-2 show that the proposed scheme can improve the schedulability by 3$36\%$ for real-time messages and give $9\%$ more bandwidth to non-real-time messages for the given stream sets, compared with the network whose bandwidth is just doubled with the same MAC.

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.

Clinical Characteristics of the Patients with Mycobacterium avium Complex Pulmonary Disease (Mycobacterium avium complex 폐질환 환자의 임상적 특징)

  • Koh, Won-Jung;Kwon, O Jung;Kang, Eun Hae;Jeon, Ik Soo;Pyun, Yu Jang;Ham, Hyoung Suk;Suh, Gee Young;Chung, Man Pyo;Kim, Hojoong;Han, Daehee;Kim, Tae Sung;Lee, Kyung Soo
    • Tuberculosis and Respiratory Diseases
    • /
    • v.54 no.1
    • /
    • pp.33-44
    • /
    • 2003
  • Background : Mycobacterium avium complex(MAC) is the most common respiratory pathogen in nontuberculous mycobacterial pulmonary disease. This study described the clinical characteristics of the patients with pulmonary disease caused by MAC. Materials and Methods : The clinical characteristics of 24 patients with pulmonary disease caused by the MAC, who fulfilled the 1997 American Thoracic Society diagnostic criteria for nontuberculous mycobacterial pulmonary disease, were retrospectively analyzed. Results : Fourteen patients(58%) were male and the median age at diagnosis was 61 years(range 46-75). Of the 24 patients, 16(67%) had a M. intracellulare infection, 7(29%) had a M. avium infection and one patient was not identified. Coughing (92%) and sputum (88%) were most frequently observed symptoms. The sputum smear for acid-fast bacilli was positive in 17(71%) patients. Fourteen(58%) patients had the upper lobe cavitary form and 10(42%) patients had the nodular bronchiectatic form. In a comparison between the patients with the upper lobe cavitary form and those with the nodular bronchiectatic form, significant differences were found according to sex(male 86% vs. 20%, p=0.003), smoking history(79% vs. 10%, p=0.008), the presence of an underlying disease(64% vs. 20%, p=0.036), the pulmonary function(% forced vital capacity, median 71% vs. 88%, p=0.022; % forced expiratory volume in one second, median 69% vs. 89%, p=0.051) and bilateral disease at chest radiography(29% vs. 90%, p=0.005). The time from the onset of symptoms to diagnosis was longer in those with the nodular bronchiectatic form(median 72 months, range 8-132) than those with the upper lobe cavitary form(median 22 months, range 6-60) Conclusions : MAC pulmonary disease occurs in two distinct populations with two distinct clinical presentations. For a correct diagnosis of MAC pulmonary disease, knowledge of the diverse clinical and radiological findings is essential.