• 제목/요약/키워드: Protocol Performance

검색결과 3,199건 처리시간 0.031초

Multiple-Packet Reception MAC Protocol Applying Pulse/Tone Exchange in MIMO Ad-Hoc Networks

  • Yoshida, Yuto;Komuro, Nobuyoshi;Ma, Jing;Sekiya, Hiroo
    • Journal of Multimedia Information System
    • /
    • 제3권4호
    • /
    • pp.141-148
    • /
    • 2016
  • This paper proposes a medium access control (MAC) protocol for multiple-input multiple-output (MIMO) ad-hoc networks. Multiple-packet receptions in MIMO systems have attracted as a key technique to achieve a high transmission rate. In the conventional protocols for multiple-packet receptions, timing offsets among multiple-frame transmissions cause frame collisions induced by hidden nodes, which degrades network performance. In the proposed protocol, transmission synchronization among hidden nodes can be achieved by applying pulse/tone exchanges. By applying the pulse/tone exchanges, multiple-packet receptions among hidden nodes can be achieved, which enhances network throughputs compared with the conventional protocol. Simulation results show effectiveness of the proposed protocol.

인터넷 멀티캐스트 라우팅에서 지연시간에 대한 QoS를 지원하는 방법 (A QoS of Delay supporting Scheme for IP Multicast Routing)

  • 박세훈;안상현
    • 한국정보과학회논문지:정보통신
    • /
    • 제28권4호
    • /
    • pp.498-507
    • /
    • 2001
  • 인터넷 멀티캐스트 라우팅을 위해 PIM, CBT, DVMRP 등의 여러 가지 프로토콜이 연구되고 있다. 본 논문에서는 이와 같은 멀티캐스트 라우팅에서 지연시간에 대한 QoS를 보장하기 위한 새로운 방법 DPIM(Delay-bounded PIM)을 제시한다. 이 방법은 기존의 PIM-SM을 개선한 형태로, 동적인 멤버쉽에 의해 주어진 지연시간 상한값을 만족하지 않는 상황이 발생하면 PIM-SM 트리의 RP (Rendezvous Point)를 다시 선택하고 트리를 재구성함으로써 지연시간에 대한 QoS를 보장한다. 기존에 제안된 다른 프로토콜과의 비교를 통해 지연시간에 대한 이 방법의 유효성을 확인하였다.

  • PDF

Performance Analysis of ILEACH and LEACH Protocols for Wireless Sensor Networks

  • Miah, Md. Sipon;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • 제10권4호
    • /
    • pp.384-389
    • /
    • 2012
  • In this paper, we examine the problems of the low energy adaptive clustering hierarchy (LEACH) protocol and present ideas for improvement by selecting the cluster head node. The main problem with LEACH lies in the random selection of cluster heads. There exists a probability that the formed cluster heads are unbalanced and may remain in one part of the network, which makes some part of the network unreachable. In this paper, we present a new version of the LEACH protocol called the improved LEACH (ILEACH) protocol, which a cluster head is selected based on its ratio between the current energy level and an initial energy level, and multiplies by the root square of its number of neighbor nodes. The simulation results show that the proposed ILEACH increases the energy efficiency and network lifetime.

Mobile-IP 등록 프로토콜에서 공개키를 이용한 인증 방안 (The Authentication Mechanism Using Public-Key infrastructure in Mobile IP Registration Protocol)

  • 박상준;홍충선;이대영
    • 한국통신학회논문지
    • /
    • 제27권3C호
    • /
    • pp.211-219
    • /
    • 2002
  • Mobile IP(RFC2002)는 호스트에 이동성을 제공하여주는 대표적인 프로토콜이다. 본 논문에서는 공개키 기반의 인증서와 인증기관을 이용한 Mobile IP 등록 프로토콜을 제안한다. 제안된 프로토콜은 이동 노드의 등록 메시지를 인증하고 재전송 공격을 방지하며 공개키 암호화 사용을 최소로 하였다. 또한, 제안 프로토콜은 인증서를 사용하여 에이전트들과 이동 노드들 사이에 직접적인 인증을 할 수 있도록 설계하였다. 컴퓨터 모의 실험을 통하여 제안 프로토콜은 기존에 연구되어진 공개키를 기반으로 하는 Mobile IP 등록 프로토콜보다 통신 성능이 우수함을 알 수 있다.

Mutual Authentication Protocol Using a Low Power in the Ubiquitous Computing Environment

  • Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2004년도 Proceedings of ISRS 2004
    • /
    • pp.91-94
    • /
    • 2004
  • Ubiquitous sensor network is to manage and collect information autonomously by communicating user around device. Security requirements in Ubiquitous based on sensor network are as follows: a location of sensor, a restriction of performance by low electric power, communication by broadcasting, etc. We propose new mutual authentication protocol using a low power of sensor node. This protocol solved a low power problem by reducing calculation overload of sensor node using two steps, RM(Register Manager) and AM(Authentication Manager). Many operations performing the sensor node itself have a big overload in low power node. Our protocol reduces the operation number from sensor node. Also it is mutual authentication protocol in Ubiquitous network, which satisfies mutual authentication, session key establishment, user and device authentication, MITM attack, confidentiality, integrity, and is safe the security enemy with solving low electric power problem.

  • PDF

고속광통신망용 새로운 WDM/TDM 프로토콜 (A new WDM/TDM protocol for very high speed optical networks)

  • 이상록;이성근;박진우
    • 전자공학회논문지A
    • /
    • 제33A권2호
    • /
    • pp.50-58
    • /
    • 1996
  • This paper proposes the channel-access protocol suitable to a very high speed photonic WDM network with star configuration, which can provide a high channel utilization and insensitivity to the propagation delay. The proposed protocol employs a control channel and a simple status table to deal with the propagation delay which has been a major limiting factor in the performance of the very high speed optical communication networks. The control channel transmits control information in order to reserve access on data channels, and each node constitutes a status table after the reception of control pckets which holds information about the availbility of destination node and data channel. The proposed protocol is insensitive to the propagation delay time by removing necessity of the retransmission and by allowing parallel transmission of control packet and data packets. It is proved in analysis and discrete event simulation that the proposed protocol is superior in throughput and mean delay, especially at the high load conditions compared to the existing high speed channel-access protocols.

  • PDF

Zone based Ad Hoc Network Construction Scheme for Local IoT Networks

  • Youn, Joosang
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권12호
    • /
    • pp.95-100
    • /
    • 2017
  • In this paper, we propose a zone based ad hoc network construction scheme which support ad hoc path between nodes in local IoT networks consisting of IoT devices with the constrained feature, such as low power, the limited transmission rate and low computing capacity. Recently, the various routing protocols have been studied to support ad hoc networking of local IoT environments. This is, because basis RPL protocol is deigned to be used for the connecting service with Internet through gateway, ad hoc path between nodes in local IoT networks is not supported in basis RPL protocol. Thus, in this paper, the proposed routing scheme provides both ad hoc path and Infra path through gateway, supporting basis RPL protocol simultaneously. Through simulation, we show that the proposed routing scheme with zone based path selection scheme improves the performance of the success rate of end-to-end data transmission and the end-to-end delay, compared to basis RPL protocol.

SMDS 망과 LAN의 효율적인 상호접속을 위한 프로토콜 (A protocol for the efficient interconnection of SMDS and LAN)

  • 오윤택;한치문;박성한
    • 전자공학회논문지A
    • /
    • 제32A권8호
    • /
    • pp.19-30
    • /
    • 1995
  • For the efficient interconnection between SMDS and LAN, an interconnection protocol architecture in the router is proposed in this paper. A control method of xongestion which is produced by this interconnection of SMDS and LAN is also proposed. Especially, the SIP level 3 of SMDS is devided into CS-SIP3 sublayer and CLNAP sublayer in order to circumvent the problems which are producted by the protocol difference of two networks and to consider the interconnection with B-ISDN in the future. In this way, the interconnection of SMDS and LAN is transparentlly achieved through CLNAP layer, and the interconnection protocol architecture becomes simple. To test the performance of the router, amodel of interconnection protocol which is proposed by this paper is simulated using sliding window flow control. The simulation results show that the throughput of router is increased. The packet delay and the rate of packet discard are also decreased.

  • PDF

Bio-MAC: WBSN환경에서 다양한 생체신호 전송을 위한 최적화된 MAC Protocol (Bio-MAC: Optimal MAC Protocol for Various Bio-signal Transmission in the WBSN Environment)

  • 장봉문;노영식;유선국
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.423-425
    • /
    • 2007
  • In this paper, Medium Access Control(MAC) protocol designed for Wireless Body area Sensor Network(Bio-MAC) is proposed, Because in WBSN, the number of node is limited and each node has different characteristics. Also, reliability in transmitting vital data sensed at each node and periodic transmission should be considered so that general MAC protocol cannot satisfy such requirements of biomedical sensors in WBSN. Bio-MAC aims at optimal MAC protocol in WBSN. For this, Bio-MAC used Pattern -SuperFrame, which modified IEE E 802.15.4-based SuperFrame structurely. Bio-MAC based on TDMA uses Medium Access-priority and Pattern eXchange -Beacon method for dynamic slot allocation by considering critical sensing data or power consumption level of sensor no de etc. Also, because of the least delay time. Bio-MAC is suitable in the periodic transmission of vital signal data. The simulation results demonstrate that a efficient performance in WBSN can be achieved through the proposed Bio-MAC.

  • PDF

Stateful Virtual Proxy for SIP Message Flooding Attack Detection

  • Yun, Ha-Na;Hong, Sung-Chan;Lee, Hyung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권3호
    • /
    • pp.251-265
    • /
    • 2009
  • VoIP service is the transmission of voice data using SIP protocol on an IP-based network. The SIP protocol has many advantages, such as providing IP-based voice communication and multimedia service with low communication cost. Therefore, the SIP protocol disseminated quickly. However, SIP protocol exposes new forms of vulnerabilities to malicious attacks, such as message flooding attack. It also incurs threats from many existing vulnerabilities as occurs for IP-based protocol. In this paper, we propose a new virtual proxy to cooperate with the existing Proxy Server to provide state monitoring and detect SIP message flooding attack with IP/MAC authentication. Based on a proposed virtual proxy, the proposed system enhances SIP attack detection performance with minimal latency of SIP packet transmission.