• Title/Summary/Keyword: medium access control protocol

Search Result 299, Processing Time 0.024 seconds

An efficient channel assignment meghod for real-time service in the IEEE 802.11 wireless LAN system (IEEE 802.11 무선 LAN 환경에서 실시간 서비스를 제공하기 위한 채널 구간 할당 방안)

  • 박중신;류시훈;강태원;이준호;이재용;이상배
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.5
    • /
    • pp.1249-1259
    • /
    • 1998
  • This paper proposes an efficient channel assignment method for real-time service in the IEEE 802.11 Wireless LAN system, and analyzes the supportability to real-time service and the channel utilzation of that through computer simulations. The improved MAC(Medium Access Control) protocol employing the proposed channel assignment method achieved good throughput over contention period as well as contention-free period by making real-time terminals transmit the information about their desiring value before starts of data transmissions. For performance evaluation of the proposed method, a simulation analyzing the variation of allocated bandwidths to terminals using real-time service and their buffer sizes wasexecuted. Real-time data traffics was modeled s 7-stae transition VBR sources, and asynchronous data traffics modeled as Poisson processes. In the simulation, the proposed method showed smaller variation of the bandwidth of each terminal and samller buffer size than the existing method, and also recorded good throughput over contention period.

  • PDF

CDASA-CSMA/CA: Contention Differentiated Adaptive Slot Allocation CSMA-CA for Heterogeneous Data in Wireless Body Area Networks

  • Ullah, Fasee;Abdullah, Abdul Hanan;Abdul-Salaam, Gaddafi;Arshad, Marina Md;Masud, Farhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5835-5854
    • /
    • 2017
  • The implementation of IEEE 802.15.6 in Wireless Body Area Network (WBAN) is contention based. Meanwhile, IEEE 802.15.4 MAC provides limited 16 channels in the Superframe structure, making it unfit for N heterogeneous nature of patient's data. Also, the Beacon-enabled Carrier-Sense Multiple Access/Collision-Avoidance (CSMA/CA) scheduling access scheme in WBAN, allocates Contention-free Period (CAP) channels to emergency and non-emergency Biomedical Sensors (BMSs) using contention mechanism, increasing repetition in rounds. This reduces performance of the MAC protocol causing higher data collisions and delay, low data reliability, BMSs packet retransmissions and increased energy consumption. Moreover, it has no traffic differentiation method. This paper proposes a Low-delay Traffic-Aware Medium Access Control (LTA-MAC) protocol to provide sufficient channels with a higher bandwidth, and allocates them individually to non-emergency and emergency data. Also, a Contention Differentiated Adaptive Slot Allocation CSMA-CA (CDASA-CSMA/CA) for scheduling access scheme is proposed to reduce repetition in rounds, and assists in channels allocation to BMSs. Furthermore, an On-demand (OD) slot in the LTA-MAC to resolve the patient's data drops in the CSMA/CA scheme due to exceeding of threshold values in contentions is introduced. Simulation results demonstrate advantages of the proposed schemes over the IEEE 802.15.4 MAC and CSMA/CA scheme in terms of success rate, packet delivery delay, and energy consumption.

Performance Evaluation of Traffic Adaptive Sleep based MAC in Clustered Wireless Sensor Networks (클러스터 기반 무선 센서 망에서 트래픽 적응적 수면시간 기반 MAC 프로토콜 성능 분석)

  • Xiong, Hongyu;So, Won-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.107-116
    • /
    • 2011
  • In this paper, a traffic adaptive sleep based medium access control (TAS-MAC) protocol for wireless sensor networks (WSNs) is proposed. The protocol aims for WSNs which consist of clustered sensor nodes and is based on TDMA-like schema. It is a typical schedule based mechanism which is adopted in previous protocols such as LEACH and Bit-Map Assisted MAC. The proposed MAC, however, considers unexpected long silent period in which sensor nodes have no data input and events do not happen in monitoring environment. With the simple traffic measurement, the TAS-MAC eliminates scheduling phases consuming energy in previous centralized approaches. A frame structure of the protocol includes three periods, investigation (I), transmission (T), and sleep-period (S). Through the I-period, TAS-MAC aggregates current traffic information from each end node and dynamically decide the length of sleep period to avoid energy waste in long silent period. In spite of the energy efficiency of this approach, the delay of data might increase. Thus, we propose an advanced version of TAS-MAC as well, each node in cluster sends one or more data packets to cluster head during the T-period of a frame. Through simulation, the performance in terms of energy consumption and transmission delay is evaluated. By comparing to BMA-MAC, the results indicate the proposed protocol is more energy efficient with tolerable expense in latency, especially in variable traffic situation.

An Efficient Multi-Channel MAC Protocol for Cognitive Ad-hoc Networks with Idle Nodes Assistance (무선 인지 애드 혹 네트워크를 위한 휴지 노드를 활용하는 효율적인 다중 채널 MAC 프로토콜)

  • Gautam, Dinesh;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.39-45
    • /
    • 2011
  • In this paper, we propose an efficient multichannel MAC protocol with idle nodes assistance to avoid the multi-channel hidden terminal problem in cognitive radio ad hoc network and further to improve the performance of the network. The proposed MAC protocol can be applied to the cognitive radio adhoc network where every node is equipped with the single transceiver and one common control channel exists for control message negotiation. In the proposed protocol, the idle nodes available in the neighbour of communication nodes are utilized because the idle nodes have the information about the channels being utilized in their transmission range. Whenever the nodes are negotiating for the channel, idle nodes can help the transmitting and receiving nodes to select the free data channel for data transfer. With the proposed scheme, we can minimize the hidden terminal problem and decrease the collision between the secondary users when selecting the channel for data transfer. As a result, the performance of the network is increased.

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

Throughput rate of DCF Protocol based Ricean fading channel in the IEEE 802.1la wireless LAN. (라이시안 페이딩 채널환경에서 IEEE 802.11a 무선 LAN의 DCF 처리율)

  • Ha Eun-Sil;Jung Jin-Wook;Lee Ha-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.803-813
    • /
    • 2005
  • This paper explores the throughput performance of CSMA/CA-based DCF protocol over frequency-selective, slow Ricean fading channels with both the $E_{b}/N_{o}$ and BER at the MAC layer in the 802.1 la wireless LAN. By exploring the throughput of DCF protocol with the data rate of 6Mbps, 12 Mbps, 24 Mbps and 54 Mbps, we find the fact that the higher the $E_{b}/N_{o}$ be and the less the BER be, the higher the throughput be.

A performance study and IC implementation of high-speed distributed-multimedia shared medium access control protocol(part II:integrated circuit design for HCR protocol) (고속 분산 멀티미디어 서비스를 위한 공유매체 접속제어 프로토콜의 성능분석 및 집적회로 구현 (II부:HCR 프로토콜용 집적회로 설계))

  • 강선무;이종필;송호준;김대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.10
    • /
    • pp.2282-2291
    • /
    • 1997
  • This paper describes an IC design for the HCR protocol which is designed to accomodata both real and non-real time data for high-speed multimedia services. The designed HCR IC is perfectly compatible with the conventional ATM IC's and physical layer IC's. The standard UTOPIA interface is adopted. Simulation results show that the proposed HCR IC operates very well according to the priority and the quota state of the real and non-real time data. The proposed HCR IC can be merged into the conventional ATM IC's without any modification and will be useful for multimedia service applications.

  • PDF

MAG Protocol Implementation for IEEE 802.11 Wireless LAN Systems (무산 LAN용 IEEE 802.11 MAC 프로토콜의 구현)

  • Na, N.;Choi, J.;Han, T.;Ahn, D.;Lee, D.;Hong, Y.;Hwang, I.
    • Proceedings of the KIEE Conference
    • /
    • 2001.11c
    • /
    • pp.380-382
    • /
    • 2001
  • This paper presents the implementation of IEEE 802.11 Medium Access Control and Physical Layer Protocol that can be applied to wireless LAN system. We have used PRISM2 chipsets from Intersil to build the baseband, IF, and RF parts. DSSS(Direct Sequence Spread Spectrum) physical layer at 2.4GHz ISM band is adopted in the hardware prototype. To meet the high-speed requirement of physical layer, we have designed the MAC protocol layer with embedded firmware and FPGA. The prototype board is shown to be able to support the physical layer of 5GHz and 600Hz wireless LAN systems.

  • PDF

Implementation of IEEE 802.15.4 Protocol Stack on the Texas Instrument CC2530 (텍사스 인스트루먼트의 CC2530 상에 IEEE 802.15.4 프로토콜 스택 구현)

  • Kim, Byung-Soon
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.353-358
    • /
    • 2012
  • Wireless sensor networks consist of resource constraint devices which typically send data measured by sensors attached to the end devices towards a coordinator. The most often used medium access control protocol used in wireless sensor networks is the standard IEEE 802.15.4, where it is wireless standard introduced for low power, low cost wireless communication with moderate data rates. In this paper, we present implementation of both the IEEE 802.15.4 protocol stack and UART interface on the TI CC2530. We show that data via UART of our implemented IEEE 802.15.4 board are transmitted correctly in terms of captured frames.

MAC Protocol Analysis for Effective Energy Consumption in Ubiquitous Sensor network (유비쿼티스 센서 네트워크에서 효율적인 에너지 소모를 위한 MAC 프로토콜 분석)

  • Kim, Dong Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.927-930
    • /
    • 2012
  • The sensor network technology for core technology of ubiquitous computing is in the spotlight recently, the research on ubiquitous sensor network is proceeding actively which is composed many different sensor node. One of the important condition for design of sensor node is to extend for network life which is to minimize power-consumption under the limited resources of sensor network. This study suggest routing protocol that was used second level cluster structure to reduce power-consumption of sensor node. the first level use the previous routing protocol under the LEACH, second level decide to transmit or not by comparision of data value for Effective Usage, reduce the unnecessary power-consumption.

  • PDF