• Title/Summary/Keyword: protocol Analysis

Search Result 2,498, Processing Time 0.032 seconds

Performance Analysis of an Enhanced DQRUMA/MC-CDMA Protocol with an LPRA Scheme for Voice Traffic

  • Park, Jae-Yoon;Nam, Seung-Yeob;Sung, Dan-Keun;Jemin Chung
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.43-48
    • /
    • 2003
  • This paper presents a comparative evaluation of a modified version (A-Protocol) of the Distributed-Queueing Request Update Multiple Access (DQRUMA)Multi-Code Code Division Multiple Access (MC-CDMA) protocol and an enhanced version (P-Protocol) of the DQRUMA/MC-CDMA protocol with a lattice pool for request accesses (LPRA) scheme in a packet-based voice traffic environment. Analytical results agree with the simulation ones and show that the P-Protocol outperforms the A-Protocol in terms of the packet loss rate for voice traffic.

  • PDF

Performance Evaluation of the RIX-MAC Protocol for Wireless Sensor Networks

  • Kim, Taekon;Lee, Hyungkeun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.764-784
    • /
    • 2017
  • Energy efficiency is an essential requirement in designing a MAC protocol for wireless sensor networks (WSNs) using battery-operated sensor nodes. We proposed a new receiver-initiated MAC protocol, RIX-MAC, based on the X-MAX protocol with asynchronous duty cycles. In this paper, we analyzed the performance of RIX-MAC protocol in terms of throughput, delay, and energy consumption using the model. For modeling the protocol, we used the Markov chain model, derived the transmission and state probabilities, and obtained the equations to solve the performance of throughput, delay, and energy consumption. Our proposed model and analysis are validated by comparing numerical results obtained from the model, with simulation results using NS-2.

Analysis and Design a Optimum Protocol for TICN Tactical Backbone (TICN 전술백본망 최적의 프로토콜 분석 및 설계)

  • Kwon, Tae-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1722-1727
    • /
    • 2011
  • The Korea Army are developing the TICN(Tactical Information Communication Network) which is the next army tactical communication system. The TICN tactical backbone's ability is very important. So analysis of the standard protocol for the data transmission guarantee are obliged. For the TICN tactical backbone, previous paper analysed routing protocol efficiency index and compared to superiority of the OSPF and IS-IS protocols in the tactical environment and conclusively IS-IS protocol was more suitable for TICN backbone routing protocol. And We got the result that It could improve the performance of IS-IS protocol as a TICN tactical backbone protocol under the tactical environments by adjusting some time parameters of IS-IS protocol. This paper modified and designed the IS-IS protocol in order to support the QoS strategies of TICN and analyzed it's adaptability through simulation.

Sensitivity Analysis of Cache Coherence Protocol for Hierarchical-Bus Multiprocessor (계층버스 다중처리기에서 캐시 일관성 프로토콜의 민감도 분석)

  • Lee, Heung-Jae;Choe, Jin-Kyu;Ki, Jang-Geun;Lee, Kyou-Ho
    • Journal of IKEEE
    • /
    • v.8 no.2 s.15
    • /
    • pp.207-215
    • /
    • 2004
  • In a hierarchical-bus multiprocessor system, cache coherence protocol has effect on system performance. Under a particular cache coherence protocol, system performance can be affected by bus bandwidth, memory size, and memory block size. Therefore sensitivity analysis is necessary for the part of multiprocessor system. In this paper, we set up cache coherence protocol for hierarchical-bus multiprocessor system, and compute probability of state of protocol, and analyze sensitivity for part of system by simulation.

  • PDF

Improved An RFID Mutual Authentication Protocol Based on Hash Function (개선된 해시기반의 RFID 상호인증 프로토콜)

  • Shin, Ju-Seok;Oh, Se-Jin;Jeong, Cheol-Ho;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.241-250
    • /
    • 2012
  • In 2010, Jeon-Kim proposed HMAP(Hash-based Mutual Authentication Protocol for RFID Environment) to resolve a variety of problem related to security using Mutual authentication scheme, the hash function and secret key is used to update in RFID system. Jeon-Kim proved RMAP was safe for a variety of attacks including eavesdropping attacks through safety analysis. However, unlike the claims of the proposed protocol is vulnerable to next session of the secret key exposure due to eavesdropping. In this paper, we analyze the problem of RMAP and proves it through security analysis. And we also propose improved an RFID Mutual Authentication Protocol based on Hash Function to solve problems of HMAP.

A Study on The Performance Analysis of IEEE 802,11 Wireless LAN (IEEE 802.11 무선 LAN의 성능분석에 관한 연구)

  • Hong, Seong-Cheol;Bae, Seong-Su;O, Yeong-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.2
    • /
    • pp.7-16
    • /
    • 2000
  • In this paper, IEEE 802.11 MAC layer protocol is modeled by p-persistent CSMA method. And We introduce performance analysis model based on Basic CSMA/CA protocol, CTS/RTS protocol and hidden node effect reflected Basic CSMA/CA Protocol, Which is mathematically assayed by renewal theory. In this throughput, the result shown that Basic CSMA/CA protocol is profitable when the number of active node is smaller, or the length of packet is shorter, and CTS/RTS protocol is lucrative when the number of active node is larger, or the length of packet is longer. Also the result shown that hidden node less affected when the active node has small one, rather than when the active node has larger one.

  • PDF

Analysis of Three-Phase Multiple Access with Continual Contention Resolution (TPMA-CCR) for Wireless Multi-Hop Ad Hoc Networks

  • Choi, Yeong-Yoon;Nosratinia, Aria
    • Journal of Communications and Networks
    • /
    • v.13 no.1
    • /
    • pp.43-49
    • /
    • 2011
  • In this paper, a new medium access control (MAC) protocol entitled three-phase multiple access with continual contention resolution (TPMA-CCR) is proposed for wireless multi-hop ad hoc networks. This work is motivated by the previously known three-phase multiple access (TPMA) scheme of Hou and Tsai [2] which is the suitable MAC protocol for clustering multi-hop ad hoc networks owing to its beneficial attributes such as easy collision detectible, anonymous acknowledgment (ACK), and simple signaling format for the broadcast-natured networks. The new TPMA-CCR is designed to let all contending nodes participate in contentions for a medium access more aggressively than the original TPMA and with continual resolving procedures as well. Through the systematical performance analysis of the suggested protocol, it is also shown that the maximum throughput of the new protocol is not only superior to the original TPMA, but also improves on the conventional slotted carrier sense multiple access (CSMA) under certain circumstances. Thus, in terms of performance, TPMA-CCR can provide an attractive alternative to other contention-based MAC protocols for multi-hop ad hoc networks.

The Design & Analysis of Time-Stamp Protocol with H-Binary Tree (H-이진트리체제의 타임스탬프 프로토콜 분석)

  • 정경원;도경화;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.2
    • /
    • pp.157-171
    • /
    • 2002
  • We want to find a timestamping method which improves efficient performance and have high-level security to send secured messages in the digital signature and the law of e-commerces. Our paper shows a H-binary tree of time stamp to use a time stamp protocol with high security and performance in the packets of sending messages. We implement and analyze the protocols, show to compare with previous RSA methods. Our proposed protocol has O(log n) time complexity and high-performance.

  • PDF

Danger Element Analysis and Protocol Design of Electronic Cash Payment System (전자화폐지불시스템의 위험요소 분석 및 프로토콜 설계)

  • 허철회;조성진;정환묵
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.103-115
    • /
    • 1999
  • The electronic cash, an electronic equivalent of the real paper money, has been recently proposed as one of the various payment methods for electronic commerce. In this paper, we design an electronic cash payment system based on a new electronic cash payment protocol that can effectively provide full anonymity and avoid double-spending. The protocol is suitable for use as the electronic cash control or electronic cash database. The protocol support also security and electronic cash property.

  • PDF

Verification of Authentication Protocol for CDMA Mobile Communication Network

  • Hong, Ki-Yoong;Kim, Seok-Woo;Kim, Dong-Kyoo
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.1
    • /
    • pp.82-90
    • /
    • 1996
  • In this paper, we present an analysis of the IS-95 authentication protocol for the Code Division Multiple Access(CDMA) mobile communication network. We propose a mutual authentication protocol, AP-6, to improve the security and correctness. Formal description and verification of the proposed AP-6 are also presented on the basis of the formal logic. It is shown that the proposed AP-6 is more secure and correct than the IS-95 authentication protocol.

  • PDF