• Title/Summary/Keyword: Media Access Control

Search Result 276, Processing Time 0.039 seconds

An Implementation of Acoustic-based MAC Protocol Multichannel Underwater Communication Network

  • Lim, Yong-Kon;Park, Jong-Won;Kim, Chun-Suk;Lee, Young-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.1 no.1
    • /
    • pp.105-111
    • /
    • 1997
  • This Paper Proposes a new efficient system design strategies for the acoustic-based underwater multiple modem and media access control protocol. The system aims to establish the acoustic-based communication network of an underwater vehicles for deep sea mining, which ensures a certain level of maximum throughput regardless of the propagation delay of acoustic and allows fast data transmission through the acoustic-based multiple channel. A media access control protocol for integrated communication network and it's acoustic-based communication modems that allows 'peer-to-peer' communication between a surface mining plant multiple underwater system is designed, and the proposed media access control protocol is implemented for its verification. Furthermore, a proposed design strategies which make it possible to control the multiple vehicle for an underwater mining is presented in this paper.

  • PDF

MAC Protocol Design for Underwater Data Communication (수중 데이터 통신을 위한 MAC(Media Access Control) 프로토콜 설계)

  • Yeo, Jin-Ki;Lim, Young-Kon;Lee, Heung-Ho;Lee, Sung-Min
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2619-2621
    • /
    • 2001
  • This study proposes a new efficient MAC(media access control) protocol to establish the ultrasonic communication network for under water vehicles, which ensures a certain level of maximum throughput regardless of the propagation delay of ultrasonic and allows fast data transmission through the multiple ultrasonic communication channel. In this study, a media access control protocol for underwater communication network that allows 'peer-to-peer' communication between a surface ship and multiple underwater system is designed, and the proposed control protocol is implementde for its verification.

  • PDF

Resource management service model implemented for the Internet of Things services access control (사물인터넷 서비스 접근제어를 위한 리소스 서비스 관리 모델 구현)

  • Kim, Jin-Bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.9-16
    • /
    • 2016
  • Many countless services form using the Internet technology of things, in order to provide a variety of services in the current also many institutions, have created a new technology and protocols. In this paper, we design the resource service model for the efficient service provided by the system for controlling access to the Internet services of the things, to implement. The resources of the service that the user tries to access modeled using LCRS (Left Child-Right Sibling) tree, by utilizing the service token resource, it is possible to perform access control to services.

A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks

  • Shi, Fei;Song, Joo-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1565-1585
    • /
    • 2012
  • The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.

Improvement of AACS Security Framework with Access Control to Personal Contents (개인 콘텐츠 접근제어 기능을 갖는 개선된 AACS 보안 Framework)

  • Kim, Dae-Youb
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.167-174
    • /
    • 2008
  • As both a digital camera and a digital camcorder are popularized in recent years, UCC created by general users is also popularized. Unfortunately, according to that, the lack of privacy is also increasing more and more. The UCC is saved on the recordable media(Media) like DVD and deposited personally as well as distributed through Internet portal service. If you use Internet portal service to put up your contents, you can partially prevent the violation of privacy using security technologies such as authentication and illegal copy protection offered by internet portal service providers. Media also has technologies to control illegal copy. However, it is difficult to protect your privacy if your Media having personal contents is stolen or lost. Therefore, it is necessary to develope an additional security mechanism to guarantee privacy protection when you use Media. In this paper, we describe AACS framework for Media Security and propose improved AACS framework to control the access to personal contents saved on Media.

An Improved Contention Access Mechanism for FPRP to Increase Throughput

  • Yang, Qi;Zhuang, Yuxiang;Shi, Jianghong
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.58-68
    • /
    • 2013
  • Five-phase reservation protocol (FPRP) is a contention-based media access control protocol for wireless ad hoc networks. FPRP uses a five-phase reservation process to establish slot assignments based on time division multiple access. It allows a node to reserve only one slot in an information frame. Once a node has reserved a slot, it will cease contending for other slots. As a result, there may be less contending nodes in the remaining slots, so the time slots in an information frame are not fully used by FPRP. To improve time slot utilization, this paper proposes an improved pseudo-Bayesian algorithm, based on which an improved contention access mechanism for FPRP is proposed, in which nodes are allowed to contend for more than one slot in a reservation frame according to a certain probability/priority. Simulation results indicate that the proposed mechanism performs better than FPRP in time slot utilization and hence the network throughput under various scenarios.

Layered Access Control Mechanism using Hybrid-based Method for SVC Media Transmission (SVC 미디어의 전송을 위한 하이브리드 방식의 계층별 접근제어 메커니즘)

  • Kwon, Hyeok-Chan;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.47-54
    • /
    • 2011
  • To protect SVC(Scalable Video Coding) media, the encryption mechanism need to consider two fundamental issues; First, What is to be encrypted? Second, When encryption is performed with respect to compression? In this paper, we analyze the several encryption approaches with regard to the above issue. And we propose hybrid-based protection mechanism. This mechanism ensures the media scalability, layered access control and reuse protected content. In this experiment the proposed mechanism generates under 3% security overhead against standard scalable video coding.

Media Access Scheme for Achieving an Effective Traffic Control Mechanism and Energy Efficiency in Sensor Networks (센서 네트워크에서 효과적인 트래픽 제어 방법과 에너지 효율성을 고려한 Media Access 기법)

  • Min Byung-Ung;Kim Dong-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1060-1064
    • /
    • 2006
  • Data collected by sensors in field are transmitted to the base station gathering all of data. Because sensors have to gather data in surroundings and periodically transmit data to the base station, it makes energy consumed much. In this paper, we mose the scheme that is to avoid traffic congestion with achievement of energy efficiency, so collected data is transmitted efficiently. This is to adjust transmission rate differently in case of increasing or decreasing traffic and minimize the energy consumption with setting ideal options up basic CSMA(Carrier Sense Multiple Access) protocol in each sensor. Through the simulation, we find the ideal CSMA options and apply the proposed scheme of traffic control mechanism to them and analyze them, then show energy efficiency and effective traffic control mechanism.

UWB Link-Adaptive Relay Transmission Protocol for WiMedia Distributed MAC Systems (WiMedia Distributed MAC 통신 시스템을 위한 UWB 링크에 적응적인 릴레이 통신 프로토콜)

  • Hur, Kyeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3A
    • /
    • pp.141-150
    • /
    • 2012
  • The WiMedia Alliance has specified a Distributed Medium Access Control (D-MAC) protocol based on UWB for high speed wireless home networks and WPANs. In this paper, firstly, a time slot reservation protocol for relay transmission is proposed. Furthermore, we propose a novel relay node selection algorithm adaptive to current UWB link transmission rate. The proposed relay node selection algorithm has compatibility with current WiMedia D-MAC standard and is executed at each device according to the SoQ as a QoS criterion.

New MAC Protocol and Dynamic Bandwidth Allocation Method for TWDM PON (TWDM PON을 위한 새로운 MAC 프로토콜 및 동적대역할당 방법)

  • Han, Man-Soo;Na, Cheol-Hun;Kang, Seong-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1419-1424
    • /
    • 2013
  • Passive optical networks (PONs) are the emerging solution for access networks since PONs provide high bandwidth and the low operation cost. In recent, the new solution in access networks is TWDM PON which is a mixture of WDM (wavelength-division multiplexing) and TDM (time-division multiplexing). This paper proposes a new MAC (media access control) protocol for TWDM PON. In addition, this paper proposes and evaluates a new dynamic bandwidth allocation method for TWDM PON.