- Changhee Joo, Xiaojun Lin, Jiho Ryu, and Ness B. Shroff, "Distributed Greedy Approximation to Maximum Weighted Independent Set for Scheduling with Fading Channels," IEEE Trans. on Networking (ToN), accepted for publication.
[PDF] It has been known that scheduling algorithms designed to achieve throughput optimality and good delay performance often require solving the Maximum Weighted Independent Set (MWIS) problem. However, under most realistic network settings, the MWIS problem is known to be NP-hard. In nonfading environments, low-complexity scheduling algorithms have been provided that converge either to the MWIS solution in time or to a solution that achieves at least a provable fraction of the achievable throughput. However, in more practical systems the channel conditions can vary at faster time-scales than convergence occurs in these lower-complexity algorithms. Hence, these algorithms cannot take advantage of opportunistic gains, and may no longer result in achieving good performance. In this paper, we propose a low-complexity scheduling scheme that performs provably well under fading channels and is amenable to implement in a distributed manner. To the best of our knowledge, this is the first scheduling scheme under fading environments that requires only local information, has a low complexity that grows logarithmically with the network size (provided that the conflict graph has bounded maximum vertex degree), and achieves provable performance guarantees (arbitrarily close to that of the well-known centralized Greedy Maximal Scheduler). We verify that the throughput and the delay of our proposed scheme are close to those of the optimal MaxWeight that solves MWIS at each time. Further, we implement our algorithm in a testbed by modifying the existing IEEE 802.11 DCF. The experiment results show that our implementation successfully accounts for wireless fading, attains the short-term opportunistic gains in practice, and hence substantially outperforms IEEE 802.11 DCF.
- Jiho Ryu, Changhee Joo, Ted Taekyoung Kwon, Ness B. Shroff, and Yanghee Choi, "DSS: Distributed SINR-Based Scheduling Algorithm for Multihop Wireless Networks," IEEE Transactions on Mobile Computing (TMC), Vol. 12, No. 6, pp. 1120-1132, June 2013.
[PDF]
The problem of developing distributed scheduling algorithms for high throughput in multihop wireless networks has been extensively studied in recent years. The design of a distributed low-complexity scheduling algorithm becomes even more challenging when taking into account a physical interference model, which requires the SINR at a receiver to be checked when making scheduling decisions. To do so, we need to check whether a transmission failure is caused by interference due to simultaneous transmissions from distant nodes. In this paper, we propose a scheduling algorithm under a physical interference model, which is amenable to distributed implementation with 802.11 CSMA technologies. The proposed scheduling algorithm is shown to achieve throughput optimality. We present two variations of the algorithm to enhance the delay performance and to reduce the control overhead, respectively, while retaining throughput optimality.
- Rajiv Gandhi, Yoo-Ah Kim, Seungjoon Lee, Jiho Ryu, and Peng-Jun Wan, "Approximation Algorithms for Data Broadcast in Wireless Networks," IEEE Transactions on Mobile Computing (TMC), Vol. 11, No. 7, pp. 1237-1248, July 2012.
[PDF]
Broadcasting is a fundamental operation in wireless networks and plays an important role in the communication protocol design. In multihop wireless networks, however, interference at a node due to simultaneous transmissions from its neighbors makes it nontrivial to design a minimum-latency broadcast algorithm, which is known to be NP-complete. We present a simple 12-approximation algorithm for the one-to-all broadcast problem that improves all previously known guarantees for this problem. We then consider the all-to-all broadcast problem where each node sends its own message to all other nodes. For the all-to-all broadcast problem, we present two algorithms with approximation ratios of 20 and 34, improving the best result available in the literature. Finally, we report experimental evaluation of our algorithms. Our studies indicate that our algorithms perform much better in practice than the worst-case guarantees provided in the theoretical analysis and achieve up to 37 percent performance improvement over existing schemes.
- Jeongkeun Lee, Jiho Ryu, Sung-Ju Lee, and Ted Taekyoung Kwon, "Improved modeling of IEEE 802.11a PHY through fine-grained measurements," Elsevier Computer Networks (ComNet), Vol. 54, No. 4, pp. 641-657, March 2010.
[PDF]
In wireless networks, modeling of the physical layer behavior is an important yet difficult task. Modeling and estimating wireless interference is receiving great attention, and is crucial in a wireless network performance study. The physical layer capture, preamble detection, and carrier sense threshold are three key components that play important roles in successful frame reception in the presence of interference. Using our IEEE 802.11a wireless network testbed, we carry out a measurement study that reveals the detailed operation of each component and in particular we show the terms and conditions (interference timing, signal power difference, bitrate) under which a frame survives interference according to the preamble detection and capture logic. Based on the measurement study, we show that the operations of the three components in real IEEE 802.11a systems differ from those of popular simulators and present our modifications of the IEEE 802.11a PHY models to the NS-2 and QualNet network simulators. The modifications can be summarized as follows. (i) The current simulators¡¯ frame reception is based only on the received signal strength. However, real 802.11 systems can start frame reception only when the Signal-to-Interference Ratio (SIR) is high enough to detect the preamble. (ii) Different chipset vendors implement the frame reception and capture algorithms differently, resulting in different operations for the same event. We provide different simulation models for several popular chipset vendors and show the performance differences between the models. (iii) Based on the 802.11a standard setting and our testbed observation, we revise the simulator to set the carrier sense threshold higher than the receiver sensitivity rather than equal to the receiver sensitivity. We implement our modifications to the QualNet simulator and evaluate the impact of PHY model implementations on the wireless network performance; these result in an up to six times increase of net throughput.
- Jiho Ryu, Chang-Gun Lee, Taekyoung Kwon, and Junghee Han, "Combined Scheduling and Routing for Deterministic Guarantee of End-to-End Deadlines in Cell Structured Sensor Networks," IEEE Sensors Journal, Vol. 9, No. 10, pp. 1291-1301, October 2009.
[PDF]
Wireless sensor networks have great potentials to be applied to mission critical real-time applications such as target tracking, emergency detection, and disaster management. For such real-time applications, sensory data should be delivered within the end-to-end deadlines; otherwise, the data may become useless or misleading. In order to provide such deterministic guarantee of end-to-end deadlines, not only packet scheduling within a single hop but also routing across multiple hops have to be jointly considered. In this paper, we propose a combined scheduling and routing mechanism that provides a deterministic guarantee of end-to-end deadlines leveraging real-time scheduling and analysis techniques. Our experimental study shows that the proposed mechanism can accommodate a larger workload meeting all the end-to-end deadlines than a pretty comprehensive set of other possible solutions of scheduling and routing that are known to deterministically guarantee end-to-end deadlines.
- Nakjung Choi, Jiho Ryu, Eunkyoung Paik, Taekyoung Kwon, and Yanghee Choi, "A Transparent Failover Mechanism for a Mobile Network with Multiple Mobile Routers," IEEE Communications Letters, (CL), Vol. 11, No. 7, pp. 604-606, July 2007.
[PDF]
In a mobile network that is multihomed by multiple mobile routers, a mobile router that loses link connectivity can be replaced by the other mobile routers. We propose a transparent failover mechanism (TFM) to provide seamless Internet services to nodes in the mobile network, which is validated by implementing a real test-bed. Compared to the network mobility basic support protocol, TFM does not require the nodes attached to the failed mobile router to change their addresses, and hence has two advantages: (a) IP connectivity is maintained transparently, and (b) failover is quickly accomplished by avoiding the address re-configuration process in each node.
- Jiho Ryu, Yongho Seok, Nakjung Choi, Taekyoung Kwon, and Yanghee Choi, "S-EDCA: EDCA based on SuperSlot and Pseudo Collision," ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Vol. 10, No. 4, pp. 15-16, October 2006.(invited)
[PDF]
The IEEE 802.11e EDCA mechanism cannot guarantee the QoS of high-priority traffic as the bandwidth consumption of low-priority traffic increases. Also, the existence of high priority traffic undermines link utilization of low priority traffic. To solve these problems, we propose the S-EDCA scheme that extends IEEE 802.11e EDCA by introducing a SuperSlot and Pseudo Collision. Compared to IEEE 802.11e EDCA, S-EDCA has two advantages: (a) Higher priority traffic achieves QoS regardless of the amount of low priority traffic, and (b) Low priority traffic experiences a higher throughput with the same amount of high priority traffic.
- Changhee Joo, Xiaojun Lin, Jiho Ryu, and Ness B. Shroff, "Distributed Greedy Approximation to Maximum Weighted Independent Set for Scheduling with Fading Channels," ACM MobiHoc, to appear, July 2013.
[PDF]
The problem of developing high-performance distributed scheduling algorithms for multi-hop wireless networks has seen enormous interest in recent years. The problem is especially challenging when studied under a physical interference model, which requires the SINR at the receiver to be above a certain threshold for decoding success. Under such an SINR model, transmission failure may be caused by interference due to simultaneous transmissions from far away nodes, which exacerbates the difficulty in developing a distributed algorithm. In this paper, we propose a scheduling algorithm that exploits carrier sensing and show that the algorithm is not only amenable to distributed implementation, but also results in throughput optimality. Our algorithm has a feature called the ``dual-state'' approach, which separates the transmission schedules from the system state and can be shown to improve delay performance.
- Jiho Ryu, Changhee Joo, Ted "Taekyoung" Kwon, Ness B. Shroff, and Yanghee Choi, "Distributed SINR based Scheduling Algorithm for Multi-hop Wireless Networks," in Proc. of the 13th ACM Intl. Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM'2010), Bodrum, Turkey, Oct. 2010. (Short paper, Acceptance Ratio: 39.4 = 52/132, Regular: 32.6 = 43/132).
[PDF]
The problem of developing high-performance distributed scheduling algorithms for multi-hop wireless networks has seen enormous interest in recent years. The problem is especially challenging when studied under a physical interference model, which requires the SINR at the receiver to be above a certain threshold for decoding success. Under such an SINR model, transmission failure may be caused by interference due to simultaneous transmissions from far away nodes, which exacerbates the difficulty in developing a distributed algorithm. In this paper, we propose a scheduling algorithm that exploits carrier sensing and show that the algorithm is not only amenable to distributed implementation, but also results in throughput optimality. Our algorithm has a feature called the ``dual-state'' approach, which separates the transmission schedules from the system state and can be shown to improve delay performance.
- Rajiv Gandhi, Yoo-Ah Kim, Seungjoon Lee, Jiho Ryu, and Peng-Jun Wan, "Approximation Algorithms for Data Broadcast in Wireless Networks," in Proc. of IEEE INFOCOM Mini-conference 2009, Rio de Janeiro, Brazil, Apr. 2009.
[PDF]
Broadcasting is a fundamental operation in wireless networks and plays an important role in the communication protocol design. In multihop wireless networks, however, interference at a node due to simultaneous transmissions from its neighbors makes it non-trivial to design a minimum-latency broadcast algorithm, which is known to be NP-complete. We present a simple 12-approximation algorithm for the one-to-all broadcast problem that improves all previously known guarantees for this problem. We then consider the all-to-all broadcast problem where each node sends its own message to all other nodes. For the all-to-all broadcast problem, we present two algorithms with approximation ratios of 20 and 34, improving the best result available in the literature. Finally, we report experimental evaluation of our algorithms. Our studies indicate that our algorithms perform much better in practice than the worst-case guarantees provided in the theoretical analysis and achieve up to 37% performance improvement over existing schemes.
- Jiho Ryu, Jeongkeun Lee, Sung-Ju Lee, and Taekyoung Kwon, "Revamping the IEEE 802.11a PHY Simulation Models," in Proc. of the 11th ACM/IEEE Intl. Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM'08), one of three best paper candidates, Vancouver, British Columbia, Canada, Oct. 2008. (Acceptance Ratio: 29.3 = 55/188, Regular: 21.3 = 40/188).
[PDF]
In simulating wireless networks, modeling of the physical layer behavior is an important yet difficult task. Modeling and estimating wireless interference is receiving great research attention, and is crucial in a wireless network performance study. The implementation of physical layer capture, preamble detection, and carrier sense threshold plays an important role in successful frame reception in the presence of interference. We showed in our previous testbed study that the operations of the frame reception and the capture effect in real IEEE 802.11a systems differ from those of popular research simulators. We present our modifications of the IEEE 802.11a PHY models to the current simulators. The modifications can be summarized as follows. (i) The current simulators' frame reception is only based on the received signal strength. However, the real 802.11 systems can start the frame reception only when the Signal-to-Interference Ratio (SIR) is high enough to detect the preamble. (ii) Different chipset vendors implement the frame reception and capture algorithms differently, resulting in different operations for the same event. We provide different simulation models for several popular chipset vendors and show the performance differences between the chipsets. (iii) The current simulators set the carrier sense threshold equal to the receiver sensitivity. The standard however states that it should be 20 dB higher than the receiver sensitivity. We implement our modifications to the QualNet simulator and conduct a wireless network performance study to evaluate the impact of PHY model implementation.
- Jeongkeun Lee, Wonho Kim, Sung-Ju Lee, Daehyung Jo, Jiho Ryu, Taekyoung Kwon, and Yanghee Choi, "An Experimental Study on the Capture Effect in 802.11a Networks," in Proc. of the Second ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and CHaracterization (WinTECH) 2007, Montreal, QC, Canada, September 2007.
[PDF]
- The revised version with the Atheros driver bug fix: [PDF]
In wireless networks, a frame collision does not necessarily result in all the simultaneously transmitted frames being lost. Depending on the relative signal power and the arrival timing of the involved frames, one frame can survive the collision and be successfully received by the receiver. Using our IEEE 802.11a wireless network testbed, we carry out a measurement study that shows the terms and conditions (timing, power difference, bit rate) under which this capture effect takes place. Recent measurement work on the capture effect in 802.11 networks [10] argues that the stronger frame can be successfully decoded only in two cases: (1) The stronger frame arrives earlier than the weaker frame, or (2) the stronger frame arrives later than the weaker frame but within the preamble time of the weaker frame. However, our measurement shows that the stronger frame can be decoded correctly regardless of the timing relation with the weaker frame. In addition, when the stronger frame arrives later than the weaker frame's arrival, the physical layer capture exhibits two very distinct patterns based on whether the receiver has been successfully synchronized to the previous weak frame or not. In explaining the distinct cases we observe that the successful capture of a frame involved in a collision is determined through two stages: preamble detection and the frame body FCS check.
- Nakjung Choi, Jiho Ryu, Yongho Seok, Taekyoung Kwon, and Yanghee Choi, "Optimizing Aggregate Throughput of Upstream TCP Flows over IEEE 802.11 Wireless LANs," in Proc. of IEEE International symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2007, Athens, Greece, September 2007.
[PDF][PPT]
This paper via analysis and simulation revisits the interaction between MAC contention and TCP congestion control over IEEE 802.11 WLANs, misled in the previous efforts. The results reveal that the effective number of contending wireless stations is not proportional to the number of wireless stations with an upstream TCP flow in IEEE 802.11 wireless LANs. Thus, we propose a new scheme called TCP ACK Priority (TAP) in which, by allowing an access point to transmit TCP ACKs at the highest priority, the optimal number of competing stations are allowed to contend for media access to utilize link bandwidth efficiently. We use an ns-2 simulator to evaluate the performance of TAP with the IEEE 802.11 DCF. The results show that there is an improvement in network performance without the loss of fairness between upstream TCP flows. The extensions for IEEE 802.11e/n are also considered.
- Jiho Ryu, Hojin Lee, Yongho Seok, Taekyoung Kwon, and Yanghee Choi, "A Hybrid Query Tree Protocol for Tag Collision Arbitration in RFID systems," in Proc. of the IEEE International Conference on Communications (ICC) 2007, Glasgow, Scotland, June 2007.
[PDF][PPT]
In this paper, we propose a hybrid query tree protocol that combines a tree based query protocol with a slotted backoff mechanism. The proposed protocol decreases the average identification delay by reducing collisions and idle time. To reduce collisions, we use a 4-ary query tree instead of a binary query tree. To reduce idle time, we introduce a slotted backoff mechanism to reduce the number of unnecessary query commands. For static scenarios of tags, we extended the proposed protocol by adopting two phases. First, in leaf query phase for existing tags, the interrogator queries leaf-nodes directly to reuse query strings in the previous session. Second, in root query phase for new arriving tags, the interrogator starts the query process from the root-node. Simulation reveals that the proposed protocol achieves lower identification delay than existing tag collision arbitration protocols regardless of whether tags are mobile or not.
- Yongsub Nam, Jiho Ryu, Nakjung Choi, Taekyoung Kwon, and Yanghee Choi, "Block-Poll Coordination Function for Improving Throughput Performance in Wireless LANs," in Proc. of IEEE International Conference on Communications Systems (ICCS) 2006, Singapore, October/November 2006.
[PDF] [PPT]
IEEE 802.11 DCF shows the inefficient throughput performance, due to the large backoff and collision overheads. We propose the Block-poll coordination function (BCF) to reduce the backoff and collision overheads, thus increasing the aggregate throughput. By introducing a new Block-poll frame which includes a polling bitmap, each station can decide its transmission order, so that the channel access emulates TDMA. In addition, by dividing the polling bitmap into several chunks and transmitting only the changed chunks, the polling overhead can be reduced. The simulation and analysis results show the proposed protocol achieves higher throughput than IEEE 802.11 DCF, while reducing the average delay and the delay jitter values.
- Nakjung Choi, Jiho Ryu, Yongho Seok, Yanghee Choi, and Taekyoung Kwon, "Unicast-Friendly Multicast in IEEE 802.11 Wireless LANs," the best student paper award(3rd place), in Proc. of IEEE Consumer Communications & Networking Conference (CCNC) 2006, Las Vegas, USA, January 2006.
[PDF]
The IEEE 802.11 protocol has become the de facto standard in wireless LANs. However, it reveals the unfairness problem between unicast flows and multicast flows since multicast packets are not subject to binary exponential backoff. To prevent a multicast flow from overwhelming the wireless link bandwidth is a crucial issue. This paper seeks to achieve fairness between unicast and multicast flows by introducing Unicast-Friendly Multicast (UFM). The central idea behind the UFM algorithm is to dynamically change the contention window size for multicast packets to limit the bandwidth share of a multicast flow equal to that of a unicast flow. The proposed UFM algorithm adjusts the multicast contention window size depending on the number of competing stations. We present two versions of UFM: the first one calculates the multicast window size by inferring the average contention window size of unicast flows, while the second one maintains the mapping table between the number of competing stations and the corresponding multicast window size given by related analysis. Simulation reveals that both versions of UFM achieve the fairness by providing almost the fair share of bandwidth to each flow regardless of unicast or multicast under the saturated network conditions.
- Nakjung Choi, Jiho Ryu, Yongho Seok, Yanghee Choi, and Taekyoung Kwon, "Throughput Enhancement for Uploading TCP Flows in IEEE 802.11 Wireless LANs," in Proc. of IEEE International Conference on Consumer Electronics (ICCE) 2006, Las Vegas, USA, January 2006.
[PDF][PPT]
This paper re-analyzes the relationship between MAC contention and TCP congestion control misled in previous efforts. By introducing a prioritized access of an access point, we seek to allow the optimal number of competing stations to contend for media access.
- Jiho Ryu, Yongho Seok, Yanghee Choi, Taekyoung Kwon, and Jean-Marie BONNIN, "S-EDCF: EDCF based on SuperSlot and Pseudo Collision," ACM International Conference on Mobile Computing and Networking (MobiCom) 2005 Student Poster Session, Cologne, Germany, August/September, 2005.
[PPT]
The IEEE 802.11e EDCF mechanism cannot guarantee the QoS of high-priority traffic as the bandwidth consumption of the low-priority traffic increases. Also, the existence of high priority traffic undermines link utilization of low priority traffic. To solve these problems, we propose the S-EDCF scheme that extends IEEE 802.11e EDCF by introducing a SuperSlot and Pseudo Collision. Compared to EDCF, S-EDCF has two advantages: (a) Higher priority traffic achieves QoS regardless of the amount of low priority traffic, and (b) Low priority traffic experiences a higher throughput with the same amount of high priority traffic.
- Dukhyun Chang, Yoonbo Shim, Gilsoo Kim, Nakjung Choi, Jiho Ryu, Taekyoung Kwon, and Yanghee Choi, "MIR: Mobility Information based Routing for Delay and Disruption Tolerant Network," Journal of KIISE: , Vol. 36 No. 2, pp. 130-136, April 2009.
[PDF]
Delay and Disruption Tolerant Network (DTN) employs message delivery based on a store-and-forward method to conquer no guarantee of continuous end-to-end connectivity. Different from general networks, it is hard for the existing TCP/IP-based routing protocols to correctly work, due to the characteristics such as large latency and unstable link connectivity. Thus, many recent studies focus on routing protocols for DTN. In this paper, we propose a novel routing protocol for DTN with efficient message delivery utilizing mobility information such as direction or destination of mobile nodes. And this protocol is enhanced in terms of delivery ratio, decreases latency and overhead compared to the previously proposed solutions. Simulation results prove its superiority.
¡Ø The main body of paper is written in Korean.
- Jinyoung Han, Heedong Jung, Youngbin Im, Jeongkeun Lee, Jiho Ryu, Taekyoung Kwon, and Yanghee Choi, "Performance Evaluation in Combination of Wired and Wireless Mesh Networks," Journal of KIISE: Computing Practices and Letters, Vol. 14, No .8, pp. 778-782, November 2008.
[PDF]
The performance in combination of wired and wireless mesh network which will be a main access network in future internet is directly linked with service quality to users. In this paper, we evaluate variant TCP performance and analyze traffic characteristics on Wireless (Seoul National University Mesh testbed) - Wired (KOREN/Abilene) - Wireless (HP Mesh testbed in the USA) Network. We found that RTT is proper in this network to serve a VoIP service. Also we propose an enhanced TCP protocol which can perform well in both wireless network which has many packet losses and wired network which has high bandwidth and long delay.
¡Ø The main body of paper is written in Korean.
- Jiho Ryu, Hojin Lee, Yongho Seok, Taekyoung Kwon, and Yanghee Choi, "A Hybrid Approach to Arbitrate Tag collisions in RFID systems," Journal of KIISE: Information Networking, Vol. 34, No. 6, pp. 483-492, December 2007.
[PDF]
º» ³í¹®¿¡¼´Â RFID ½Ã½ºÅÛ¿¡¼ Äõ¸® Æ®¸® ±â¹ÝÀÇ ÅÂ±× Ãæµ¹ ÁßÀ縦 À§ÇÑ »õ·Î¿î ÇÁ·ÎÅäÄÝÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈÇÑ ÇÏÀ̺긮µå Äõ¸® Æ®¸® (Hybrid Query Tree) ±â¹ýÀº ÀÌÁø Äõ¸® Æ®¸® ´ë½Å¿¡ 4-ary Äõ¸® Æ®¸®¸¦ ÀÌ¿ëÇÏ¿© ÅÂ±× Ãæµ¹ ¼ö¸¦ ÁÙ¿´À¸¸ç Ãß°¡ÀûÀ¸·Î ¹ß»ýÇÏ´Â À¯ÈÞ ½Ã°£À» ÁÙÀ̱â À§ÇØ slotted ¹é¿ÀÇÁ ±â¹ýÀ» Ȱ¿ëÇÏ¿´´Ù. ½ÇÇè°á°ú ¹× ¼öÇÐÀû ºÐ¼®Àº Á¦¾ÈÇÑ ÇÏÀ̺긮µå Äõ¸® Æ®¸® ÇÁ·ÎÅäÄÝÀÌ ±âÁ¸¿¡ Á¦½ÃµÈ ±â¹ýº¸´Ù ¿ì¼öÇÑ ¼º´ÉÀ» º¸ÀÓÀ» ÀÔÁõÇÑ´Ù.
¡Ø The original paper was written in Korean.
- Nakjung Choi, Hakyoung Jung, Jiho Ryu, Yongho Seok, Yanghee Choi, and Taekyoung Kwon, "TAS: TCP-Aware Sub-layer over IEEE 802.11-based Wireless LANs," Journal of KISS: Information Networking, Vol. 33, No. 5, pp. 355-368, October 2006.
[PDF]
º» ³í¹®Àº IEEE 802.11 ±â¹Ý ¹«¼±·£ ȯ°æ¿¡¼ TCP ¼º´ÉÀ» Çâ»ó½Ã۱â À§ÇÑ »õ·Î¿î ºÐÇÒTCP ±â¹ýÀ» ¼Ò°³ÇÑ´Ù. IEEE 802.11 ±â¹Ý ¹«¼±·£ ȯ°æ¿¡¼´Â À¯¼± ȯ°æ°ú´Â ´Þ¸® TCP µ¥ÀÌŸ È帧(flow)ÀÌ ¸¹Àº µ¥ÀÌŸ¸¦ º¸³»·Á°í ½ÃµµÇÏÁö ¾Ê±â ¶§¹®¿¡ TCP µ¥ÀÌŸ È帧 ¼º´É ÀúÇÏÀÇ ÁÖ¿äÇÑ ¿øÀÎÀÌ µÈ´Ù. º» ³í¹®¿¡¼´Â ÀÌ·± ¹®Á¦¸¦ ¿ÏÈÇÏ¿© TCP µ¥ÀÌŸ È帧ÀÇ ¼º´ÉÀ» Çâ»ó½Ã۱â À§ÇÑ TAS(TCP-Aware Sub-layer) ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. TAS ±â¹ýÀº ÇϳªÀÇ TCP µ¥ÀÌŸ È帧À» AP µîÀÇ ºÐÇÒ ÁöÁ¡À» ±âÁ¡À¸·Î µÎ °³ÀÇ TCP µ¥ÀÌŸ È帧À¸·Î ³ª´©´Â ±âÁ¸ÀÇ ºÐÇÒ ¿¬°á(split-connection) ±â¹ýÀ» È®ÀåÇÑ °³³äÀÌ´Ù. TAS¸¦ ±â¹ÝÀ¸·Î µ¿ÀÛÇÏ´Â ¹«¼± ³ëµå´Â ½ÇÁ¦·Î TCP ACKÀ» ¼ö½ÅÇÏ´Â °ÍÀÌ ¾Æ´Ï¶ó, ¼ö½ÅµÈMAC ACKÀ» ÀÌ¿ëÇÏ¿© TCP ACKÀ» ¿¡¹Ä·¹À̼ÇÇÑ´Ù. NS2 ¸ðÀÇ ½ÇÇèÀ» ÅëÇÏ¿© Á¦¾ÈµÈ ±â¹ýÀÎ TAS ±â¹ýÀÇ ¼º´ÉÀ» ±âÁ¸ TCP ±â¹ý, I-TCP (Indirect TCP) ±â¹ýÀÇ ¼º´É°ú ºñ±³ÇÏ¿´À¸¸ç ¸ðÀÇ ½ÇÇè °á°ú´Â TAS ±â¹ýÀÌ ´Ù¸¥ ±â¹ýµé¿¡ ºñÇÏ¿© ½Ã°£´ç 󸮷®°ú ÀÚ¿ø ÇÒ´çÀÇ ÇüÆò¼º Ãø¸é¿¡¼ ´õ ÁÁÀº ¼º´ÉÀ» º¸Àδٴ °ÍÀ» Áõ¸íÇÑ´Ù. ¶ÇÇÑ ÀýÀü ¸ðµåÀÇ °æ¿ì, Àü¼Û Áö¿¬ ½Ã°£µµ ÁÙÀÏ ¼ö ÀÖ´Ù.
¡Ø The original paper was written in Korean.
- Youngbin Im, Jiho Ryu, Hojin Lee, Taekyoung Kwon, and Yanghee Choi, "A Study on Resource Allocation in Heterogeneous Wireless Networks," in Proc. of Korea Information and Communication Society (KICS) Conference Winter 2011, YongPyong, Korea, February 2011.
[PDF]
- Jiho Ryu, Youngbin Im, Hojin Lee, Taekyoung Kwon, and Yanghee Choi, "MCM: Multiple Connection Management for Exploiting Heterogeneous Wireless Networks," in Proc. of The 14th Conference on Next Generation Communication Software (NCS) 2010, Pyeongchang, Korea, December 2010.
[PDF]
- Jiho Ryu, Taekyoung Kwon, and Yanghee Choi, "FPA: Frame Power Adjustment for MAC performance enhancements," in Proc. of KICS Conference Summer 2009, Jeju Island, June 2009.
[PDF]
- Jinyoung Han, Heedong Jung, Youngbin Im, Jeongkeun Lee, Jiho Ryu, Taekyoung Kwon, and Yanghee Choi, "Performance Evaluation in Combination of Wired and Wireless Mesh Networks," in Proc. of KCC 2008, Phoenix Park, Gangwon-Do, June 2008.
[PDF]
- Dukhyun Chang, Yoonbo Shim, Gilsoo Kim, Nakjung Choi, Jiho Ryu, Taekyoung Kwon, and Yanghee Choi, "MIR: Mobility Information based Routing for Delay and Disruption Tolerant Network," in Proc. of KCC 2008, Phoenix Park, Gangwon-Do, June 2008.
[PDF]
- Youngbin Im, Jiho Ryu, Kunwoo Park, Taekyoung Kwon, Yanghee Choi, Taewan You, and Seungyun Lee, "A study on the L3Shim Implementation for IPv6 Site Multihoming based on Linux Kernel," in Proc. of KICS Conference Fall 2007, Seoul, November 2007.
[PDF]
º» ³í¹®Àº ÇöÀç IETF¿¡¼ Ç¥ÁØÈ°¡ ÁøÇàµÇ°í ÀÖ´Â L3Shim »çÀÌÆ® ¸ÖƼȣ¹Ö ÇÁ·ÎÅäÄÝÀ» ¸®´ª½º Ä¿³Î¿¡ ±¸ÇöÇÏ´Â ¹æ¹ýÀ» ±â¼úÇÑ °ÍÀÌ´Ù. L3ShimÀº ±âÁ¸ È£½ºÆ®¿Í shim-enabled È£½ºÆ® »çÀÌÀÇ Åë½Å ¹× shim-enabled È£½ºÆ®µé³¢¸®ÀÇ Åë½Å¿¡¼ ´Ü¸»½Äº°ÀÚ¿Í À§Ä¡½Äº°ÀÚ¸¦ ±¸ºÐÇÔÀ¸·Î½á ÇöÀç ¸Î¾îÁ® ÀÖ´Â Ä¿³Ø¼ÇÀ» À¯ÁöÇÏ¸é¼ ¸ÖƼȣ¹ÖÀ» Áö¿øÇÏ´Â ÇÁ·ÎÅäÄÝÀÌ´Ù. º» ¿¬±¸ÁøÀº ´Ü¸»µéÀÌ L3ShimÀ» »ç¿ëÇÒ °æ¿ì ÀϾ ¼ö ÀÖ´Â ¼º´ÉÀúÇÏ¿ä¼Ò¸¦ Á¦°ÅÇϱâ À§ÇÏ¿© L3ShimÀÇ ÇÙ½É ºÎºÐÀº ¸ðµâÀÇ ÇüÅ·Π¸®´ª½º Ä¿³Î¿¡ Á÷Á¢ ±¸ÇöÇÏ¿´´Ù. ±×¸®°í L3ShimÀÇ ³ª¸ÓÁö ºÎºÐÀº ÇϳªÀÇ ÀÀ¿ëÇÁ·Î±×·¥À¸·Î ±¸ÇöÇÔ°ú µ¿½Ã¿¡ API¸¦ Á¦°øÇÔÀ¸·Î½á »ç¿ëÀÚ ¶Ç´Â Ÿ °³¹ßÀÚ°¡ Á¢±ÙÇϱ⠽±µµ·Ï ¼³°èÇß´Ù. º» ¿¬±¸¸¦ ÅëÇÏ¿© L3ShimÀº ³·Àº ¿À¹öÇìµå¸¦ °¡Áö°í µ¿ÀÛÇÒ ¼ö ÀÖÀ½À» º¸À̰í Ãß°¡ÀûÀÎ draft ÇüÅ·ΠÁ¸ÀçÇÏ´Â signaling ÇÁ·ÎÅäÄÝÀ» ÅëÇÏ¿© ¿À·ù ÀÚµ¿ °¨Áö ¹× ÀÚµ¿ º¹±¸¿¡ÀÇ È°¿ë °¡´É¼ºÀ» È®ÀÎÇÑ´Ù.
¡Ø The original paper was written in Korean.
- Jiho Ryu, Nakjung Choi, Taekyoung Kwon, Yanghee Choi, and Eunkyoung Paik, "The Mechanism to Bypass Ingress Filtering for Multihomed Mobile Networks," in Proc. of KISS Conference Fall 2006, Seoul, October 2006.
[PDF][PPT]
º» ³í¹®¿¡¼´Â ¸ÖƼȣ¹Ö ¸ð¹ÙÀÏ ³×Æ®¿öÅ©¿¡¼ ¹ß»ýÇÏ´Â ´Ù¾çÇÑ À̽´ Áß Àα׷¹½º ÇÊÅ͸µ(ingress filtering) ¹®Á¦¿¡ ´ëÇÑ ÇØ°áÃ¥À» Á¦½ÃÇϰíÀÚ ÇÑ´Ù. º» ÀúÀÚµéÀº ¸ÕÀú ´Ù¼öÀÇ ¸ð¹ÙÀÏ ¶ó¿ìÅͰ¡ Á¸ÀçÇÏ´Â ¸ð¹ÙÀÏ ³×Æ®¿öÅ© ȯ°æ¿¡¼ ÀÌ¿ô ¸ð¹ÙÀÏ ¶ó¿ìÅÍ »çÀÌ¿¡ 'ÇÁ¸®ÇȽº(prefix) ÀÌ¿ô' °ü°è¸¦ Á¦¾ÈÇÑ´Ù. ±×¸®°í ÀÌ·± °ü°è¸¦ Ȱ¿ëÇÏ¿© ¸ð¹ÙÀÏ ¶ó¿ìÅÍÀÇ ¼ºñ½º¸¦ ¹Þ´Â ´Ü¸»µéÀÌ ÀÚ½ÅÀÇ ÁÖ¼Ò¸¦ º¯°æÇÏÁö ¾Ê°íµµ ÀÌ¿ô ¸ð¹ÙÀÏ ¶ó¿ìÅ͸¦ ÅëÇÏ¿© ¸±·¹ÀÌ ¼ºñ½º¸¦ ¹ÞÀ» ¼ö ÀÖµµ·Ï ÇÏ´Â Àα׷¹½º ÇÊÅ͸µ ¿ìȸ ±â¹ýµµ Á¦¾ÈÇÑ´Ù. ¶ÇÇÑ Á¦¾ÈµÈ ±â¹ýµéÀ» ns-2 ½Ã¹Ä·¹ÀÌÅÍ »ó¿¡¼ ±¸ÇöÇϰí, ¸ðÀÇ ½ÇÇèÀ» ¼öÇàÇÏ¿© Á¦¾ÈµÈ ±â¹ýÀÇ ¼º´É Çâ»óÀ» °ËÁõÇÑ´Ù.
¡Ø The original paper was written in Korean.
- Yongsub Nam, Jiho Ryu, Nakjung Choi, Taekyoung Kwon, and Yanghee Choi, "Contention-based Multi-Polling Mechanism for Wireless LANs Using Bitmap," in Proc. of KICS Conference Summer 2006, Jeju Island, July 2006.
[PDF] [PPT]
IEEE 802.11 ¹«¼± ·£ÀÇ DCF ±â¹ýÀº backoff ·Î ÀÎÇÑ Ã¤³Î À¯ÈÞ ½Ã°£°ú Ãæµ¹·Î ÀÎÇØ ½ÇÁ¦ °¡´ÉÇÑ ¸µÅ© ´ë¿ªÆø ¿¡ ¸ø ¹ÌÄ¡´Â È¿À²À» º¸ÀδÙ. ÀÌÀÇ ´ë¾ÈÀ¸·Î Æú¸µ ±â¹ýÀ» °í·ÁÇÒ ¼ö ÀÖÀ¸³ª, ±âÁ¸ÀÇ Æú¸µ ±â¹ýÀº °³°³ÀÇ ´Ü¸»À» Æú¸µÇØ¾ß Çϰí, ¶ÇÇÑ º¸³¾ ÇÁ·¹ÀÓÀÌ ¾ø´Â ´Ü¸»¿¡°Ôµµ Æú¸µÀ» ¼öÇàÇÏ°Ô µÇ¾î ä³ÎÀ» ³¶ºñÇÏ°Ô µÈ´Ù. º» ³í¹®Àº ¹«¼± ·£ÀÇ ¼º´ÉÀ» ³ôÀ̱â À§ÇØ ºñÆ®¸ÊÀ» ÀÌ¿ëÇÑ °æÀï ±â¹Ý ´ÙÁß Æú¸µ ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. ¾×¼¼½º Æ÷ÀÎÆ®°¡ ÁÖ±âÀûÀ¸·Î Àü¼Û ¼ø¼¸¦ ±â·ÏÇÑ ºñÆ®¸ÊÀ» ºê·Îµåij½ºÆ®Çϸç, À̸¦ ¼Û½ÅÇÑ ¼ºñ½º Áö¿ª ³»ÀÇ ¸ðµç ´Ü¸»ÀÌ ÀÚ½ÅÀÇ Àü¼Û ¼ø¼¸¦ À¯ÃßÇÑ´Ù. Àü¼Û ¼ø¼°¡ °áÁ¤µÇ¾î ÀÖÀ¸¹Ç·Î Ãæµ¹À̳ª backoff ·Î ÀÎÇÑ Ã¤³Î ³¶ºñ°¡ ¹ß»ýÇÏÁö ¾Ê¾Æ ä³ÎÀ» È¿À²ÀûÀ¸·Î »ç¿ëÇÑ´Ù. ¶ÇÇÑ, ÇϳªÀÇ ÇÁ·¹ÀÓÀ¸·Î BSS ³»ÀÇ ¸ðµç ´Ü¸»À» Æú¸µÇϸç, ûũ ±â¹ÝÀ¸·Î Æú¸µ ¸ñ·ÏÀ» Àü¼ÛÇϹǷΠÆú¸µ ¿À¹öÇìµå ¿ª½Ã °¨¼ÒÇÑ´Ù. ¸ðÀÇ ½ÇÇèÀ» ÅëÇÑ ¼º´É Æò°¡ °á°ú´Â Á¦¾È ±â¹ýÀÇ ¿ì¼öÇÑ ¼º´ÉÀ» ÀÔÁõÇÑ´Ù.
¡Ø The original paper was written in Korean.
- Yongsub Nam, Nakjung Choi, Jiho Ryu, Taekyoung Kwon, and Yanghee Choi, "Dynamic Multi-Rate Routing Sub-Layer for Mobile Ad hoc Networks," in Proc. of KCC 2006, Yongpyong, June 2006.
[PDF][PPT]
IEEE 802.11 Ç¥ÁØÀº ä³Î »óÅ¿¡ µû¶ó ´Ù¾çÇÑ Àü¼Û ¼Óµµ¸¦ Áö¿øÇϸç, ¹«¼±·£ ȯ°æ¿¡¼ ÀÌ·¯ÇÑ Æ¯¼ºÀ» Ȱ¿ëÇÏ´Â ¿¬±¸µéÀÌ ÁøÇàµÇ¾î ¿Ô´Ù. ±×·¯³ª, ¸ð¹ÙÀÏ ¾Öµå Ȥ ³×Æ®¿öÅ© ȯ°æ¿¡¼ ´ÙÁßÀü¼Û¼Óµµ¸¦ Ȱ¿ëÇÏ´Â ¿¬±¸´Â °ÅÀÇ ÀÌ·ç¾îÁöÁö ¾Ê¾Ò´Ù. º» ³í¹®Àº ¸ð¹ÙÀÏ ¾Öµå Ȥ ³×Æ®¿öÅ©¿¡¼ µ¿ÀûÀ¸·Î ´ÙÁßÀü¼Û¼Óµµ¸¦ Ȱ¿ëÇÏ¿© ä³Î È¿À²À» ³ôÀÌ´Â ¾Ë°í¸®ÁòÀ» Á¦¾ÈÇÑ´Ù. Á¦¾È ±â¹ýÀº MAC °èÃþ°ú ³×Æ®¿öÅ© °èÃþ Áß°£¿¡ À§Ä¡ÇÏ¸ç °¢ °èÃþ¿¡ µ¶¸³ÀûÀ¸·Î µ¿ÀÛÇÑ´Ù. ¶ó¿ìÆÃ ÇÁ·ÎÅäÄÝ¿¡¼ °áÁ¤ÇÑ ´ÙÀ½ È©¿¡ ´õºÒ¾î, Á¦¾È ±â¹ýÀº ´õ ºü¸¥ Àü¼Û ¼Óµµ¸¦ °®´Â Áß°è °æ·Î¸¦ Ž»öÇÑ´Ù. ¶ÇÇÑ, ÆÐŶÀÇ Å©±â¿¡ µû¶ó °æÀï ºÎÇϸ¦ °í·ÁÇÏ¿© ¼±ÅÃÀûÀ¸·Î Àü¼Û °æ·Î¸¦ º¯°æÇÑ´Ù. ¸ðÀÇ ½ÇÇèÀ» ÅëÇÑ ¼º´É Æò°¡´Â Á¦¾È ±â¹ýÀÇ ¿ì¼öÇÑ ¼º´ÉÀ» ÀÔÁõÇÑ´Ù.
¡Ø The original paper was written in Korean.
- Yongsub Nam, Jiho Ryu, Taekyoung Kwon, and Yanghee Choi, "Optimal topology in Wireless Mesh Networks Using Genetic Algorithm," in Proc. of KISS Conference Fall 2005, Seoul, November 2005.
[PDF]
¹«¼± ¸Å½¬ ³×Æ®¿öÅ©¿¡¼ÀÇ ¾×¼¼½º Æ÷ÀÎÆ®ÀÇ ¹èÄ¡´Â ¿¹»ó °¡ÀÔÀÚÀÇ À§Ä¡¿Í ¼ºñ½º °ø±ÞÀÚÀÇ À§Ä¡, ¾×¼¼½º Æ÷ÀÎÆ®ÀÇ ¼ö¸¦ ¸ðµÎ °í·ÁÇØ¾ß ÇÏ´Â NP-complete ¹®Á¦À̳ª, È¿À²°ú ºñ¿ëÀÇ Ãø¸é¿¡¼ °£°úÇÒ ¼ö ¾ø´Â ¸Å¿ì Áß¿äÇÑ ¹®Á¦ÀÌ´Ù. º» ¿¬±¸¿¡¼´Â ´ë±Ô¸ð ¸Å½¬ ³×Æ®¿öÅ©ÀÇ È¿À²ÀûÀÎ ¹èÄ¡¸¦ À§ÇØ, À¯Àü ¾Ë°í¸®ÁòÀ» »ç¿ëÇÏ¿© ÃÖ¼ÒÇÑÀÇ ¾×¼¼½º Æ÷ÀÎÆ®¸¦ »ç¿ëÇÏ¿© ÃÖ´ëÇÑÀÇ °¡ÀÔÀÚ¸¦ ¼ö¿ëÇÒ ¼ö ÀÖ´Â ¹«¼± ¸Þ½¬ ³×Æ®¿öÅ©ÀÇ ¹èÄ¡ ¹æ¾ÈÀ» ¸ð»öÇÑ´Ù. ±¸ÇöÀ» ÅëÇÑ ¼º´ÉÆò°¡ °á°ú¿Í ¼öÄ¡Àû ºÐ¼®Àº º» ¹®Á¦ °ø°£¿¡¼ÀÇ À¯Àü ¾Ë°í¸®ÁòÀÇ È¿¿ë¼ºÀ» ÀÔÁõÇÑ´Ù.
¡Ø The original paper was written in Korean.
- Jiho Ryu, Nakjung Choi, Yongho Seok, Taekyoung Kwon, and Yanghee Choi, "Improving TCP Uploading Throughput in IEEE 802.11 Wireless LANs," in Proc. of KICS Conference Summer 2005, Yongpyong, June/July 2005.
[PDF][PPT]
ÃÖ±Ù À¯ºñÄûÅͽº ³×Æ®¿öÅ©¸¦ Áö¿øÇϱâ À§ÇÑ ´Ù¾çÇÑ ¹«¼± ³×Æ®¿öÅ· ±â¼úÀÌ µîÀåÇÏ¿´°í, ±× Áß ¹«¼±·£Àº ½¬¿î ¼³Ä¡¿Í °ª½Ñ ºñ¿ëÀ¸·Î ÀÎÇÏ¿© °¡Àå ¼º°øÀûÀÎ ±â¼ú·Î ¾Ë·ÁÁ® ÀÖ´Ù. ±×·¯³ª Á¡Â÷ »ç¿ëÀÚ°¡ ´Ã¾î³²¿¡ µû¶ó ´õ ¸¹Àº »ç¿ëÀÚ, ´õ ³ªÀº ¼ºñ½º¸¦ Á¦°øÇϱâ À§ÇÑ È¿À²ÀûÀÎ AP ¹èÄ¡¿Í ¹«¼±·£ÀÇ ¼º´É Çâ»ó ±â¹ýÀÌ Áß¿äÇØÁö°íÀÖ´Ù. ƯÈ÷³ª ±âÁ¸ÀÇ ÀÀ¿ë ÇÁ·Î±×·¥ ´ëºÎºÐÀÌ TCP ±â¹ÝÀ¸·Î µ¿ÀÛÇÑ´Ù´Â Á¡À» °¨¾ÈÇϸé, ¹«¼±·£¿¡¼ TCP ¿¬°áÀÇ ¼º´É Çâ»óÀº °¡Àå Áß¿äÇÑ À̽´ Áß¿¡ Çϳª·Î ºÎ°¢µÇ°í ÀÖ´Ù. º» ³í¹®¿¡¼´Â IEEE 802.11 ±â¹Ý ¹«¼±·£¿¡¼ TCP ¼º´É Çâ»ó¿¡ ´ëÇÑ ±âÁ¸ ¿¬±¸ÀÇ ¹®Á¦Á¡À» ÁöÀûÇϰí, ÃÖÀûÀÇ ³×Æ®¿öÅ© ¼º´ÉÀ» ´Þ¼ºÇϱâ À§ÇÑ ¾Ë°í¸®ÁòÀ» Á¦½ÃÇÑ´Ù. ¶ÇÇÑ ½ÇÇèÀ» ÅëÇÏ¿© Á¦¾ÈµÈ ¾Ë°í¸®ÁòÀÌ ±âÁ¸ÀÇ IEEE 802.11 DCF º¸´Ù ¿ì¼öÇÑ ¼º´ÉÀ» º¸ÀÓÀ» Áõ¸íÇÑ´Ù.
¡Ø The original paper was written in Korean.