• Title/Summary/Keyword: 링크기반방식

Search Result 391, Processing Time 0.025 seconds

A Grouping Technique for Synchronous Digital Duplexing Systems (동기식 디지털 이중화 시스템을 위한 그룹핑 기법)

  • Ko, Yo-Han;Park, Chang-Hwan;Park, Kyung-Won;Jeon, Won-Gi;Paik, Jong-Ho;Lee, Seok-Pil;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4C
    • /
    • pp.341-348
    • /
    • 2009
  • In this paper, we propose a grouping technique for the SDD(Synchronous Digital Duplexing) based on OFDMA(Orthogonal Frequency Division Multiple Access). The SDD has advantages of increasing data efficiency and flexibility of resource since SDD can transmit uplink signals and downlink signals simultaneously by using mutual time information and mutual channel information, obtained during mutual ranging process. However, the SDD has a disadvantage of requiring additional CS to maintain orthogonality of OFDMA symbols when the sum of mutual time difference and mutual channel length between AP(access point) and SS(subscriber station) or among SSs are larger than CP length. In order to minimize the length of CS for the case of requiring additional CS in SDD, we proposes a grouping technique which controls transmit timing and receive timing of AP and SS in a cell by classifying them into groups. Performances of the proposed grouping technique are evaluated by computer simulation.

Ranging Performance Enhancement by Successive Interference Cancellation in Multiuser M-WiMAX System (다중 사용자 M-WiMAX 시스템에서 직렬 간섭 제거를 이용한 레인징 성능 향상 기법)

  • Kim, Jong-Hun;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12A
    • /
    • pp.998-1005
    • /
    • 2009
  • In the uplink of OFDMA (Orthogonal Frequency Division Multiple Access) based M-WiMAX(Mobile-Worldwide Interoperability for Microwave Access) system, linear phase shift is caused by signals transmitted from multiuser with different delay time and thus, MAI (Multiple Access Interference) occurs. MAI degrades the performance of ranging code detection and delay time estimation in the uplink. Therefore, in this paper, we propose ranging algorithm, applying SIC (Successive Interference Cancellation) to the conventional ranging algorithm, to minimize MAI and to improve ranging performance. The proposed ranging algorithm is verified through the Monte Carlo simulation, which shows the improved performance of ranging code detection and delay time estimation compared to the conventional algorithms. Through compared with random access of the 3GPP LTE, we can know limit of ranging performance.

Performance Analysis of Rotation-lock Differential Precoding Scheme (회전로크 구조의 차분 선부호화 기법의 성능 분석)

  • Kim, Young Ju
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.9-16
    • /
    • 2013
  • Long term evolution (LTE) and LTE-Advanced (LTE-A) systems adopt closed-loop multiple-input multiple-output antenna techniques. Equal gain transmission which has equal gain property is the key factor in their codebook design. In this paper, a novel differential codebook structure which maintains the codebook design requirements of LTE or LTE-A systems. Especially, eight-phase shift keying (8-PSK) constellations are used as elements of codewords, which not only maintain equal gain property but also reduce the computation complexity of precoding and decoding function blocks. The equal gain property is very important to uplink because the performance of uplink is very sensitive to the peak-to-average power ratio (PAPR). Moreover, the operation of the proposed differential codebook is explained as a rotation-lock structure. As the results of computer simulations, the steady-state throughput performance of the proposed codebook shows at least 0.9dB of SNR better than those of the conventional LTE codebook with the same amount of feedback information.

A Vehicle Communication Routing Algorithm Considering Road Characteristics and 2-Hop Neighbors in Urban Areas (도심 환경에서 도로의 특성과 2-홉 이웃 노드를 고려한 차량 통신 라우팅 알고리즘)

  • Ryu, Min-Woo;Cha, Si-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.464-470
    • /
    • 2011
  • V2V (Vehicle-to-Vehicle) is a special kind of VANET (Vehicular Ad-hoc Network), which has high mobility and frequent topology changes and causes the link breakage problem. To resolve this problem, geographic routing protocols such as greedy forwarding are proposed. However, the greedy forwarding approach selects the node closest to the destination node as the transfer node within the transmission range so that it may cause many problems owing to many intersections and many changes in vehicular traffic in urban areas. The paper proposes a greedy perimeter urban routing (GPUR) algorithm considering the presence of 2-hop neighbor nodes and the road characteristics. Simulation results using ns-2 reveal that the proposed GPUR algorithm significantly reduces the routing error problem and the probability of local maximum than the existing routing protocols.

A User Detection Technique Based on Parallel Orthogonal Matching Pursuit for Large-Scale Random Access Networks (대규모 랜덤 액세스 네트워크에서 병렬 직교매칭퍼슛 기술을 이용한 사용자 검출 기법)

  • Park, Jeonghong;Jung, Bang Chul;Kim, Jinwoo;Kim, Jeong-Pil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1313-1320
    • /
    • 2015
  • In this paper, we propose a user detection technique based on parallel orthogonal matching pursuit (POMP) for uplink multi-user random access networks (RANs) with a number of users and receiver antennas. In general RANs, it is difficult to estimate the number of users simultaneously transmitting packets at the receiver because users with data send the data without grant of BS. In this paper, therefore, we modify the original POMP for the RAN and evaluate its performances through extensive computer simulations. Simulation results show that the proposed POMP can effectively detect activated users more than about 2%~8% compared with the conventional OMP in RANs.

Link-E-Param : A URL Parameter Encryption Technique for Improving Web Application Security (Link-E-Param : 웹 애플리케이션 보안 강화를 위한 URL 파라미터 암호화 기법)

  • Lim, Deok-Byung;Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1073-1081
    • /
    • 2011
  • An URL parameter can hold some information that is confidential or vulnerable to illegitimate tampering. We propose Link-E-Param(Link with Encrypted Parameters) to protect the whole URL parameter names as well as their values. Unlike other techniques concealing only some of the URL parameters, it will successfully discourage attacks based on URL analysis to steal secret information on the Web sites. We implement Link-E-Param in the form of a servlet filter to be deployed on any Java Web server by simply copying a jar file and setting a few configuration values. Thus it can be used for any existing Web application without modifying the application. It also supports numerous encryption algorithms to choose from. Experiments show that our implementation induces only 2~3% increase in user response time due to encryption and decryption, which is deemed acceptable.

PCISS Scheme for Minimize Prove Delay in Wireless Mesh Networks (무선 메쉬 네트워크 환경에서 프로브 지연을 최소화한 PCISS 기법)

  • Cho, Young-Bok;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.25-31
    • /
    • 2012
  • Recently Wireless Communication technologies are widely used in Small And Medium Business fields. Wireless mesh networks have been studied as the next generation technology to solve problem of conventional wireless networks. Wireless mesh network uses a 802.11 when make up of network. mesh clients occurs Hard handover moving between ones. This increases the handover latency of the network mobility is a very great issues. Consequently, this paper propose a channel information previously methods to reduce the handover latency selective channels. Proposed scheme accounts for more than 90% of the probe delay to minimize the client had to move the mesh based on the old channel to retrieve information. Through simulation, the proposed scheme had shorter handover delay time than transitional full scan and selective scan. Through results of evaluation, the suggest PCISS scheme more fast 6.5% than transitional scheme.

  • PDF

An effegive round-robin packet transmit scheduling scheme based on quality of service delay requirements (지연 서비스품질 요구사항을 고려한 효과적인 라운드 로빈 패킷 전송 스케쥴링 기법)

  • 유상조;박수열;김휘용;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.10
    • /
    • pp.2191-2204
    • /
    • 1997
  • An efficient packet transmit scheduling algorithm should be able to allocate the resource to each connection fairly based on the bandwidth and quality of service requirements negotiated during the call admission procedure and it should be able to isolate the effects of users that are behaving badly. In this paper, we propose an effective round-robin packet transmit scheduling mechanism, which we call the delay tolerant packet reserving scheme (DTPRS) based on delay QoS requirments. The proposed scheme can not only provide fairness and but also reduce delay, delay variation, and packet loss rate by reserving output link time slots of delay tolerant packets and assigning the reserved slotsto delay urgent packets. Our scheme is applicable to high speed networks including ATM network because it only requires O(1) work to process a packet, and is simple enough to implement.

  • PDF

An One-To-One K-Shortest Path Algorithm Considering Vine Travel Pattern (덩굴망 통행패턴을 고려한 One-To-One 다경로알고리즘)

  • Lee, Mee-Young;Yu, Ki-Yun;Kim, Jeong-Hyun;Shin, Seong-Il
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.6
    • /
    • pp.89-99
    • /
    • 2003
  • Considering a path represented by a sequence of link numbers in a network, the vine is differentiated from the loop in a sense that any link number can be appeared in the path only once, while more than once in the loop. The vine provides a proper idea how to account for complicated travel patterns such as U-turn and P-turn witnessed nearby intersections in urban roads. This paper proposes a new algorithm in which the vine travel pattern can be considered for finding K number of sequential paths. The main idea of this paper is achieved by replacing the node label of the existing Yen's algorithm by the link label technique. The case studies show that the algorithm properly represent the vine travel patterns in searching K number of paths. A noticeable result is that the algorithm may be a promising alternative for ITS deployment by enabling to provide reasonable route information including perceived traveler costs.

Traffic Delay Guarantee using Deterministic Service in Multimedia Communication (멀티미디어 통신에서 결정론적 서비스를 이용한 트래픽 지연 보장)

  • 박종선;오수열
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.101-114
    • /
    • 2002
  • The real multimedia application in wide area communication needs the guaranteed performance of communication service. Therefore, the resource is reserved at the moment of traffic burst and the region of connection admission possibility is widened at the basis of maximum cell rate. This of study shows that the end-to-end traffic delay to the traffic of burst state is guaranteed when the total of maximum transmission rate is higher than link speed by using the region of deterministic delay. The network load rate of connection admission can be improved by the inducement of delay bounds consideration each traffic characteristic to guarantee the end-to-end delay of network from single switch. This suggested buffering system using deterministic service do not give any influence to service quality and can guarantee the bounds of end-to-end delay. And it can also reduce the load of network even if the delay is increased according to the burst traffic characteristic. The above suggested system can be applied effectively to the various kinds of general network specification which admit both real time trafnc service and non-real time traffic service.

  • PDF