• Title/Summary/Keyword: Broadcasting protocol

Search Result 492, Processing Time 0.024 seconds

Incremental Cooperative Transmission of Bidirectional Relaying Schemes in Underlay Cognitive Radio (언더레이 인지기술에서 양방향 릴레이 증분 협력 전송에 관한 연구)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.47-53
    • /
    • 2013
  • In this paper, we propose an incremental cooperative transmission protocol in two-way underlay cognitive radio networks. In the proposed protocol, two secondary sources attempt to transmit their packet to each other with help of a secondary relay under interference constraint. For performance evaluation, we derive exact closed-form expressions of average outage probability over Rayleigh fading channel. Then, we perform Monte Carlo simulations to verify the derivations. Results present that the simulation and theoretical results are in good agreement and the outage performance of the proposed protocol is better than that of two-way direct transmission protocol.

Cooperative Relaying Protocol using Fountain Codes under Interference Constraint Networks (간섭 제약 네트워크에서 파운틴 코드를 사용한 협동 릴레이 프로토콜 설계)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.39-45
    • /
    • 2013
  • In this paper, we propose a cooperative relaying protocol using Fountain codes for secondary network under interference constraint. In the proposed protocol, a secondary source uses Fountain codes to transmit its message to a secondary destination with help of a secondary relay. The secondary source and relay operate in the underlay model, in which they must adapt their transmit power so that the interference caused at a primary user is lower than an allowable threshold. To evaluate performance of the proposed protocol, we derive the expressions of average number of transmission times over Rayleigh fading channel. Various Monte-Carlo simulations are presented to verify the derivations.

Relay Protocol applied to Optimal Power Allocation (최적의 전력 분배 방안이 적용된 중계기 프로토콜)

  • Kim, Tae-Wook;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.93-97
    • /
    • 2015
  • In this Paper, we proposed optimization of system performance, optimal splitting factor applied to power splitting protocol with relay in the cooperative communication undergo co-channel interference. We can possible to optimize and maximize the channel capacity of the receiver through optimal factor of splitting protocol. So, we can solve inability in system, and to increase the efficiency of the network. Finally, performance of the proposed protocol is analyzed in terms of outage probability, capacity of system.

Decode and Forward Protocol applied to Optimal Power Allocation (최적의 전력 분배 방안이 적용된 복호 후 전송 프로토콜)

  • Kim, Tae-Wook;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.87-92
    • /
    • 2015
  • In this Paper, we proposed optimization of system performance, optimal splitting factor ${\alpha}$ applied to power splitting protocol with relay protocol with decode and forward undergo co-channel interference. We can possible to optimize and maximize the channel capacity of the receive performance and the efficiency of the network through optimal factor of splitting protocol. We verified BER performance and Channel capacity and Outage probability for the proposed scheme over Rayleigh fading through Monte-Carlo simulation.

Research on Performance Improvement for Wireless CCN (무선 CCN을 위한 성능향상에 대한 연구)

  • Lee, Seung-Jin;Bae, Hong-Min;Kim, Byung-Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.71-76
    • /
    • 2015
  • To resolve inefficient content delivery mechanism in conventional internet-based networks, Content-Centric Networks (CCN) has been proposed for wired and wireless networks. One of issues in wireless CCN-based networks is overhead to achieve reliability on content delivery because CCN uses end-to-end two-way handshake with Interest/content packets. In this paper, a novel protocol to reduce overhead and achieve reliability is proposed. The protocol allows Interest packet to request multiple data packets and multiple data packets to be sent in a row without a Interest packets. The protocol is evaluated through the simulations and the performance improvement is proved.

A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET

  • Lee, ByungKwan;Jeong, EunHee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1467-1480
    • /
    • 2016
  • This paper proposes "A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET." It consists of the Mutual Authentication Scheme (MAS) that processes a Mutual Authentication by transferring messages among a Gateway Node, a Sensor Node, and a User Node and the Black Hole Detection Protocol (BHDP) which detects a Non-Authentication Node by using the Session Key computed in the MAS and a Black Hole by using the Broadcasting Table. Therefore, the MAS can reduce the operation count of hash functions more than the existing scheme and protect a privacy from an eavesdropping attack and an information exposure by hashing a nonce and user's ID and password. In addition, the MAS prevents a replay attack by using the randomly generated nonce and the time stamp. The BHDP improves Packet Delivery ratio and Throughput more than the AODV with Black hole by 4.79% and 38.28Kbps. Also, it improves Packet Delivery ratio and Throughput more than the IDSAODV by 1.53% and 10.45Kbps. Hence it makes VANET more safe and reliable.

Performance Comparison of Mobile Ad Hoc Multicast Routing Protocols (모바일 애드 혹 멀티캐스트 라우팅 프로토콜 성능분석)

  • Lee, Joo-Han;Cho, Jin-Woong;Lee, Jang-Yeon;Lee, Hyeon-Seok;Park, Sung-Kwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.173-179
    • /
    • 2008
  • An ad hoc network is multi-hop wireledss formed by mobile node without infrastructure. Due to the mobility of nodes in mobile ad hoc networks, the topology of network changes frequently. In this environments, multicast protocols are faced with the challenge of producing multi-hop routes and limitation of bandwidth. We compare the performance of two multicast routing protocols for mobile ad hoc networks - Serial Multiple Disjoint Tree Multicast Routing Protocol (Serial MDTMR) and Adaptive Core Multicast Routing Protocol (ACMRP). The simulator is implemented with GloMoSim.

  • PDF

A Fast Universal Video Distribution Protocol For Video-On-Demand Systems (주문형 비디오 시스템을 위한 빠른 광범위한 비디오 배포 기법)

  • Kwon Hyeok Min
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.803-812
    • /
    • 2004
  • The performance of video-on-demand(VOD) systems is known to be mainly dependent on a scheduling mechanism which they employ. Broadcast-based scheduling schemes have attracted a lot of attention as an efficient way of distributing popular videos to very large client populations. The main motivations of broadcasting scheduling mechanisms are that they scale up extremely well and they have very modest bandwidth requirements. This paper studies this issue and proposes a new broadcasting scheduling mechanism, named fast universal video dis-tribution(FUVD). FUVD scheme dynamically constructs a video broadcasting schedule in response to client requests, and broadcasts video seg-ments according to this schedule. This paper also evaluates the performance of FUVD on the basis of a simulation approach. The simulation results indicate that FUVD protocol shows a superior performance over UD, CBHD, and NPB in terms of the average response time.

통신방송융합 시장의 경쟁전망과 최적경쟁정책 : 한국 IPTV사례를 중심으로

  • 최종일;황준석;고대영
    • Proceedings of the Technology Innovation Conference
    • /
    • 2006.02a
    • /
    • pp.248-263
    • /
    • 2006
  • The convergence in telecommunication and broadcasting is one of the most popular topics in these days. For example, the characteristic of IPTV -internet protocol television-is controversial in the extreme. In Korea the IPTV operators are mainly the telecommunication service operators. So it is natural that the IPTV services are categorized to the telecommunication services. But the Broadcasting service providers, especially the CATV providers who can serve the TPS-triple play service- like IPTV players insist that the IPTV should be regulated as a broadcasting service. This paper will analyze whether the regulation in which the IPTV is categorized to one of the broadcasting services is better than the case of telecommunication services. To examine this, the social welfare analysis is conduced and the differential oligopoly market model is used. Together with that, this paper suggests that we can improve the social welfare by the asymmetric regulation between IPTV and D-CA TV. This means that in Korea the IPTV has a weak substitution relation with the D-CA TV and the IPTV should be dealed as a new convergence service that differs from traditional broadcasting services.

  • PDF

Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm (AES 암호 알고리듬 기반 보안성이 강화된 RFID 인증 프로토콜 설계)

  • Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.83-89
    • /
    • 2012
  • This paper proposes the design of a security-enhanced RFID authentication protocol which meets the privacy protection for tag bearers. The protocol which uses AES(Advanced Encryption Standard) cipher algorithm is based on a three-way challenge response authentication scheme. In addition, three different types of protocol packet formats are also presented by extending the ISO/IEC 18000-3 standard for realizing the security-enhanced authentication mechanism in RFID system environment. Through the comparison of security, it was shown that the proposed scheme has better performance in user data confidentiality, Man-in-the-middle replay attack, and replay attack, and forgery resistance, compared with conventional some protocols. In order to validate the proposed protocol, a digital Codec of RFID tag is also designed based on the protocol. This Codec has been described in Verilog HDL and also synthesized using Xilinx Virtex XCV400E device.