• Title/Summary/Keyword: Cooperative protocol

Search Result 222, Processing Time 0.022 seconds

A MAC Protocol for Link Maintenance in Multichannel Cognitive Radio Ad Hoc Networks

  • Li, Jingye;Luo, Tao;Gao, Jing;Yue, Guangxin
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.172-183
    • /
    • 2015
  • To provide an efficient link maintenance approach, we propose a cross layer medium access control (LM-MAC) protocol for multichannel cognitive radio ad hoc networks. Link establishment and reliable transmission are two key problems for a perfect link maintenance mechanism. Since the cognitive user (CU) pairs have to reestablish their links each frame, in the proposed MAC protocol, three different access modes are designed to guarantee transmission efficiency in continuous frames. To enhance the transmission reliability, each CU will create a father spectrum list (FSL) after joining in the network. FSL is divided into three groups of sub-channels with different functions to compensate the packet loss caused by the primary users' appearance and the deep fading. Meanwhile, since the transmitter and the receiver will share the same FSL, periodical cooperative sensing is adopted to further optimize the former problem. Finally, compared with the existing opportunistic multichannel (OMC)-MAC protocol, the proposed LM-MAC protocol achieves better system performance in terms of saturation throughput, continuity and access delay.

Performance evaluation of cooperative MAC protocol at ad hoc networks under real traffic environments (실제적인 트래픽 환경에서 애드 혹 네트워크용 협력통신 MAC 프로토콜 성능평가)

  • Jang, Jae-Shin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2237-2246
    • /
    • 2010
  • In this paper, the performance of a RCO-MAC protocol is evaluated using a different traffic model. Data frames are assumed to generate based on an exponential distribution from one source node and then directly to be stored into the input buffer in the source node. System throughput, average access delay and average system delay are used as a performance measure. Performance evaluation is carried out by the computer simulation. Numerical results show that the RCO-MAC scheme offers 18% higher system throughput than the rDCF scheme. In addition, the numerical results show that the RCO-MAC protocol also offers the better average system delay under any traffic load than that by the rDCF scheme, which was not obtained in the previous research due to the saturated traffic model.

Adaptive Cooperative Relay Transmission Technique Using Closed-loop MIMO Scheme for Duplex Communication System (양방향 통신 시스템에서 폐회로 다중 안테나 기법을 적용한 적응형 협동 중계 전송 기술)

  • Lee, Kwan-Seob;Kim, Young-Ju
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.157-162
    • /
    • 2010
  • In this paper, We propose that the adaptive cooperative relay transmission technique using closed-loop MIMO scheme for duplex communication system. As the mobility between relay and base station is little, closed-loop MIMO is better diversity gain than open-loop MIMO. At this time, more than one relaying terminals are included in one cooperative group to share their transmission and take precoding weight feedback. For minimization of throughput reduction caused by increasing feedback bits, we use codebook-based MRT that limit the number of feedback bits. Among the cooperative relay group, the best relays are selected from the base stataion and get the feedback. A protocol senarios are also proposed for this relay system.

Analysis of VANET Authentication Protocol using Casper in the Formal Verification (정형검증 도구인 Casper를 이용한 VANET 인증 프로토콜 분석)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehiculars sho uld be able to authenticate each other to securely communicate with network-based infrastructure, and their location s and identifiers should not be exposed from the communication messages. This paper explains V2I authentication pr otocol using a hash function that preserves the user privacy. In addition, we analyze the security stability of the V2I authentication protocol using Casper in the formal verification technique. As a result, V2I authentication protocol us ing hash function prove a stability.

Decode and Forward Protocol applied to Optimal Power Allocation (최적의 전력 분배 방안이 적용된 복호 후 전송 프로토콜)

  • Kim, Tae-Wook;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.87-92
    • /
    • 2015
  • In this Paper, we proposed optimization of system performance, optimal splitting factor ${\alpha}$ applied to power splitting protocol with relay protocol with decode and forward undergo co-channel interference. We can possible to optimize and maximize the channel capacity of the receive performance and the efficiency of the network through optimal factor of splitting protocol. We verified BER performance and Channel capacity and Outage probability for the proposed scheme over Rayleigh fading through Monte-Carlo simulation.

A Direction-Adaptive Watermarking Technique Based on 2DCT in the Buyer-Seller Watermarking Protocol (구매자-판매자 워터마킹 프로토콜상에서 DCT 기반의 방향성 적응 워터마킹)

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.778-786
    • /
    • 2014
  • Buyer-seller watermarking protocol is one of the copyright protection techniques which combine a cryptographic protocol used in electronic commerce with a digital wetermarking scheme aiming at proving the ownership of multimedia contents and preventing the illegal reproduction and redistribution of digital contents. In this paper, it is proposed a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework. In order to implement watermarking scheme in a public-key cryptosystem, it is divided that frequency coefficients exist as real number into integer and decimal layer. And the decimal layer is modified integer type through integral-processing. Also, for robustness and invisibility required in watermarking scheme, it is designed a direction-adaptive watermarking scheme based on locally edge-properties of each block in an image through analyzing distribution property of the frequency coefficients in a block using JND threshold.

Emphasizing Intelligent Event Processing Cooperative Surveillance System (지능형 사건 처리를 강조한 협업 감시 시스템)

  • Yoon, Tae-Ho;Song, Yoo-Seoung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.6
    • /
    • pp.339-343
    • /
    • 2012
  • Security and monitoring system has many applications and commonly used for detection, warning, alarm, etc. As the networking technology advances, user requirements are getting higher. An intelligent and cooperative surveillance system is proposed to meet current user demands and improve the performance. This paper focuses on the implementation issue for the embedded intelligent surveillance system. To cover wide area cooperative function is implemented and connected by wireless sensor network technology. Also to improve the performance lots of sensors are employed into the surveillance system to reduce the error but improve the detection probability. The proposed surveillance system is composed of vision sensor (camera), mic array sensor, PIR sensor, etc. Between the sensors, data is transferred by IEEE 802.11s or Zigbee protocol. We deployed a private network for the sensors and multiple gateways for better data throughput. The developed system is targeted to the traffic accident detection and alarm. However, its application can be easily changed to others by just changing software algorithm in a DSP chip.

Cooperative Frame Aggregation in IEEE 802.11n Wireless Networks (IEEE 802.11n 무선 네트워크에서의 협력적 프레임 집약 기법)

  • Song, Tae-Won;Pack, Sang-Heon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.485-490
    • /
    • 2010
  • IEEE 802.11n supports two frame aggregation schemes, aggregation for MAC service data unit (A-MSDU) and aggregation for MAC protocol data unit (A-MPDU), to improve throughput at the MAC layer. In this paper, we propose a cooperative frame aggregation (CoFA), which can recover erroneous frames in a cooperative manner based on A-MPDU. Specifically, CoFA receive multiple frames from direct and relay paths, and combined multiple frames jointly. Numerical results show that CoFA outperforms direct transmission and relay transmission over diverse channel conditions.

Performance Analysis of Hybrid ARQ-II Protocol for Cooperative Communication in Wireless Channel (무선 채널의 협업 통신을 위한 Hybrid ARQ-II 프로토콜 성능 분석)

  • Park, In-Hye;Lee, Sung-Hun;Lee, Hyung-Keun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.6
    • /
    • pp.73-81
    • /
    • 2009
  • Wireless media communication has lower robustness and stability than wired communication because of narrow bandwidth and unstable channel state. To make up for the deficient points of wireless communication, we used the diversity effect of cooperation communication and the error correction effect of channel coding schemes. In this paper, the cooperative communication system with RCPC codes and Hybrid ARQ transmission scheme is proposed for improving reliability on wireless communication, and we executed these simulations. From the simulation results, proposed system is showed lower BER performance than legacy system. In addition, we confirm the fact that the channel state of Relay-node and source-node is more important than the channel state of Relay-node and destination-node.

  • PDF

A Simple Cooperative Transmission Protocol for Energy-Efficient Broadcasting Over Multi-Hop Wireless Networks

  • Kailas, Aravind;Thanayankizil, Lakshmi;Ingram, Mary Ann
    • Journal of Communications and Networks
    • /
    • v.10 no.2
    • /
    • pp.213-220
    • /
    • 2008
  • This paper analyzes a broadcasting technique for wireless multi-hop sensor networks that uses a form of cooperative diversity called opportunistic large arrays (OLAs). We propose a method for autonomous scheduling of the nodes, which limits the nodes that relay and saves as much as 32% of the transmit energy compared to other broadcast approaches, without requiring global positioning system (GPS), individual node addressing, or inter-node interaction. This energy-saving is a result of cross-layer interaction, in the sense that the medium access control (MAC) and routing functions are partially executed in the physical (PHY) layer. Our proposed method is called OLA with a transmission threshold (OLA-T), where a node compares its received power to a threshold to decide if it should forward. We also investigate OLA with variable threshold (OLA-VT), which optimizes the thresholds as a function of level. OLA-T and OLA-VT are compared with OLA broadcasting without a transmission threshold, each in their minimum energy configuration, using an analytical method under the orthogonal and continuum assumptions. The trade-off between the number of OLA levels (or hops) required to achieve successful network broadcast and transmission energy saved is investigated. The results based on the analytical assumptions are confirmed with Monte Carlo simulations.