• Title/Summary/Keyword: D2D-Access Probability

Search Result 18, Processing Time 0.028 seconds

Greedy Heuristic Resource Allocation Algorithm for Device-to-Device Aided Cellular Systems with System Level Simulations

  • Wang, Xianxian;Lv, Shaobo;Wang, Xing;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1415-1435
    • /
    • 2018
  • Resource allocation in device-to-device (D2D) aided cellular systems, in which the proximity users are allowed to communicate directly with each other without relying on the intervention of base stations (BSs), is investigated in this paper. A new uplink resource allocation policy is proposed by exploiting the relationship between D2D-access probability and channel gain among variant devices, such as cellular user equipments (CUEs), D2D user equipments (DUEs) and BSs, etc., under the constraints of their minimum signal to interference-plus-noise ratio (SINR) requirements. Furthermore, the proposed resource-allocation problem can be formulated as the cost function of "maximizing the number of simultaneously activated D2D pairs subject to the SINR constraints at both CUEs and DUEs". Numerical results relying on system-level simulations show that the proposed scheme is capable of substantially improving both the D2D-access probability and the network throughput without sacrificing the performance of conventional CUEs.

Interference Avoidance Resource Allocation for Device-to-Device Communication Based on Graph-Coloring (단말 간 직접 통신을 위한 그래프-컬러링 기반 간섭 회피 자원 할당 방법)

  • Lee, Changhee;Oh, Sung-Min;Park, Ae-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.12
    • /
    • pp.729-738
    • /
    • 2014
  • In this paper, we propose interference avoidance resource allocation scheme based on graph-coloring algorithm to introduce performance gain using spatial reuse in D2D (Device-to-Device) system. By assigning multiple D2D pairs to a single D2D resource, interference from neighboring D2D pairs is inevitable, which leads to performance degradation. Therefore, we first introduce the feedback information and the method considering the amount of information that can be practically provided by a D2D pair. Then, we propose how to construct a graph, which is corresponding to the D2D system, using the feedback information and adopt a graph-coloring algorithm to efficiently avoid interference. Simulation results show that the proposed resource allocation scheme outperforms traditional resource allocation schemes in both overall sum rate and spectral efficiency of D2D system while reducing the outage probability. Moreover, the outage probability, which indicates a failure rate of D2D communication, can be reduced by adopting the proposed scheme.

Performance Analysis of DS/CDMA with PLL Gain under the Nakagami-m Fading Channel (나카가미-m 페이딩 채널 하에서 PLL 이득에 따른 DS/CDMA의 성능 분석)

  • 강찬석;박진수
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.53-59
    • /
    • 2000
  • A received signal in mobile communication environments exhibits variation in both amplitude and phase due to the multipath fading. Therefore we analyzed the performance of DS/CDMA(Direct Sequence/code Division Multiple Access) DPSK(Differential Phase Shift Keying) system for the variations of PLL(Phase Locked Loop) gain with Tikhonov probability density function, assuming that the phase difference between transmitter and receiver signals is phase error. As a result, it is discovered that the performance of system could be improved by the control of PLL gain in compared with the DPSK system which does not consider the phase error. If the PLL gain is 1dB, the difference of two systems is 4.8dB and 0.4dB at 7dB. and if 30dB, it coincides. From above, it

  • PDF

The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access (OAuth 2.0 프로토콜에서 E-mail을 이용한 사용자 권한 인증)

  • Chae, Cheol-Joo;Choi, Kwang-Nam;Choi, Kiseok;Yae, Yong-Hee;Shin, YounJu
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.21-28
    • /
    • 2015
  • Currently there are wide variety of web services and applications available for users. Such services restrict access to only authorized users, and therefore its users often need to go through the inconvenience of getting an authentication from each service every time. To resolve of such inconvenience, a third party application with OAuth(Open Authorization) protocol that can provide restricted access to different web services has appeared. OAuth protocol provides applicable and flexible services to its users, but is exposed to reply attack, phishing attack, impersonation attack. Therefore we propose method that after authentication Access Token can be issued by using the E-mail authentication. In proposed method, regular user authentication success rate is high when value is 5 minutes. However, in the case of the attacker, the probability which can be gotten certificated is not more than the user contrast 0.3% within 5 minutes.

Study on Frequency Selection Method Using Case-Based Reasoning for Cognitive Radio (사례기반 추론 기법을 이용한 인지 라디오 주파수 선택 방법 연구)

  • Park, Jae-Hoon;Choi, Jeung Won;Um, Soo-Bin;Lee, Won-Cheol
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.1
    • /
    • pp.58-71
    • /
    • 2019
  • This paper proposes architecture of a cognitive radio engine platform and the allowable frequency channel reasoning method that enables acquisition of the allowable channels for the military tactical network environment. The current military tactical wireless communication system is increasing need to secure a supplementary radio frequency to ensure that multiple wireless networks for different military wireless devices coexist, so that tactical wireless communication between the same or different systems can be operated effectively. This paper presents the allowable frequency channel reasoning method based on cognitive radio engine for realizing DSA(Dynamic Spectrum Access) as an optimal available frequency channel. To this end, a case-based allowable frequency channel reasoning method for cognitive radio devices is proposed through modeling of primary user's traffic status and calculation of channel occupancy probability. Also through the simulation of the performance analysis, changing rate of collision probability between the primary users' occupancy channel and the available channel acquisition information that can be used by the cognitive radio device was analysed.

Acquisition of Direct-Sequence Cellular Communication System for Code Division Mutlipie Access (부호 분할 다원 접속을 위한 직접 확산 셀룰라 통신 시스팀의 동기)

  • 전정식;한영열
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.2
    • /
    • pp.207-217
    • /
    • 1993
  • In this paper, knowing a priori probability of phase offset between transmitted codes and reference codes in the receiver, we construct the state diagram of acquisition process of the direct sequence spread-spectrum communication system using the expanding window search. The scannings are performed from the cell with higher probability code epoch synchronization to that with lower one. We expand window size from initial value by r times of its previous size in each search, construct the corresponding the state diagrams, and derive average synchronization time using the Markov process and Mason's gain formula. Average synchronization times versus number of search n and detection probability $P_d$ are calculated.

  • PDF

Analysis on the optimal 2-dimensional code generation algorithm for high-speed optical CDMA network (초고속 광 코드분할 다원접속 네트웍용 최적 2차 코드 생성 알고리즘 제안 및 연구)

  • 신종윤;박남규
    • Korean Journal of Optics and Photonics
    • /
    • v.13 no.5
    • /
    • pp.435-441
    • /
    • 2002
  • In this paper, we propose an optimal 2-dimensional construction algorithm of a code family for a high-speed optical code division multiple access network. The optimal 2-D code family generated by search algorithm has better spectrum efficiency than previous codes, having relatively many code sets with short code length and the same or lower BER. Using the optimal 2-D code, OCDMA systems make it possible to utilize the spectrum more efficiently than WDM systems. The probability of bit error for high-speed OCDMA transmissions is calculated as a function of the number of users in the presence of receiver and shot noise(additive white Gaussian noise).

Medium Access Control Protocol for Ad Hoc Networks Using Dynamic Contention Window (동적 경쟁윈도우를 이용한 Ad Hoc 망에서의 Medium Access Control 프로토콜)

  • Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.35-42
    • /
    • 2008
  • Since Bianchi's 2-D Markov Chain Model considers collision problem only in ideal channel condition, it does not reflect real channel impaired by fading, interference, and noise. Distributed Coordination Function(DCF) doubles its contention window(CW) when transmission fails regardless of collision or transmission error. Increase of CW caused by transmission error degrade throughput and increase the delay. In this paper, we present quantitative analysis of the impact of the parameters such as contention window size(CW), transmission probability for a given time slot(${\Im}$), transmission failure probability($p_f$), on the system performance and provide a method how to decrease the initial CW to achieve equivalent performance.

  • PDF

Analysis on the Interference Effect of WLAN on WiBro (무선랜에 의한 WiBro 간섭 영향 분석)

  • Shim, Yong-Sup;Lee, Il-Kyoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.95-100
    • /
    • 2011
  • This paper analyzes the interference effect of WLAN(Wireless Local Area Network) service on WiBro(Wireless Broadband) service in adjacent frequency band by using Monte Carlo method. For the analysis, we make scenario that WLAN service operates on frequency band of 2401 MHz ~ 2423 MHz and WiBro service operates on frequency band of 698 MHz ~ 704 MHz. In case of WiBro receiver is close to WLAN AP(Access Point), the interference will be increased. So, we calculate the protection distance between WiBro receiver and WLAN AP to meet interference probability of 5 % below and required interference power of WLAN AP to meet interference probability of 5 % below in the case of fixed protection distance. As a result, the protection distance of 60 m and -9.5 dBm of required interference power of WLAN AP at 10 m of the fixed protection distance are analyzed.

System Optimization, Full Data Rate and Transmission Power of Decode-and-Forward Cooperative Communication in WSN (WSN환경에서 Decode-and-Forward 협력통신의 시스템 최적화 및 최대전송률과 저전력에 관한 연구)

  • Kim, Gun-Seok;Kong, Hyung-Yun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.597-602
    • /
    • 2007
  • In conventional cooperative communication data rate is 1/2 than non cooperative protocols. In this paper, we propose a full data rate DF (Decode and Forward) cooperative transmission scheme. Proposed scheme is based on time division multiplexing (TDM) channel access. When DF protocol has full data rate, it can not obtain diversity gain under the pairwise error probability (PEP) view point. If it increases time slot to obtain diversity gain, then data rate is reduced. The proposed algorithm uses orthogonal frequency and constellation rotation to obtain both full data rate and diversity order 2. Moreover, performance is analyzed according to distance and optimized components that affect the system performance by using computer simulation. The simulation results revealed that the cooperation can save the network power up to 7dB over direct transmission and 5dB over multi-hop transmission at BER of $10^{-2}$. Besides, it can improve date rate of system compared with the conventional DF protocol.