• Title/Summary/Keyword: IEEE802.11a

Search Result 1,111, Processing Time 0.027 seconds

Performance Analysis of Noncoherent OOK UWB Transceiver for LR-WPAN (저속 WPAN용 비동기 OOK 방식 UWB 송수신기 성능 분석)

  • Ki Myoungoh;Choi Sungsoo;Oh Hui-Myoung;Kim Kwan-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1027-1034
    • /
    • 2005
  • IEEE802.15.4a, which is started to realize the PHY layer including high precision ranging/positioning and low data rate communication functions, requires a simple and low power consumable transceiver architecture. To satisfy this requirements, the simple noncoherent on-off keying (OOK) UWB transceiver with the parallel energy window banks (PEWB) giving high precision signal processing interface is proposed. The flexibility of the proposed system in multipath fading channel environments is acquired with the pulse and bit repetition method. To analyze the bit error rate (BER) performance of this proposed system, a noise model in receiver is derived with commonly used random variable distribution, chi-square. BER of $10^{-5}$ under the line-of-sight (LOS) residential channel is achieved with the integration time of 32 ns and signal to noise ratio (SNR) of 15.3 dB. For the non-line-of-sight (NLOS) outdoor channel, the integration time of 72 ns and SNR of 16.2 dB are needed. The integrated energy to total received energy (IRR) for the best BER performance is about $86\%$.

Development of MEMS Accelerometer-based Smart Sensor for Machine Condition Monitoring (MEMS 가속도계 기반 기계 상태감시용 스마트센서 개발)

  • Son, Jong-Duk;Yang, Bo-Suk
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2007.05a
    • /
    • pp.448-452
    • /
    • 2007
  • Many industrial operations require continuous or nearly-continuous operation of machines, which if interrupted can result in significant financial loss. The condition monitoring of these machines has received considerable attention recent years. Rapid developments in semiconductor, computing, and communication with a remote site have led to a new generation of sensor called "smart" sensors which are capable of wireless communication with a remote site. The purpose of this research is the development of smart sensor using which can on-line perform condition monitoring. This system is addressed to detect conditions that may lead to equipment failure when it is running. Moreover it will reduce condition monitoring expense using low cost MEMS accelerometer. This sensor can receive data in real-time or periodic time from MEMS accelerometer. Furthermore, this system is capable for signal preprocessing task (High Pass Filter, Low Pass Filter and Gain Amplifier) and analog to digital converter (A/D) which is controlled by CPU. A/D converter that converts 10bit digital data is used. This sensor communicates with a remote site PC using TCP/IP protocols. Wireless LAN contain IEEE 802.11i-PSK or WPA (PSK, TKIP) encryption. Developed sensor executes performance tests for data acquisition accuracy estimations.

  • PDF

Pareto Optimized EDCA Parameter Control for Wireless Local Area Networks

  • Kim, Minseok;Oh, Wui Hwan;Chung, Jong-Moon;Lee, Bong Gyou;Seo, Myunghwan;Kim, Jung-Sik;Cho, Hyung-Weon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3458-3474
    • /
    • 2014
  • The performance of IEEE 802.11e enhanced distributed channel access (EDCA) is influenced by several interactive parameters that make quality of service (QoS) control complex and difficult. In EDCA, the most critical performance influencing parameters are the arbitration interframe space (AIFS) and contention window size (CW) of each access category (AC). The objective of this paper is to provide a scheme for parameter control such that the throughput per station as well as the overall system throughput of the network is maximized and controllable. For this purpose, a simple and accurate analytical model describing the throughput behavior of EDCA networks is presented in this paper. Based on this model, the paper further provides a scheme in which a Pareto optimal system configuration is obtained via an appropriate CW control for a given AIFS value, which is a different approach compared to relevant papers in the literature that deal with CW control only. The simulation results confirm the effectiveness of the proposed method which shows significant performance improvements compared to other existing algorithms.

Study of the System for Generating Traffic Information Based on Smartphone Bluetooth and WiFi Signal (스마트폰 블루투스/와이파이 신호기반 교통정보 생성 시스템 연구)

  • Nam-gung, Keun;Lee, Sangsun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.1
    • /
    • pp.121-131
    • /
    • 2020
  • Current traffic information is collected through a loop detector or an image detector. This method is influenced by weather and time, so a traffic information generation system is needed to replace it. A system for generating traffic information using a smartphone in a vehicle is proposed and the performance of the proposed method is verified through the collection rate and the travel time error rate obtained through field tests. In addition, we propose an algorithm for generating intersection traffic information for each direction of rotation, suggest ways to increase the amount of valid information, and confirm the results.

An IBC and Certificate Based Hybrid Approach to WiMAX Security

  • Rodoper, Mete;Trappe, Wade;Jung, Edward Tae-Chul
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.615-625
    • /
    • 2009
  • Worldwide inter-operability for microwave access (WiMAX) is a promising technology that provides high data throughput with low delays for various user types and modes of operation. While much research had been conducted on physical and MAC layers, little attention has been paid to a comprehensive and efficient security solution for WiMAX. We propose a hybrid security solution combining identity-based cryptography (IBC) and certificate based approaches. We provide detailed message exchange steps in order to achieve a complete security that addresses the various kind of threats identified in previous research. While attaining this goal, efficient fusion of both techniques resulted in a 53% bandwidth improvement compared to the standard's approach, PKMv2. Also, in this hybrid approach, we have clarified the key revocation procedures and key lifetimes. Consequently, to the best of knowledge our approach is the first work that unites the advantages of both techniques for improved security while maintaining the low overhead forWiMAX.

Power Saving Scheme by Distinguishing Traffic Patterns for Event-Driven IoT Applications

  • Luan, Shenji;Bao, Jianrong;Liu, Chao;Li, Jie;Zhu, Deqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1123-1140
    • /
    • 2019
  • Many Internet of Things (IoT) applications involving bursty traffic have emerged recently with event detection. A power management scheme qualified for uplink bursty traffic (PM-UBT) is proposed by distinguishing between bursty and general uplink traffic patterns in the IEEE 802.11 standard to balance energy consumption and uplink latency, especially for stations with limited power and constrained buffer size. The proposed PM-UBT allows a station to transmit an uplink bursty frame immediately regardless of the state. Only when the sleep timer expires can the station send uplink general traffic and receive all downlink frames from the access point. The optimization problem (OP) for PM-UBT is power consumption minimization under a constrained buffer size at the station. This OP can be solved effectively by the bisection method, which demonstrates a performance similar to that of exhaustive search but with less computational complexity. Simulation results show that when the frame arrival rate in a station is between 5 and 100 frame/second, PM-UBT can save approximately 5 mW to 30 mW of power compared with an existing power management scheme. Therefore, the proposed power management strategy can be used efficiently for delay-intolerant uplink traffic in event-driven IoT applications, such as health status monitoring and environmental surveillance.

Measurements and Analysis of Fingerprinting Structures for WLAN Localization Systems

  • Al KhanbashI, Nuha;Al Sindi, Nayef;Ali, Nazar;Al-Araji, Saleh
    • ETRI Journal
    • /
    • v.38 no.4
    • /
    • pp.634-644
    • /
    • 2016
  • Channel-based radio-frequency fingerprinting such as a channel impulse response (CIR), channel transfer function (CTF), and frequency coherence function (FCF) have been recently proposed to improve the accuracy at the physical layer; however, their empirical performance, advantages, and limitations have not been well reported. This paper provides a comprehensive empirical performance evaluation of RF location fingerprinting, focusing on a comparison of received-signal strength, CIR-, CTF-, and FCF-based fingerprinting using the weighted k-nearest neighbor pattern recognition technique. Frequency domain channel measurements in the IEEE 802.11 band taken on a university campus were used to evaluate the accuracy of the fingerprinting types and their robustness to human-induced motion perturbations of the channel. The localization performance was analyzed, and the results are described using the spatial and temporal radio propagation characteristics. In particular, we introduce the coherence region to explain the spatial properties and investigate the impact of the Doppler spread in time-varying channels on the time coherence of RF fingerprint structures.

A Study on the Expectation and Awareness of Anti-Bribety Management Systyem Certification in Korea (반부패경영시스템 인증(ISO 37001)에 대한 국내 기업의 기대 및 인지도 연구)

  • Jun, Byoungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.95-104
    • /
    • 2020
  • Bribery is one of the world's most destructive and challenging issues. Yet despite efforts on national and international levels to tackle bribery, it remains a significant issue. Recognizing this, ISO has developed a new standard to help organizations fight bribery and promote an ethical business culture, which is "ISO 37001 - Anti-bribery Management Systems" in 2016. ISO 37001 can provide the tools and systems to greatly reduce the risk and help organizations deal with it effectively if it does arise. It is a flexible tool, which can be adapted according to the size and nature of the organization and the bribery risk it faces. After enforcing the Improper Solicitation and Graft Act, Korean government standardized ISO 37001, one of the Business Ethics of Global Standard, harmonizing International Standards into Korean Industrial Standards (KS) in 2017. It is meaningful in that Korean companies have localized regulation which applies to global standard anti-bribery management systems. Only about 100 organizations, however, have adopted ISO 37001 so far. The primary purpose of this paper is to examine the expectation and awareness of ISO 37001. Results show that still many organizations lack of awareness of ISO 37001 and it is implicated that much promotion and education will be necessary. This study has originality and value in that it can provide the guidelines for activation of ISO 37001.

A Scheme of Avoiding Occupied Channel in Overlapped Wireless LANs (중첩된 무선 랜에서 점유된 채널의 회피 기법)

  • Song, Myong-Lyol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.33-41
    • /
    • 2009
  • Signals transmitted from access point (AP) or stations in different wireless LANs (WLAN) interfere each other when the WLANs are closely installed. When they are configured to use the same channel, signals from an WLAN get collided with signals from other WLANs so that the delay increases to user stations and the throughput decreases. In this paper, we propose a method in which an AP in a basic service set (BSS) detects other BSSs using the same channel and switches to a different channel not being occupied by any other BSS. We can avoid using the same channel with other BSS in spacially overlapped BSS environment. The proposed scheme is simulated and its characteristics are described with the analysis of the result. The results measured in terms of throughput show that the problems in overlapped wireless LANs can be resolved with the proposed method.

  • PDF

A study on helper node selection mechanisms in cooperative communications (협력통신에서 도움노드 선정방법에 대한 비교연구)

  • Jang, Jae-Shin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1397-1405
    • /
    • 2012
  • Cooperative communications play a important role in increasing frame transmission rate at wireless communication networks where frequency resource is strictly limited. In this paper, we did a research on how to select the helper nodes that are very import in cooperative communications. As a prelude study in this research field, we carried out performance comparison of three helper node selection schemes using computer simulation. The system throughput was used as the performance measure and the random way point mobility model, where every communicating nodes move around within the designated communication range, was used.