• 제목/요약/키워드: Internet access

검색결과 2,619건 처리시간 0.025초

사물인터넷을 위한 라우팅과 매체접근제어의 상호작용 (Routing and Medium Access Control Interactions for Internet of Things)

  • 박판근
    • 한국정보통신학회논문지
    • /
    • 제19권10호
    • /
    • pp.2465-2472
    • /
    • 2015
  • 무선 MAC (Medium Access Control)과 라우팅 기술은 사물인터넷의 핵심 네트워크 기술 요소로서. 최근 이와 관련된 집중적인 연구가 진행 되고 있다. 그러나 사물인터넷을 위한 새로운 표준이 제안되고, 다른 네트워크 관련 기술들이 패치되면서, 이러한 네트워크의 성능을 평가하는 방식은 명확하지 않다. 본 연구에서는 사물인터넷을 위한 최근의 MAC과 라우팅 프로토콜 기술을 분석 정리하고, 이들 간의 상호작용에 대하여 설명하였다. 특히, 현재 많은 사물인터넷 관련 분야에서 고려되고 있는 IEEE 802.15.4 MAC 과 RPL (Routing Protocol for Low-power Lossy Network) 라우팅 프로토콜의 기술을 설명하고 이들 간의 상호 작용에 대하여 설명하였다. 이러한 분석에 따라 경쟁기반의 MAC 프로토콜의 경우 라우팅의 성능에 치명적인 영향을 줄 수 있으므로 MAC과 라우팅 관련 시스템 파라미터를 최적화 할 수 있는 모델링을 제시하였다.

Optimal Opportunistic Spectrum Access with Unknown and Heterogeneous Channel Dynamics in Cognitive Radio Networks

  • Zhang, Yuli;Xu, Yuhua;Wu, Qihui;Anpalagan, Alagan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권8호
    • /
    • pp.2675-2690
    • /
    • 2014
  • We study the problem of optimal opportunistic spectrum access with unknown and heterogeneous channel dynamics in cognitive radio networks. There is neither statistic information about the licensed channels nor information exchange among secondary users in the respective systems. We formulate the problem of maximizing network throughput. To achieve the desired optimization, we propose a win-shift lose-stay algorithm based only on rewards. The key point of the algorithm is to make secondary users tend to shift to another channel after receiving rewards from the current channel. The optimality and the convergence of the proposed algorithm are proved. The simulation results show that for both heterogeneous and homogenous systems the proposed win-shift lose-stay algorithm has better performance in terms of throughput and fairness than an existing algorithm.

Impact of Correlation on Superposition Coding in NOMA for Interactive Mobile Users in 5G System: Achievable Sum Rate Perspective

  • Chung, Kyuhyuk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권3호
    • /
    • pp.39-45
    • /
    • 2020
  • The fifth generation (5G) mobile communication has been more commercialized worldwide. One of the promising 5G technologies is non-orthogonal multiple access (NOMA). We present the achievable sum rate of non-orthogonal multiple access (NOMA) with correlated superposition coding (SC). Then this paper investigates the impacts of correlation on the achievable sum rate of correlated SC NOMA. It is shown that the achievable sum rate of correlated SC NOMA is greater than that of standard independent SC NOMA, for the most of the values of the power allocation factor over the meaningful range of the user fairness. In result, correlated SC could be a promising scheme for NOMA.

Development and Performance Evaluation of a Concurrency Control Technique in Object-Oriented Database Systems

  • Jun, Woochun;Hong, Suk-Ki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1899-1911
    • /
    • 2018
  • In this work, we propose a concurrency control scheme in object-oriented database (OODB). Since an OODB provides complex modeling power than the conventional relational databases, a concurrency control technique in OODB is also rather complicated and has influence on the overall performance. Thus, it is very important to develop a concurrency control technique with less overhead. The proposed scheme deals with class hierarchy that is a key concept in OODBs. The proposed scheme is developed on implicit locking scheme. Also, the proposed scheme is designed using data access frequency in order to reduce locking overhead than implicit locking. It means that, if access frequency information is not available, the proposed scheme works just like the existing implicit locking, In our work, the correctness of the proposed scheme is proved. The performance is analyzed depending on access types. Also, it is proved that our scheme performs works much better than the implicit locking does.

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권6호
    • /
    • pp.3254-3272
    • /
    • 2017
  • With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.

Smart WLAN Discovery for Power Saving of Dual-Mode Terminals

  • Park, Hyunho;Lee, Hyeong Ho
    • ETRI Journal
    • /
    • 제35권6호
    • /
    • pp.1144-1147
    • /
    • 2013
  • Dual-mode terminals (DMTs) equipped with cellular and WLAN interfaces have become popular in recent years. Users of DMTs can enjoy high-speed WLAN Internet access and wide area Internet access to cellular networks. However, a DMT may consume power inefficiently when discovering a WLAN with inherently limited service coverage. In this letter, we propose to use smart WLAN discovery (SWD) to minimize the power consumption required for WLAN discovery. To minimize the power consumption of a DMT, an SWD DMT activates its WLAN interface only when the DMT transfers data within the WLAN coverage area. The simulation results of SWD show an improved power-saving performance compared to previous WLAN discovery schemes.

Network Selection Algorithm Based on Spectral Bandwidth Mapping and an Economic Model in WLAN

  • Pan, Su;Zhou, Weiwei;Gu, Qingqing;Ye, Qiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권1호
    • /
    • pp.68-86
    • /
    • 2015
  • Future wireless network aims to integrate different radio access networks (RANs) to provide a seamless access and service continuity. In this paper, a new resource denotation method is proposed in the WLAN and LTE heterogeneous networks based on a concept of spectral bandwidth mapping. This method simplifies the denotation of system resources and makes it possible to calculate system residual capacity, upon which an economic model-based network selection algorithm is designed in both under-loaded and over-loaded scenarios in the heterogeneous networks. The simulation results show that this algorithm achieves better performance than the utility function-based access selection (UFAS) method proposed in [12] in increasing system capacity and system revenue, achieving load balancing and reducing the new call blocking probability in the heterogeneous networks.

Enhanced Channel Access Estimation based Adaptive Control of Distributed Cognitive Radio Networks

  • Park, Jong-Hong;Chung, Jong-Moon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1333-1343
    • /
    • 2016
  • Spectrum sharing in centrally controlled cognitive radio (CR) networks has been widely studied, however, research on channel access for distributively controlled individual cognitive users has not been fully characterized. This paper conducts an analysis of random channel access of cognitive users controlled in a distributed manner in a CR network. Based on the proposed estimation method, each cognitive user can estimate the current channel condition by using its own Markov-chain model and can compute its own blocking probability, collision probability, and forced termination probability. Using the proposed scheme, CR with distributed control (CR-DC), CR devices can make self-controlled decisions based on the status estimations to adaptively control its system parameters to communicate better.

A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks

  • Shi, Fei;Song, Joo-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권6호
    • /
    • pp.1565-1585
    • /
    • 2012
  • The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.

On Narrowband Interference Suppression in OFDM-based Systems with CDMA and Weighted-type Fractional Fourier Transform Domain Preprocessing

  • Liang, Yuan;Da, Xinyu;Wang, Shu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5377-5391
    • /
    • 2017
  • In this paper, we propose a new scheme to suppress the narrowband interference (NBI) in OFDM-based systems. The scheme utilizes code division multiple access (CDMA) and weighted-type fractional Fourier transform (WFRFT) domain preprocessing technologies. Through setting the WFRFT order, the scheme can switch into a single carrier (SC) or a multi-carrier (MC) frequency division multiple access block transmission system. The residual NBI can be eliminated to the maximum extent when the WFRFT order is selected properly. Final simulation results show that the proposed system can outperform MC and SC with CDMA and frequency domain preprocessing in terms of the narrowband interference suppression.