• Title/Summary/Keyword: Multiple Access

Search Result 2,387, Processing Time 0.029 seconds

High-Spread Interleaver based Interleave-Division Multiple Access Scheme for the 4G System

  • Chung, Yeon-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.6
    • /
    • pp.828-834
    • /
    • 2008
  • This paper presents high-spread (HS) random interleavers based interleave-division multiple access (IDMA) scheme for the 4th generation mobile radio system. High-spread feature of a random interleaver offers high-spread characteristics to interleavers and thus produces extrinsic values with low correlation. As interleavers are key components for user separation in the IDMA, the HS interleavers with this feature are employed and analyzed in the IDMA for performance improvement. In addition, by replacing random interleavers with the HS interleavers in the IDMA, bandwidth efficiency is achieved by means of reducing the length of the repetition code. Performance evaluation shows that the proposed scheme of the IDMA with the HS interleavers provides superior BER performance and improved bandwidth efficiency.

  • PDF

A Medium Access Control Protocol for Voice/Data Integrated Wireless CDMA Systems

  • Lim, In-Taek
    • ETRI Journal
    • /
    • v.23 no.2
    • /
    • pp.52-60
    • /
    • 2001
  • In this paper, a medium access control protocol is proposed for integrated voice and data services in wireless local networks. Uplink channels for the proposed protocol are composed of time slots with multiple spreading codes per slot based on slotted code division multiple access (CDMA) systems. The proposed protocol uses spreading code sensing and reservation schemes. This protocol gives higher access priority to delay-sensitive voice traffic than to data traffic. The voice terminal reserves an available spreading code to transmit multiple voice packets during a talkspurt. On the other hand, the data terminal transmits a packet without making a reservation over one of the available spreading codes that are not used by voice terminals. In this protocol, voice packets do not come into collision with data packets. The numerical results show that this protocol can increase the system capacity for voice service by applying the reservation scheme. The performance for data traffic will decrease in the case of high voice traffic load because of its low access priority. But it shows that the data traffic performance can be increased in proportion to the number of spreading codes.

  • PDF

A Chirp Rate Allocation Scheme for Multiple Access Interference Reduction in Chirp Spread Spectrum Systems (처프 확산 대역 시스템에서 다중 접속 간섭의 감소를 위한 처프율 할당 기법)

  • Kim, Kwang-Yul;Lee, Seung-Woo;Kim, Yong-Sin;Lee, Jae-Seang;Kim, Jin-Young;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1420-1422
    • /
    • 2016
  • In order to guarantee the multiuser transmission performance of a chirp spread spectrum system, the cross-correlation coefficient (CCC) among multiple users should be carefully considered. In this paper, we propose a chirp rate allocation scheme for reducing the multiple access interference based on the cross-correlation coefficient. The simulation results show that the proposed scheme can improve the multiple access interference performance.

Maximum Ratio Transmission for Space-Polarization Division Multiple Access in Dual-Polarized MIMO System

  • Hong, Jun-Ki;Jo, Han-Shin;Mun, Cheol;Yook, Jong-Gwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3054-3067
    • /
    • 2015
  • The phenomena of higher channel cross polarization discrimination (XPD) is mainly observed for future wireless technologies such as small cell network and massive multiple-input multiple-output (MIMO) system. Therefore, utilization of high XPD is very important and space-polarization division multiple access (SPDMA) with dual-polarized MIMO system could be a suitable solution to high-speed transmission in high XPD environment as well as reduction of array size at base station (BS). By SPDMA with dual-polarized MIMO system, two parallel data signals can be transmitted by both vertically and horizontally polarized antennas to serve different mobile stations (MSs) simultaneously compare to conventional space division multiple access (SDMA) with single-polarized MIMO system. This paper analyzes the performance of SPDMA for maximum ratio transmission (MRT) in time division duplexing (TDD) system by proposed dual-polarized MIMO spatial channel model (SCM) compare to conventional SDMA. Simulation results indicate that how SPDMA utilizes the high XPD as the number of MS increases and SPDMA performs very close to conventional SDMA for same number of antenna elements but half size of the array at BS.

On Non-Orthogonal Multiple Access (NOMA) in 5G Systems (5G 시스템에서의 비-직교 다중 액세스(NOMA))

  • Islam, SM Riazul;Kim, Jae Moung;Kwak, Kyung Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2549-2558
    • /
    • 2015
  • The non-orthogonal multiple access (NOMA) is one of the fledging paradigms which next generation radio access technologies are sprouting toward. The NOMA with superposition coding (SC) in the transmitter and successive interference cancellation (SIC) at the receiver comes with many desirable features and benefits over orthogonal multiple access (OMA) such as orthogonal frequency division multiple access (OFDMA) adopted by Long-Term Evolution (LTE). In this paper, we study the recent research trends on NOMA in 5G systems. We discuss the basic concept of NOMA and explain its aspects of importance for future radio access. Then, we provide a survey of the state of the art in NOMA for 5G systems in a categorized manner. Further, we analyze the NOMA performances with numerical examples; and provide some avenues for future research on NOMA on a set of open issues and challenges.

Spectral and Energy Efficient Spatially Modulated Non-Orthogonal Multiple Access (NOMA) For 5G (5G를 위한 주파수 및 에너지 효율적인 공간 변조 비-직교 다중 접속 기법)

  • Irfan, Mohammad;Kim, Jin Woo;Shin, Soo Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1507-1514
    • /
    • 2015
  • Non-orthogonal multiple access (NOMA) is a promising candidate for 5G networks. NOMA achieves superior spectral efficiency than conventional orthogonal multiple access (OMA), as in NOMA multiple users uses the same time and frequency resources. Multiple-input-multiple-output (MIMO) is one another promising technique that can enhance system performance. In this paper we present a spectral and energy efficient multiple antenna based NOMA scheme, known as spatially modulated NOMA. In the proposed scheme the cell edge users are multiplexed in spatial domain, which means the information to cell edge users is conveyed using the transmit antenna indices. In NOMA the performance of cell edge users are deeply effected as it treats signals of others as noise. The proposed scheme achieves superior spectral efficiency than the conventional NOMA. The number of decoding steps involved in decoding NOMA signal reduces by one as cell edge user is multiplexed in spatial domain. The proposed scheme is more energy efficient as compare to conventional NOMA. All of the three gains high spectral, energy efficiency and one step reduction in decoding comes at cost of multiple transmit antennas at base station.

EDS scenario Implementation for the Multiple Network and Multiple Service Environments

  • Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.135-140
    • /
    • 2009
  • The wide deployment of wireless access technologies and the integration of various access network interfaces into a single terminal, allows mobile end-users to be always connected to the IP network, and to use those interface simultaneously. In this paper the CTE provides various access network interfaces capabilities, allowing reception of data over multiple service providers with different characteristics. Considerations for multiple network and service provider environments are regarded as essential for the successful deployment of convergence services in Next Generation Network (NGN). Event Driven Service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers. This paper first describes the deployment model of NGN convergence services for multiple service provider environments. It also covers the service scenario of EDS, a convergence service for multiple service provider environments in NGN. Multiple provider environments stimulates the unified identifier management, namely ubiquitous identification (U-ID), to enable users to be provided convergence services without awareness of multiple provides. Then the designed structure and procedures of U-ID based EDS are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.

Access Control of Content Package by Using XML Subject-based Encryption (XML의 주체 기반 암호화를 이용한 콘텐츠 패키지의 접근 제어)

  • Cho Kwang-Moon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.137-142
    • /
    • 2006
  • As a large quantity of information is represented in XML format on the web, there are increasing demands for XML security. Until now research on XML security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex, however, XML security comes to involve not only network security but also managerial security. But XML encryption support only simple network security. So it cannot support multiple users and multiple access control policy. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can support multiple authorization of multiple users with integrating access control.

  • PDF

Design and Implementation of Image Segmentation Tx/Rx Technology Based On BLE(Bluetooth Low Energy) Multiple Access Technology for Image Block Devices (이미지 블록 디바이스를 위한 BLE 다중 접속기술 기반 이미지 분할 송수신 기술의 설계 및 구현)

  • Kwak, Chang-Sub;Lee, Young-Soon
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.825-837
    • /
    • 2021
  • The Bluetooth Low Energy profile has the advantage of continuing wireless communication with very little power consumption compared to the existing Bluetooth, so it is widely applied to smart devices. Most of them are applied to Point-to-Point (1:1) communication between Central (Master) and Peripheral (Slave), but can be applied to Point-to-Multiple (1:N) wireless communication through the use of multiple threads and timers. Therefore, in this paper, a precise timer was designed in the BLE profile to devise an image segmentation transmission/reception structure based on multiple access, and a smart image block device applied to it was designed and verified.

Role based XML Encryption for Enforcing Access Control Policy (접근제어 정책구현을 위한 역할기반 XML 암호화)

  • Choi Dong-Hee;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.3-15
    • /
    • 2005
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Research area or n security is about Encryption Digital signature, Key management and Access control. until now research on U security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex XML security comes to involve not only network security but also managerial security. Managerial security is guaranteed through access control. But XML Encryption supports simple network security. So it can't support multiple users and multiple access control policies. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can supper multiple authorizations of multiple users with integrating access control. And this can reduce the cost of evaluation process of the existing complicated access authorization with pre-processing.