• Title/Summary/Keyword: QoS-guaranteed

Search Result 251, Processing Time 0.025 seconds

Power Allocation Schemes For Downlink Cognitive Radio Networks With Opportunistic Sub-channel Access

  • Xu, Ding;Feng, Zhiyong;Zhang, Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1777-1791
    • /
    • 2012
  • This paper considers a downlink cognitive radio (CR) network where one secondary user (SU) and one primary user (PU) share the same base station (BS). The spectrum of interest is divided into a set of independent, orthogonal subchannels. The communication of the PU is of high priority and the quality of service (QoS) is guaranteed by the minimum rate constraint. On the other hand, the communication of the SU is of low priority and the SU opportunistically accesses the subchannels that were previously discarded by the PU during power allocation. The BS assigns fractions ?? and 1 ?? of the total available transmit power to the PU and the SU respectively. Two power allocation schemes with opportunistic subchannel access are proposed, in which the optimal values of ??'s are also obtained. The objective of one scheme is to maximize the rate of the SU, and the objective of the other scheme is to maximize the sum rate of the SU and the PU, both under the PU minimum rate constraint and the total transmit power constraint. Extensive simulation results are obtained to verify the effectiveness of the proposed schemes.

A Case Study of a Resource Reservation Protocol in IP Based Wireless Access Networks for ITS Service

  • Jung Kwang Mo;Jung Hyun Chul;Min Sang Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.1 s.6
    • /
    • pp.107-115
    • /
    • 2005
  • For effective IP based service implementation on the wireless network environments, wireless network including the ITS network have to support QoS guaranteed protocol such as a RSVP. RSVP is a resource reservation protocol for Internet environment, and its scalability makes easy to implement RSVP over the various IP transport technologies. But for the If based ITS wireless network environment, RSVP is not suitable, since by its path setup procedure characteristic. In the wireless access network for ITS service, when a mobile node moves to other domain it must perform registration procedure. But the registration procedure is time consuming steps, so if a RSVP session was already established in the previous domain, the RSYP session may be disconnected and the time to re establish a new RSVP session is long enough to cause serious packet loss. In this paper, we propose a pre-path reservation mechanism for applying the RSVP in wireless access networks for ITS. In the pre-path reservation mechanism, the resource reservation procedure occurred during a mobile node's handoff time. An access point in wireless access network performs this procedure when the mobile node attempts handoff The access point executes pre-path reservation procedure as a proxy, since the mobile node does not have IP address until the address allocation procedure is finished in a new domain.

  • PDF

A Link Protection Scheme with a Backup Link Spanning Tree for Provider Backbone Bridged Networks and Implementation (프로바이더 백본 브리지 망을 위한 백업링크 스패닝트리 기반 링크장애 복구기능과 구현)

  • Nam, Wie-Jung;Lee, Hyun-Joo;Yoon, Chong-Ho;Hong, Won-Taek;Moon, Jeong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.58-68
    • /
    • 2010
  • In this paper, we propose an efficient link protection switching scheme for provider backbone bridge systems with a spanning tree for backup links exclusively, and evaluate its performance. The proposed scheme offers guaranteed QoS flows even when a link fault occurrs in the primary link by flooding the flows over the profiled spanning tree. The flooding mechanism over the spanning tree can also provide low latency and remove the loopback flows. We also derive the efficiency of bandwidth usage for the normal flows and the number of lost frames during the link restoration. For evaluating its feasibility, we implement a prototype of PBB-TE systems based on the Linux bridge codes, which can support both link protection switching capability with CCM and MAC-in-MAC encapsulation. A related protocol analyzer is also developed. One can see that the proposed scheme and the prototype can be useful for developing carrier class Ethernet systems based on PBB-TE.

Model and Architecture of User-Defined Networks for Seamless Mobility Management in Diverse Wireless Environment (다양한 무선 환경에서 끊김 없는 이동성 관리를 위한 사용자 정의 네트워크 모델 및 구조)

  • Chun, Seung-Man;Nah, Jae-Wook;Lee, Seung-Mu;Choi, Jun-Hyuk;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.35-43
    • /
    • 2011
  • In this paper, we propose a novel architecture for seamless mobility management to provide users with seamless Internet connection when users roam between diverse wireless local area networks (WLANS) controlled by different management entities. There have been many researches in IETF, i.e., MIPv6, HMIPv6, and PMIPv6, to provide the mobility management. However, practically since wireless access points or access routers, which are managed by an individual manager or ISP managers, have different authentication scheme and the supported mobility management, the previous mobility management protocol developed by IETF can not guarantee the quality of service of application services as the mobile node performs the handover. To solve this drawback, we propose the mobility management scheme to provide QoS-guaranteed Internet services during the handover by configurating the wireless networks which is defined by users. More specifically, we present a model, the architecture and an algorithm for user-defined network (UDN) to provide the seamless Internet service. Finally, the performance of the proposed algorithm is evaluated by the network simulation tool.

Cooperative Relaying with Interference Cancellation for Secondary Spectrum Access

  • Dai, Zeyang;Liu, Jian;Long, Keping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2455-2472
    • /
    • 2012
  • Although underlay spectrum sharing has been shown as a promising technique to promote the spectrum utilization in cognitive radio networks (CRNs), it may suffer bad secondary performance due to the strict power constraints imposed at secondary systems and the interference from primary systems. In this paper, we propose a two-phase based cooperative transmission protocol with the interference cancellation (IC) and best-relay selection to improve the secondary performance in underlay models under stringent power constraints while ensuring the primary quality-of-service (QoS). In the proposed protocol, IC is employed at both the secondary relays and the secondary destination, where the IC-based best-relay selection and cooperative relaying schemes are well developed to reduce the interference from primary systems. The closed-form expression of secondary outage probability is derived for the proposed protocol over Rayleigh fading channels. Simulation results show that, with a guaranteed primary outage probability, the proposed protocol can achieve not only lower secondary outage probability but also higher secondary diversity order than the traditional underlay case.

Networking Technologies for IPTV2.0 Service (IPTV2.0 서비스를 위한 네트워킹 기술)

  • Lee, Kyounghee;Yoon, Changwoo;Ryu, Won;Kim, Bongtae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.4
    • /
    • pp.218-228
    • /
    • 2008
  • The convergence of broadcasting and telecommunication services is being accelerated by broadband networks, digital broadcasting and Web2.0. This paper describes the definition and service characteristics of IPTV as a representative of broadcasting and telecommunication convergence services. Especially, the changes of infrastructure and technology for IPTV2.0 are addressed in terms of the service features of mobility, intelligence and participation. IPTV2.0 shall be characterized by the open IPTV service based on Web2.0 and the mobile IPTV service over the heterogeneous networks employing various wireless/wired access technologies. The IP Multimedia Subsystem (IMS) and Service Delivery Platform (SDP) technologies are increasingly considered to support the personalization and openness. The mobility management technology is being evolved to provide QoS-guaranteed mobile communication services to users at anytime and anywhere. IPTV2.0 services and platforms are also anticipated to be core components to achieve knowledge-based ubiquitous society. IPTV2.0 contents are required to be integrated with the enhanced metadata to efficiently support search, selection, convergence and delivery of the contents. Moreover, those contents shall be enhanced to provide the scalable services which is adaptable to the network status and user preferences. Therefore, the networking technologies for IPTV2.0 should tightly cooperate with application services and adaptive contents. Those technologies will be developed to construct the ubiquitous content service platform considering the evolution of networks and various converged services.

  • PDF

Trustworthy Service Discovery for Dynamic Web Service Composition

  • Kim, Yukyong;Choi, Jong-Seok;Shin, Yongtae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1260-1281
    • /
    • 2015
  • As the number of services available on the Web increases, it is vital to be able to identify which services can be trusted. Since there can be an extremely large number of potential services that offer similar functionality, it is challenging to select the right ones. Service requestors have to decide which services closelysatisfy their needs, and theymust worry about the reliability of the service provider. Although an individual service can be trusted, a composed service is not guaranteed to be trustworthy. In this paper, we present a trust model that supports service discovery and composition based on trustworthiness. We define a method to evaluate trust in order to discover trustworthy services. We also provide a method to perform trust estimation for dynamic service composition, and we present results of two experiments. The proposed model allows for service requestors to obtain the most trustworthy services possible. Our mechanism uses direct and indirect user experience to discover the trustworthiness of the services and service providers. Moreover, composing services based on quantitative trust measurements will allow for consumers to acquire a highly reliable service that meet their quality and functional requirements.

The Efficient Bandwidth Control Method for Variable Data using ATM-GFR Service (ATM-GFR 서비스를 이용한 가변 데이터의 효과적인 대역폭 관리)

  • Kim Jung-Gyu;Lee Young-Dong
    • Journal of Digital Contents Society
    • /
    • v.2 no.2
    • /
    • pp.129-138
    • /
    • 2001
  • With the explosive growth and pervasive of the Internet, dynamic bandwidth allocation is nessary for ATM streams that carry various traffic. In order to provide quality of service(QoS) guarantees and to give the minimum cell rate, new bandwidth allocation scheme requires to be implemented. DFBA(Differential Fair Buffer Allocation) scheme is one of the methods for ATM GFR(Guaranteed Frame Rate) services. DFBA scheme treats cells selectively in a region between low buffer occupancy threshold and high buffer occupancy threshold. A big unbalance is introduced when the value being selected by DFBA scheme is greater than minimum rate. In a try to reduce the unbalance modified DFBA scheme is proposed. Selecting parameter according to the situation of network, this scheme is very effective to control the bandwidth in the various network situation.

  • PDF

An Efficient Power Processing Method for Cognitive Radio (Cognitive Radio에 적합한 효율적인 전력 처리기법)

  • Cho, Ju-Phil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.43-48
    • /
    • 2008
  • In this paper, we discuss the transmit power of user in Cognitive Radio environment. Transmit power of user should be operated in order not to give a bad effect to PU(Primary user) and this power can be considered as SINR(Signal to Interference and Noise Ratio) measured in PU. Exact spectrum sensing is required to see which is the vacant frequency. And this spectrum sensing should be operated repeatedly within certain time because the vacant frequency is time-varying. In this paper, we reduce the existing defect by using orthogonal parameter and show the sensing operation is possible if SINR of PU can be guaranteed.

  • PDF

A Buffer Management Scheme for Throughput and Fairness Improvement in ATM Networks (ATM 망에서 수율 및 공평성 향상을 위한 효율적 버퍼관리 기법)

  • 김남희
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.842-848
    • /
    • 2003
  • The Guaranteed Frame Rate(GFR) service has been designed to accomodate non-real-time applications, such as TCP/IP based traffic in ATM networks. One of the important factors is buffer management for guaranteeing QoS in GFR service. In this paper, we propose a buffer management scheme which can improve the fairness and the throughput through the traffic control in GFR service. For the evaluation of the proposed scheme, we compare proposed scheme with the existing scheme in the fairness and the throughput. Simulation results show that proposed scheme can improve the fairness and throughput than the existing scheme.

  • PDF