• Title/Summary/Keyword: Radio Network

Search Result 1,727, Processing Time 0.035 seconds

An Heuristic for Joint Assignments of Power and Subcarriers in Cognitive Radio Networks (인지라디오 네트워크에서 전력과 부반송파 할당을 위한 휴리스틱)

  • Paik, Chun-Hyun
    • Korean Management Science Review
    • /
    • v.29 no.2
    • /
    • pp.65-77
    • /
    • 2012
  • With the explosivley increasing demand in wireless telecommunication service, the shortage of radio spectrum has been worsen. The traditional approach of the current fixed spectrum allocation leads to spectrum underutilization. Recently, CR (Cognitive Radio) technologies are proposed to enhance the spectrum utilization by allocating dynamically radio resources to CR Networks. In this study, we consider a radio resource(power, subcarrier) allocation problem for OFDMA-based CRN in which a base station supports a variety of CUs (CRN Users) while avoiding the radio interference to PRN (Primary Radio Network). The problem is mathematically formulated as a general 0-1 IP problem. The optimal solution method for the IP problem requires an unrealistic execution time due to its complexity. Therefore, we propose an heuristic that gives an approximate solution within a reasonable execution time.

A Study of Digital Message Transfer System based on R-NAD for FM Radios (FM무전기를 통한 디지털 메시지 전송장비에 R-NAD 적용 연구)

  • Rho, Hai-Hwan;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.523-526
    • /
    • 2010
  • FM Radio communication operating mode is half-duplex mode. FM radio network access control shall be used to detect the presence of active transmissions on a multiple-subscriber-access communications network and shall provide a means to preclude data transmissions from conflicting on the network. In this study, we implemented R-NAD(Random Network Access Delay) that is one of network access control method.

  • PDF

An ANP-based Resource Management Scheme in Heterogeneous Wireless Networks Considering Multiple Criteria (다기준 요소를 고려한 ANP 기반 이기종 무선 네트워크 자원관리 방안)

  • Shin, Choong-Yong;Cho, Jin-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.910-920
    • /
    • 2011
  • In a heterogeneous wireless environment, a variety of Radio Access Technologies (RATs) coexist. Since the number of RATs is anticipated to increase in the near future, it is desirable to have radio and network resources managed in a cooperative manner using the Common Radio Resource Management (CRRM) strategy. In order to make RAT-specific radio resources manageable in CRRM, this paper proposes the Analytical Network Process (ANP) based resource management scheme that efficiently allocates resources among heterogeneous wireless networks. The proposed ANP-based method is flexible enough to be used in any network environment and can consider a multitude of decision factors. In addition, the proposed scheme uses a radio bandwidth model, which properly reflects transmission rates under given channel conditions, as the actual radio resources to be allocated. The model considers the AMC (Adaptive Modulation and Coding) scheme that is widely used in current broadband wireless access technologies, and thus, packet service characteristics, such as response time, can be analyzed. The effectiveness and flexibility of the proposed method are demonstrated by implementing a number of existing factors on heterogeneous networks environment.

The Analysis of the TETRA Authentication Protocol (TETRA 인증 프로토콜 분석)

  • Park Yong-Seok;Ahn Jae-Hwan;Jung Chang-Ho;Ahn Joung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1070-1075
    • /
    • 2006
  • TETRA system provides the radio authentication service which permits only authorized radio to access network. Radio authentication is the process which checks the sameness of authentication-key(K) shared between radio and authentication center by challenge-response protocol. TETRA standard authentication protocol can prevent the clone radio to copy ISSI from accessing network, but can't prevent the clone radio to copy ISSI & authentication-key. This paper analyzes authentication-key generation/delivery/infection model in TETRA authentication system and analyzes the threat of clone radio caused by authentication-key exposure. Finally we propose the new authentication protocol which prevent the clone radio to copy ISSI & authentication-key from accessing network.

Analysis of Domestic and Foreign Frequency Demands for 700 MHz Band and Consideration for Building Public Integrated Radio Network (700 MHz 대역의 국내·외 주파수 수요 분석 및 공공통합망 구축시 고려사항)

  • Park, Duk-Kyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.10
    • /
    • pp.1028-1039
    • /
    • 2014
  • After DTV transition, frequency allocation to efficiently utilize 700 MHz band, which is remained as Digital Dividend, is in progress domestically and internationally. This paper investigates global frequency allocation of 700 MHz band and utilization of the band, and analyzes domestic wireless technology methods and requested frequency bandwidth by use. In addition, the paper suggests what needs to be considered in case of building public integrated radio network that focuses on disaster and safety network; the integrated radio network also includes railway network and e-Navigation.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

Cluster-based Cooperative Data Forwarding with Multi-radio Multi-channel for Multi-flow Wireless Networks

  • Aung, Cherry Ye;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5149-5173
    • /
    • 2016
  • Cooperative forwarding has shown a substantial network performance improvement compared to traditional routing in multi-hop wireless network. To further enhance the system throughput, especially in the presence of highly congested multiple cross traffic flows, a promising way is to incorporate the multi-radio multi-channel (MRMC) capability into cooperative forwarding. However, it requires to jointly address multiple issues. These include radio-channel assignment, routing metric computation, candidate relay set selection, candidate relay prioritization, data broadcasting over multi-radio multi-channel, and best relay selection using a coordination scheme. In this paper, we propose a simple and efficient cluster-based cooperative data forwarding (CCDF) which jointly addresses all these issues. We study the performance impact when the same candidate relay set is being used for multiple cross traffic flows in the network. The network simulation shows that the CCDF with MRMC not only retains the advantage of receiver diversity in cooperative forwarding but also minimizes the interference, which therefore further enhances the system throughput for the network with multiple cross traffic flows.

Continuous Control Message Exchange in Distributed Cognitive Radio Networks

  • Arega, Zerabruk G.;Kim, Bosung;Roh, Byeong-hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.206-209
    • /
    • 2014
  • Control message exchange is major job for cognitive radio to exist and use spectrum opportunistically. For this control message exchange they need a common control channel (CCC). Once this channel is affected by a primary user, communication stops until new CCC is setup. This takes substantial time and if they could not get free channel, this halt continues for long time. To prevent such cease of communication, we propose a combination of two networks, namely WLAN and UWB, to let the communication continue. In our proposed idea if the CCC of a certain CR in WLAN is affected, the CR changes its network from WLAN to UWB and keeps the communication because UWB cannot be affected by PU. In the proposed idea every cognitive radio has two transceivers; one for the overlay network (WLAN) and another UWB network. If a primary user is detected in the spectrum of a cognitive radio, it continues exchanging control messages under the UWB network and in parallel negotiates for a new CCC using the WLAN network. This idea solves the communication interruption until new CCC is setup.

VLBI NETWORK SIMULATOR: AN INTEGRATED SIMULATION TOOL FOR RADIO ASTRONOMERS

  • Zhao, Zhen;An, Tao;Lao, Baoqiang
    • Journal of The Korean Astronomical Society
    • /
    • v.52 no.5
    • /
    • pp.207-216
    • /
    • 2019
  • In this paper we introduce a software package, the Very long baseline interferometry Network SIMulator (VNSIM), which provides an integrated platform assisting radio astronomers to design Very Long Baseline Interferometry (VLBI) experiments and evaluate the network performance, with a user-friendly interface. Though VNSIM is primarily motivated by the East Asia VLBI Network, it can also be used for other VLBI networks and generic interferometers. The software package not only integrates the functionality of plotting (u, v) coverage, scheduling the observation, and displaying the dirty and CLEAN images, but also adds new features including sensitivity calculations for a given VLBI network. VNSIM provides flexible interactions on both command line and graphical user interface and offers friendly support for log reports and database management. Multi-processing acceleration is also supported, enabling users to handle large survey data. To facilitate future developments and updates, all simulation functions are encapsulated in separate Python modules, allowing independent invoking and testing. In order to verify the performance of VNSIM, we performed simulations and compared the results with other simulation tools, showing good agreement.

Smart Dynamic Pricing in Cognitive Radio Systems

  • Vo, Dat
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.2
    • /
    • pp.11-18
    • /
    • 2012
  • Smart Dynamic Pricing has been introduced to address the under-utilised network resources problem in mobile telecommunications systems. In this paper, we investigate the applicability of Smart Dynamic Pricing and its signalling models into Cognitive Radio Systems. Cognitive Radio System is defined as one in which cognitive radios are employed to access shared spectrum and/or dynamically allocated spectrum. Network elements, protocols, traffic and control channels, and system architecture are proposed for the implementation of Smart Dynamic Pricing in Cognitive Radio System. It is found that Smart Dynamic Pricing and its signalling models can be applied to Cognitive Radio Systems.