• Title/Summary/Keyword: Radio relay system

Search Result 108, Processing Time 0.025 seconds

Distributed Matching Algorithms for Spectrum Access: A Comparative Study and Further Enhancements

  • Ali, Bakhtiar;Zamir, Nida;Ng, Soon Xin;Butt, Muhammad Fasih Uddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1594-1617
    • /
    • 2018
  • In this paper, we consider a spectrum access scenario which consists of two groups of users, namely Primary Users (PUs) and Secondary Users (SUs) in Cooperative Cognitive Radio Networks (CCRNs). SUs cooperatively relay PUs messages based on Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative techniques, in exchange for accessing some of the spectrum for their secondary communications. From the literatures, we found that the Conventional Distributed Algorithm (CDA) and Pragmatic Distributed Algorithm (PDA) aim to maximize the PU sum-rate resulting in a lower sum-rate for the SU. In this contribution, we have investigated a suit of distributed matching algorithms. More specifically, we investigated SU-based CDA (CDA-SU) and SU-based PDA (PDA-SU) that maximize the SU sum-rate. We have also proposed the All User-based PDA (PDA-ALL), for maximizing the sum-rates of both PU and SU groups. A comparative study of CDA, PDA, CDA-SU, PDA-SU and PDA-ALL is conducted, and the strength of each scheme is highlighted. Different schemes may be suitable for different applications. All schemes are investigated under the idealistic scenario involving perfect coding and perfect modulation, as well as under practical scenario involving actual coding and actual modulation. Explicitly, our practical scenario considers the adaptive coded modulation based DF schemes for transmission flexibility and efficiency. More specifically, we have considered the Self-Concatenated Convolutional Code (SECCC), which exhibits low complexity, since it invokes only a single encoder and a single decoder. Furthermore, puncturing has been employed for enhancing the bandwidth efficiency of SECCC. As another enhancement, physical layer security has been applied to our system by introducing a unique Advanced Encryption Standard (AES) based puncturing to our SECCC scheme.

OVERALL LINK ANALYSIS ON HRIT AND LRIT IN COMS

  • Park Durk-Jong;Hyun Dae-Wan;Kang Chi-Ho;Ahn Sang-Il;Kim Eun-Kyu
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.98-100
    • /
    • 2005
  • This paper describes link analysis on the processed data, HRIT (High Rate Information Transmission) and LRIT (Low Rate Information Transmission), for the preliminary design of interface between COMS (Communication, Ocean and Meteorological Satellite) and ground station. At the MODAC (MeteorologicaVOcean Data Application Center), the processed data are transmitted to user station via COMS with normalization and calibration by pre-processing of MI (Meteorological Imager) data. Due to consider satellite as radio relay, overall analysis containing uplink and downlink is needed. Specific link parameters can be obtained with using the outcomes of SRR (System Requirement Review) which was held on 13-14 June 2005, in Toulouse. From the relation between overall link margin and output power of HPA (High Power Amplifier) of MODAC, it is shown that even though the minimum power related with COMS receiving power range is transmitted at MODAC, the obtained link margin of HRIT could be above 3 dB at user station which antenna elevation angle is 10 degree.

  • PDF

Implementation of an Automatic Door Lock System Using DTMF Signal of a Mobile Phone (모바일 단말기의 DTMF 신호를 이용한 자동 도어락 시스템 구현)

  • Bae Ki-Won;Yang Doo-Yeong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.8-13
    • /
    • 2006
  • In this thesis, an automatic door lock system using a dual tone multiple frequency(DTMF) signal generated as pushing the key button of mobile phone is proposed and implemented. This system consists of a transmitter module and a receiver module for processing the DTMF signal of mobile phone. The DTMF signal of mobile phone connected with ear-phone jack enter into the input terminal of DTMF receiver and those are encoded by a code-converter with 4-bits binary format in the DTMF receiver. The encoded output signals are transmitted to the amplitude shift keying(ASK) modulator of transmitter module and the modulated ASK signals which are converted into radio frequency(RF) signals propagate in a free space. The RF signals passed through a free space are demodulated by the ASK demodulator of receiver module and the demodulated ASK signals are sent to a micro-controller unit(MCU). The output signals processed by the MCU are compared with the secreted identification number which is prerecorded in a microprocessor and are transferred to a power relay. If the result is the same, the automatic door lock system opens a door. In the opposite case, it maintains closing the door. The implemented automatic door lock system operates well in mobile environments.

  • PDF

Efficient Cognitive and Cooperative Communication Scheme for Multiuser OFDMA Systems using Relays (중계기를 사용하는 다중 사용자 OFDMA 시스템을 위한 효율적인 인지 협력 통신 기법)

  • Kang, Min-Gyu;Sang, Young-Jin;Ko, Byung-Hoon;Kim, Kwang-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.235-243
    • /
    • 2009
  • In this paper, we investigate the cognitive and cooperative communication scheme to improve the spectral efficiency in multiuser OFDMA systems using wireless relays. First, we propose the frame structure in which the efficient frequency reuse scheme with the cognitive technique is performed to increase the system throughput. And in the case where the THP (Tomlinson-Harashima preceding) is used for the elimination of interference from the relay, we derive the effective signal to noise ratio of the link largely affected by the channel quantization error. From the system level simulation results, it is shown that the proposed cognitive and cooperative communication scheme increases the overall system performance including the feedback overhead.

HeNB-Aided Virtual-Handover for Range Expansion in LTE Femtocell Networks

  • Tang, Hao;Hong, Peilin;Xue, Kaiping
    • Journal of Communications and Networks
    • /
    • v.15 no.3
    • /
    • pp.312-320
    • /
    • 2013
  • Home evolved Node-B (HeNB), also called a femtocell or a femto base station, is introduced to provide high data rate to indoor users. However, two main problems arise in femtocell networks: (1) Small coverage area of HeNB, which results in limited cell-splitting gain and ping-pong handover (HO) problems and (2) high inter-femtocell interference because HeNBs may be densely deployed in a small region. In this study, an efficient cooperation mechanism called an HeNB-aided virtual-HO (HaVHO) scheme is proposed to expand the coverage area of femtocells and to reduce inter-femtocell interference. The cooperation among neighbor HeNBs is exploited in HaVHO by enabling an HeNB to relay the data of its neighbor HeNB without an HO. The HaVHO procedure is compatible with the existing long term evolution specification, and the information exchange overhead in HaVHO is relatively low. To estimate the signal to interference plus noise ratio improvement, the area average channel state metric is proposed, and the amount of user throughput enhancement by HaVHO is derived. System-level simulation shows that HaVHO has a better performance than the other four schemes, such as lesser radio link failure, lesser ping-pong handover, lesser short-stay handover, and higher user throughput.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

A Study on the Wireless Communication Method for Emergency Broadcasting System in Metro Environments (도시철도용 비상방송시스템을 위한 무선통신방식 연구)

  • Jang, Soo-Hyun;Shin, Dae-Kyo;Yoon, Sang-Hun;Jung, Han-Gyun;Jin, Seong-Keun;Lim, Ki-Taeg
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.6
    • /
    • pp.202-210
    • /
    • 2018
  • Recently, the subway running in metro environments has a problem in securing the safety of passengers due to the failure of announcement in emergency situations such as breakdown, train accidents and power outage in the underground tunnels. Thus, there is a need to develop an emergency broadcasting system that can provide the announcement to all passenger cars in any emergency situations on the railway route. In this paper, the applicability of various wireless communication technologies for the emergency broadcasting system through the measurement campaign was examined in Seoul metropolitan subway. A WAVE(Wireless Access in Vehicular Environments) is communication technology that can use 5.9GHz dedicated frequency band without charge and it is possible to directly communicate between terminals over 200m without the help of additional relay. Especially, it confirms robust communication performance in the various metro environments, and therefore, it is considered to be suitable as a communication method of a radio-connected emergency broadcasting system for urban subway.

A Study on Traffic analysis for System Optimization of CDMA base station and repeaters (CDMA 기지국과 중계기의 시스템 최적화를 위한 Traffic 분석 기법)

  • Jo, Ung;Chin, Yong-Ohk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4C
    • /
    • pp.333-341
    • /
    • 2002
  • This article is written to make a foundation for effective radio network engineering by enabling the accurate traffic assumption between Base Station (BTS : Base Station Transceiver Subsystem) md Repeater through the scientific and systematic analysis of mobile traffic dealt within CDMA Base Station. Among these, Repeater, having direct physical connection with BTS, simply does the remote relay function but the volume of the traffic flowed into the repeater is not accountable. The total BTS traffic is the sum of traffic dealt by the BTS and multiple Repeaters. In this article, we tried traffic analysis of this kind by adopting RTD (Round Trip Delay) which is specially designed to measure distribution of the distance between the Base Station and the Mobile station by differentiating the traffic dealt by BTS from traffic dealt by Repeaters. The fact that the connection between mobile station and BTS via Repeater (which is located remotely) yields far more delay than the direct connection between mobile station and BTS is the clue of this article. Based on this fact, Time Delay equipment was put at the receiving side of the Repeater to add certain amount of delay to the traffic to BTS and the result showed that the 99.78% of the traffic can be identified.