• Title/Summary/Keyword: Relay network

Search Result 701, Processing Time 0.025 seconds

Effective Routing Schemes for Double-Layered Peer-to-Peer Systems in MANET

  • Kim, Ji-Hoon;Lee, Kwang-Jo;Kim, Taek-Hun;Yang, Sung-Bong
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.19-31
    • /
    • 2011
  • In this paper, we propose two new routing schemes for double-layered peer-to-peer systems; a shorter-lower mobility routing scheme and a reverse path routing scheme. The shorter-lower mobility routing scheme first chooses shortest routing paths among possible routing paths and selects the path associated with the relay peer who has lower mobility to improve the reliability of the system. The reverse path routing scheme carries out unicasting (instead of multicasting) based on the reverse path information that can be obtained during the initial file search to further reduce network traffic. The experimental results showed that a double-layered peer-topeer system with the proposed hybrid scheme improved the reliability of the system about 1.5% over the hop count scheme and reduced network traffic by about 0.5% compared to the hop count scheme.

Outage Probability of a Two-Way Full-Duplex Relay Network with Imperfect CSI (불완전한 채널 정보를 갖는 전이중 양방향 중계 네트워크의 불능 확률 성능 분석)

  • Choi, Dongwook;Lee, Jae Hong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.11a
    • /
    • pp.67-68
    • /
    • 2012
  • 전이중(full-duplex) 양방향 중계 네트워크는 전이중 방식을 사용하는 중계기에서 물리 계층 네트워크 부호화(physical layer network coding) 혹은 중첩 부호화(superposition coding)을 사용하여 기존 반이중(half duplex) 중계기를 사용하는 양방향 중계 네트워크에 비해 높은 주파수 효율을 제공한다. 본 논문에서는 전이중 양방향 중계 네트워크를 고려하여 전이중 방식에서 필연적으로 발생하는 루프간섭 신호의 영향을 살펴보았다. 여기에서 사용자 및 중계기는 루프간섭 신호를 제거하기 위해 루프간섭 신호를 추정한다. 하지만 루프간섭 신호를 추정할 때 추정 오류가 발생하여 수신 신호에서 루프간섭 신호를 완벽하게 제거하기는 어렵다. 모의실험에서는 이로 인해 발생할 수 있는 성능 변화를 불능 확률을 통해 분석하였다.

  • PDF

Self-jamming based opportunistic relaying for a cooperative network (협력 네트워크를 위한 자가 전파방해 기반 기회적 중계 기법)

  • Kim, Jinsu;Lee, Jae Hong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.371-372
    • /
    • 2012
  • 본 논문은 협력 네트워크(cooperative network)에서 무선 채널의 보안성(security) 강화를 위한 자가 전파방해(self-jamming) 기반 기회적 중계(opportunistic relaying) 기법을 제안한다. 단일 송신 단말 (source)과 단일 수신 단말(destination)이 다중 중계 단말(relay)의 협력을 통해 송수신하는 이중 홉(dualhop) 네트워크에서 도청 단말(eavesdropper)에 의한 정보 절취를 최소화하기 위해 자가 전파방해 기법과 기회적 중계 기법을 결합한다. 이를 통해 무선 채널의 방송(broadcasting) 특성에 기인한 도청 용이성을 저하 시키고, 다중 중계 단말의 송신 전력을 최소화하여 협력 네트워크의 수명(lifetime)을 연장한다. 컴퓨터 모의실험 결과를 통해 제안된 기법이 다중 중계기가 있는 이중 홉 협력 네트워크에서 보안 전송률(secrecy rate)의 불능확률(outage probability) 성능을 제고함을 보인다.

  • PDF

Internal Fault Classification in Transformer Windings using Combination of Discrete Wavelet-Transforms and Back-propagation Neural Networks

  • Ngaopitakkul Atthapol;Kunakorn Anantawat
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.3
    • /
    • pp.365-371
    • /
    • 2006
  • This paper presents an algorithm based on a combination of Discrete Wavelet Transforms and neural networks for detection and classification of internal faults in a two-winding three-phase transformer. Fault conditions of the transformer are simulated using ATP/EMTP in order to obtain current signals. The training process for the neural network and fault diagnosis decision are implemented using toolboxes on MATLAB/Simulink. Various cases and fault types based on Thailand electricity transmission and distribution systems are studied to verify the validity of the algorithm. It is found that the proposed method gives a satisfactory accuracy, and will be particularly useful in a development of a modern differential relay for a transformer protection scheme.

The Development of Electronic Transformer(CT/PT) for Intelligent GIS Based on IEC 60044 (IEC 60044 기반 Intelligent GIS용 전자식 변성기 개발)

  • Kim, M.S.;Jung, J.R.;Kim, J.B.;Song, W.P.
    • Proceedings of the KIEE Conference
    • /
    • 2005.07c
    • /
    • pp.2262-2264
    • /
    • 2005
  • 지금까지 변전소나 개폐소에서 전류, 전압을 계측하는 수단으로서 주로 철심과 권선으로 구성되어진 변류기(CT), 계기용 변압기(PT, PD)가 사용되어져 왔다. 최근, 2차측의 계측기나 보호 Relay의 Digital화가 진전되어 또한 이것을 Digital Network으로 총합한 Intelligent 변전소의 구축이 검토되어지고 있으며, Digital Network에 대응한 변성기 관련규격인 IEC 60044가 근래 제정되어짐에 따라 이에 적합한 전자식 변성기가 요구되어지고 있다. 상기와 같은 요구로 인해 당사에서는 IEC 60044를 기반으로 한 전자식변성기 Layout을 구성하였으며, CT는 검출부에 Rogowski Coil을 적용하며 그 후단에 적분기를 설치하였으며, VD는 검출부에 중간 전극을 이용해서 분압하는 방식인 Capacitive Voltage Divider를 사용하고 증폭기를 삽입하여, 각각 요구되는 전압 신호를 얻었다. 이러한 신형 CT/VD의 적용으로 종래의 CT/PT가 차지하는 공간이 필요없게 되어 컴팩트한 GIS의 구조가 가능하게 되어 있다.

  • PDF

A Study on the Development of Digital CT/VD for GIS (가스절연개폐장치(GIS)용 디지털 CT/VD 개발에 관한 연구)

  • Kim, M.S.;Kim, J.B.;Song, W.P.;Kim, D.S.
    • Proceedings of the KIEE Conference
    • /
    • 2002.11a
    • /
    • pp.22-24
    • /
    • 2002
  • 지금까지 변전소나 개폐소에서 전류, 전압을 계측하는 수단으로서 주로 철심과 권선으로 구성되어진 변류기(CT), 계기용 변압기(PT, PD)가 사용되어져 왔다. 최근, 2차측의 계측기나 보호 Relay의 Digital화가 진전되어, 또한 이것을 Digital Network으로 총합한 Intelligent 변전소의 구축이 검토되어짐에 따라, Digital Network에 대응한 신형 CT, VD가 요구되어지고 있다. 상기와 같은 요구로 인해 당사에서는 CT는 검출부에 Rogowski Coil을 적용하며 그 후단에 적분기를 설치하였으며, VD는 검출부에 중간 전극을 이용해서 분압하는 방식인 Capacitive Voltage Divider를 사용하고 증폭기를 삽입하여, 각각 요구되는 전압 신호를 얻었다. 이러한 신형 CT/VD의 적용으로 종래의 CT/PT가 차지하는 공간이 필요 없게 되어 컴팩트한 GIS의 구조가 가능하게 되어 있다.

  • PDF

PNC(Pipeline Network Coding)-Based Message and Node Authentication in Wireless Networks (무선 네트워크에서 파이프라인 네트워크 코딩 기반 메시지 및 노드 인증)

  • Ahn, Myeong-Gi;Cho, Young-Jong;Kang, Kyungran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.999-1008
    • /
    • 2017
  • In this paper, we propose a pipeline network coding (PNC) scheme for efficient data transmission in wireless networks, a data authentication scheme for verifying the integrity of data, and a node authentication scheme for a virtual source. PNC is a technique that improves the overall network performance by relaying data such that the relay node performing network coding transmits to the sender instead. However, network coding is vulnerable to a pollution attack, which is an attack by a malicious attacker to inject modified data into the network. To prevent this, hash-based message authentication code (HMAC) is used. For this purpose, in order to generate a tag used for data authentication, a key must be distributed to the nodes performing authentication. We applied a hash chain to minimize the overhead of key distribution. A null vector is used as the authentication scheme for the virtual source. Finally, we analyze the safety and complexity of the proposed scheme and show he performance through simulation.

System Throughput of Cognitive Radio Multi-hop Relay Networks (무선인지 멀티홉 릴레이 네트워크의 시스템 스루풋)

  • Hassan, I.;Rho, Chang-Bae;Song, Ju-Bin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.4
    • /
    • pp.29-39
    • /
    • 2009
  • The need for radio spectrum is recently considered as a huge hurdle towards the rapid development of wireless networks. Large parts of the spectrum are allocated to licensed radio services in proprietary way. However, enormous success of the wireless services and technologies in the unlicensed bands has brought new ideas and innovations. In recent years cognitive radio has gained much attention for solving the spectrum scarcity problem. It changes the way spectrum is regulated so that more efficient spectrum utilization is possible. Multi-hop relay technology on the other hand has intensively been studied in the area of ad hoc and peer-to-peer networks. But in cellular network, only recently the integration of multi-hop capability is considered to enhance the performance significantly. Multi-hop relaying can extend the coverage of the cell to provide high data rate service to a greater distance and in the shadowed regions. Very few papers still exist that combine these methods to maximize the spectrum utilization. Thus we propose a network architecture combining these two technologies in a way to maximize the system throughput. We present the throughput capacity equations for the proposed system model considering various system parameters like utilization factor by the primary users and primary users' transmission radius and through extensive numerical simulations we analyze the significance of work.

A Mobility Supporting MAC Protocol to Improve Handover Performance in IEEE 802.16j Multi-hop Relay Networks (IEEE 802.16j 멀티 홉 릴레이 네트워크에서의 핸드오버 성능 향상을 위한 이동성 지원 MAC 프로토콜)

  • Yang, Hyeon-Chae;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.437-452
    • /
    • 2008
  • IEEE 802.16j MR networks introduce RSs (Relay Stations) within the IEEE 802.16 system in order to enhance the data throughput and extend the coverage. However, the current standardization defines that the BS (Base Station) controls MS's (Mobile Station's) handover, not only it induces the large signaling overhead but also handover latency could increase. In this paper, we propose a handover protocol in the MR networks where the high capability RSs that can process the MS's control functions are deployed. First, we classify the handover scenarios for the MR networks with the high capability RSs. Then, we define the MAC handover procedure, corresponding MAC management messages and the transmission routes for the proposed messages so that an 802.16e MS can perform seamless handover without noticing it is attached to an MR network. The simulation results show that the proposed handover protocol not only reduces the MAC management message overhead transferred through the wireless links compared to IEEE 802.16j/D1, which is the current standard for MR networks, but also performs the rapider and more secure MS handover than IEEE 802.16e and IEEE 802.16j/D1.

Modulation Scheme for Network-coded Bi-directional Relaying over an Asymmetric Channel (양방향 비대칭 채널에서 네트워크 부호화를 위한 변조 방식)

  • Ryu, Hyun-Seok;Kang, Chung-G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2B
    • /
    • pp.97-109
    • /
    • 2012
  • In this paper, we propose a modulation scheme for a network-coded bi-directional relaying (NBR) system over an asymmetric channel, which means that the qualities of the relay channel (the link between the BS and RS) and access channel (the link between the RS and MS) are not identical. The proposed scheme employs a dual constellation in such a way that the RS broadcasts the network-coded symbols modulated by two different constellations to the MS and BS over two consecutive transmission intervals. We derive an upper bound on the average bit error rate (BER) of the proposed scheme, and compare it with the hybrid constellation-based modulation scheme proposed for the asymmetric bi-directional link. Furthermore, we investigate the channel utilization of the existing bi-directional relaying schemes as well as the NBR system with the proposed dual constellation diversity-based modulation (DCD). From our simulation results, we show that the DCD gives better average BER performance about 3.5~4dB when $E_b/N_0$ is equal to $10^{-2}$, while maintaining the same spectral efficiency as the existing NBR schemes over the asymmetric bi-directional relaying channel.