• Title/Summary/Keyword: Wireless Cellular Network

Search Result 223, Processing Time 0.025 seconds

User Scheduling Algorithm Based on Signal Quality and Inter-User Interference for Outage Minimization in Full-Duplex Cellular Networks (전이중 셀룰라 네트워크에서 아웃티지 최소화를 위한 신호 품질과 사용자간 간섭량 기반의 사용자 스케쥴링 알고리즘)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2576-2583
    • /
    • 2015
  • In a full-duplex (FD) wireless cellular network, uplink (UL) users induce the severe inter-user interference to downlink (DL) users. Therefore, a user scheduling that makes a pair of DL user and UL user to use the same radio resource simultaneously influences the system performances significantly. In this paper, we first formulate an optimization problem for user scheduling to minimize the occurrence of outage, aiming to guarantee the quality of service of users, and then we propose a suboptimal user scheduling algorithm with low complexity. The proposed scheduling algorithm is designed in a way where the DL user with a worse signal quality has a higher priority to choose its UL user that causes less interference. Simulation results show that the FD system using the proposed user scheduling algorithm achieves the optimal performance and significantly decreases the outage probability compared with the conventional half-duplex cellular system.

DANCE : Small AP On/Off Algorithms in Ultra Dense Wireless Network (DANCE : 초고밀도 통신망에서의 소형기지국 온-오프 알고리즘)

  • Lee, Gilsoo;Kim, Hongseok;Kim, Young-Tae;Kim, Byoung-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.12
    • /
    • pp.1135-1144
    • /
    • 2013
  • Deploying small cells is a reliable and influential solution to handle the skyrocketing traffic increase in the cellular network, and the small cell technology is evolving to ultra-dense network (UDN). In this paper we propose a small cell on/off algorithm with a simple but essential framework composed of access point (AP), user equipment (UE), and small cell controller (SCC). We propose Device-Assisted Networking for Cellular grEening (DANCE) algorithms that save the energy consumption by tying to minimize the number of turned-on APs while maintaining the network throughput. In doing so, SCC firstly gathers the feedback messages from UEs and then makes a decision including a set of turned-on APs and user association. DANCE algorithm has several variations depending on the number of bits of the UE's feedback message (1 bit vs. N bit), and is divided into AP-first, UE-first, or Proximity ON according to the criteria of selecting the turned-on APs. We perform extensive simulations under the realistic UDN environment, and the results confirm that the proposed algorithms, compared to the baseline, can significantly enhance the energy efficiency, e.g., more than a factor of 10.

Reliability Constrained Resource Allocation in Cellular Network Uplink Scheduler (이동통신 역방향 스케줄러에서의 고신뢰성 자원 할당 기법)

  • Lee, Sung-Won;Jung, Kwang-Ryul;Park, Ae-Soon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.57-66
    • /
    • 2010
  • In this paper, we propose the reliability constrained resource allocation scheduling algorithm in cellular network for uplink transmission, where uplink transmission is supported via packet switching schemes without the dedicated uplink circuit links. We evaluate the performance of the proposed algorithm, and compared with the conventional works to identify the pros and cons. The proposed uplink scheduling algorithm is to satisfy the constraints requirements of the MTC services which is considered as the core technology for future mobile wireless networks. It is different to conventional works which target to maximize the link capacity. The proposed algorithm provides reliable uplink transmission independent to the location and the quality of the wireless link of the mobile terminal. Based on the performance evaluation results, we conclude that the proposed method provides enhanced reliability performance than conventional works.

Performance comparison of Tabu search and genetic algorithm for cell planning of 5G cellular network (5G 이동통신 셀 설계를 위한 타부 탐색과 유전 알고리즘의 성능)

  • Kwon, Ohyun;Ahn, Heungseop;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.65-73
    • /
    • 2017
  • The fifth generation(5G) of wireless networks will connect not only smart phone but also unimaginable things. Therefore, 5G cellular network is facing the soaring traffic demand of numerous user devices. To solve this problem, a huge amount of 5G base stations will need to be installed. The base station positioning problem is an NP-hard problem that does not know how long it will take to solve the problem. Because, it can not find an answer other than to check the number of all cases. In this paper, to solve the NP hard problem, we compare the tabu search and the genetic algorithm using real maps for optimal cell planning. We also perform Monte Carlo simulations to study the performance of the Tabu search and Genetic algorithm for 5G cell planning. As a results, Tabu search required 2.95 times less computation time than Genetic algorithm and showed accuracy difference of 2dBm.

A remote vehicle diagnosis and control system based on mobile cellular network (이동 통신망 기반의 차량 원격 진단 및 제어 시스템)

  • Choi Yong-Wun;Hong Won-Kee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.1
    • /
    • pp.69-76
    • /
    • 2006
  • Telematics, which is a compound word of a telecommunication and informatics, provides drivers with useful driving information such as driving path guidance, accident or robbery detection, traffic conditions and other valuable data at real time. This paper proposes and implements how to build a telematics terminal equipped with CDMA and GPS running embedded Linux, to check a vehicle's state through communication between telematics server and vehicle terminals using a cellular phone and to control a vehicle using SMS as shown in Figure 1. In order to do this, we use the SK-VM platform which is mobile terminal platform based on JAVA to design, implement and evaluate it.

  • PDF

BandBlock: Bandwidth allocation in blockchain-empowered UAV-based heterogeneous networks

  • Kuna Venkateswarararao;Pratik Kumar;Akash Solanki;Pravati Swain
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.945-954
    • /
    • 2022
  • The 5G mobile network is promising to handle the dynamic traffic demands of user equipment (UE). Unmanned aerial vehicles (UAVs) equipped with wireless transceivers can act as flying base stations in heterogeneous networks to ensure the quality of service of UE. However, it is challenging to efficiently allocate limited bandwidth to UE due to dynamic traffic demands and low network coverage. In this study, a blockchain-enabled bandwidth allocation framework is proposed for secure bandwidth trading. Furthermore, the proposed framework is based on the Cournot oligopoly game theoretical model to provide the optimal solution; that is, bandwidth is allocated to different UE based on the available bandwidth at UAV-assisted-based stations (UBSs) with optimal profit. The Cournot oligopoly game is performed between UBSs and cellular base stations (CBSs). Utility functions for both UBSs and CBSs are introduced on the basis of the available bandwidth, total demand of CSBs, and cost of providing cellular services. The proposed framework prevents security attacks and maximizes the utility functions of UBSs and CBSs.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

Performance Improvement of Wireless Uplink Channels Using Packet Diversity (패킷 다이버시티를 이용한 무선 상향 링크의 성능 개선)

  • Lee, Goo-Yeon;Kim, Hwa-Jong;Jeong, Choong-Kyo;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.24 no.B
    • /
    • pp.187-192
    • /
    • 2004
  • In this paper, we introduce a packet diversity scheme to increase uplink channel utilization in a wireless network where forward error correction is used. The packet diversity allows neighbor base stations to receive uplink packets from a mobile terminal in order to increase the utilization of the uplink channel. By allowing multiple base stations to receive the same packets, we can improve the error correction capability in an uplink channel. By incorporating the packet diversity we can reduce the parity overhead of each packet for a given tolerable loss probability, which improves the link efficiency.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

Software Development for PC-PC Remote Measurement of Automobile's Fault Detection using the Bluetooth (브루투스를 이용한 자동차 고장 진단신호의 PC-PC 원격계측 소프트웨어 개발)

  • 윤여흥;정진호;서진원;이영춘;권대규
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.257-260
    • /
    • 1997
  • Bluetooth is the most promising network paradigm which ca open the new area in the information technology. Especially, bluetooth can link all the electrical products and PCs(Personal Computer) to cellular phone or PDA. In this paper, the data from ECU which are gathered by scanner are communicated between tow PCs using the bluethooth modules. The acquired data are ECU's self diagnosis signal and sensor output signal. Self diagnosis signals are very important to check the ECU's state and sensor output signals. Using these data, the possibility of wireless communication with ECU is developed and verified. Protocol stack of bluetooth is L2CAP through HCI and wireless communication software of ECU's signal is developed using VC++ in Windows 98 environment.

  • PDF