• Title/Summary/Keyword: Wireless Distribution System

Search Result 286, Processing Time 0.028 seconds

Analysis of Network Traffic with Urban Area Characteristics for Mobile Network Traffic Model (이동통신 네트워크 트래픽 모델을 위한 도시 지역 이동통신 트래픽 특성 분석)

  • Yoon, Young-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.471-478
    • /
    • 2003
  • Traditionally,, analysis, simulation and measurement have all been used to evaluate the performance of network protocols and functional entities that support mobile wireless service. Simulation methods are useful for testing the complex systems which have the very complicate interactions between components. To develop a mobile call simulator which is used to examine, validate, and predict the performance of mobile wireless call procedures must have the teletraffic model, which is to describe the mobile communication environments. Mobile teletraffic model is consists of 2 sub-models, traffic source and network traffic model. In this paper, we analyzed the network traffic data which are gathered from selected Base Stations (BSs) to define the mobile teletraffic model. We defined 4 types of cell location-Residential, Commercial, Industrial, and Afforest zone. We selected some Base Stations (BSs) which are represented cell location types in Seoul city, and gathered real data from them And then, we present the call rate per hour, cail distribution pattern per day, busy hours, loose hours, the maximum number of call, and the minimum number of calls based on defined cell location types. Those parameters are very important to test the mobile communication system´s performance and reliability and are very useful for defining the mobile network traffic model or for working the existed mobile simulation programs as input parameters.

A Proposal of USN-based DER(Decentralized Energy Resources) Management System (USN 기반의 댁내 분산 전력 관리 시스템 제안)

  • Kim, Bo-Min;Kim, Jeong-Young;Bang, Hyun-Jin;Jang, Min-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.871-874
    • /
    • 2010
  • Needs for Smart Grid development are increasing all over the world as a solution to its problem according to depletion of energy resources, climatic and environmental rapidly change and growing demand for electrical power. Especially decentralized power is attracting world's attention. In this mood a new era for a unit scale of decentralized power environment is on its way in building. However there is a problem to have to be solved in the uniformity of power quality because the amount of power generated from renewable energy resources such as wind power and solar light is very sensitive to climate fluctuation. And thus this paper tries to suggest an energy management method on basis of real time monitoring for meteorological data. In the current situation of lacking in USN-based killer application in Smart Grid field, this paper proposes the USN-based DER management system which collects the meteorological data and control power system througout utilizing wireless sensor network technique this business. This communication technique is regarded to be efficient in aspects of installation cost and tits maintenance cost. The proposed EMS model embodies the method for predicting the power generation by monitoring and analyzing the climatic data and controling the efficient power distribution between the renewable energy and the existing power. The ultimate goal of this paper is to provide the technological basis for achieving zero-energy house.

  • PDF

A Nearest Neighbor Query Processing Algorithm Supporting K-anonymity Based on Weighted Adjacency Graph in LBS (위치 기반 서비스에서 K-anonymity를 보장하는 가중치 근접성 그래프 기반 최근접 질의처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.4
    • /
    • pp.83-92
    • /
    • 2012
  • Location-based services (LBS) are increasingly popular due to the improvement of geo-positioning capabilities and wireless communication technology. However, in order to enjoy LBS services, a user requesting a query must send his/her exact location to the LBS provider. Therefore, it is a key challenge to preserve user's privacy while providing LBS. To solve this problem, the existing method employs a 2PASS cloaking framework that not only hides the actual user location but also reduces bandwidth consumption. However, 2PASS does not fully guarantee the actual user privacy because it does not take the real user distribution into account. Hence, in this paper, we propose a nearest neighbor query processing algorithm that supports K-anonymity property based on the weighted adjacency graph(WAG). Our algorithm not only preserves the location of a user by guaranteeing k-anonymity in a query region, but also improves a bandwidth usage by reducing unnecessary search for a query result. We demonstrate from experimental results that our algorithm outperforms the existing one in terms of query processing time and bandwidth usage.

Improving Hot Spot Problem in Layer of DL-LEACH

  • LEE, WooSuk;Jin, Seung Yeon;Jung, Kye-Dong;Lee, Jong-Yong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.64-69
    • /
    • 2017
  • The abstract should summarize the contents of the paper and written below the author information. Use th In Wide-area Wireless Sensor Networks, network lifetime is short due to energy consumption due to transmission distance. To improve this, we divide the sensor field into layers and reduce transmission distance through multi-hop transmission. However, there is a problem in that the transmission rate drops because there is no Cluster Head in the layer, or the transmission distance increases due to the layer, and energy is wasted. There are DL-LEACH and EDL-LEACH as Protocols to improve this. DL-LEACH uses either single-hop transmission or multi-hop transmission depending on the situation. As a result, the transmission distance is optimized, thereby reducing energy consumption. In case of EDL-LEACH, it is proposed to improve the data rate in DL-LEACH. It is the same as DL-LEACH, but the Cluster Head is mandatory for all layers to improve the transmission rate. Although there is no Cluster Head for each layer, the transmission rate is improved, but the network life is shortened. In this paper, we try to improve the network lifetime while maintaining the EDL-LEACH transmission rate. The shortened network lifetime is due to Cluster Head overload near the base station. To improve this, the Cluster Head distribution method is improved and the network lifetime is improved.

The data transmission of the of u-lD sensor networks configuration with a Bluetooth (Bluetooth를 이용한 u-lD센서네트워크 구성에서의 데이터 전송)

  • Kim Young-kil;Park Ji-hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.242-246
    • /
    • 2005
  • RFID(Radio Frequency Identification) which is emerging from a change in digital convergence paradigm and recently rapidly advancing throughout the overall society is the core technology based on Ubiquitous network. In other words, This is a technology to identify the information of the object and recognize the situation by attaching electrical tag to an object and using Reader that can read the information of the object. With the emergence of the technology, it has turned the existing maintenance of the product into the network and intelligence of the product control by using the bar cord to maintain the product and will lead a revolution throughout overall society by affecting the fields of distribution and product maintenance as well as those of medicines, chemicals and food which the electrical tag can be attached to. his paper shows that utilizing the Bluetooth which is a local wireless telecommunication in the standalone imbedded system can implement the piconet configuration among the Readers and the data telecommunication with the main server.

Achievable Sum Rate Analysis of ZF Receivers in 3D MIMO Systems

  • Li, Xingwang;Li, Lihua;Xie, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1368-1389
    • /
    • 2014
  • Three-dimensional multiple-input multiple-output (3D MIMO) and large-scale MIMO are two promising technologies for upcoming high data rate wireless communications, since the inter-user interference can be reduced by exploiting antenna vertical gain and degree of freedom, respectively. In this paper, we derive the achievable sum rate of 3D MIMO systems employing zero-forcing (ZF) receivers, accounting for log-normal shadowing fading, path-loss and antenna gain. In particular, we consider the prevalent log-normal model and propose a novel closed-form lower bound on the achievable sum rate exploiting elevation features. Using the lower bound as a starting point, we pursue the "large-system" analysis and derive a closed-form expression when the number of antennas grows large for fixed average transmit power and fixed total transmit power schemes. We further model a high-building with several floors. Due to the floor height, different floors correspond to different elevation angles. Therefore, the asymptotic achievable sum rate performances for each floor and the whole building considering the elevation features are analyzed and the effects of tilt angle and user distribution for both horizontal and vertical dimensions are discussed. Finally, the relationship between the achievable sum rate and the number of users is investigated and the optimal number of users to maximize the sum rate performance is determined.

Bandwidth Management of WiMAX Systems and Performance Modeling

  • Li, Yue;He, Jian-Hua;Xing, Weixi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.2
    • /
    • pp.63-81
    • /
    • 2008
  • WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, large service coverage, and flexible quality of services (QoS). Due to the large number of connections and flexible QoS supported by WiMAX, the uplink access in WiMAX networks is very challenging since the medium access control (MAC) protocol must efficiently manage the bandwidth and related channel allocations. In this paper, we propose and investigate a cost-effective WiMAX bandwidth management scheme, named the WiMAX partial sharing scheme (WPSS), in order to provide good QoS while achieving better bandwidth utilization and network throughput. The proposed bandwidth management scheme is compared with a simple but inefficient scheme, named the WiMAX complete sharing scheme (WCPS). A maximum entropy (ME) based analytical model (MEAM) is proposed for the performance evaluation of the two bandwidth management schemes. The reason for using MEAM for the performance evaluation is that MEAM can efficiently model a large-scale system in which the number of stations or connections is generally very high, while the traditional simulation and analytical (e.g., Markov models) approaches cannot perform well due to the high computation complexity. We model the bandwidth management scheme as a queuing network model (QNM) that consists of interacting multiclass queues for different service classes. Closed form expressions for the state and blocking probability distributions are derived for those schemes. Simulation results verify the MEAM numerical results and show that WPSS can significantly improve the network’s performance compared to WCPS.

The data transmission of the of u-ID sensor networks configuration with a Bluetooth (Bluetooth를 이용한 u-ID센서네트워크 구성에서의 데이터 전송)

  • 김영길;박지훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.45-48
    • /
    • 2004
  • RFID(Radio Frequency Identification) which is emerging from a change in digital convergence paradigm and recently rapidly advancing throughout the overall society is the core technology based on Ubiquitous network. In other words, This is a technology to identify the information of the object and recognize the situation by attaching electrical tag to an object and using Reader that can read the information of the object. With the emergence of the technology, it has turned the existing maintenance of the product into the network and intelligence of the product control by using the bar cord to maintain the product and will lead a revolution throughout overall society by affecting the fields of distribution and product maintenance as well as those of medicines, chemicals and food which the electrical tag can be attached to. this paper shows that utilizing the Bluetooth which is a local wireless telecommunication in the standalone imbedded system can implement the piconet configuration among the Readers and the data telecommunication with the main server

  • PDF

A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office (스마트 모바일 오피스 보안을 위한 CERT와 ISAC의 역할)

  • Lee, Keun-Young;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.109-127
    • /
    • 2011
  • Mobile Office is a new type of working method in the workplace that can be used at any time or anywhere by connecting to the network with mobile devices. This allows people to do their jobs without their physical presence in their offices to use computers. The elements in mobile office environment are advancing. They include the widespread distribution of the smart phones, the network enhancing strategy in a ubiquitous environment and expansion of the wireless internet; however, there are not enough security guidelines or policies against these threats on the new environment, the mobile office, although there is the revitalization policy of smart work supported by the government. CERT and ISAC, the known security system as of now, could be used for the secure mobile office, In this paper, suggestions are to be provided for strengthening the security of smart mobile office by analysing the functions of CERT and ISAC.

Comparison of the Contact Area, Maximum Pressure, Maximum Average Pressure and Maximum Force between Functional Insoles and General Insoles (기능성 인솔과 일반 인솔의 발에 대한 접촉 면적, 최대 압력, 최대 평균압력 및 최대 힘 비교)

  • Lee, Su-Kyoung
    • PNF and Movement
    • /
    • v.20 no.3
    • /
    • pp.431-441
    • /
    • 2022
  • Purpose: The purpose of this study was to compare the changes in the contact area, maximum pressure, maximum mean pressure, and maximum force of functional insoles and general insoles when walking. Methods: Foot pressure was measured by the ignition of functional insoles and general insoles on Company N shoes. The foot pressure was measured using a precision pressure distribution meter (Pedar - X mobile system, Novel, Germany). Each insole sensor contained 99 independent cells and was inserted between the foot and the shoe. A wireless Bluetooth-type program was used to measure the pressure detected by the measuring insoles. In order to eliminate adaptation and fatigue caused by wearing the guide during the experiment, sufficient rest was taken between each experiment, and the wearing order was randomly selected. Results: Functional insole significantly increased the forefoot and midfoot (medial, lateral) (p<0.05), while total foot, forefoot, and rearfoot peak pressure significantly decreased (p < 0.05) compared to the general insole. Conclusion: In the functional insole, a high contact area was measured inside, even in the middle of the foot, leading to a proper change in foot pressure. It was confirmed that the contact area was reduced and dispersion occurred well. In addition, it was found that the maximum pressure in the front and back of the entire foot was reduced, so the weight pressure dispersion in the functional insole was evenly distributed, and the maximum average pressure change was similar.