• 제목/요약/키워드: channel network analysis

Search Result 610, Processing Time 0.03 seconds

Performance Analysis of IEEE 802.11n System adapting Frame Aggregation Methods (Frame Aggregation 기법을 적용한 IEEE 802.11n 시스템 성능 분석)

  • Lee, Yun-Ho;Kim, Joo-Seok;Kim, Kyung-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.515-527
    • /
    • 2009
  • IEEE 802.11n is an ongoing next-generation WLAN(Wireless Local Area Network) standard that supports a very high-speed connection with more than 100Mb/s data throughput measured at the MAC(Medium Access Control) layer. Study trends of IEEE 802.11n show two aspects, enhanced data throughput using aggregation among packets in MAC layer, and better data rates adapting MIMO(Multiple-Input Multiple-Output) in PHY(Physical) layer. But, the former doesn't consider wireless channel and the latter doesn't consider aggregation among packets for reality. Therefore, this paper analyzes data throughput for IEEE 802.11n considering MAC and PHY connection. A-MPDU(Aggregation-MAC Protocol Data Unit) and A-MSDU(Aggregation-MAC Service Unit) is adapted considering multi-service in MAC layer, WLAN MIMO TGn channel using SVD(Singular Value Decomposition) is adapted considering MIMO and wireless channel in PHY layer. Consequently, Simulation results shows throughput between A-MPDU and A-MSDU. Also, We use Ns-2(Network simulator-2) for reality.

An Adaptive FEC Algorithm for Mobile Wireless Networks (이동 무선 네트워크의 전송 성능 향상을 위한 적응적 FEC 알고리즘)

  • Ahn, Jong-Suk;John Heidmann
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.563-572
    • /
    • 2002
  • Wireless mobile networks tend to drop a large portion of packets due to propagation errors rather than congestion. To Improve reliability over noisy wireless channels, wireless networks can employ forward error correction (FEC) techniques. Static FEC algorithms, however, can degrade the performance by poorly matching their overhead to the degree of the underlying channel error, especially when the channel path loss rate fluctuates widely. This paper investigates the benefits of an adaptable FEC mechanism for wireless networks with severe packet loss by analytical analysis or measurements over a real wireless network called sensor network. We show that our adaptive FEC named FECA (FEC-level Adaptation) technique improves the performance by dynamically tuning FEC strength to the current amount of wireless channel loss. We quantify these benefits through a hybrid simulation integrating packet-level simulation with bit-level details and validate that FECA keeps selecting the appropriate FEC-level for a constantly changing wireless channel.

Performance Analysis of OFDM-CDMA Systems using Space-Time Coding (공간-시간부호화를 이용한 OFDM-CDMA의 성능분석)

  • Kang, Mingoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.265-275
    • /
    • 2004
  • In this paper, an OFDM-CDMA broadband system is considered for a possible candidate of fixed wireless broadband access network applications. With an emphasis on a preamble design for multi-channel separation, we address a channel estimation based on the time-domain windowing and its imperfectness in OFDM-based multiple-antenna transmission systems. By properly designing each preamble for multiple antennas to be orthogonal in the time domain, the channel estimation can be applied to the ETSI HlPERLAN/2 and IEEE-802.11a standards in the case of more than two transmit antennas. Also, an effect of diversity techniques on the performance of OFDM-CDMA based broadband wireless access networks is investigated and the maximum achievable diversity gain for a two-path Rayleigh fading environment is evaluated Simulation results show that the OFDM-CDMA system applying a space-time-frequency diversity with a full-rate full diversity code can give the diversity of D = 4 and D = 8 for both multi-user cases of maximum user and half user capacities, respectively.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.

Performance Analysis of The CCITT X.25 Protocol (X. 25 Protocol의 성능 분석)

  • 최준균;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.1
    • /
    • pp.25-39
    • /
    • 1986
  • In this paper, we analyze the performance, particularly the flow control mechanism, of the CCITT X.25 protocol in a packet-switched network. In this analysis, we consider the link and packet layers separately, and investigate the performance in three measures; normalized channel throughput, mean transmission time, and transmission efficiency. Each of these measures is formulated in terms of given protocol parameters such as windos size, $T_1$ and $T_2$ values, message length, and so forth. We model the service procedure of the inpur traffic based on the flow control mechanism of the X.25 protocol, and investigate the mechanism of the sliding window flow control with the piggybacked acknowlodgment scheme using a discrete-time Markov chain model. With this model, we study the effect of variation of the protoccol parameters on the performance of the X.25 protocol. From the numerical results of this analysis one can select the optimal valuse of the protocol parameters for different channel environments. it has been found that to maintain the trasnmission capacity satisfactorily, the window size must be greater than or equal to 7 in a high-speed channel. The time-out value, $T_1$, must carefully be selected in a noisy channel. In a normal condition, it should be in the order of ls. The value of $T_2$ has some effect on the transmission efficiency, but is not critical.

  • PDF

A Communication Platform for Mobile Group Peer-to-Peer Services (모바일 그룹 P2P 응용 서비스를 위한 통신 플랫폼)

  • Song, Ji-Hwan;Kang, Kyung-Ran;Cho, Young-Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.389-400
    • /
    • 2008
  • As the wireless network technologies and the capability of the mobile terminals are evolving, advanced peer to peer applications for mobile users are attracting interests. In this paper, we propose the mobile P2P communication platform(MPCP) which provides transparency to the wireless network technologies and solutions to the limited resources of the mobile terminals. MPCP classifies the connection into two levels: a virtual channel and a session. A virtual channel is the network layer connection between the terminals whereas a session is the application layer connection. MPCP classifies the sessions into four types and applies different scheduling priority and data processing policies such as segmentation and reassembly. It selects proper wireless network technologies depending on the distance between the communication endpoints. To acquire dynamically changed access address, we harness the Session Initiation Protocol. We implemented MPCP on embedded Linux simulator and utilized the implementation in mobile P2P service development. For the quantitative analysis, we compared the performance of MPCP with that of ftp. Regardless of the number of simultaneous sessions, MPCP maintains the relative performance.

Performance Analysis of Coded FH/SSMA Communication Network system (부호화한 주파수 도약 대역 확산 통신 네트워크의 성능 분석)

  • 김근묵;정영지;홍은기;황금찬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.7
    • /
    • pp.730-738
    • /
    • 1992
  • This paper alms to analyse the performance of frequency hopping /spread spectrum multiple access system by employing the channel with mixture of AWGN, partial band Jamming, fading and user interference. The performance analysis of FH /SSMA system, taking account of frequency 'hit'(user Interference ) which occurs in the presence of multiple user, produces the following numerical results by computing error probability and throughput of each code in two cases whether the side Information about channel is used or not. The numerical results are as follows : When composite interferences coexist In channel, RS code Is significantly superior to convolutional code in terms of performance. Concatenated code provides the same performance as RS code. The above results show that RS code is pertinent as error-correction code.

  • PDF

The Successful Strategies for YouTube Channels Using the Network Overlap (네트워크 중복을 이용한 유튜브 채널의 성공 전략)

  • Shin, Jin-Hee;Son, Jung-Min
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.267-287
    • /
    • 2020
  • Purpose Online platform companies can increase the spread of content by communicating with users who have diverse preferences through social networks. Previous studies show the mixed effect on the network overlap, and there was a limited examinations for the underlying mechanism. This study expects high academic and practical implications that can be provided by studying on the user's viewership network. The purpose of this research is to examine the effects of network overlap on the users' viewership for creators of user-generated content in YouTube. We explain the direct and in-direct effects through the content sharing and the valence of user ratings. Design/methodology/approach The data contains 45 channels and 4,085 video clips from YouTube. We control the effect of the categories, channel characteristics, and vide clip characteristics on the viewership. PROCESS macro were used to analyze the direct and in-direct effects of network overlap. Findings The analysis results showed that the network overlap directly affect on the users' viewership. The variable decreases the moderators (i.e., content sharing and the valence of user ratings). This result implies that the users can not satisfy their need for uniqueness which is achieved by content sharing and rating in the overlapped network.

Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing (비프로파일링 기반 전력 분석의 성능 향상을 위한 오토인코더 기반 잡음 제거 기술)

  • Kwon, Donggeun;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.491-501
    • /
    • 2019
  • In side-channel analysis, which exploit physical leakage from a cryptographic device, deep learning based attack has been significantly interested in recent years. However, most of the state-of-the-art methods have been focused on classifying side-channel information in a profiled scenario where attackers can obtain label of training data. In this paper, we propose a new method based on deep learning to improve non-profiling side-channel attack such as Differential Power Analysis and Correlation Power Analysis. The proposed method is a signal preprocessing technique that reduces the noise in a trace by modifying Auto-Encoder framework to the context of side-channel analysis. Previous work on Denoising Auto-Encoder was trained through randomly added noise by an attacker. In this paper, the proposed model trains Auto-Encoder through the noise from real data using the noise-reduced-label. Also, the proposed method permits to perform non-profiled attack by training only a single neural network. We validate the performance of the noise reduction of the proposed method on real traces collected from ChipWhisperer board. We demonstrate that the proposed method outperforms classic preprocessing methods such as Principal Component Analysis and Linear Discriminant Analysis.

Blind Channel Estimation based on Hadamard Matrix Interstream Transmission for Multi-Cell MIMO Networks (다중 셀 MIMO 네트워크를 위한 Hadamard 행렬 Interstream 전송 기반 Blind 채널 추정)

  • Yang, Jae-Seung;Hanif, Mohammad Abu;Park, Ju-Yong;Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.119-125
    • /
    • 2015
  • In this paper, we introduce a Hadamard matrix interstream transmission based blind channel estimation for multi-cells multiple-input and multiple-output (MIMO) networks. The proposed scheme is based on a network with mobile stations (MS) which are deployed with multi cells. We assume that the MS have the signals from both cells. The signal from near cell are considered as desired signal and the signals from the other cells are interference signal. Since the channel is blind, so that we transmit Hadamard matrix pattern pilot stream to estimate the channel; that gives easier and fast channel estimation for large scale MIMO channel. The computation of Hadamard based system takes only complex additions, and thus the complexity of which is much lower than the scheme with Fourier transform since complex multiplications are not needed. The numerical analysis will give perfection of proposed channel estimation.