• Title/Summary/Keyword: computer simulations

Search Result 3,399, Processing Time 0.026 seconds

Multi-Protocol Based Routing Selection Scheme for MANET Using Mobility and Connectivity (MANET에서 이동성과 연결성을 고려한 다중 모드 라우팅 프로토콜 적용 기법)

  • Heo, Ung;Wan, Xin;Zhao, Yi;You, Kang-Soo;Choi, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.5
    • /
    • pp.40-52
    • /
    • 2010
  • A mobile ad hoc network is instant and heuristic, and it is also vulnerable and volatile. Since topology and route changes are frequent, no single routing protocol designed for a conventional network performs well. Some protocols suffer from significant performance degradation when the number of nodes increases, or when nodes become highly mobile. In this paper we investigate a way to adaptively select a routing protocol that fits to the real-time network conditions. The first phase of our study is to analyze the performances of two classes of routing protocols under various network scenarios. The second phase consists of constructing a routing protocol selection reference. All nodes continue to monitor the status of neighbor nodes and control packets exchanged. Then, the aggregated information is periodically compared against the protocol selection reference. The selected routing protocol is maintained throughout the network until the network property changes substantially. The performance of the proposed algorithm is verified by a set of computer simulations using the OPNET modeler. The experimental results show that selectively changing routing protocol adaptive to the network conditions greatly improves the efficacy of bandwidth utilization.

Performance Analysis of Soft Handoff Methods using Simulation (시뮬레이션을 이용한 소프트 핸드오프 방식의 성능 분석)

  • Han, Kyung-Sook;Kim, Tae-Jung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.411-420
    • /
    • 2000
  • The performance of soft handoffs of CDMA mobile communication systems is potentially determined by several factors such as handoff-related system parameters (T_ADD, T_DROP, T_COMP, T_TDROP), mobile stations' mobility, service areas, capacity of base stations. Due to the importance of handoffs in mobile communications, several methods have been proposed and tested through computer simulations to prove the efficiency of proposed methods. Different assumptions on the above mentioned factors often produce different simulation results. Therefore, the credibility of a simulation result is directly determined by the objectivity of the assumptions made by the simulation. This paper proposes a new soft handoff method that controls handoff delay time based on a mobile station's speed, and compares it with the current method of CDMA systems. The simulation results showed that the new method is much more efficient for mobile stations that are free in their moving direction and space than for those restricted in their moving direction and space. In addition, the results showed that even the same handoff method may produces different simulation results depending on whether a service area is modeled as two-dimensional space or three-dimensional space. These results indicate the importance of suitable models of user mobility, especially the movement types and space allowed for mobile stations, which have been neglected in simulation studies of mobile communications.

  • PDF

Class Gated Dynamic Bandwidth Allocation Algorithm for supporting QoS in the EPON (EPON 시스템에서 효율적인 QoS 제공을 위한 Class Gated 동적 대역 할당 알고리즘)

  • Hwang Jun-Ho;Kim Hyo-Won;Yoo Myung-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.5 s.347
    • /
    • pp.94-103
    • /
    • 2006
  • Ethernet passive optical network (EPON) has drawn many attention as a promising access network technology for FTTH because it can provide a high bandwidth with a low cost. Since the uplink bandwidth in the EPON system is shared by many users, it is necessary for an EPON system to have an efficient bandwidth allocation mechanism. To support QoS in EPON, the previous bandwidth allocation schemes employ strict priority queueing (SPQ). Since SPQ gives unlimited priority to higher service class, the QoS of lower service classes gets worse. In this paper, we propose Class Gated DBA (Dynamic Bandwidth Allocation) algorithm in which the bandwidth is requested / granted in a service class basis. To avoid the monopoly in bandwidth usage by higher classes the maximum bandwidth that is allocate to each service class is limited (fairness between services classes). In addition, to avoid the monopoly in bandwidth usage by some particular users, each ONU runs fairness bandwidth allocation algorithm within each service classes. Through computer simulations, it is verified that the proposed algorithm achieves a good level of QoS, and at the same time maintains a good level of fairness between both service classes and users.

Design and Performance Analysis of a DS/CDMA Multiuser Detection Algorithm in a Mixed Structure Form (혼합구조 형태의 DS/CDMA 다중사용자 검파 알고리즘 설계 및 성능 분석)

  • Lim, Jong-Min
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.51-58
    • /
    • 2002
  • The conventional code division multiple access(CDMA) detector shows severe degradation in communication quality as the number of users increases due to multiple access interferences(MAI). This problem thus restricts the user capacity. Various multiuser detection algorithms have been proposed to overcome the MAI problem. The existing detectors can be generally classified into one of the two categories : linear multiuser detection and subtractive interference cancellation detectors. In the linear multiuser detection, a linear transform is applied to the soft outputs of the conventional detector. In the subtractive interference cancellation detection, estimates of the interference are generated and subtracted out from the received signal. There has been great interest in the family of the subtractive interference cancellation detection because the linear multiuser detection exhibits the disadvantage of taking matrix inversion operations. The successive interference cancellation (SIC) and the parallel interference cancellation (PIC) are the two most popular structures in the subtractive interference cancellation detector. The SIC structure is very simple in hardware complexity, but has the disadvantage of increased processing delay time, while the PIC structure is good in performance, but shows the disadvantage of increased hardware complexity. In this paper we propose a mixed structure form of SIC and PIC in order to achieve good performance as well as simple hardware complexity. A performance analysis of the proposed scheme has been made, and the superior characteristics of the mixed structure are demonstrated by extensive computer simulations. 

A Novel Method for Rejection of the Spurious Signal in Weaver-Type Up-Conversion Mixer (위버구조 상향변환 혼합기의 스퓨리어스 신호 제거 방법)

  • 김영완;송윤정;김유신;이창석
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.7
    • /
    • pp.661-668
    • /
    • 2004
  • A novel method to reject the spurious signals which are occurred at Weaver-type low-IF transmitter was proposed in this paper. The spurious signals are generated by the gain and phase imbalances of I/Q channel or imperfect characteristics of 90$^{\circ}$ phase shifter in local oscillator for I/Q channel source. By deriving the gain and phase-based functions from RF spurious signal with the channel imbalance information, the lie channel imbalances were deduced as functions with magnitude and sign dependent on I/Q channel imbalance degree. The proposed method compensates the estimated I/Q channel imbalances by correlation values between the down-converted signal obtained by squaring the output signal itself using a simple mixer and the modified baseband signal. By comparing two signals after A/D conversion, the magnitude and sign of each type of imbalances can be determined separately and simultaneously. Based on the I/Q channel imbalance compensation, the spurious signals can be reduced by adjusting the gain and phase values of I or Q channel signal. The way to estimate the channel imbalances of the up-conversion mixer was presented and verified by using theoretical derivations and computer simulations.

Noise Whitening Decision Feedback Equalizer for SC-FDMA Receivers (SC-FDMA 수신기를 위한 잡음 백색화 판정궤환 등화기)

  • Lee, Su-Kyoung;Park, Yong-Hyun;Seo, Bo-Seok
    • Journal of Broadcast Engineering
    • /
    • v.16 no.6
    • /
    • pp.986-995
    • /
    • 2011
  • In this paper, we propose a noise whitening decision feedback equalizer for single carrier frequency division multiple access (SC-FDMA) receivers. SC-FDMA has the same advantage as that of orthogonal frequency division multiple access (OFDMA) in which the multipath effect can be removed easily, and also solves the problem of high peak to average power ratio (PAPR) which is the main drawback of OFDMA. Although SC-FDMA is a single carrier transmission scheme, a simple frequency domain linear equalizer (FD-LE) can be implemented as in OFDMA, which can dramatically reduce the equalizer complexity. Moreover, some residual intersymbol interference in the output of the FD-LE can be further removed by an additional nonlinear decision feedback equalizer (DFE) in time domain, because the time domain signal is a digitally modulated symbol. In the conventional DFE, however, the noise is not white at the input of the decision device and correspondingly the decision is not optimum. In this paper, we propose an improved DFE scheme for SC-FDMA systems where a linear noise whitening filter is inserted before the decision device of the conventional DFE scheme. Through computer simulations, we compare the bit error rate performance of the proposed DFE scheme with the conventional equalizers.

Parameter Calibration of Car Following Models Using DGPS DATA (DGPS 수신장치를 활용한 차량추종 모형 파라미터 정산)

  • Kim, Eun-Yeong;Lee, Cheong-Won;Kim, Yong-Jin
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.3 s.89
    • /
    • pp.17-27
    • /
    • 2006
  • Car following model is a theory that examines changes of condition and interrelationship of acceleration deceleration. headway, velocity and so on closely based on the hypothesis that the Posterior vehicle always follows the preceding vehicle. Car following mode) which is one of the research fields of microscopic traffic flow was first introduced in 1950s and was in active progress in 1960s. However, due to the limitation of data gathering the research depression was prominent for quite a while and then soon was able to tune back on track with development in global positioning system using satellite and generalization of computer use. Recently, there has been many research studies using reception materials of global Positioning system(GPS). Introducing GPS technology to traffic has made real time tracking of a vehicle position possible. Position information is sequential in terms of time and simultaneous measurement of several vehicles in continuous driving is also practicable. Above research was focused on judging whether it is feasible to overcome the following model research by adopting the GPS reception device that was restrictively proceeded due to the limitation of data gathering. For practical judgment, we measured the accuracy and confidence level of the GPS reception devices material by carrying out a practical experiment. Car following model is also being applied in simulations of traffic flow analysis, but due to the difficulty of estimating parameters the basis of the above result. it is our goal to produce an accurate calibration of car following model's parameters that is suitable in this domestic actuality.

Performance Analysis of an Optical CDMA System for multi-user Environment (다중 사용자 환경에서의 광 CDMA 시스템 성능 분석)

  • 전상영;김영일;이주희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1134-1141
    • /
    • 1999
  • In this paper, we implement an optical code division multiple access(OCDMA) system and analyze the performance of the implemented system. In the implemented system, a transmitter encodes input data into optical pulses by using laser diode, and spreads the encoded pulses in an encoder which consists of 4 stage delay lines. The decoder which is the same structure as that of encoder delays and combines the spreaded pulses, and thus recovers the original data. At first, we discuss the auto- and cross-correlations of OCDMA signals under both environments of single user and multi-users, and then verify the simulation results with experimental results. We also evaluate the effect of a number of stages of delay line and code length on the system performance through computer simulations. As experimental results we can see that if the decoder have the same configuration as that of encoder, the peak auto-correlation characteristics can be achieved, and thus we can recover the original data from received data. As simulation results we can see that although bit error rate decreases as code length decreases or the number of stage of delay line increases, it is difficult to implement the system because the pulse width becomes narrow. From the results, we can apply CDMA technologies to optical communication networks.

  • PDF

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

Congestion Control Scheme for Wide Area and High-Speed Networks (초고속-장거리 네트워크에서 혼잡 제어 방안)

  • Yang Eun Ho;Ham Sung Il;Cho Seongho;Kim Chongkwon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.571-580
    • /
    • 2005
  • In fast long-distance networks, TCP's congestion control algorithm has the problem of utilizing bandwidth effectively. Several window-based congestion control protocols for high-speed and large delay networks have been proposed to solve this problem. These protocols deliberate mainly three properties : scalability, TCP-friendliness, and RTT-fairness. These protocols, however, cannot satisfy above three properties at the same time because of the trade-off among them This paper presents a new window-based congestion control algorithm, called EM (Exponential Increase/ Multiplicative Decrease), that simultaneously supports all four properties including fast convergence, which is another important constraint for fast long-distance networks; it can support scalability by increasing congestion window exponentially proportional to the time elapsed since a packet loss; it can support RTT-fairness and TCP-friendliness by considering RTT in its response function; it can support last fair-share convergence by increasing congestion window inversely proportional to the congestion window just before packet loss. We evaluate the performance of EIMD and other algorithms by extensive computer simulations.