• Title/Summary/Keyword: link interference

Search Result 387, Processing Time 0.024 seconds

Outage Probability Analysis of Full Duplex Relay with Decode and Forward Protocol (복호 후 전달 방식을 사용하는 전이중 통신 릴레이 시스템에서의 오수신 확률 성능 분석)

  • Kwon, Tae-Hoon;Lim, Sung-Mook;Park, Sung-Soo;Hong, Dae-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.568-576
    • /
    • 2010
  • In this paper, we analyze the outage probability of full duplex relay (FDR) with decode-and-forward (DF) protocol is derived under fading channels. The fading channel for source-relay link is assumed to be Rician fading to consider the infrastructured fixed relay with line of sight (LOS) propagation, and the other fading channels are assumed to be Rayleigh fading. Based on this analytical result, we provide the criterion that FDR shows a lower outage probability than HDR to consider the interference problem and the resource efficiency improvement by full duplex (FD) operation. The accuracy of the analysis is confirmed throughout the simulation results.

Traffic Flow Estimation based Channel Assignment for Wireless Mesh Networks

  • Pak, Woo-Guil;Bahk, Sae-Woong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.68-82
    • /
    • 2011
  • Wireless mesh networks (WMNs) provide high-speed backbone networks without any wired cable. Many researchers have tried to increase network throughput by using multi-channel and multi-radio interfaces. A multi-radio multi-channel WMN requires channel assignment algorithm to decide the number of channels needed for each link. Since the channel assignment affects routing and interference directly, it is a critical component for enhancing network performance. However, the optimal channel assignment is known as a NP complete problem. For high performance, most of previous works assign channels in a centralized manner but they are limited in being applied for dynamic network environments. In this paper, we propose a simple flow estimation algorithm and a hybrid channel assignment algorithm. Our flow estimation algorithm obtains aggregated flow rate information between routers by packet sampling, thereby achieving high scalability. Our hybrid channel assignment algorithm initially assigns channels in a centralized manner first, and runs in a distributed manner to adjust channel assignment when notable traffic changes are detected. This approach provides high scalability and high performance compared with existing algorithms, and they are confirmed through extensive performance evaluations.

MIMO Two-way Cooperative Relay to Improve End to End Capacity in Non-equidistant Topology

  • Niyizamwiyitira, Christine;Kang, Chul-Gyu;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.465-467
    • /
    • 2010
  • This paper proposes MIMO two-way cooperative relay scheme to optimize the end to end capacity in wireless multi-hop mesh network. The basic idea is to perform data transmission via multi-hop relay nodes, in equidistant topology, this method is quite efficient. However, on one hand this topology is very rare in practical situation, on the other hand, in real practical situation where the topology is most likely non equidistant, the end to end capacity significantly degrades due to bottleneck link caused by uneven SNR. Moreover, the end to end capacity degrades at high SNR due to overreach interference from far nodes existing in multi-hop relay networks. In this paper, MIMO two-way cooperative relay in the region of non equidistant nodes is found efficient to improve the end to end capacity. The proposed scheme is validated using numerical simulation.

  • PDF

Multi-interface Wireless Mesh Network Testbed using Wireless Distribution System (무선 분산 시스템을 이용한 멀티 인터페이스 무선 메쉬 네트워크 테스트베드)

  • Yoon, Mi-kyung;Yang, Seung-chur;Kim, Jong-deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.87-90
    • /
    • 2009
  • Wireless Mesh Network(WMN) is wireless backbone networks technique which has ease of network configuration and cost of advantage. Recently, WNM released a new product, but most of existing research and technology analysis the performance through the simulation. This paper build the wireless mesh network testbed for actual situation. Testbed supports multi-channel multi-interface using bridge, the Wireless Distribution System and dynamic location-based routing protocol. This routing protocol strongly design against wireless interference using metric for link channel change and real distance. Then, the address of mesh clients assigned by the centralized address management server. Mesh clients is designed and implemented to manage network through Simple Network Management Protocol.

  • PDF

Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers

  • Liu, Xiaochen;Gao, Yuanyuan;Sha, Nan;Zang, Guozhen;Wang, Shijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2204-2224
    • /
    • 2021
  • This paper studies secure wireless transmission from a multi-antenna transmitter to a single-antenna intended receiver overheard by multiple eavesdroppers with considering the imperfect channel state information (CSI) of wiretap channel. To enhance security of communication link, the artificial noise (AN) is generated at transmitter. We first design the robust joint optimal beamforming of secret signal and AN to minimize transmit power with constraints of security quality of service (QoS), i.e., minimum allowable signal-to-interference-and-noise ratio (SINR) at receiver and maximum tolerable SINR at eavesdroppers. The formulated design problem is shown to be nonconvex and we transfer it into linear matrix inequalities (LMIs). The semidefinite relaxation (SDR) technique is used and the approximated method is proved to solve the original problem exactly. To verify the robustness and tightness of proposed beamforming, we also provide a method to calculate the worst-case SINR at eavesdroppers for a designed transmit scheme using semidefinite programming (SDP). Additionally, the secrecy rate maximization is explored for fixed total transmit power. To tackle the nonconvexity of original formulation, we develop an iterative approach employing sequential parametric convex approximation (SPCA). The simulation results illustrate that the proposed robust transmit schemes can effectively improve the transmit performance.

Security Threats and Attacks in Internet of Things (IOTs)

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.107-118
    • /
    • 2021
  • The term Internet of Things (IoTs) refers to the future where things are known daily through the Internet, whether in one way or another, as it is done by the method of collecting various information from various sensors to form a huge network through which people, things and machines are helped to make a link between them at all time and anywhere. The IoTs is everywhere around us such as connected appliances, smart homes security systems and wearable health monitors. However, the question is what if there is a malfunction or outside interference that affects the work of these IoTs based devises? This is the reason of the spread of security causes great concern with the widespread availability of the Internet and Internet devices that are subject to many attacks. Since there aren't many studies that combines requirements, mechanisms, and the attacks of the IoTs, this paper which explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality Additionally, the paper addresses the different types of attacks in IoTs. We have also addressed the different approaches aim to prevention mechanisms according to several researchers' conclusions and recommendations.

Capacity Variation of a Microcell due to Power Control Error in and Overlaid Macrocell/Microcell CDMA System (매크로셀내에 마이크로셀이 중첩된 CDMA 시스템에서 전력제어오차로 의한 마이크로셀의 용량 변화)

  • 강희곡;김영철;노재성;조성준
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.11 no.1
    • /
    • pp.8-17
    • /
    • 2000
  • The BER performance and the capacity variation of a microcell due to power control error(PCE) is analyzed on service types(data and voice, respectively) for the reverse link of an overlaid cell CDMA system. The procedure of analysis is followed as: First, we calculate BER performance according to PCE. Next, we find the minimum SNR for voice service, BER=TEX>$10^{-3}$, and data service, BER=TEX>$10^{-5}$. Then, according to the calculated SNR, we find the maximum capacity of a microcell and macrocell and the capacity of a microcell where interference is considered is found and analyzed with that in perfect power control. We get to the results as follows. The BER performance in 1 dB PCE is similar to that in perfect power control, however, with a increase in PCE, the BER performance is largely degraded. In terms of capacity, it is shown that if the PCE is equal or less than 2 dB, the effect of the PCE on voice service is more than that on data service, but if the PCE is equal or more than 3 dB, effect of the PCE on data service is more than that on voice. Besides, if the PCE is equal or less than 2 dB, both PCE and interference should be considered to calculate the capacity of a microcell, but if the PCE is equal or more than 3 dB, interference can be negligible since the effect of PCE is much stronger than that of interference. Therefore, the microcell should be located where $R_d$, the ratio of a microcell to a macrocell radius, is equal to 0.1, and d, the ratio of the distance between a microcell and a macrocell to the macrocell radius, is equal or more than 0.5, in order to obtain a appropriate microcell capacity against interference. If $\sigma$ is adjusted to less than 2 dB, we may get equal or more than 70% of the maximum microcell capacity.

  • PDF

Performance Analysis of Multi-Code CDMA System over IS-95B Forward Channel (IS-95B 순방향 채널에서의 멀티코드 CDMA 시스템의 성능분석)

  • 곽재민;최창호;이영교;오창헌;김언곤;조성준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5B
    • /
    • pp.879-888
    • /
    • 2000
  • In this paper, the performance of IS-95B CDMA system adopting multi-code scheme for data service on the forward link is obtained by theoretical analysis and computer simulation. The wireless channel is assumed to include AWGN, MUI(Multi-User Interference), and MPI(Multi-Path Interference), and multipath Rayleigh fading modeled by TDL(Tapped Delay Line). To obtain actual performance, IS-95B system using PN codes(M-sequence) concatenated with Walsh codes is considered. The BER performance of voice/data service satisfying QoS requirement and the maximum capacity of voice users is derived in terms of various system parameters(voice activity factor, required SNR of voice/data users, the number of multi-codes, the number of voice/data users.,etc.). As a result, under the condition that the maximum allowable number of voice user is 38 in voice only system, as the number of multi-code is decreased by 1, the maximum allowable number of voice user is increased by 5% for system with 1 data user and 22.3% for system with 4 data users. Therefore, it is possible to increase maximum allowable number of users in IS-95B CDMA system by appropriate control of the number of multi-codes and required SNR according to channel environment and traffic characteristic.

  • PDF

Design of Adaptive DCF algorithm for TCP Performance Enhancement in IEEE 802.11 based Mobile Ad-hoc Networks (IEEE 802.11 기반 이동 ad-hoc 망에서 TCP 성능 향상을 위한 적응적 DCF 알고리즘 설계)

  • Kim, Han-Jib;Lee, Gi-Ra;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.79-89
    • /
    • 2006
  • TCP is the most widely used transport protocol in Internet applications that guarantees a reliable data transfer. But, in the wireless multi-hop networks, TCP performance is degraded because it is designed for wired networks. The main reasons of TCP performance degradation are contention for wireless medium at the MAC layer, hidden terminal problem, exposed terminal problem, packet losses in the link layer, unfairness problem, reordering problem caused by path disconnection, bandwidth waste caused by exponential backoff of retransmission timer due to node's mobility and so on. Specially, in the mobile ad-hoc networks, discrepancy between a station's transmission range and interference range produces hidden terminal problem that decreases TCP performance greatly by limiting simultaneous transmission at a time. In this paper, we propose a new MAC algorithm for mobile ad-hoc networks to solve the problem that a node can not transmit and just increase CW by hidden terminal. In the IEEE 802.11 MAC DCF, a node increases CW exponentially when it fails to transmit, but the proposed algorithm, changes CW adaptively according to the reason of failure so we get a TCP performance enhancement. We show by ns-2 simulation that the proposed algorithm enhances the TCP performance by fairly distributing the transmission opportunity to the failed nodes by hidden terminal problems.

A Demodulation Method for DS/CDMA Systems (DS/CDMA 시스템을 위한 새로운 복조 방식)

  • Jung, Bum-Jin;Jin, Ming-Lu;Kwak, Kyung-Sup
    • Journal of IKEEE
    • /
    • v.2 no.2 s.3
    • /
    • pp.212-224
    • /
    • 1998
  • There are two major factors of degrading the performance in the forward link of DS/CDMA systems. One is the multiple access interference (MAI) caused by using the same frequency bands simultaneously and the other is the multipath lading due to multipath propagation. PN codes which have minimum cross correlation properties among spread spectrum codes are necessary to reduce the MAI. In the conventional IS-95A system, the PN sequence has the period of $2^{15}$ and is of the length of 64 chips for spreading each data. In this case, since the length of PN code per bit is very short compared to the period of the PN code, the performance of the conventional system is not satisfied in view of suppressing the multipath interference. However, the correlation property of the PN codes at the demodulation can be improved by increasing the interval of Integration at the demodulation. This paper proposes a demodulation method to reduce the cross correlation among PN codes. The performance of the proposed demodulation method is investigated through computer simulations. We used multipath Ray lading channel and AWGN channel in the simulation. Our simulation results show the improved performance of $0.25{\sim}0.5dB$ SNR in a given BER compared to the conventional demodulation scheme.

  • PDF