• Title/Summary/Keyword: network coverage

Search Result 601, Processing Time 0.024 seconds

Cellular-Automata Based Node Scheduling Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 셀룰러 오토마타 기반의 노드 스케줄링 제어)

  • Byun, Heejung;Shon, Sugook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.10
    • /
    • pp.708-714
    • /
    • 2014
  • Wireless sensor networks (WSNs) generally consist of densely deployed sensor nodes that depend on batteries for energy. Having a large number of densely deployed sensor nodes causes energy waste and high redundancy in sensor data transmissions. The problems of power limitation and high redundancy in sensing coverage can be solved by appropriate scheduling of node activity among sensor nodes. In this paper, we propose a cellular automata based node scheduling algorithm for prolonging network lifetime with a balance of energy savings among nodes while achieving high coverage quality. Based on a cellular automata framework, we propose a new mathematical model for the node scheduling algorithm. The proposed algorithm uses local interaction based on environmental state signaling for making scheduling decisions. We analyze the system behavior and derive steady states of the proposed system. Simulation results show that the proposed algorithm outperforms existing protocols by providing energy balance with significant energy savings while maintaining sensing coverage quality.

Coverage and Energy Modeling of HetNet Under Base Station On-Off Model

  • Song, Sida;Chang, Yongyu;Wang, Xianling;Yang, Dacheng
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.450-459
    • /
    • 2015
  • Small cell networks, as an important evolution path for next-generation cellular networks, have drawn much attention. Different from the traditional base stations (BSs) always-on model, we proposed a BSs on-off model, where a new, simple expression for the probabilities of active BSs in a heterogeneous network is derived. This model is more suitable for application in practical networks. Based on this, we develop an analytical framework for the performance evaluation of small cell networks, adopting stochastic geometry theory. We derive the system coverage probability; average energy efficiency (AEE) and average uplink power consumption (AUPC) for different association strategies; maximum biased received power (MaBRP); and minimum association distance (MiAD). It is analytically shown that MaBRP is beneficial for coverage but will have some loss in energy saving. On the contrary, MiAD is not advocated from the point of coverage but is more energy efficient. The simulation results show that the use of range expansion in MaBRP helps to save energy but that this is not so in MiAD. Furthermore, we can achieve an optimal AEE by establishing an appropriate density of small cells.

Self-weighted Decentralized Cooperative Spectrum Sensing Based On Notification for Hidden Primary User Detection in SANET-CR Network

  • Huang, Yan;Hui, Bing;Su, Xin;Chang, KyungHi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2561-2576
    • /
    • 2013
  • The ship ad-hoc network (SANET) extends the coverage of the high data-rate terrestrial communications to the ships with the reduced cost in maritime communications. Cognitive radio (CR) has the ability of sensing the radio environment and dynamically reconfiguring the operating parameters, which can make SANET utilize the spectrum efficiently. However, due to the dynamic topology nature and no central entity for data fusion in SANET, the interference brought into the primary network caused by the hidden primary user requires to be carefully managed by a sort of decentralized cooperative spectrum sensing schemes. In this paper, we propose a self-weighted decentralized cooperative spectrum sensing (SWDCSS) scheme to solve such a problem. The analytical and simulation results show that the proposed SWDCSS scheme is reliable to detect the primary user in SANET. As a result, secondary network can efficiently utilize the spectrum band of primary network with little interference to primary network. Referring the complementary receiver operating characteristic (ROC) curves, we observe that with a given false alarm probability, our proposed algorithm reduces the missing probability by 27% than the traditional embedded spectrally agile radio protocol for evacuation (ESCAPE) algorithm in the best condition.

A study on the Base of Design of GF Network for Satellite DMB (위성 DMB GF Network의 설계 기초에 관한 연구)

  • Noh, Sun-Kuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.1
    • /
    • pp.183-188
    • /
    • 2008
  • Satellite DMB(Digital Multimedia Broadcasting) uses the Cap Filler(GF) that provides a service to the wave shade area of the satellite signal that is a non-line of sight area. The GF is the repeater and the Satellite DMB Systems certainly must construct the GF Network toguarantee the movement reception of the terminal. As the coverage of the GF is formed the Cell or Sector, when the multiple GF is established to be contiguous, the problem of the interference will be able to occur. This paper describes the Satellite DMB system and the GF, and it investigate the design fundamentals plan of the GF Network that it will be able to reduce this problem. As a result, in case of the distance that GF and terminal unit is above 4.6Km, service is not provided because of quality degradation according to mutual interference.

Framing North Korea on Twitter: Is Network Strength Related to Sentiment?

  • Kang, Seok
    • Journal of Contemporary Eastern Asia
    • /
    • v.20 no.2
    • /
    • pp.108-128
    • /
    • 2021
  • Research on the news coverage of North Korea has been paying less attention to social media platforms than to legacy media. An increasing number of social media users post, retweet, share, interpret, and set agendas on North Korea. The accessibility of international users and North Korea's publicity purposes make social media a venue for expression, news diversity, and framing about the nation. This study examined the sentiment of Twitter posts on North Korea from a framing perspective and the relationship between network strengths and sentiment from a social network perspective. Data were collected using two tools: Jupyter Notebook with Python 3.6 for preliminary analysis and NodeXL for main analysis. A total of 11,957 tweets, 10,000 of which were collected using Python and 1,957 tweets using NodeXL, about North Korea between June 20-21, 2020 were collected. Results demonstrated that there was more negative sentiment than positive sentiment about North Korea in the sampled Twitter posts. Some users belonging to small network sizes reached out to others on Twitter to build networks and spread positive information about North Korea. Influential users tended to be impartial to sentiment about North Korea, while some Twitter users with a small network exhibited high percentages of positive words about North Korea. Overall, marginalized populations with network bonding were more likely to express positive sentiment about North Korea than were influencers at the center of networks.

Study on the Design Method of the Energy Harvesting Smart Sensor for Implementing IoT Service (IoT 서비스 구현을 위한 에너지 하베스팅 Smart Sensor 설계 방안 연구)

  • Jang, Ho-Deok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.89-94
    • /
    • 2018
  • This paper investigated the design method of the smart sensor for implementing IoT (Internet of Things) service. The power supply of sensor consistently acquisting data is based on the energy harvesting technology and designed with piezoelectric transducer not affected by surrounding circumstances. The wireless communication interface for the transmission of data is designed with BLE (Bluetooth Low Energy). BLE is highly adequate wireless communication technology for low power consumption and short distance wireless communication. The main application of BLE is beacon whose usage range is extended from O2O (Online to Offline) service, navigator based on indoor positioning technology, and anti-theft/lost child prevention service to mobile game. This paper studied the method to extend wireless coverage for complementing the short wireless transmission distance of BLE. The wireless sensor network based on CATV network is proposed for the easy construction of BLE sensor network and extended wireless coverage.

Performance Analysis of Hybrid Downlink Call Admission Control Algorithm for Supporting Wireless Multimedia Services (무선 멀티 미디어 서비스를 위한 하이브리드 호 접속 제어 알고리듬의 제안 및 평가)

  • Kim, Jeong-Ho;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9A
    • /
    • pp.1031-1038
    • /
    • 2004
  • The call admission control algorithm of hybrid scheme is proposed to enhance the QoS(quality of service) of attempted multimedia calls. In the initial stage of 3rd generation multimedia services networks, the major limitations include the small sefyice coverage and the limited radio link capacity. Because the initial massive deployment of network elements such as base stations, base station controllers, and mobile switching centers is restricted to populated areas and the other areas should be covered with the fewer network elements, the radio channel resources are hmited and coverage network is supposed to be established. Therefore the QoS of multimedia services is expected to be severely degraded when tentative traffic hot spot occurs frequently. Thus, the blocking probability of attempted calls mcreases when relatively large number of users try to place multimedia calls in a hot spot area of the wireless networks. In this situation, the proposed hybrid scheme can mitigate the degradation of the QoS of multimedia services by using the available radio channels of the neighboring cells.

HeNB-Aided Virtual-Handover for Range Expansion in LTE Femtocell Networks

  • Tang, Hao;Hong, Peilin;Xue, Kaiping
    • Journal of Communications and Networks
    • /
    • v.15 no.3
    • /
    • pp.312-320
    • /
    • 2013
  • Home evolved Node-B (HeNB), also called a femtocell or a femto base station, is introduced to provide high data rate to indoor users. However, two main problems arise in femtocell networks: (1) Small coverage area of HeNB, which results in limited cell-splitting gain and ping-pong handover (HO) problems and (2) high inter-femtocell interference because HeNBs may be densely deployed in a small region. In this study, an efficient cooperation mechanism called an HeNB-aided virtual-HO (HaVHO) scheme is proposed to expand the coverage area of femtocells and to reduce inter-femtocell interference. The cooperation among neighbor HeNBs is exploited in HaVHO by enabling an HeNB to relay the data of its neighbor HeNB without an HO. The HaVHO procedure is compatible with the existing long term evolution specification, and the information exchange overhead in HaVHO is relatively low. To estimate the signal to interference plus noise ratio improvement, the area average channel state metric is proposed, and the amount of user throughput enhancement by HaVHO is derived. System-level simulation shows that HaVHO has a better performance than the other four schemes, such as lesser radio link failure, lesser ping-pong handover, lesser short-stay handover, and higher user throughput.

RRA : Ripple Routing Algorithm Considering the RF-Coverage of the node in WSN (RRA : 무선센서 네트워크에서 노드의 통신영역을 고려한 랜덤 배치 고정형 라우팅 알고리즘)

  • Lee, Doo-Wan;Kim, Min-Je;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.820-823
    • /
    • 2011
  • WSN is composed of a lot of small sensors with the limited hardware resources. In WSN, at the initial stage, sensor nodes are randomly deployed over the region of interest, and self-configure the clustered networks by grouping a bunch of sensor nodes and selecting a cluster header among them. In this paper, we propose a self-configuration routing protocol for WSN, which consists of step-wise ripple routing algorithm for initial deployment, effective joining of sensor nodes. RRA is search node in RF-coverage of each node, which result in fast network connection, reducing overall power consumption, and extending the lifetime of network.

  • PDF

Assessing Efficiency of Handoff Techniques for Acquiring Maximum Throughput into WLAN

  • Mohsin Shaikha;Irfan Tunio;Baqir Zardari;Abdul Aziz;Ahmed Ali;Muhammad Abrar Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.172-178
    • /
    • 2023
  • When the mobile device moves from the coverage of one access point to the radio coverage of another access point it needs to maintain its connection with the current access point before it successfully discovers the new access point, this process is known as handoff. During handoff the acceptable delay a voice over IP application can bear is of 50ms whereas the delay on medium access control layer is high enough that goes up to 350-500ms. This research provides a suitable methodology on medium access control layer of the IEEE 802.11 network. The medium access control layer comprises of three phases, namely discovery, reauthentication and re-association. The discovery phase on medium access control layer takes up to 90% of the total handoff latency. The objective is to effectively reduce the delay for discovery phase to ensure a seamless handoff. The research proposes a scheme that reduces the handoff latency effectively by scanning channels prior to the actual handoff process starts and scans only the neighboring access points. Further, the proposed scheme enables the mobile device to scan first the channel on which it is currently operating so that the mobile device has to perform minimum number of channel switches. The results show that the mobile device finds out the new potential access point prior to the handoff execution hence the delay during discovery of a new access point is minimized effectively.