• Title/Summary/Keyword: normalized throughput

Search Result 33, Processing Time 0.228 seconds

Multiple Access Protocols for a Multichannel Optical Fibre Local Area Network Using a Passive Star Topology and WDM (Passive Star 토플로지와 WDM을 사용한 다중채널 광섬유 LAN을 위한 Multiple Access 르로토콜)

  • ;Jon W. Mark
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.9
    • /
    • pp.1184-1201
    • /
    • 1995
  • Two multiple access protocols are proposed for a multichannel WDM optical fibre local area network or metropolitan area network in which users are interconnected using a passive star topology. Each user has a single tunable transmitter and a single tunable receiver. A transmitter sends a control packet before its data packet transmission so that its intended receivers can tune to the proper data channel wavelength. The maximum throughput of the proposed protocols are independent of the effective normalized propagation delay which may include the transmitter and receiver tuning times and the processing delays. The maximum throughputs of the protocols are analyzed and compared with those of the existing ones by numerical examples. The message delay of the R- Aloha/synchronous N-server switch protocol which is suitable for the queued users is also analyzed.

  • PDF

A Composite LMMSE Channel Estimator for Spectrum-Efficient OFDM Transmit Diversity

  • Seo, Jeong-Wook;Jeon, Won-Gi;Paik, Jong-Ho;Jo, Min-Ho;Kim, Dong-Ku
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.4
    • /
    • pp.209-221
    • /
    • 2008
  • In this paper, we propose a subcarrier allocation method and a composite linear minimum mean square error (LMMSE) channel estimator to increase spectrum efficiency in orthogonal frequency division multiplexing (OFDM) transmit diversity. The pilot symbols for OFDM transmit (Alamouti) diversity are exclusively allocated in two OFDM symbols in different antennas, which causes serious degradation of spectrum efficiency. To reduce the number of pilot symbols, our subcarrier allocation method uses repetition-coded data symbols, and the proposed channel estimator maintains good bit error rate (BER) performance.

Performability Analysis of Token Ring Networks using Hierarchical Modeling

  • Ro, Cheul-Woo;Park, Artem
    • International Journal of Contents
    • /
    • v.5 no.4
    • /
    • pp.88-93
    • /
    • 2009
  • It is important for communication networks to possess the capability to overcome failures and provide survivable services. We address modeling and analysis of performability affected by both performance and availability of system components for a token ring network under failure and repair conditions. Stochastic reward nets (SRN) is an extension of stochastic Petri nets and provides compact modeling facilities for system analysis. In this paper, hierarchical SRN modeling techniques are used to overcome state largeness problem. The upper level model is used to compute availability and the lower level model captures the performance. And Normalized Throughput Loss (NTL) is obtained for the composite ring network for each node failures occurrence as a performability measure. One of the key contributions of this paper constitutes the Petri nets modeling techniques instead of complicate numerical analysis of Markov chains and easy way of performability analysis for a token ring network under SRN reward concepts.

IEEE 802.15.6 Under Saturation: Some Problems to Be Expected

  • Rashwand, Saeed;Misic, Jelena;Khazaei, Hamzeh
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.142-148
    • /
    • 2011
  • Because currently available wireless technologies are not appropriate for wireless body area networks (WBANs), the IEEE 802.15.6 standard was introduced by the IEEE 802.15.6 Task Group to satisfy all the requirements for a monitoring system that operates on, in, or around the human body. In this work, we develop an analytical model for evaluating the performance of an IEEE 802.15.6-based WBAN under saturation condition and a noisy channel. We employ a three-dimensional Markov chain to model the backoff procedure as specified in the standard. Probability generating functions (PGFs) are used to compute the performance descriptors of the network. The results obtained from the analytical model are validated by simulation results. Our results indicate that under saturation condition, the medium is accessed by the highest user priority nodes at the vast majority of time while the other nodes are starving.

Performance Analysis of The CCITT X.25 Protocol (X. 25 Protocol의 성능 분석)

  • 최준균;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.1
    • /
    • pp.25-39
    • /
    • 1986
  • In this paper, we analyze the performance, particularly the flow control mechanism, of the CCITT X.25 protocol in a packet-switched network. In this analysis, we consider the link and packet layers separately, and investigate the performance in three measures; normalized channel throughput, mean transmission time, and transmission efficiency. Each of these measures is formulated in terms of given protocol parameters such as windos size, $T_1$ and $T_2$ values, message length, and so forth. We model the service procedure of the inpur traffic based on the flow control mechanism of the X.25 protocol, and investigate the mechanism of the sliding window flow control with the piggybacked acknowlodgment scheme using a discrete-time Markov chain model. With this model, we study the effect of variation of the protoccol parameters on the performance of the X.25 protocol. From the numerical results of this analysis one can select the optimal valuse of the protocol parameters for different channel environments. it has been found that to maintain the trasnmission capacity satisfactorily, the window size must be greater than or equal to 7 in a high-speed channel. The time-out value, $T_1$, must carefully be selected in a noisy channel. In a normal condition, it should be in the order of ls. The value of $T_2$ has some effect on the transmission efficiency, but is not critical.

  • PDF

A High Speed LDPC Decoder Structure Based on the HSS (HSS 기반 초고속 LDPC 복호를 위한 구조)

  • Lee, In-Ki;Kim, Min-Hyuk;Oh, Deock-Gil;Jung, Ji-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.2
    • /
    • pp.140-145
    • /
    • 2013
  • This paper proposes the high speed LDPC decoder structure base on the DVB-S2. Firstly, We study the solution to avoid the memory conflict. For the high speed decoding process the decoder adapts the HSS(Horizontal Shuffle Scheduling) scheme. Secondly, for the high speed decoding algorithm normalized Min-Sum algorithm is adapted instead of Sum-Product algorithm. And the self corrected is a variant of the LDPC decoding that sets the reliability of a Mc${\rightarrow}$v message to 0 if there is an inconsistency between the signs of the current incoming messages Mv'${\rightarrow}$c and the sign of the previous incoming messages Moldv'${\rightarrow}$c This self-corrected algorithm avoids the propagation on unreliable information in the Tanner graph and thus, helps the convergence of the decoder.Start after striking space key 2 times. Lastly, and this paper propose the optimal hardware architecture supporting the high speed throughput.

Performance Analysis of the HIPERLAN Channel Access Control Protocol (고속 무선 근거리 통신망(HIPERLAN) 채널접근제어 프로토콜의 성능분석)

  • Hyun, Young-Guen;Lee, Jong-Kyu
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.22-29
    • /
    • 2000
  • In this paper, we analyzed the performance of EY-NPMA(Elimination Yield-Non-preemptive Priority Multiple Access) protocol-channel access control protocol of HIPERLAN(HIgh PErformance Radio Local Area Network) type 1 specification, adopted as european high speed wireless LAN standard by ETSI(European Telecommunication Standards Institute). We established a system model for EY-NPMA protocol analysis, analyzed success probability in a channel access cycle, and derived expressions for the average length of contention phase. Using a M/G/1 model, we approximated the normalized delay, and throughput, and we evaluated these results by simulations.

  • PDF

Novel Estimation Technique for the State-of-Charge of the Lead-Acid Battery by using EKF Considering Diffusion and Hysteresis Phenomenon (확산 및 히스테리시스 현상을 고려한 확장칼만필터를 이용한 새로운 납축전지의 충전상태 추정방법)

  • Duong, Van-Huan;Tran, Ngoc-Tham;Park, Yong-Jin;Choi, Woojin
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.19 no.2
    • /
    • pp.139-148
    • /
    • 2014
  • State-of-charge (SOC) is one of the significant indicators to estimate the driving range of the electric vehicle and to control the alternator of the conventional engine vehicles as well. Therefore its precise estimation is crucial not only for utilizing the energy effectively but also preventing critical situations happening to the power train and lengthening the lifetime of the battery. However, lead-acid battery is time-variant, highly nonlinear, and the hysteresis phenomenon causes large errors in estimation SOC of the battery especially under the frequent discharge/charge. This paper proposes a novel estimation technique for the SOC of the Lead-Acid battery by using a well-known Extended Kalman Filter (EKF) and an electrical equivalent circuit model of the Lead-Acid battery considering diffusion and hysteresis characteristics. The diffusion is considered by the reconstruction of the open circuit voltage decay depending on the rest time and the hysteresis effect is modeled by calculating the normalized integration of the charge throughput during the partial cycle. The validity of the proposed algorithm is verified through the experiments.

Low-Power Channel-Adaptive Reconfigurable 4×4 QRM-MLD MIMO Detector

  • Kurniawan, Iput Heri;Yoon, Ji-Hwan;Kim, Jong-Kook;Park, Jongsun
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.100-111
    • /
    • 2016
  • This paper presents a low-complexity channel-adaptive reconfigurable $4{\times}4$ QR-decomposition and M-algorithm-based maximum likelihood detection (QRM-MLD) multiple-input and multiple-output (MIMO) detector. Two novel design approaches for low-power QRM-MLD hardware are proposed in this work. First, an approximate survivor metric (ASM) generation technique is presented to achieve considerable computational complexity reduction with minor BER degradation. A reconfigurable QRM-MLD MIMO detector (where the M-value represents the number of survival branches in a stage) for dynamically adapting to time-varying channels is also proposed in this work. The proposed reconfigurable QRM-MLD MIMO detector is implemented using a Samsung 65 nm CMOS process. The experimental results show that our ASM-based QRM-MLD MIMO detector shows a maximum throughput of 288 Mbps with a normalized power efficiency of 10.18 Mbps/mW in the case of $4{\times}4$ MIMO with 64-QAM. Under time-varying channel conditions, the proposed reconfigurable MIMO detector also achieves average power savings of up to 35% while maintaining a required BER performance.

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.