• Title/Summary/Keyword: physical layer protocol

Search Result 126, Processing Time 0.023 seconds

Ship Ad-hoc Communication (SAC) Protocol for SANETs (선박용 애드혹 네트워크를 위한 Ship Ad-hoc Communication 프로토콜)

  • Yun, Chang-Ho;Kim, Seung-Gun;Park, Jong-Won;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.906-912
    • /
    • 2012
  • A ship ad-hoc network (SANET) can provide ships with diverse multimedia services by replacing expensive satellite communications. While ITU-R M. 1842-1, standards for maritime VHF band digital communications, can be used as the specifications of physical layer for SANETs, no standards are specified for higher layers of SANETs. In this paper, we propose a ship ad-hoc communication (SAC) protocol for SANETs, based on medium access control (MAC) and routing protocols for terrestrial ad-hoc networks. SAC protocol is a cross-layer protocol which combines MAC and routing into one algorithm and considers maritime environments, including the existence of neighboring ships, the possibility of routing to a destination, and changing the communication mode in case of VHF channel failure.

A Combining Scheme to Reduce Power Consumption in Cooperation and Cyclic Code for Wireless Sensor Networks (협력-순환 부호를 이용한 무선 센서 네트워크에서의 전력 소모 감소를 위한 결합기법에 관한 연구)

  • Kong, Hyung Yun;Hwang, Yun Kyeong;Hong, Seong Wook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.63-69
    • /
    • 2008
  • In this paper, our goal is to find a power-effective protocol that improves the accuracy of transmission in sensor networks. Therefore we propose a cooperative communication protocol based on MRC(Maximal Ratio Combining) and cyclic code. In our proposal, one sensor node assists two others to communicate with a clusterhead that can get diversity effect and MRC can improve diversity effect also. The proposed protocol with cyclic code can correct error up to 3-bit and reduce decoding complexity compared with convolutional code. Simulation results reveal proposed protocol can save the network energy up to 6dB over single-hop protocol at BER(Bit Error Rate) of $10^{-2}$.

  • PDF

Evaluation of the Wear Comfort of Women's Fitted Sports T-shirts Made from Cool-Touch Fabrics (냉감 소재를 활용한 밀착형 여성 스포츠 상의의 착용쾌적성 평가)

  • Kim, Soyoung;Choi, Jiyoung;Lee, Heeran;Hong, Kyunghi
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.41 no.5
    • /
    • pp.929-938
    • /
    • 2017
  • This research investigated the effects of cool touch fabrics on thermo-regulating physical properties and subjective evaluation using a 3D fitted women's T-shirts in wear test. Qmax, clothing microclimate, microclimate wettedness, thermogram and subjective vote were observed during rest-right after an exercise-rest protocol. As a result, there was no single determining physical variable to explain the reasons of cool sensations of T-shirts made of cool touch fabric across the entire protocol. Qmax could partly predict a wear sensation at the initial stage when only insensible perspiration was presented. Simultaneous observation of temperature/humidity gradient understand from the inside to the outside of the clothing layer or microclimate wettedness calculated using vapor pressure were helpful to figure out the performance of cool touch fabric, especially at the later stage of the protocol when sweating was excessive. It was especially difficult to connect thermo-regulating physical variables to the subjective evaluation during transient conditions such as 'right after exercise' stage. It is necessary to measure the amount of heat and moisture transferred from the skin to the outside of clothing along with the physical properties measured in this study to understand the detailed mechanisms of why a cool sensation is evoked from tight fitting T-shirts made of newly developed cool touch fabrics.

Relay Network using UAV: Survey of Physical Layer and Performance Enhancement Issue (무인항공기를 이용한 중계네트워크: 물리계층 동향분석 및 성능향상 이슈)

  • Cho, Woong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.901-906
    • /
    • 2019
  • UAV (Unmanned Aerial Vehicle) is widely used in various areas such as civil and military applications including entertainment industries. Among them, UAV based communication system is also one of the important application areas. Relays have been received much attention in communication system due to its benefits of performance enhancement and coverage extension. In this paper, we investigate UAVs as relays especially focusing on physical layer. First, we introduce the research on UAV application for the relays, then the basic performance of relay networks in dual-hop communication system is analyzed by adopting decode-and-forward (DF) relaying protocol. The performance is represented using symbol error rate (SER) and UAV channels are applied by assuming asymmetric environments. Based on the performance analysis, we discuss performance enhancement issues by considering physical layer.

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.

Survey on IEEE 802.11 DCF Game Theoretic Approaches (IEEE 802.11 DCF에서의 게임 이론적 접근방법 소개)

  • Choi, Byeong-Cheol;Kim, Jung-Nyeo;Ryu, Jae-Cheol
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.240-242
    • /
    • 2007
  • The game theoretic analysis in wireless networks can be classified into the jamming game of the physical layer, the multiple access game of the medium access layer, the forwarder's dilemma and joint packet forwarding game of the network layer, and etc. In this paper, the game theoretic analysis about the multiple access game that selfish nodes exist in the IEEE 802.11 DCF(Distributed Coordination Function) wireless networks is addressed. In this' wireless networks, the modeling of the CSMA/CA protocol based DCF, the utility or payoff function calculation of the game, the system optimization (using optimization theory or convex optimization), and selection of Pareto-optimality and Nash Equilibrium in game strategies are the important elements for analyzing how nodes are operated in the steady state of system. Finally, the main issues about the game theory in the wireless network are introduced.

  • PDF

Technical Analysis of LoRa for Problems on Outdoor Culture Smart Farm (노지재배 스마트팜의 문제점을 해결하기 위한 LoRa 기술 분석)

  • Jaechan Lee;Sanghyeon Jeon;Junyoung Lee;Yeunwoong Kyung
    • Journal of Advanced Technology Convergence
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Recently, there have been increasing interests in researches to apply wireless communication technologies for smart farm. This paper introduces the problems in the smart farm for the outdoor culture and technical considerations to solve the problems. As candidate technologies, this paper selects LoRa, Sigfox, NB-IoT, and Wi-Fi and then determines that LoRa is a suitable technology based on the CAPEX, coverage, transmission rate, battery, and the price. To provide technical analysis, this paper introduces technologies related to the physical and medium access control (MAC) layers as well as the security. Specifically, this paper includes the modulation technology in the physical layer, Class (Class A, B, and C) based protocol operations in MAC layer, and security architecture based on the LoRa version.

Multiple Constraint Routing Protocol for Frequency Diversity Multi-channel Mesh Networks using Interference-based Channel Allocation

  • Torregoza, John Paul;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1632-1644
    • /
    • 2007
  • Wireless Mesh Networks aim to attain large connectivity with minimum performance degradation, as network size is increase. As such, scalability is one of the main characteristics of Wireless Mesh Networks that differentiates it from other wireless networks. This characteristic creates the need for bandwidth efficiency strategies to ensure that network performance does not degrade as the size of the network increase. Several researches have been done to realize mesh networks. However, the researches conducted were mostly focused on a per TCP/IP layer basis. Also, the studies on bandwidth efficiency and bandwidth improvement are usually dealt with as separate issues. This paper aims to simultaneously study bandwidth efficiency and improvement. Aside from optimizing the bandwidth given a fixed capacity, the capacity is also increased using results of physical layer studies. In this paper, the capacity is improved by using the concept of non-overlapping channels for wireless communication. A channel allocation scheme is conceptualized to choose the transmission channel that would optimize the network performance parameters with consideration of chosen Quality of Service (QoS) parameters. Network utility maximization is used to optimize the bandwidth after channel selection. Furthermore, a routing scheme is proposed using the results of the network utilization method and the channel allocation scheme to find the optimal path that would maximize the network gain.

  • PDF

An Energy-Efficient MAC Protocol for Wireless Wearable Computer Systems

  • Beh, Jounghoon;Hur, Kyeong;Kim, Wooil;Joo, Yang-Ick
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.7-11
    • /
    • 2013
  • Wearable computer systems use the wireless universal serial bus (WUSB), which refers to USB technology that is merged with WiMedia physical layer and medium access control layer (PHY/MAC) technical specifications. WUSB can be applied to wireless personal area network (WPAN) applications as well as wired USB applications such as PAN. WUSB specifications have defined high-speed connections between a WUSB host and WUSB devices for compatibility with USB 2.0 specifications. In this paper, we focus on an integrated system with a WUSB over an IEEE 802.15.6 wireless body area network (WBAN) for wireless wearable computer systems. Due to the portable and wearable nature of wearable computer systems, the WUSB over IEEE 802.15.6 hierarchical medium access control (MAC) protocol has to support power saving operations and integrate WUSB transactions with WBAN traffic efficiently. In this paper, we propose a low-power hibernation technique (LHT) for WUSB over IEEE 802.15.6 hierarchical MAC to improve its energy efficiency. Simulation results show that the LHT also integrates WUSB transactions and WBAN traffic efficiently while it achieves high energy efficiency.

MAC Protocol Design for Visual Light LAN using LED Light (LED 조명 기반의 무선 가시광 LAN 통신을 위한 MAC 프로토콜 설계)

  • Jeon, Jong-Bae;Choi, Jung-Ho;Kim, Sung-Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.391-398
    • /
    • 2011
  • In this paper, we propose a MAC protocol for visible light wireless LAN using LED light. The proposed MAC protocol has a function of automatic direction optimization for LED transceiver. There is periodical time slot for broadcasting and registration in the proposed MAC protocol. We used polling method for data transfer in the protocol since visible light is hard to detect carrier and collision by other mobile stations; thus we cannot use CSMA/CD method in visible light LAN. We also amended the MAC frame of IEEE 802.11 to propose a revised version for visible light wireless LAN using LED light. We investigate the performance of the proposed MAC protocol. When the bit rate of physical layer is 100 Mb/s, the net data throughput using the proposed MAC protocol is estimated to 94.386 Mb/s.