• Title/Summary/Keyword: probability of information transmission

Search Result 489, Processing Time 0.023 seconds

Adaptive Timing Synchronization Algorithm for WiBro Uplink (WiBro 상향링크를 위한 적응적 시간동기 추정 알고리즘)

  • Kim, Jeong-Been;Jin, Young-Hwan;Kim, Kyung-Soo;Ahn, Jae-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1068-1075
    • /
    • 2006
  • An adaptive ranging technique for Orthogonal Frequency Division Multiple Access(OFDMA) uplink transmission is proposed for timing synchronization of multiple mobile stations located different distances from a base station. By combining the Timing Phase Compensated Frequency Domain Cross-correlation(TPCFDC) and Frequency Domain Differential Cross-correlation(FDDC), the proposed scheme reduces the number of correlators used in ordinary TPCFDC. Repeated initial ranging attempt with the FDDC in the proposed scheme greatly reduces the hardware implementation complexity. Simulation results for ranging success probability and average ranging attempts count show that the proposed algorithm performs similarly with the ordinary TPCFDC even with the 10 times reduced complexity.

Comparison about TCP and Snoop protocol on wired and wireless integrated network (유무선 혼합망에서 TCP와 Snoop 프로토콜 비교에 관한 연구)

  • Kim, Chang Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.141-156
    • /
    • 2009
  • As the TCP is the protocol designed for the wired network that packet loss probability is very low, because TCP transmitter takes it for granted that the packet loss by the wireless network characteristics is occurred by the network congestion and lowers the transmitter's transmission rate, the performance is degraded. The Snoop Protocol was designed for the wired network by putting the Snoop agent module on the BS(Base Station) that connect the wire network to the wireless network to complement the TCP problem. The Snoop agent cash the packets being transferred to the wireless terminal and recover the loss by resending locally for the error occurred in the wireless link. The Snoop agent blocks the unnecessary congestion control by preventing the dupack (duplicate acknowledgement)for the retransmitted packet from sending to the sender and hiding the loss in the wireless link from the sender. We evaluated the performance in the wired/wireless network and in various TCP versions using the TCP designed for the wired network and the Snoop designed for the wireless network and evaluated the performance of the wired/wireless hybrid network in the wireless link environment that the continuous packet loss occur.

A Study of MAC Architecture Dynamic cope with channel status (채널상황에 동적 대응하는 MAC의 구조에 대한 연구)

  • Kim, Sook-Young;Kim, Young-Sung;Suk, Jung-Bong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.463-465
    • /
    • 2005
  • 본 논문에서는 802.l1e MAC의 EDCA 모드를 기반으로 한 무선랜 환경에서 realtime data인 voice traffic의 QoS를 향상하기 위한 방안을 연구하였다. 동적으로 채널의 상태를 보고, 네트워크 상태를 예측하여 채널 경쟁에 참여할지를 결정하는 방안으로, 경쟁이 치열할 때 voice traffic에 차별화된 가중치를 더 줄 수 있어 전반적인 voice traffic의 성능 향상에 기여한다. 본 연구에서 SU(slot utilization)을 계산하여 PT(Probability of Transmission)을 구할 때, 기존의 DCC 알고리즘을 그대로 802.11e에 적용하게 되면 4개의 AC에 똑같은 알고리즘이 적용되어 802.11e의 핵심인 차별화된 QoS를 지원하는데 무리가 있다. 기존 DCC 알고리즘에서 재시도 회수만 고려해 구하는 것을 802.11e 구조에 맞추어 4개의 AC별로 차별화하여 전송확률(PT)를 구할 수 있게 하였다. 뿐만 아니라, 재시도 회수를 고려하여 재시도 회수가 않은 packet에는 PT값이 높게 나을 수 있게 하고, 최대 가능한 재시도 회수에 도달할 때에는 상위 AC 영역의 값이 나오게 하여 AC의 upgrade가 되는 효과를 가져오게 하였다. 이 때 각 AC의 lower bound와 upper bound를 정하고, 이 때 802.11e의 최대 재시도 회수 parameter와의 상관관계를 정의하여 하위 AC가 상위 AC의 영역을 침범하지 못하도록 정의하고 있다. 추가적으로 SU의 값을 구할 때에도 현재의 SU값 대신 누적된 평균 SU값을 사용해 PT값을 구하여, utilization, latency, Packet loss등 전반적인 부분의 성능개선을 확인할 수 있다.

  • PDF

A Study on the Estimation of Ship Location Information in the Intelligent Maritime Traffic Information System (지능형 해상교통정보시스템의 선박 위치 정보 추정 연구)

  • Deuk-Jae Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.313-314
    • /
    • 2022
  • The intelligent maritime traffic information service provides a service to prevent collisions and stranding of ships based on the location information of ships periodically collected from ship equipment such as LTE-Maritime transceivers and AIS installed on ships. provided in real time. However, the above service may reduce the reliability of ship location information because GPS location information for measuring the ship's location may be cut off during transmission through LTE-Maritime or AIS networks, or phenomena such as location jumps and delays may occur. This study aims to estimate reliable position information to some extent even in an abnormal section through ship position prediction based on the existing received position information using the Kalman filter, which is an optimal estimation filter based on probability.

  • PDF

A Study on MAC Protocol Design for Mobile Healthcare (모바일 헬스케어를 위한 MAC 프로토콜 설계에 관한 연구)

  • Jeong, Pil-Seong;Kim, Hyeon-Gyu;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.323-335
    • /
    • 2015
  • Mobile healthcare is a fusion of information technology and biotechnology and is a new type of health management service to keep people's health at anytime and anywhere without regard to time and space. The WBAN(Wireless Body Area Network) technology that collects bio signals and the data analysis and monitoring technology using mobile devices are essential for serving mobile healthcare. WBAN consisting of users with mobile devices meet another WBAN during movement, WBANs transmit data to the other media. Because of WBAN conflict, several nodes transmit data in same time slot so a collision will occur, resulting in the data transmission being failed and need more energy for re-transmission. In this thesis, we proposed a MAC protocol for WBAN with mobility to solve these problems. First, we proposed a superframe structure for WBAN. The proposed superframe consists of a TDMA(Time Division Muliple Access) based contention access phase with which a node can transmit data in its own time slot and a contention phase using CSMA/CA algorithm. Second, we proposed a network merging algorithm for conflicting WBAN based on the proposed MAC protocol. When a WBAN with mobility conflicts with other WBAN, data frame collision is reduced through network reestablishment. Simulations are performed using a Castalia based on the OMNeT++ network simulation framework to estimate the performance of the proposed superframe and algorithms. We estimated the performance of WBAN based on the proposed MAC protocol by comparing the performance of the WBAN based on IEEE 802.15.6. Performance evaluation results show that the packet transmission success rate and energy efficiency are improved by reducing the probability of collision using the proposed MAC protocol.

Monte-Carlo Based Interference Analysis of 900MHz Passive RFID systems (몬테카를로(Monte-Carlo) 방법을 적용한 수동형 900MHz 대역의 RFID 간섭 분석)

  • Kim Young-Hwan;Eo Pill-Seon;Yang Hoon-Gee;Park Seung-Keun;Kang Bongsoon;Kim Young-Soo;Yook Jong-Gwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.9-18
    • /
    • 2006
  • This paper presents a Monte-Carlo based method to obtain a probability of interference in the 900MHz passive RFID systems. We show an efficient algorithm to calculate not only in-band interference due to unwanted emission of interfering sources for a given emission mask, but out-of-band interference, which depends on the blocking performances of a victim receiver filter. We next apply the proposed method to two types of RFID systems, one is to use simple FHSS and the other to adopt a hybrid use of FHSS and LBT, which senses the channel before transmission. Simulation is first performed with a SEAMCAT. We next make simulation with a MATLAB software which implements SEAMCAT algorithm and show both results from two softwares are similar.

Dynamically Adjusted Probabilistic Broadcasting Mechanism based on Distance Ratio and Node Density for MANETs (MANET에서 이격 비율과 노드 밀집도에 기반한 동적 확률을 적용한 브로드캐스팅 기법)

  • Kim, Jae Soo
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.9
    • /
    • pp.1077-1088
    • /
    • 2013
  • As broadcasting is the process that a node sends a packet to all nodes in the network. it is basic process used for discovering of a routes to a node and disseminating of control information message in Mobile Ad hoc NETwork (MANET). In this paper, we propose dynamically adjusted probabilistic mechanism based on distance ratio and node density for broadcasting in MANETs. The distance ratio can be calculated as the ratio of the radio strength length to the distance from sender of a node, and node density can be get from 1-hop nodes of neighbours. A mobile node receiving broadcast packets determines the probability of rebroadcasting considering distance ratio and node density of itself. Rebroadcast probability will be set as low value to a node which is located in nearby area of sender and has high 1-hop node density, So it reduces packets transmission caused by the early die-out of rebroadcast packets. Compared with the simple flooding and fixed probabilistic flooding by simulation, our approach shows better performances results. Proposed algorithm can reduce the rebroadcast packet delivery more than 30% without scanting reachability, where as it shows up to 96% reachability compared with flooding.

Design of Space-Time Trellis Code with Uniform Error Property (균일 오율의 시공간 격자상 부호 설계)

  • Jung Young-Seok;Lee Jae-Hong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.59-68
    • /
    • 2006
  • The study on the uniform error property of codes has been restricted to additive white Gaussian noise (AWGN) channel, which is generally referred to as geometrical uniformity. In this paper, we extend the uniform error property to space-time codes in multiple-input multiple-output (MIMO) channel by directly treating the probability density functions fully describing the transmission channel and the receiver. Moreover, we provide the code construction procedure for the geometrically uniform space-time trellis codes in fast MIMO channels, which consider the distance spectrum. Due to the uniform error property, the complexity of code search is extensively reduced. Such reduction makes it possible to obtain the optimal space-time trellis codes with high order states. Simulation results show that new codes offer a better performance in fast MIMO channels than other known codes.

An improvement of Medium Access Control Protocol in Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크의 매체 접근 제어 기법에 대한 개선 방안)

  • Jang, Ho;Lee, Myung-Sub;Jeon, Woo-Sang
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.373-382
    • /
    • 2009
  • we present more efficient method of a medium access for real-time ubiquitous sensor networks. Proposed MAC protocol is like the randomized CSMA/CA protocol, but unlike previous legacy protocols, it does not use a time-varying contention window from which a node randomly picks a transmission slot. To reduce the latency for the delivery of event reports from sensor nodes, we carefully decide to select a fixed-size contention window with non-uniform probability distribution of transmitting in each slot. We show that the proposed method can offer up to several times latency reduction compared to legacy of IEEE 802.11 as the size of the sensor network scales up to 256 nodes using a widely-used network simulation package, NS-2. We finally show that proposed MAC scheme comes close to meet bounds on the best latency being achieved by a decentralized CSMA-based MAC protocol for real-time ubiquitous sensor networks which is sensitive to latency.

Coalition based Optimization of Resource Allocation with Malicious User Detection in Cognitive Radio Networks

  • Huang, Xiaoge;Chen, Liping;Chen, Qianbin;Shen, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4661-4680
    • /
    • 2016
  • Cognitive radio (CR) technology is an effective solution to the spectrum scarcity issue. Collaborative spectrum sensing is known as a promising technique to improve the performance of spectrum sensing in cognitive radio networks (CRNs). However, collaborative spectrum sensing is vulnerable to spectrum data falsification (SSDF) attack, where malicious users (MUs) may send false sensing data to mislead other secondary users (SUs) to make an incorrect decision about primary user (PUs) activity, which is one of the key adversaries to the performance of CRNs. In this paper, we propose a coalition based malicious users detection (CMD) algorithm to detect the malicious user in CRNs. The proposed CMD algorithm can efficiently detect MUs base on the Geary'C theory and be modeled as a coalition formation game. Specifically, SSDF attack is one of the key issues to affect the resource allocation process. Focusing on the security issues, in this paper, we analyze the power allocation problem with MUs, and propose MUs detection based power allocation (MPA) algorithm. The MPA algorithm is divided into two steps: the MUs detection step and the optimal power allocation step. Firstly, in the MUs detection step, by the CMD algorithm we can obtain the MUs detection probability and the energy consumption of MUs detection. Secondly, in the optimal power allocation step, we use the Lagrange dual decomposition method to obtain the optimal transmission power of each SU and achieve the maximum utility of the whole CRN. Numerical simulation results show that the proposed CMD and MPA scheme can achieve a considerable performance improvement in MUs detection and power allocation.