• Title/Summary/Keyword: system throughput

Search Result 1,748, Processing Time 0.025 seconds

QoS Control and Link-Level Performance Analysis for Mobile IP of Wireless Communication Networks (이동인터넷을 위한 QoS 제어 및 링크레벨 성능분석)

  • 조정호;김광현;이형옥
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.941-950
    • /
    • 2001
  • In this paper, we present the integrated network architecture for supporting mobile IP in third generation mobile communication networks, and propose the end-to-end QoS control mechanisms of DiffServ and QoS control functions of each network element in the proposed network. First, the QoS supporting schemes of IMT-2000 are described. Second, the necessities of integrating the networks are discussed and the integrated architecture are proposed. Third, the mapping between wireless channels and DiffServ classes are presented. Finally, the end-to-end QoS control mechanisms are proposed. We also analyze the link level protocols with QoS provisioning for mobile multimedia assuming that the system support voice and data traffic simultaneously. In case of data traffic, the delay and throughput of SREJ ARQ and Type-1 Hybrid ARQ scheme are compared, and In case of voice traffic, the packet loss rate of BCH coding is analyzed according to the varying data traffic loads. The results indicate that the adaptive link level protocols are efficient to meet the QoS requirements while the complexities are increased.

  • PDF

Power consumption estimation of active RFID system using simulation (시뮬레이션을 이용한 능동형 RFID 시스템의 소비 전력 예측)

  • Lee, Moon-Hyoung;Lee, Hyun-Kyo;Lim, Kyoung-Hee;Lee, Kang-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1569-1580
    • /
    • 2016
  • For the 2.4 GHz active RFID to be successful in the market, one of the requirements is the increased battery life. However, currently we do not have any accurate power consumption estimation method. In this study we develop a simulation model, which can be used to estimate power consumption of tag accurately. Six different simulation models are proposed depending on collision algorithm and query command method. To improve estimation accuracy, we classify tag operating modes as the wake-up receive, UHF receive, sleep timer, tag response, and sleep modes. Power consumption and operating time are identified according to the tag operating mode. Query command for simplifying collection and ack command procedure and newly developed collision control algorithm are used in the simulation. Other performance measures such as throughput, recognition time for multi-tags, tag recognition rate including power consumption are compared with those from the current standard ISO/IEC 18000-7.

A QOC Signal Detection Method for Spatially Multiplexed MIMO Systems (공간다중화 MIMO 시스템을 위한 QOC 신호검출 기법)

  • Im, Tae-Ho;Kim, Jae-Kwon;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9C
    • /
    • pp.771-777
    • /
    • 2010
  • This paper proposes a new signal detection method, called QR-OSIC with Candidates (QOC) method, for spatially multiplexed multiple input multiple output (MIMO) systems. By using the ordered successive interference cancellation (OSIC) algorithm and the maximum likelihood (ML) metric, the proposed method achieves near-ML performance without requiring a large number of candidates. Although the proposed method can be used for both hard and soft decoding systems, it is especially useful for soft decoding systems since the LLR values for all the bits can be efficiently computed without using LLR estimation. The proposed method is also suitable for VLSI implementation since it leads to fixed throughput system.

The Performance Improvement for Congestion Control under TCP Traffic in Wireless Network (무선네트워크 전송기반에서 프로토콜에 의한 트래픽 혼잡제어)

  • Ra, Sang-Dong;Kim, Moon-Hwan;Lee, Sung-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10A
    • /
    • pp.965-973
    • /
    • 2007
  • We analyzed that the loss of data in TCP protocol based wireless networks caused by overlapped responses in bi-directional nodes that were resulted in out of the data sequence. This loss can be prevented by using revised TCP rate control algorithm and the performance of throughput can also be improved. The rate control algorithm is applied when the congestion happens between nodes while traffic packets are retransmitting in TCP bandwidth. In addition to applying the rate control algorithm, we determine the number of system clients in bandwidth and the average of pausing time between transmitting serial files to produce a competitive level so that an efficient performance of rapid retransmitting for the loss of multi-packets. This paper discusses the improvement of congestion control in that the decrease of the loss, firstly, as ensuring an efficient connection rate and, secondly, as using sliding window flow control.

A MU-MIMO User Scheduling Mechanism based on Active CSI Exchange (능동적 CSI 교환을 기반으로 한 MU-MIMO 유저 스케줄링 기법)

  • Lee, Kyu-Haeng;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.41 no.4
    • /
    • pp.192-201
    • /
    • 2014
  • User scheduling boosts the Multi-User Multi-Input Multi-Output (MU-MIMO) gain by selecting an optimal set of users to increase the 802.11 Wi-Fi system capacities. Many kinds of user scheduling algorithms, however, fail to realize the advantages of MU-MIMO due to formidable Channel State Information (CSI) overhead. In this paper, we propose a user scheduling method considering such CSI exchange overhead and its MAC protocol, called ACE (Active CSI Exchange based User Scheduling for MU-MIMO Transmission). Unlike most proposals, where user scheduling is performed after an Access Point (AP) receives CSI from all users, ACE determines the best user set during the CSI exchange phase. In particular, the AP broadcasts a channel hint about previously scheduled users, and the remaining users actively send CSI reports according to their Effective Channel Gains (ECGs) calculated from the hint. Through trace-driven MATLAB simulations, we prove that the proposed scheme improves the throughput gain significantly.

Efficient Differentiated Bandwidth Allocation for QoS based Ethernet PON System (QoS 기반의 EPON 시스템에서 효율적인 차등 대역폭 할당)

  • Eom Jong-Hoon;Jung Min-Suk;Kim Sung-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.156-166
    • /
    • 2005
  • Ethernet passive optical network is an economical and efficient access network that has received significant research attention in recent years. A MAC(Media Access Control) protocol of PON, the next generation access network, is based on TDMA(Time Division Multiple Access) basically. In this thesis, we addressed the problem of dynamic bandwidth allocation in QoS based Ethernet PONs. We augmented the bandwidth allocation to support QoS in a differentiated services framework. Our differentiated bandwidth guarantee allocation(DBGA) allocates effectively and fairly bandwidths among end users. Moreover, we showed that DBGA that perform weighted bandwidth allocation for high priority packets result in better performance in terms of average and maximum packet delay, as well as network throughput compared with existing dynamic bandwidth allocations. We used simulation experiments to study the performance and validate the effectiveness of the proposed bandwidth allocations.

An Adaptive Buffer Tuning Mechanism for striped transport layer connection on multi-homed mobile host (멀티홈 모바일 호스트상에서 스트라이핑 전송계층 연결을 위한 적응형 버퍼튜닝기법)

  • Khan, Faraz-Idris;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.199-211
    • /
    • 2009
  • Recent advancements in wireless networks have enabled support for mobile applications to transfer data over heterogeneous wireless paths in parallel using data striping technique [2]. Traditionally, high performance data transfer requires tuning of multiple TCP sockets, at sender's end, based on bandwidth delay product (BDP). Moreover, traditional techniques like Automatic TCP Buffer Tuning (ATBT), which balance memory and fulfill network demand, is designed for wired infrastructure assuming single flow on a single socket. Hence, in this paper we propose a buffer tuning technique at senders end designed to ensure high performance data transfer by striping data at transport layer across heterogeneous wireless paths. Our mechanism has the capability to become a resource management system for transport layer connections running on multi-homed mobile host supporting features for wireless link i.e. mobility, bandwidth fluctuations, link level losses. We show that our proposed mechanism performs better than ATBT, in efficiently utilizing memory and achieving aggregate throughput.

  • PDF

Genotoxicity Study on Khal, a Halocidin Derivative, in Bacterial and Mammalian Cells

  • Kim, Youn-Jung;Kim, Mi-Soon;Jeon, Hee-Kyoung;Ryu, Jae-Chun
    • Molecular & Cellular Toxicology
    • /
    • v.2 no.3
    • /
    • pp.151-158
    • /
    • 2006
  • Khal was a synthetic congener of halocidin, a heterodimeric peptide consisting of 19 and 15 amino acid residues detected in Halocynthia aurantium. This compound was considered a candidate for the development of a novel peptide antibiotic. The genotoxicity of Khal was subjected to high throughput toxicity screening (HTTS) because they revealed strong antibacterial effects. Mouse lymphoma thymidine kinase ($tk^{+/-}$) gene assay (MOLY), single cell gel electrophoresis (Comet) assay and chromosomal aberration assay in mammalian cells and Ames reverse mutation assay in bacterial system were used as simplified, inexpensive, short-term in vitro screening tests in our laboratory. These compounds are not mutagenic in S. typhimurium TA98 and TA100 strains both in the presence and absence of metabolic activation. Before performing the comet assay, $IC_{20}$ of Khal was determined the concentration of $25.51\;{\mu}/mL\;and\;21.99\;{\mu}g/mL$ with and without S-9, respectively. In the comet assay, Khal was not induced DNA damage in mouse lymphoma cell line. Also, the mutation frequencies in the Khal-treated cultures were similar to the vehicle controls. It is suggests that Khal is non-mutagenic in MOLY assay. And no clastogenicity was observed in Khal-treated Chinese hamster lung cells. The results of this battery of assays indicate that Khal has no genotoxic potential in bacterial or mammalian cell systems. Therefore, we suggest that Khal, as the optimal candidates with both no genotoxic potential and antibacterial effects must be chosen.

Bandwidth Management of WiMAX Systems and Performance Modeling

  • Li, Yue;He, Jian-Hua;Xing, Weixi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.2
    • /
    • pp.63-81
    • /
    • 2008
  • WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, large service coverage, and flexible quality of services (QoS). Due to the large number of connections and flexible QoS supported by WiMAX, the uplink access in WiMAX networks is very challenging since the medium access control (MAC) protocol must efficiently manage the bandwidth and related channel allocations. In this paper, we propose and investigate a cost-effective WiMAX bandwidth management scheme, named the WiMAX partial sharing scheme (WPSS), in order to provide good QoS while achieving better bandwidth utilization and network throughput. The proposed bandwidth management scheme is compared with a simple but inefficient scheme, named the WiMAX complete sharing scheme (WCPS). A maximum entropy (ME) based analytical model (MEAM) is proposed for the performance evaluation of the two bandwidth management schemes. The reason for using MEAM for the performance evaluation is that MEAM can efficiently model a large-scale system in which the number of stations or connections is generally very high, while the traditional simulation and analytical (e.g., Markov models) approaches cannot perform well due to the high computation complexity. We model the bandwidth management scheme as a queuing network model (QNM) that consists of interacting multiclass queues for different service classes. Closed form expressions for the state and blocking probability distributions are derived for those schemes. Simulation results verify the MEAM numerical results and show that WPSS can significantly improve the network’s performance compared to WCPS.

A High-Speed Hardware Design of IDEA Cipher Algorithm by Applying of Fermat′s Theorem (Fermat의 소정리를 응용한 IDEA 암호 알고리즘의 고속 하드웨어 설계)

  • Choi, Young-Min;Kwon, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.696-702
    • /
    • 2001
  • In this paper, we design IDEA cipher algorithm which is cryptographically superior to DES. To improve the encryption throughput, we propose an efficient design methodology for high-speed implementation of multiplicative inverse modulo $2^{15}$+1 which requires the most computing powers in IDEA. The efficient hardware architecture for the multiplicative inverse in derived from applying of Fermat's Theorem. The computing powers for multiplicative inverse in our proposal is a decrease 50% compared with the existing method based on Extended Euclid Algorithm. We implement IDEA by applying a single iterative round method and our proposal for multiplicative inverse. With a system clock frequency 20MGz, the designed hardware permits a data conversion rate of more than 116 Mbit/s. This result show that the designed device operates about 2 times than the result of the paper by H. Bonnenberg et al. From a speed point of view, out proposal for multiplicative inverse is proved to be efficient.

  • PDF