• Title/Summary/Keyword: throughput method

Search Result 1,074, Processing Time 0.029 seconds

Elementary MAC Scheme Based on Slotted ALOHA for Wireless Passive Sensor Networks (무선 수동형 센서 망을 위한 Slotted ALOHA 기반의 기본적인 MAC 방식)

  • Choi, Cheon Won;Seo, Heewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.20-26
    • /
    • 2016
  • A wireless passive sensor network is a network which, by letting RF sources supply energy to sensor nodes, is - at least theoretically - able to live an eternal life without batteries. Due to the technological immaturity, however, a wireless passive sensor network still has many difficulties; energy scarcity, non-simultaneity of energy reception and data transmission and inefficiency in data transmission occurring at sensor nodes. Considering such practical constraints, in this paper, we propose an elementary MAC scheme supporting many sensor nodes to deliver packets to a sink node. Based on a time structure in which a charging interval for charging capacitors by using received and an acting interval for communicating with a sink node are alternately repeated, the proposed MAC scheme delivers packets to a sink node according to slotted ALOHA. In general, a contention-type scheme tends to exhibit relatively low throughput. Thus, we multilaterally evaluate the throughput performance achieved by the proposed MAC scheme using a simulation method. Simulation results show that the network-wide throughput performance can be enhanced by properly setting the length of acting interval.

Intra-session Network Coding for Improving Throughput in Multi-Radio Multi-Channel Multi-Hop Wireless Networks (멀티라디오/멀티채널 멀티 홉 무선 네트워크에서 처리율 향상을 위한 인트라세션 네트워크 코딩)

  • Seo, Kyeong-Su;Yoon, Won-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.10
    • /
    • pp.29-34
    • /
    • 2011
  • We present a network coding scheme which is designed for improving throughput in multi-hop wireless network with multi-radio multi-channel. The co-channel interference and unreliability of wireless transmissions cause the wireless network to reduce throughput. In wireless network, multi-radio multi-channel technology shows benefit to cut down channel interferences and contentions. And network coding can reduce the complexity of scheduling and improve throughput by increasing usage of links in wireless network. In this paper, we propose a method of channel assignment and transmission scheduling in intra-session network coding that efficiently improve throughput for multi-hop wireless network by using mathematical modeling and linear programming. Moreover, we evaluate the performance of the intra-session network coding scheme by using AMPL with CPLEX. The simulation results show that intra-session network coding can achieve better throughput than traditional routing.

Analysis of IEEE 802.11n MAC and PHY Integration Method for High Throughput Performance based on NS-2 (고속 처리량을 위한 NS-2 기반 IEEE 802.11n MAC/PHY 연동 기법분석)

  • Kim, Joo-Seok;Lee, Yun-Ho;Song, Jae-Su;Kim, Kyung-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.67-75
    • /
    • 2009
  • IEEE 802.11 WLAN(Wireless Local Area Network) standard is currently developing with increased wireless internet demand. Study trends of IEEE 802.11n for high throughput show two aspects, enhanced system throughput using aggregation among packets in MAC(Medium Access Control) layer, and better data rates adapting MIMO(Multiple-Input Multiple-Output) in PRY(Physical) layer. But, no one demonstrates IEEE 802.11n system performance results considering MAC and PRY connection. This paper adapts A-MPDU(Aggregation-MAC Protocol Data Unit) method in MAC layer and MIMO in PRY layer for IEEE 802.11n system. Consequently, Simulation results show enhanced throughput and data rates compared to existing system. Also, We use NS-2(Network Simulator-2) considering MAC and PRY connection for reality.

A Rule for Reducing Error Remains in Multicopy Transmission ARQ

  • Shin, Woo-Cheol;Park, Jin-Kyung;Ha, Jun;Choi, Cheon-Won
    • Journal of IKEEE
    • /
    • v.7 no.1 s.12
    • /
    • pp.97-106
    • /
    • 2003
  • In ARQ based error control, imperfect error detection leaves error remains on a packet. Aiming for a reduction of error remains in multicopy transmission ARQ system, we propose a rule of requesting a retransmission and deciding a correct copy, (identified as $(m, \;{\sigma})$rule). While the probability of error remains is reduced by the employment of the $(m, \;{\sigma})$ rule at multicopy transmission ARQ, delay and throughput performance may be degraded in comparison with those of conventional single copy transmission ARQ. Thus, we develop an analytical method to evaluate the performance trade-off in multicopy transmission ARQ following the $(m, \;{\sigma})$ rule. From the numerical results obtained by the analytical method, we investigate the effect of channel characteristics on the performance of error remains, packet loss, throughput, and packet delay, and confirm that the adaptability of the $(m, \;{\sigma})$ rule to conform to various QoS requirements with ease.

  • PDF

A study on the Throughput Guarantee with TCP Traffic Control (전송률 보장을 위한 TCP 트래픽 제어에 관한 연구)

  • Lee, Myun-Sub
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.303-308
    • /
    • 2016
  • Recently, as the rapid development of network technology and the increase of services required high bandwidth such as multimedia service, the network traffic dramatically increases. This massive increase of network traffic causes some problems such as the degradation of QoS and the lack of network resources and, to solve these problems, various research to guarantee QoS have been performing. Currently, The most representative method to guarantee the QoS is the DiffServ(: Differentiated Service). The DiffServ defines the AF(: Assured Forwarding) PHB(: Per Hop Behavior) and statistically ensures the throughput over the certain level of data rate. However, the TCP congestion control method that make up the majority of the Internet traffic is not fundamentally suitable to the DiffServ that guarantees the throughput without managing the individual flow. Therefore, in this paper, we present this mismatch through the simulation as an example and propose the solution by controlling the TCP of the terminal in the network. The proposed scheme utilizes the information of the reception window size included in the ACK frame and does not require any modification of the TCP algorithms currently in use.

Interference-limited Resource Allocation Algorithm in Cognitive Heterogeneous Networks

  • Zhuang, Ling;Yin, Yaohu;Guan, Juan;Ma, Xiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1471-1488
    • /
    • 2018
  • Interference mitigation is a significant issue in the cognitive heterogeneous networks, this paper studied how to reduce the interference to macrocell users (MU) and improve system throughput. Establish the interference model with imperfect spectrum sensing by analyzing the source of interference complexity. Based on the user topology, the optimize problem was built to maximize the downlink throughput under given interference constraint and the total power constraint. We decompose the resource allocation problem into subcarrier allocation and power allocation. In the subcarrier assignment step, the allocated number of subcarriers satisfies the requirement of the femtocell users (FU).Then, we designed the power allocation algorithm based on the Lagrange multiplier method and the improved water filling method. Simulation results and performance analyses show that the proposed algorithm causes less interference to MU than the algorithm without considering imperfect spectrum sensing, and the system achieves better throughput performance.

New Lung Cancer Panel for High-Throughput Targeted Resequencing

  • Kim, Eun-Hye;Lee, Sunghoon;Park, Jongsun;Lee, Kyusang;Bhak, Jong;Kim, Byung Chul
    • Genomics & Informatics
    • /
    • v.12 no.2
    • /
    • pp.50-57
    • /
    • 2014
  • We present a new next-generation sequencing-based method to identify somatic mutations of lung cancer. It is a comprehensive mutation profiling protocol to detect somatic mutations in 30 genes found frequently in lung adenocarcinoma. The total length of the target regions is 107 kb, and a capture assay was designed to cover 99% of it. This method exhibited about 97% mean coverage at $30{\times}$ sequencing depth and 42% average specificity when sequencing of more than 3.25 Gb was carried out for the normal sample. We discovered 513 variations from targeted exome sequencing of lung cancer cells, which is 3.9-fold higher than in the normal sample. The variations in cancer cells included previously reported somatic mutations in the COSMIC database, such as variations in TP53, KRAS, and STK11 of sample H-23 and in EGFR of sample H-1650, especially with more than $1,000{\times}$ coverage. Among the somatic mutations, up to 91% of single nucleotide polymorphisms from the two cancer samples were validated by DNA microarray-based genotyping. Our results demonstrated the feasibility of high-throughput mutation profiling with lung adenocarcinoma samples, and the profiling method can be used as a robust and effective protocol for somatic variant screening.

Fast High-throughput Screening of the H1N1 Virus by Parallel Detection with Multi-channel Microchip Electrophoresis

  • Zhang, Peng;Park, Guenyoung;Kang, Seong Ho
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.4
    • /
    • pp.1082-1086
    • /
    • 2014
  • A multi-channel microchip electrophoresis (MCME) method with parallel laser-induced fluorescence (LIF) detection was developed for rapid screening of H1N1 virus. The hemagglutinin (HA) and nucleocapsid protein (NP) gene of H1N1 virus were amplified using polymerase chain reaction (PCR). The amplified PCR products of the H1N1 virus DNA (HA, 116 bp and NP, 195 bp) were simultaneously detected within 25 s in three parallel channels using an expanded laser beam and a charge-coupled device camera. The parallel separations were demonstrated using a sieving gel matrix of 0.3% poly(ethylene oxide) ($M_r$ = 8,000,000) in $1{\times}$ TBE buffer (pH 8.4) with a programmed step electric field strength (PSEFS). The method was ~20 times faster than conventional slab gel electrophoresis, without any loss of resolving power or reproducibility. The proposed MCME/PSEFS assay technique provides a simple and accurate method for fast high-throughput screening of infectious virus DNA molecules under 400 bp.

802.11 Ad Hoc LANs with Realistic Channels : Study of Packet Fragmentation

  • Kim, Chesoong;Lee, Seokjun;Lyakhov, Andrey;Vishnevsky , Vladimir
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.33 no.3
    • /
    • pp.381-392
    • /
    • 2007
  • In this paper, we present an analytical method for estimating the saturation throughput of an 802.11 ad hoc LAN in the presence of noise distorting transmitted frames. This is the first method that allows studying analytically the 802.11 network performance with consideration of correlated channel failures usually inherent to realistic wireless channels. With the study, we consider the possible packet fragmentation that can be adopted to reduce the performance degradation caused by noise-induced distortions. In addition to the throughput, our method allows estimating the probability of a packet rejection occurring when the number of packet transmission retries attains its limit. The obtained numerical results of investigating 802.11 LANs by the developed method are validated by simulation and show high estimation accuracy as well as the method efficiency in determining the optimal fragmentation threshold.

Rounds Reduction and Blocks Controlling to Enhance the Performance of Standard Method of Data Cryptography

  • Abu-Faraj, Mua'ad M.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.648-656
    • /
    • 2021
  • Color digital images are used in many multimedia applications and in many vital applications. Some of these applications require excellent protection for these images because they are confidential or may contain confidential data. In this paper, a new method of data cryptography is introduced, tested, and implemented. It will be shown how this method will increase the security level and the throughput of the data cryptography process. The proposed method will use a secret image_key to generate necessary private keys for each byte of the data block. The proposed method will be compared with other standard methods of data cryptography to show how it will meet the requirements of excellent cryptography, by achieving the objectives: Confidentiality, Integrity, Non-repudiation, and Authentication.