• 제목/요약/키워드: transmission control schemes

검색결과 175건 처리시간 0.026초

ATM망에서 GFR서비스를 위한 TCP/IP의 버퍼 관리방법과 스케쥴링에 관한 연구 (A Study on the Buffer Management and Scheduling of TCP/IP for GFR service in the ATM networks)

  • 문규춘;최현호;박광채
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 하계종합학술대회 논문집(1)
    • /
    • pp.275-278
    • /
    • 2000
  • Recently ATM(Asynchronous Transfer Mode) technology is facing challenges from Integrated Service IP(Internet Protocol), IP router, Gigabit Ethernet. Although ATM is approved by ITU-T as the standard technology in B-ISDN, its survival is still in question. In the ATM networks, the Guaranteed Frame Rate(GFR) service has been designed to accommodate non-real-time applications, such as TCP(Transmission Control Protocol)/IP based traffic. The GFR service not only guarantees a minimum throughput at the frame level, but also supports a fairshare of available resources. We have studied different discarding and scheduling schemes, and compared their throughput and fairness when TCP/IP Traffic is carried. Through simulations, we know that only per-VC queueing with weighted Round Robin(WRR) can guarantee Minimum Cell Rate Among all the Schemes that have been experimented, we recommend DT-EPD(Dynamic Threshold-Early Packet Discard) integrated with MCRplus(Minimum Cell Rate) to support the GFR service.

  • PDF

Modeling and Control of VSI type FACTS controllers for Power System Dynamic Stability using the current injection method

  • Park, Jung-Soo;Jang, Gil-Soo;Son, Kwang-M.
    • International Journal of Control, Automation, and Systems
    • /
    • 제6권4호
    • /
    • pp.495-505
    • /
    • 2008
  • This paper describes modeling Voltage Sourced Inverter (VSI) type Flexible AC Transmission System (FACTS) controllers and control methods for power system dynamic stability studies. The considered FACTS controllers are the Static Compensator (STATCOM), the Static Synchronous Series Compensator (SSSC), and the Unified Power Flow Controller (UPFC). In this paper, these FACTS controllers are derived in the current injection model, and it is applied to the linear and nonlinear analysis algorithm for power system dynamics studies. The parameters of the FACTS controllers are set to damp the inter-area oscillations, and the supplementary damping controllers and its control schemes are proposed to increase damping abilities of the FACTS controllers. For these works, the linear analysis for each FACTS controller with or without damping controller is executed, and the dynamic characteristics of each FACTS controller are analyzed. The results are verified by the nonlinear analysis using the time-domain simulation.

Opportunistic Routing for Bandwidth-Sensitive Traffic in Wireless Networks with Lossy Links

  • Zhao, Peng;Yang, Xinyu
    • Journal of Communications and Networks
    • /
    • 제18권5호
    • /
    • pp.806-817
    • /
    • 2016
  • Opportunistic routing (OR) has been proposed as a viable approach to improve the performance of wireless multihop networks with lossy links. However, the exponential growth of the bandwidth-sensitive mobile traffic (e.g., mobile video streaming and online gaming) poses a great challenge to the performance of OR in term of bandwidth guarantee. To solve this problem, a novel mechanism is proposed to opportunistically forwarding data packets and provide bandwidth guarantee for the bandwidth-sensitive traffic. The proposal exploits the broadcast characteristic of wireless transmission and reduces the negative effect of wireless lossy links. First, the expected available bandwidth (EAB) and the expected transmission cost (ETC) under OR are estimated based on the local available bandwidth, link delivery probability, forwarding candidates, and prioritization policy. Then, the policies for determining and prioritizing the forwarding candidates is devised by considering the bandwidth and transmission cost. Finally, bandwidth-aware routing algorithm is proposed to opportunistically delivery data packets; meanwhile, admission control is applied to admit or reject traffic flows for bandwidth guarantee. Extensive simulation results show that our proposal consistently outperforms other existing opportunistic routing schemes in providing performance guarantee.

무선 인체 통신 네트워크를 위한 응급데이터 전송기법 (A Life-Critical Data Transmission Scheme for Wireless Body Area Networks)

  • 최원석;조성래
    • 한국통신학회논문지
    • /
    • 제34권12B호
    • /
    • pp.1329-1335
    • /
    • 2009
  • 본 논문에서는 무선 인체 통신 네트워크에서 응급 데이터를 전송할 때 전송 지연시간을 보장하는 DCTW(Dual Channel Transmission Scheme for WBAN)기법을 제안한다. 무선 인체 통신 네트워크에서는 의학적인 응용을 고려하고 개발되었기 때문에, 의학적 데이터의 중요도에 따른 차등 전송 기법이 필요하다. DCTW에서는 응급 데이터 프레임의 전송을 위하여 협대역 채널을 사용하며 일반 데이터 프레임 전송을 위하여 광대역 채널을 사용한다. 협대역 채널을 통하여 응급데이터를 전송하기 때문에 긴급한 데이터를 보내고자 하는 노드가 데이터를 신속히 전송할 수 있도록 하여 전송 지연시간을 효과적으로 감소시켰다. 본 논문은 다양한 성능 분석을 통해 DCTW 기법이 다른 기법에 비해 우수함을 증명하였다.

Two-Tier Interference Elimination for Femtocells Based on Cognitive Radio Centralized Spectrum Management

  • Yi, Leng-Gan;Lu, Yi-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권5호
    • /
    • pp.1514-1531
    • /
    • 2014
  • Femtocell provides better coverage and higher spectrum efficiency in areas rarely covered by macrocells. However, serious two-tier interference emerging from randomly deploying femtocells may create dead zones where the service is unavailable for macro-users. In this paper, we present adopting cognitive radio spectrum overlay to avoid intra-tier interference and incorporating spectrum underlay and overlay to coordinate cross-tier interference. It is a novel centralized control strategy appropriate for both uplink and downlink transmission. We introduce the application of proper spectrum sharing strategy plus optimal power allocation to address the issue of OFDM-based femtocells interference-limited downlink transmission, along with, a low-complexity suboptimal solution proposed. Simulation results illustrate the proposed optimal scheme achieves the highest transmission rate on successfully avoiding two-tier interference, and outperforms the traditional spectrum underlay or spectrum overlay, via maximizing the opportunity to transmit. Moreover, the strength of our proposed schemes is further demonstrated by comparison with previous classic power allocation methods, in terms of transmission rate, computational complexity and signal peak-to-average power ratio.

LTE-Advanced 환경에서 D2D 통신을 위한 송수신 기법 (Transmission and reception scheme for D2D communication in LTE-Advanced environment)

  • 서방원
    • 한국인터넷방송통신학회논문지
    • /
    • 제16권1호
    • /
    • pp.83-88
    • /
    • 2016
  • 본 논문은 LTE-Advanced 시스템에서 셀룰러 상향링크 자원을 재사용하여 단말간 직접 통신 (D2D)을 수행하는 방법에 대해서 다룬다. 기존 문헌들은 일반적으로 D2D 송신 단말이 SC-FDMA 기법을 적용하여 데이터를 전송하는 것을 가정한다. 그러나, 기존 방법에서는 단말 신호들 간의 간섭 신호를 제거할 수 있는 방법이 거의 없기 때문에, 셀룰러 상향링크 통신 신호가 D2D 링크에 미치는 간섭이 큰 경우에는 D2D 통신을 적용할 수 없게 된다. 본 논문에서는 이런 경우에도 D2D 통신이 가능하도록 하기 위하여 D2D 송신 단말이 다중반송파 주파수분할 다중접속 (MC-CDMA) 기술을 적용하여 데이터를 전송하는 것을 제안한다. 또한, D2D 수신 단말에서는 최소 평균 제곱오차 (MMSE) 수신기를 적용함으로써 간섭 신호를 제거하는 것을 제안한다. 모의실험을 통해서 제안하는 방법이 기존 방법보다 더 우수한 BER 성능을 갖는다는 것을 보인다.

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권7호
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

FR/ATM 연동에서 트래픽 파라메타를 사상하기 위한 대역 비율 (Bandwidth Ratio Considerations for Traffic Parameter Mapping on the Frame Relay/ATM Interworking)

  • 남윤석;김정식
    • 한국정보처리학회논문지
    • /
    • 제6권1호
    • /
    • pp.175-181
    • /
    • 1999
  • ATM과 non-ATM 간의 서비스가 연동도기 위해서는 트래픽 파라메타가 고려되어야 한다. 예를 들면 프레임 기반의 FR 트래픽 제어와 셀 기반의 ATM UPC와는 QoS 측면에서 정확하게 일치하기 어렵다. ATM 과 FR은 서로 다른 전달 모드와 트래픽 파라메타를 가지며, 기본 단위가 프레임과 셀로서 별도의 제어 방법을 갖는다. 또한 동일 사용자 정보를 전송하는데 ATM 측의 대역이 FR보다 훨씬 크다. 이는 ATM 셀 및 AAL5 구성 형태에서 기인하는데 FR/ATM 연동시 트래픽 파라메타를 사상하는데 대역비가 사용된다. 따라서 FR/ATM 연동에서 트래픽 파라메타를 사상하여 망간의 QoS를 유지시키며, 망의 자원을 효율적으로 활용하기 위해서는 적합한 트래픽 대역비를 고려하여야 한다. 본 논문에서는 ATM 망에서 FR과 ATM 간 QoS를 유지하기 위하여 이들 간의 트래픽 파라메타를 사상하는 방법을 소개하고, 도일 사용자 정보를 전달하는데 필요한 FR과 ATM 간의 대역 비를 예측하는 방법을 기술한다. 본 논문에서는 대역비를 예측하는데 필요한 사용자 트래픽의 프레임 길이 분포를 Erlang 또는 지수 함수로 가정하고 수행하였다.

  • PDF

A Study on the Performance Enhancement of the Macro Handover in HMIP According to Protocol Layers

  • Woo, Jong-Jung;Ahn, Chi-Hyun
    • Journal of information and communication convergence engineering
    • /
    • 제8권2호
    • /
    • pp.168-172
    • /
    • 2010
  • The Network-based handover still has problems such as the transmission delays and the packet losses in the case of macro mobility, though technological advances have been made in the wireless and mobile communication. For end-to-end handover, the link bandwidth has been reduced in the wireless network due to its burst errors and congestion control. To overcome such problems, we propose a new scheme of the macro handover according to the protocol layer. The proposed macro handover is implemented on the network layer to partially substitute wired signaling for wireless signaling, to flexibly employ buffers, and on the transport layer to postpone its retransmission time. We have performed extensive simulation using ns-2 and the result shows that our proposed scheme outperforms the other existing schemes in terms of transmission delay, packet loss, and data transfer rate during the handovers.

감시정찰 센서 네트워크에서 서비스 기반 정보수집을 위한 효율적인 클러스터링 및 데이터 전송 기법 (Efficient Clustering and Data Transmission for Service-Centric Data Gathering in Surveillance Sensor Networks)

  • 송운섭;정우성;서윤;고영배
    • 한국군사과학기술학회지
    • /
    • 제16권3호
    • /
    • pp.304-313
    • /
    • 2013
  • Wireless Sensor Networks, especially supporting for surveillance service, are one of the core properties of network-centric warfare(NCW) that is a key factor of victory in future battlefields. Such a tactical surveillance sensor network must be designed not just for energy efficiency but for real-time requirements of emergency data transmission towards a control center. This paper proposes efficient clustering-based methods for supporting mobile sinks so that the network lifetime can be extended while emergency data can be served as well. We analyze the performance of the proposed scheme and compare it with other existing schemes through simulation via Qualnet 5.0.