• Title/Summary/Keyword: two-way transmission

Search Result 223, Processing Time 0.043 seconds

A Design of Bandwidth Allocation Scheme with Priority Consideration for Upstream Channel of Ethernet PON (Ethernet PON에서 서비스 클래스별 우선 순위를 고려한 상향 채널 대역 할당 기법)

  • 이호숙;유태환;문지현;이형호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11A
    • /
    • pp.859-866
    • /
    • 2003
  • In this paper, we designed the bandwidth allocation scheme with priority consideration for upstream channel access of EthernetPON. The objective of our scheme is to control the multi services in more effective way according to their CoS(Class of Service) or QoS(Quality of Service). The designed scheme considers transmission priority in the both side of OLT and ONU. In the OLT's view, the Two-step scheduling algorithm is applied with which we can support multiple bandwidth allocation policies simultaneously, i.e. SBA for the time-sensitive, constant rate transmission services and DBA for the best-effort services. This Two-step scheduling algorithm reduces the scheduling complexity by separating the process of transmission start time decision from the process of grant generation. In the ONU's view, the proposed scheme controls 8 priority queues of the 802.1d recommended 8 service classes. Higher priority queue is serviced in prior during the allowed GATE time from OLT. The OPNET modeling and simulation result compares the performance of each bandwidth allocation policy with SBA or DBA only approach.

Direct-Sequence Spread-Spectrum Systems for Interference Signal Control (직접 대역 확산 시스템을 위한 간섭 신호 제어)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1976-1981
    • /
    • 2013
  • In this paper, we propose a frequency-domain interference cancellation algorithm for direct-sequence spread spectrum systems. In the previously proposed frequency-domain interference cancellation algorithms that protocol defines the rules concerning the collection of means of Transmission Control Protocol (TCP: Transmission Control Protocol) is the most widely used in the transport layer. Two-way traffic through the network path to the same end-to-end transfer of data in the opposite direction between pairs of nodes are infused with two or more TCP connection using the network traffic patterns from the exchanger and routers share results of approval. Per-flow input/output structure of matter using the LTS online reaction when evaluated as this is the most important factor. TCP-MT when the connection duration is one of the largest performance gains.

Earthquakeproof Engineering by Metamaterials (메타물질을 이용한 내진설계)

  • Kim, Sang-Hoon
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2013.04a
    • /
    • pp.97-99
    • /
    • 2013
  • We introduced an earthquake-resistant design using acoustic rnetamaterials. There are two way in that field: one is a cloaking method and the other is a shadow zone method of seismic waves. Cloaking is a general property of a wave that changes the direction depending on the refractive index. Metamaterials control the propagation and transmission of specified parts of the wave and demonstrate the potential to render an object seemingly invisible. The shadow zone is a method of negative modulus using many huge resonators and it attenuates the amplitude of the wave exponentially. We compared and explained the fimdarnental principles of the two methods.

  • PDF

Adaptive Channel-Matched Extended Alamouti Space-Time Code Exploiting Partial Feedback

  • Badic, Biljana;Rupp, Markus;Weinrichter, Hans
    • ETRI Journal
    • /
    • v.26 no.5
    • /
    • pp.443-451
    • /
    • 2004
  • Since the publication of Alamouti's famous space-time block code, various quasi-orthogonal space-time block codes (QSTBC) for multi-input multi-output (MIMO) fading channels for more than two transmit antennas have been proposed. It has been shown that these codes cannot achieve full diversity at full rate. In this paper, we present a simple feedback scheme for rich scattering (flat Rayleigh fading) MIMO channels that improves the coding gain and diversity of a QSTBC for 2$^n$ (n=3, 4, ${\cdots}$) transmit antennas. The relevant channel state information is sent back from the receiver to the transmitter quantized to one or two bits per code block. In this way, signal transmission with an improved coding gain and diversity near to the maximum diversity order is achieved. Such high diversity can be exploited with either a maximum-likelihood receiver or low-complexity zero-forcing receiver.

  • PDF

A Three-way Handshaking Access Mechanism for Point to Multipoint In-band Full-duplex Wireless Networks

  • Zuo, Haiwei;Sun, Yanjing;Lin, Changlin;Li, Song;Xu, Hongli;Tan, Zefu;Wang, Yanfen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3131-3149
    • /
    • 2016
  • In-band Full-duplex (IBFD) wireless communication allows improved throughput for wireless networks. The current Half-duplex (HD) medium access mechanism Request to Send/Clear to Send (RTS/CTS) has been directly applied to IBFD wireless networks. However, this is only able to support a symmetric dual link, and does not provide the full advantages of IBFD. To increase network throughput in a superior way to the HD mechanism, a novel three-way handshaking access mechanism RTS/SRTS (Second Request to Send)/CTS is proposed for point to multipoint (PMP) IBFD wireless networks, which can support both symmetric dual link and asymmetric dual link communication. In this approach, IBFD wireless communication only requires one channel access for two-way simultaneous packet transmissions. We first describe the RTS/SRTS/CTS mechanism and the symmetric/asymmetric dual link transmission procedure and then provide a theoretical analysis of network throughput and delay using a Markov model. Using simulations, we demonstrate that the RTS/SRTS/CTS access mechanism shows improved performance relative to that of the RTS/CTS HD access mechanism.

An Approach to Improve the End-to-end Performance for Mobile Ad hoc Networks (이동 애드 혹 망을 위한 종단간의 성능 개선 방안)

  • 이용석;최웅철
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.327-334
    • /
    • 2004
  • In this paper, we make MAC protocol improvements for performance enhancement of multi-hop ad-hoc wireless networks. A node in ad-hoc wireless networks can transmit a packet only when the medium is available, and while a packet is being transmitted, no other nodes are allowed to transmit a packet if they are in carrier sensing range. Carrier sensing range can be divided into two disjoint areas of transmission range and carrier sensing zone(9), and we address the importance of the protocol behavior when a node is in carrier sensing zone. The characteristic of the carrier sensing zone is that a node can not know when the remaining time of the on-going transmission session expires or exactly when the media becomes available. Current MAC protocol does not behave in much different way between when a node is in transmission range and in carrier sensing zone. We have conducted a comprehensive simulation to study the performance improvements. The simulation results indicate that the performance is increased and the number of dropped packets due to collision is significantly reduced as much as a half.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

A Study on the issues for Developing Int'l Electronic Commerce (국제전자상거래(國際電子商去來)의 발전과제(發展課題)에 관한 소고(小考))

  • Ha, Kang-Hun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.13
    • /
    • pp.1033-1055
    • /
    • 2000
  • Almost business enterprises have recently used electronic commerce to conduct their business. Electronic commerce has come to encompass the Internet as well as EDI on private networks begun in the 1960s. The Internet is already changing the way that many companies conduct their business. Domestic electronic commerce has rapidly enhanced, while Int'l electronic commerce has gone steady. There are four issues for developing of Int'l Electronic Commerce. Firstly, The EDI Standardization is to be uniformed and prevailed over the world in UN/EDIFACT authorized by ISO. Secondly, There are two useful systems on Electronic Document Transmission, so called, Bolero project system and Trade Card System. It is thought that Bolero system will be more useful for large trading enterprises, especially, who need a Letter of Credit and electronic B/L, while T/C system is proper to small trade companies who do not need those. Successful results of Bolero system is very important for Int'l electronic commerce enterprises. Thirdly, to secure electronic signature, Int'l Certification Authority is essential for the users of Int'l electronic commerce. Trusted way of distributing public keys is to use a Int'l Certification Authority. The Int'l Certification Authority will accept user's public key, along with some proof of identity and serve as a depository of digital certificates. Both governments and the International business community must involve archiving keys with trusted third parties. Finally, It is important that all the nations and UNCITRAL continue efforts to make legal bases in Int'l electronic commerce concerned, including electronic signature, certification etc.

  • PDF

Backward Explicit Congestion Control in Image Transmission on the Internet

  • Kim, Jeong-Ha;Kim, Hyoung-Bae;Lee, Hak-No;Nam, Boo-Hee
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2106-2111
    • /
    • 2003
  • In this paper we discuss an algorithm for a real time transmission of moving color images on the TCP/IP network using wavelet transform and neural network. The image frames received from the camera are two-level wavelet-trans formed in the server, and are transmitted to the client on the network. Then, the client performs the inverse wavelet-transform using only the received pieces of each image frame within the prescribed time limit to display the moving images. When the TCP/IP network is busy, only a fraction of each image frame will be delivered. When the line is free, the whole frame of each image will be transferred to the client. The receiver warns the sender of the condition of traffic congestion in the network by sending a special short frame for this specific purpose. The sender can respond to this information of warning by simply reducing the data rate which is adjusted by a back-propagation neural network. In this way we can send a stream of moving images adaptively adjusting to the network traffic condition.

  • PDF

A Study on the Wavelet based Still Image Transmission over the Wireless Channel (무선채널환경에서 웨이블릿 기반 정지영상 전송에 관한 연구)

  • Nah, Won;Baek, Joong-Hwan
    • Proceedings of the IEEK Conference
    • /
    • 2001.06d
    • /
    • pp.179-182
    • /
    • 2001
  • This paper has been studied a wavelet based still image transmission over the wireless channel. EZW(Embedded Zerotree Wavelet) is an efficient and scalable wavelet based image coding technique, which provides progressive transfer of signal resulted in multi-resolution representation. It reduces therefore the reduce cost of storage media. Although EZW has many advantages, it is very sensitive on error. Because coding are performed in subband by subband, and it uses arithmetic coding which is a kind of variable length coding. Therefore only 1∼2bit error may degrade quality of the entire image. So study of error localization and recovery are required. This paper investigates the use of reversible variable length codes(RVLC) and data partitioning. RVLC are known to have a superior error recovery property due to their two-way decoding capability and data partitioning is essential to applying RVLC. In this work, we show that appropriate data partitioning length for each SNR(Signal-to-Noise Power Ratio) and error localization in wireless channel.

  • PDF