• Title/Summary/Keyword: user relaying

Search Result 56, Processing Time 0.021 seconds

A Study of an Association Admission Method for Public Wireless LAN Systems (고속 공중 무선랜 시스템을 위한 효율적인 연결 수락 제어방법의 연구)

  • Lee, Hyun-Woo;Yoon, Hong;Yoon, Chong-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.7 no.2
    • /
    • pp.149-155
    • /
    • 2003
  • This paper generally relates to the field of wireless local area networks(WLANs), and more particularly, to AP selection and association methods for the performance of a station. In these days, IEEE 802.11 Wireless LAN network is widely deployed and used as an emerging service to connect high-speed Internet in the public wireless environment. But, if there are many users in hot spot area, they suffer a severe decrease of performance. Thus it needs an association and access control mechanism especially when it is used in the public environment. In this paper, we suggest a selection and association method using Beacon or Probe Response frames based IEEE 802.11. Station selects AP using the information of the capacity area in a Beacon or a Probe Response frame. According to the present paper, an association method for a public WLAN service, which includes a WLAN user terminal and an AP for relaying WLAN communications to and from the user terminal, includes the steps of the user terminal asking the AP's states for access to a radio channel; and the station selects and associates with the AP. According to the above-described selection in a high speed wireless Internet service based on public WLAN technologies that are currently in operations. Further, it is possible to improve the efficiency of network management.

  • PDF

Enable Secondary User Spectrum Access in Cooperative Communication Scheme with Rayleigh Fading Channel (레일리 페이딩 채널에서 2차 사용자 스펙트럼 접근이 가능한 협력통신 기법)

  • Kim, Lyum;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.113-119
    • /
    • 2010
  • In this paper, the considered cognitive radio system has a pair of PT-PR and a pair of ST-SR. In first time slot(1 Phase), PT broadcast signal $x_p$ to PR, ST and SR. Then, each receivers(PR, ST, SR) decode received signal $x_p$. In second time slot(2 Phase), ST combine decoded signal ${x_p}^{\prime}$ and signal $x_s$, and it broadcast combined signal to PR and SR. PR and SR decode combined signal. At this time, PR can achieve diversity gain, due to using MRC, it combine 'received and decoded signal ${x_p}^{\prime}$ at 1 phase' and 'detected signal $x_p$ at 2 phase'. SR use linear combining technique and it can obtain $x_s$.

Combined Gain Analysis of L-band Transmit Antenna in COMS (COMS L-대역 송신 안테나 합성 이득 해석)

  • Kim, Joong-Pyo;Yang, Koon-Ho;Lee, Sang-Kon
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.19-24
    • /
    • 2010
  • The COMS (Communication Ocean Meteorological Satellite) is a hybrid geostationary satellite including communication, ocean, and meteorological payloads. The COMS includes the MODCS (Meteorological and Ocean Data Communication Subsystem) which provides transmitting the raw data collected by meteorological payload called MI (Meteorological Imager) and ocean payload named GOCI (Geostationary Ocean Color Imager) to the ground station, and relaying the meteorological data processed on the ground to the end-user stations. Here, for the L-band transmit antenna transmitting SD (Sensor Data) signal and the processed signal, from the system point of view, it is required to estimate the combined antenna gain when the L-band transmit is placed with MI and GOCI payloads on the earth panel of COMS. First of all, the L-band transmit horn is designed and analyzed for the requirements given, and then after placing it on the earth panel, the combined gain analysis is performed using three different analysis methods. It's shown that the obtained gain patterns are very similar among three different analysis methods. Finally the antenna gain degradation of less than 0.5 dB is estimated.

A Novel Cooperative Communication to Achieve Secondary Spectrum Access Using Adaptive Incremental Decode-and-Forward(AIDF) Protocol (적응 증분 복호 후 전달 프로토콜을 이용하여 2차 스펙트럼 접근이 가능한 협력 통신 기법)

  • Kim, Lyum;Kong, Hyung-Yun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.3
    • /
    • pp.354-361
    • /
    • 2011
  • In this paper, we propose a spectrum sharing system that enable secondary user's spectrum access in cooperative communication scheme. At phase 1, a transmitter in primary system broadcasts signals to the rest nodes. And then, at phase 2, a transmitter in secondary system combines the decoded signals after received from a transmitter in primary system and its own signal. And then transmitter of secondary system broadcasts the combined signals to receivers of primary and secondary systems. At this time, due to the process of combining signals, receivers of primary and secondary systems experiences a performance degradation. Therefore, we propose a novel adaptive incremental decode-andforward(AIDF) protocol to overcome this problem. By using AIDF protocol, we show performance improvement of total system through various simulations.

Efficient Radio Resource Allocation for Cognitive Radio Based Multi-hop Systems (다중 홉 무선 인지 시스템에서 효과적인 무선 자원 할당)

  • Shin, Jung-Chae;Min, Seung-Hwa;Cho, Ho-Shin;Jang, Youn-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5A
    • /
    • pp.325-338
    • /
    • 2012
  • In this paper, a radio resource allocation scheme for a multi-hop relay transmission in cognitive radio (CR) system is proposed to support the employment of relay nodes in IEEE 802.22 standard for wireless regional area network (WRAN). An optimization problem is formulated to maximize the number of serving secondary users (SUs) under system constraints such as time-divided frame structure for multiplexing and a single resource-unit to every relay-hop. However, due to mathematical complexity, the optimization problem is solved with a sub-optimal manner instead, which takes three steps in the order of user selection, relay/path selection, and frequency selection. In the numerical analysis, this proposed solution is evaluated in terms of service rate denoting as the ratio of the number of serving SUs to the number of service-requesting SUs. Simulation results show the condition of adopting multi-hop relay and the optimum number of relaying hops by comparing with the performance of 1-hop system.

Performance of an Authentication Proxy for Port Based Security Systems (포트레벨 보안을 위한 인증 프록시 시스템의 성능분석)

  • 이동현;이현우;정해원;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8B
    • /
    • pp.730-737
    • /
    • 2003
  • In this paper, we present an efficient authentication proxy for IEEE 802.1x systems based on the port-based access control mechanism. An IEEE 802.1x system consists of PC supplicants, a bridge with authentication client functions, and an authentication server. For the network security and user authentication purposes, a supplicant who wants to access Internet should be authorized to access the bridge port using the Extended Authentication Protocol (EAP) over LAN. The frame of EAP over LAN is then relayed to the authentication server by the bridge. After several transactions between the supplicant and the server via the bridge, the supplicant may be either authorized or not. Noting that the transactions between the relaying bridge and the server will be increased as the number of supplicants grows in public networks, we propose a scheme for reducing the transactions by employing an authentication proxy function at the bridge. The proxy is allowed to cache the supplicant's user ID and password during his first transaction with the server. For the next authentication procedure of the same supplicant, the proxy function of the bridge handles the authentication transactions using its cache on behalf of the authentication server. Since the main authentication server handles only the first authentication transaction of each supplicant, the processing load of the server can be reduced. Also, the authentication transaction delay experienced by a supplicant can be decreased compared with the conventional 802.1x system.