• Title/Summary/Keyword: 비동기 통신

Search Result 763, Processing Time 0.028 seconds

Performance Analysis of a Concatenated Coded DS/CDMA System in Asynchronous Rayleigh Fading Channels (비동기 레일리 감쇄 채널에서 쇄상부호 직접수열 부호분할 다중접속 시스템의 성능분석)

  • Kim, Kwang-Soon;Song, Iick-Ho;Yoon, Seok-Ho;Kim, Hong-Gil;Lee, Yong-Up
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.9
    • /
    • pp.1-8
    • /
    • 1999
  • In this paper, we propose and analyze a concatenated coding scheme for DS/CDMA systems in asynchronous channels. In the concatenated coding, bandwidth efficient $2^{2L-2}$-state ${\frac{L}{L+1}}$-rate 2-MTCM with biorthogonal signal constellation is used for the inner code, and $(2^{L-1},\;{\lceil}\frac{2^{L-1}}{L/2}{\rceil})$ RS code is use for the outer code. It is shown that we can get considerable performance gain over the uncoded system without sacrificing the data transmission rate. The proposed system can be used as a coding scheme for reliable and high speed integrated information services of mobile communication systems.

  • PDF

GPU Based Incremental Connected Component Processing in Dynamic Graphs (동적 그래프에서 GPU 기반의 점진적 연결 요소 처리)

  • Kim, Nam-Young;Choi, Do-Jin;Bok, Kyoung-Soo;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.56-68
    • /
    • 2022
  • Recently, as the demand for real-time processing increases, studies on a dynamic graph that changes over time has been actively done. There is a connected components processing algorithm as one of the algorithms for analyzing dynamic graphs. GPUs are suitable for large-scale graph calculations due to their high memory bandwidth and computational performance. However, when computing the connected components of a dynamic graph using the GPU, frequent data exchange occurs between the CPU and the GPU during real graph processing due to the limited memory of the GPU. The proposed scheme utilizes the Weighted-Quick-Union algorithm to process large-scale graphs on the GPU. It supports fast connected components computation by applying the size to the connected component label. It computes the connected component by determining the parts to be recalculated and minimizing the data to be transmitted to the GPU. In addition, we propose a processing structure in which the GPU and the CPU execute asynchronously to reduce the data transfer time between GPU and CPU. We show the excellence of the proposed scheme through performance evaluation using real dataset.

Modeling and Implementation of Multilingual Meta-search Service using Open APIs and Ajax (Open API와 Ajax를 이용한 다국어 메타검색 서비스의 모델링 및 구현)

  • Kim, Seon-Jin;Kang, Sin-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.11-18
    • /
    • 2009
  • Ajax based on Java Script receives attention as an alternative to ActiveX technology. Most portal sites in korea show a tendency to reopen existing services by combining the technology, because it supports most web browsers, and has the advantages of such a brilliant interface, excellent speed, and traffic reduction through asynchronous interaction. This paper modeled and implemented a multilingual meta-search service using the Ajax and open APIs provided by international famous sites. First, a Korean query is translated into one of the language of 54 countries around the world by Google translation API, and then the translated result is used to search the information of the social web sites such as Flickr, Youtube, Daum, and Naver. Searched results are displayed fast by dynamic loading of portion of the screen using Ajax. Our system can reduce server traffic and per-packet communications charges by preventing redundant transmission of unnecessary information.

The Study on the Performance of DS/CDMA with a Suppressed Pilot Channel in Mobile Satellite Communication System (이동위성 통신 시스템에서 억압 파일롯트 채널을 이용한 DS / CDMA의 성능 분석)

  • Chung, Boo-Young;Choi, Bong-Keun;Kang, Young-Heung;Lee, Jin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.2
    • /
    • pp.151-160
    • /
    • 1997
  • In this paper, we have carried out the DS/CDMA with a suppressed pilot channel, which is used in receiving coherently with Rake diversity and in synchronizing the chip timing, in the mobile satellite communication. Also, we have investigated the envelope variation of a shadowed Rician fading simulator, and analyzed the error performences of DS/CDMA in the mobile satellite communication. The results showed that the error performance in the Heavy shadowing environment might be degraded more than in the Rayleigh fading environment since the fading envelopes in the former environment are varied randomly compared with those in the latter environment. And the performence of DS/CDMA system could be improved about 10 dB compared with that of narrowband QPSK system. In conclusion, DS/CDMA with a suppressed pilot channel had the best performance in the case of the suppressed pilot channel to transmission power ratio $\beta$=-8 dB, the number of complex delay profiles $N_{profile}$=32, and using these values, the error performance of DS/CDMA in Light shadowing environment was identical to the ideal QPSK error performance.

  • PDF

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

A New Incentive Based Bandwidth Allocation Scheme For Cooperative Non-Orthogonal Multiple Access (협력 비직교 다중 접속 네트워크에서 새로운 인센티브 기반 주파수 할당 기법)

  • Kim, Jong Won;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.6
    • /
    • pp.173-180
    • /
    • 2021
  • Non Orthogonal Multiple Access (NOMA) is a technology to guarantee the explosively increased Quality of Service(QoS) of users in 5G networks. NOMA can remove the frequent orthogonality in Orthogonal Multiple Access (OMA) while allocating the power differentially to classify user signals. NOMA can guarantee higher communication speed than OMA. However, the NOMA has one disadvantage; it consumes a more energy power when the distance increases. To solve this problem, relay nodes are employed to implement the cooperative NOMA control idea. In a cooperative NOMA network, relay node participations for cooperative communications are essential. In this paper, a new bandwidth allocation scheme is proposed for cooperative NOMA platform. By employing the idea of Vickrey-Clarke-Groves (VCG) mechanism, the proposed scheme can effectively prevent selfishly actions of relay nodes in the cooperative NOMA network. Especially, base stations can pay incentives to relay nodes as much as the contributes of relay nodes. Therefore, the proposed scheme can control the selfish behavior of relay nodes to improve the overall system performance.

Performance Analysis of Hybrid DS/SFH-CDMA MFSK Signal with CCI Canceller and Convolution Code Techniques in Mobile Communication Multipath Interference Channels (이동통신 다중 경로 간섭 채널에서 CCI Canceller와 컨벌루션 부호화 기법에 의한 하이브리드 DS / SFH-CDMA MFSK 신호의 성능 해석)

  • 임태길;강희조;이권현
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.3
    • /
    • pp.221-231
    • /
    • 1997
  • This paper presents an analysis of a hybrid direct-sequence/slow frequency hopped code division multiple access(DS/SFH-CDMA) system employing noncoherent M-ary frequency shift keying(MFSK) modulation in a multiple m-distribution fading environment. Multipath interfer- ence(MPI) and multiuser interference(MUI) is taken into accout and the spectral efficiency is calculated for uncoded as well as simple channel coding systems. The predetection multipath CCI canceller in conjunction with convolution coding is employed for improving the bit error rate(BER) performance. The BER of noncoherent hybrid system is obtained using a Gaussian interference approximation. From the results, we know that the error performance more deteriorates as the depth of fading becomes deeper. The DS part of the modulation combats the multipath interference, whereas the FH part is a predetection against large multiuser interference. It is shown that, for the con- sidered types of a channel coding, the use of a predetection coding is still essential for obtained a satisfactory bit error performance. The results show that the capacity of the DS/SFG-CDMA MFSK communication system increases in proportion to the length of PN code sequence in the presence of AWGN and MUI. In m-distribution fading environment the capacity increases in proportion to the fading index. The capacity is increased and error performance is improved when the CCI Canceller and Convolution code technique are adopted, respectively. From the results, it is known that the error performance of $4\times10^{-2}$ by adopting Canceller technique. Also convolutional coding technique is the improvement of error performance attains about $10^{-5}$ in code rate 1/2.

  • PDF

Performance Analysis of the Multi-User Detector Employing a Hybrid Interference Cancellation Scheme in a WCDMA System (WCDMA 시스템에서 Hybrid Interference Cancellation 기법을 적용한 다중사용자 검파기의 성능분석)

  • 서정욱;오창헌;장은영;조성준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.221-227
    • /
    • 2002
  • In this paper, in order to know the effect of the interference, we have analyzed the BER (Bit Error Rate) performance of the MUD(Multi-User Detector) employing HIC(Hybrid Interference Cancellation) scheme for the asynchronous WCDMA system based on 3GPP(3rd Generation Partnership Project) Spec. through the In this paper, in order to know the effect of the interference, we have analyzed the BER (Bit Error Rate) performance of the MUD(Multi-User Detector) employing HIC(Hybrid Interference Cancellation) scheme for the asynchronous WCDMA system based on 3GPP(3rd Generation Partnership Project) Spec. through the computer simulation. we have assumed Rayleigh fading channel. And we have compared its BER performance with SIC's(Successive Interference Cancellation) and with PIC's(Parallel Interference Cancellation), which are the representative schemes in the subtractive interference cancellation. From the results, it is shown that PlC or HIC is effective for high data-rate users and SIC of HIC for low data-rate users to eliminate the interference. Regardless of the data rate, it is reasonable to use the HIC structure for WCDMA system to satisfy all of users' services. The reason is that the SIC scheme in front of HIC can guarantee the performance of low power users to cancel the serious interference caused by the high power users, while PIC in the rear of it can guarantee the performance of high power users to cancel the interference caused by the low power users.

ATM망에서 프레임 릴레이망을 근간으로한 기업통신망의 수용기술

  • Jeong, Jung-Su;Nam, Taek-Yong;Jeong, Tae-Su
    • The Magazine of the IEIE
    • /
    • v.25 no.6
    • /
    • pp.69-78
    • /
    • 1998
  • 프레임 릴레이망을 백본으로 한 LAN과 LAN접속으로 형성되는 기업통신망이 현재 활발히 전개되면서 인터넷을 통한 광고, 전자거래가 중요한 서비스로 진행되고 있다. 국내의 프레임 릴레이 서비스 현황을 살펴보면 KT, 데이콤, 일부기업등에서 프레임 릴레이 교환기를 수입하여 주고객인 기업에 서비스를 제공하고 있다. 이들은 사용자 요구에 의해 주로 LAN과 LAN에 접속된 라우터 등의 종단 시스템간 PVC(영구가상회선: Permanant Virtual Circuit)접속을 통하여 다양한 서비스를 제공하면서 독자적인 기업통신체계를 구축하고 있는 실정이다. 이와같이 사용자 요구로 PVC등록시 프레임 릴레이망과 LAN을 연결하는 링크의 QoS(서비스 질: Quality of Service), 트래픽 파라메터는 수동적으로 설정된다. 현재 국내에서는 프레임 릴레이 교환기 개발은 전무하고 단지 그들을 수입하여 운용하는 수준이며 향후 ATM(비동기 전달모드: Asynchronous Transfer Mode)망의 중요 서비스 연동이 될 프레임 릴레이 기술은 심도있게 연구되고 있다. 향후 고속통신을 제공하는 백본망은 기존의 프레임 릴레이망과 ATM망이 공존할 추세이며 점진적으로 프레임 릴레이망은 사라질 것이다. 이때 ATM 망이 기존의 프레임 릴레이망을 백본으로 한 기업통신망 수용시 원할한 서비스 제공을 위해서는 프레임 릴레이망을 백본으로 채택한 기존의 기업통신망을 ATM망에서 수용시 야기되는 문제점의 제시와 이의 해결은 매우 중요하다고 생각된다. FR/ATM(Frame Relay/ATM)연동시 기업통신망 입장에서는 PVC뿐만 아니라 SVC(교환가상회선: Switched Virtual Circuit)호처리가 수용되어야 한다. 이와같이 PVC와 SVC 수용으로 기업통신망은 통신망의 구성 및 관리가 복잡, 다양해지며, 또 그 기업은 관련된 다양하고 수많은 고객과 접속될 수 있어야 한다. 이때 ATM망을 백본으로 한 공중망이 관련 기업의 사설 정보를 관리하도록 한다는 것은 그 서비스의 이용자에게 보안문제를 제기함은 물론 서비스 이용자가 자신의 망에서 동작하는 여러 서비스를 고객 스스로가 관리하는 것이 바람직하다. CNN(고객망관리 : Customer Network Management)은 이러한 고객에 의한 통신망, 공중망에 대한 부분적 관리 및 서비스에 대한 관리가 이루어 질수 있도록 수행하는 기능이다. 본 논문에서는 ATM망이나 프레임 릴레이망과 ATM 망이 공존시 기업통신망관점에서 야기되는 문제점의 제시와 이의 해결 방안을 살펴보았다. 우선 FR/ATM 연동에서 PVC설정뿐만 아니라 SVC 설정 방법의 연구, 이때 고려된 QoS,트래픽 처리과정을 살펴보았다. 또한 망관리 입장에서 기업통신망 관리자와 ATM망 관리자와의 온-라인 서비스를 제공하기 위해서는 변화된 통신망 차원서의 확장된 Managed Object(MO)를 근간으로한 체계적인 CNN-NMS(CNM-Network management System)연동을 살펴본후 결론에서는 추후 계속연구 및 조사 되어야 할 항목을 기업통신망 입장에서 서술하여 보았다.

  • PDF

A Component-Based Framework for Structural Embedding of Mobile Agent System (모바일 에이전트 시스템의 구성적 임베딩을 위한 컴포넌트 기반의 프레임워크)

  • Chung, Wonho;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.33-42
    • /
    • 2012
  • Rapid evolution of wired and wireless technologies results in various types of embedded systems, and the software to be embedded into those devices now needs the flexibility rather than the fixedness which was well-known property for the embedded software in the past. Mobile agent is one of the useful distributed technologies of reducing network load and latency because of its disconnected operations and high asynchrony. In this paper, a component-based mobile agent framework, called EmHUMAN, is designed and implemented for structural embedding into the devices showing different functions and resource constraints. It consists of 3 layers of components. Based on those components, a structural embedding, considering resource constraints of required functions, amount of storage space, computing power, network bandwidth, ${\ldots} $ etc can be performed. The components in each layer can be extended with addition of new components, removing some components and modifying components. EmHUMAN plays the role of a framework for developing mobile agent based distributed systems. It is also a mobile agent system by itself. EmHUMAN provides several utilities as built-in API's, and thus high effectiveness in programming mobile agents can be achieved.