• Title/Summary/Keyword: 전송프레임

Search Result 1,134, Processing Time 0.024 seconds

Modeling & Performance Analysis of the MAC Protocol for VDL in the Aeronautical Mobile Communication System (항공이동통신 시스템에서 VDL을 위한 MAC 프로토콜 모델링 및 성능 분석)

  • Kim, Yong-Joong;Park, Hyo-Dal
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.327-336
    • /
    • 2009
  • This paper analysis the STDMA protocol in aviation wireless data communications and carry out the performance analysis with simulation. The STDMA protocol that is currently being used in VDL Mode-4 has TDMA system characteristics, which provides time-division into several slots per one frame. The results of modeled STDMA protocol's data channel analysis show approximate 0.7 channel throughput at the transmission probabilities 0.045, 0.2, and 0.3 in the aspects of channel throughput. The delay time are 2.32434sec, 2.0293sec, and 2.12128sec respectively. These results shows the good stability in spite of variable transmission probabilities. Consequently, it is expected that STDMA protocol would be used properly for domestic communication demands and supervision system improvement by means of applying this to point-to-point communication and data/location broadcasting as a fundamental technology in CNS/ATM.

  • PDF

Physical Computing Learning Model for Information and Communication Education (정보통신기술 교육을 위한 피지컬 컴퓨팅 학습모델)

  • Lee, Yong-Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.1-6
    • /
    • 2016
  • This paper aims to present the physical computing learning model applicable in teaching the information and communication technology for technology and engineering education. This model is based on the physical computing and deals with the information creation and information transfer in one framework, thus provides students with the total understanding and practice opportunity about information and communication. The proposed learning models are classified into the client-server based model and the web based model. In the implemented learning model, the acquirement and control of information is performed by sketch on Arduino and the communication of information is performed by the Python socket on Raspberry Pi well known as an education platform. Our proposed learning model can be used for teaching students to understand the concept of Internet of Things (IoT), which provides us with world wide control and communication of information.

ALOHA-type Anti-collision Algorithms Using Tag Estimation Method in RFID system (RFID 시스템에서의 태그 수를 추정하는 ALOHA 방시 Anti-collision 알고리즘)

  • Cha Jae-Ryong;Kim Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.814-821
    • /
    • 2005
  • When there are many tags using the same frequency around the reader in RFID system, they disturb each other and in the end their response cannot be received by the reader. To solve this disturbance and fast identify the tags, the anti-collision algorithm, which is the core technology in RFID system, is needed. We propose two ALOHA-type Dynamic Framed Slotted ALOHA(DFS-ALOHA) algorithms using Dynamic Slot Allocation(DSA), which dynamically allocates the frame size in accordance with the number of tags and Tag Estimation Method(TEM), which estimates the number of tags around the reader. We also compare the performance of the proposed DFS-ALOHA algorithms with that of the conventional Framed Slotted ALOHA (FS-ALOHA) algorithms and the algorithms proposed by Vogt using OPNET simulation. According to the analysis, the two proposed DFS-ALOHA algorithms(DFS-ALOHA I and DFS-ALOHA II) show better performance than the conventional ALOHA-based algorithms regardless of the number of tags. Although the two proposed DFS-ALOHA algorithms show the similar performance, BFS-ALOHA ll is better because it is easier to be implemented in the system and the complexity is lower.

Random Channel Allocation Scheme Based on Split Algorithm in HIPERLAN 2 (HIPERLAN Type 2에서 Split 알고리즘에 기반한 랜덤채널 할당 기법)

  • 황의석;고유창;이승규;윤철식;이형우;조충호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9A
    • /
    • pp.717-727
    • /
    • 2003
  • The HIPERLAN/2(HIgh PERformance Local Area Network Type2) is one of the wireless LAN standards for providing raw data rates of up to 54 Mbps. The MAC protocol of HIPERLAN/2 is based on TDMA/TDD, and resources in one MAC frame can be allocated dynamically by Access Point(AP). The random channel(RCH) is defined for the purpose of giving a mobile terminal the opportunity to request transmission resources in the uplink MAC frames. It is desirable that the number of RCHs is dynamically adapted by the AP depending on the current traffic situation. Allocation of excessive RCHs may waste radio resources and insufficient RCHs compared to traffic loads may result in many collisions in access attempts. We propose an RCH allocation scheme based on split algorithm in HIPERLAN/2. The simulation and analytic results show that the proposed scheme achieves a higher channel throughput, lower access delay and delay jitter than previously proposed RCH allocation schemes.

Cognitive Radio MAC Protocol for Hidden Incumbent System Detection (무선 인지 기술 기반의 WRAN 시스템에서 숨겨진 인컴번트 시스템 검출 MAC 프로토콜)

  • Kim, Hyun-Ju;Jo, Kyoung-Jin;Hyon, Tae-In;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1058-1067
    • /
    • 2006
  • In this paper, we propose a inband/outband broadcast method for hidden incumbent system detection of medium access control layer for wireless regional area network systems using cognitive radio technology. Through some extra channels that are not currently used, a short message is broadcasted. The message allows CPE detecting an appearance of incumbent system to send sensing report to CR BS. For the hidden incumbent system report message, the BS needs a process or method for allocation of upstream resource to CPEs. And transmitting multiple out-band signals has a possibility to collide with out-band signals of other co-located WRAN BSs. To avoid out-band signal collision, BSs randomly select it out-band signal broadcasting time within the pre-defined explicit out-band signaling, period. And fractional Bandwidth Usage allows WRAN BSs to efficiently use bandwidth.

Performance evaluation of BWA protocol according to uplink frame size and contention slot (상향링크의 프레임 크기와 경쟁슬롯에 따른 BWA 프로토콜의 성능평가)

  • Oh Sung-Min;Kim Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.967-973
    • /
    • 2004
  • DOCSIS and IEEE 802.16 define the usage and element of a MAP which is uplink control message. Standards does not include the details of MAP size and the number of contention slots affecting the performance of MAC protocols for DOCSIS and IEEE 802.16. In this paper, we analyzed the performance of throughput and access delay according to the MAP size and contention slot size. Based on the analytical results, we found the optimal MAP size and the number of contention slots. We found that the protocol shows best performance when the MAP size is 2msec and the number of contention slots is 8. The simulation results can apply to the network system parameters. The simulator can be used to optimize the system parameters in cable network, BWA and WiBro.

Phisical layer of ETRI wideband CDMA with 5 MHz bandwidth (5MHz 대역폭을 갖는 ETRI Wideband CDMA 시스템의 물리계층)

  • Bang, Seung-Chan;Park, Hyeong-Rae;Han, Yeong-Nam;Lim, Myeong-Seop;Lee, Heon;Han, Gi-Cheol;Park, Hang-Gu
    • Information and Communications Magazine
    • /
    • v.13 no.4
    • /
    • pp.56-63
    • /
    • 1996
  • In this paper, the phisical layer of 4.3008 Mcps wideband CDMA which is proposed as the standard of personal communication service system is introduced. It is designed to fit 5 MHz bandwidth by using $28{\times}2^n$ Hadamard code. 13 kbps CELP vocoder is chosen as the main one and 32 kbps ADPCM can be applied. In the reverse link, the burst pilot scheme is proposed and produces the increase of capacity compared with the continuous pilot method. In order to maintain the service quality when the signaling data is increased, the information data and signaling data are time-multiplexed and making use of signaling activity brings the increase of capacity. QPSK data and QPSK spreading, variable frame size, and code pair assignment for high data rate are accomplished and then information data is transmited up to 64 kbps. It is expected that the proposed techiniques here are used in the FPLMTS.

  • PDF

Performance Evaluation of ISA100.11a Superframe Using Deadline Monotonic Scheduling (마감 단조 스케줄링을 사용한 ISA100.11a 슈퍼프레임 성능평가)

  • Saputra, Oka Danil;Shin, Soo Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1338-1345
    • /
    • 2014
  • Recently, wireless technology gains attention for industrial networks due to low cost, flexibility, relatively easy installation and most importantly, solving the rouring issue. ISA100.11a is one of promising standard for wireless industrial networks (WINs). Data traffic in industrial networks are known to be periodic and must satisfy the real-time property namely deadline. Therefore, in this paper, we proposed to apply deadline monotonic scheduling to periodic tasks in ISA100.11a networks and to evaluate the performance of ISA100.11a by checking the schedulability and beacon frame overhead. Simulation results showns, that our proposed scheme can reduces the network overhead while maintaining schedulability as compared to the previous algorithm. In addition, by reducing the network overhead, our proposed scheme can send more data without degrading the overall performance of WINs.

Research on Countermeasures of Controller Area Network Vulnerability (Controller Area Network 취약점 분석 및 대응 방안 연구)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.115-120
    • /
    • 2018
  • As the number ofconnected cars grows, the security of the connected cars is becoming more important. There are also increasing warnings about the threat of attacks via the CAN bus used for in-vehicle networks. An attack can attack through a vulnerability in the CAN bus because the attacker can access the CAN bus remotely, or directly to the vehicle, without a security certificate on the vehicle, and send a malicious error message to the devices connected to the CAN bus. A large number of error messages put the devices into a 'Bus-Off' state, causing the device to stop functioning. There is a way to detect the error frame, or to manage the power of the devices related to the bus, but eventually the new standard for the CAN bus will be the fundamental solution to the problem. If new standards are adopted in the future, they will need to be studied.

Design of the PHY Structure of a Voice and Data Transceiver with Security (보안성을 갖는 음성 및 데이터 트랜시버의 물리 계층 구조 설계)

  • Eun, Chang-Soo;Lom, Sun-Min;Lee, Kyoung-Min
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.46-54
    • /
    • 2006
  • In this paper, we propose a digital transceiver that can overcome the problems which current analog transceivers have. For the proposed transceiver, we assumed a frequency resource that consists of discrete and narrow channels. We also assumed that person-to-group, group-to-group, as well as person-to-person, voice and data communications with moderate security should be devisedand the data rate is 1 Mbps with simultaneous voice and data. Frequency hewing spread spectrum (FH-SS) and differential 8-PSK (D8PSK) were adopted for security reasons and bandwidth constraints, and for the reduction of implementation complexity, respectively. For the carrier and the symbol timing recovery, the structure of the preamble was proposed based on the IEEE 802.11 FHSS frame format to improve detection probability. The computer simulation results and power budget analysis implies that the proposed system can be usedin simple wireless communications in place of such as analog walkie-talkies.