• Title/Summary/Keyword: 802.16e networks

Search Result 49, Processing Time 0.019 seconds

Multi-Homing RTP (mhRTP) for QoS-guaranteed Vertical Handover in Heterogeneous Wireless Access Networks

  • Kim, Igor;Kim, Young-Tak
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.185-194
    • /
    • 2010
  • In this paper, we propose an application layer-based vertical handover management protocol, called multihoming RTP (mhRTP), for real-time applications with seamless mobility across heterogeneous wireless access networks. The proposed multi-homing RTP provides a soft handover by utilizing multiple available wireless access network interfaces simultaneously. The newly available path is dynamically added to the ongoing session by the mhRTP session manager. Also the decision making of QoS-improving or QoS-guaranteed handover is possible based on the estimation of available bandwidth in each candidate network. The performances of the proposed mhRTP have been analyzed through a series of simulations on OPNET network simulator. From the performance analysis, we confirmed that the proposed mhRTP can provide QoS-guaranteed vertical handover with efficient session managements.

A Reservation-based HWMP Routing Protocol Design Supporting E2E Bandwidth in TICN Combat Wireless Network (TICN 전투무선망에서의 종단간 대역폭을 보장하는 예약 기반 HWMP 라우팅 프로토콜 설계)

  • Jung, Whoi Jin;Min, Seok Hong;Kim, Bong Gyu;Choi, Hyung Suk;Lee, Jong Sung;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.2
    • /
    • pp.160-168
    • /
    • 2013
  • In tactical environment, tactical wireless networks are generally comprised of Tactical MANETs(T-MANETs) or Tactical WMNs(T-WMNs). The most important services in tactical network are voice and low rate data such as command control and situation awareness. These data should be forwarded via multi-hop in tactical wireless networks. Urgent and mission-critical data should be protected in this environment, so QoS(Quality of Service) must be guaranteed for specific type of traffic for satisfying the requirement of a user. In IEEE 802.11s, TDMA-based MAC protocol, MCCA(MCF Controlled Channel Access), has a function of resource reservation. But 802.11s protocol can not guarantee the end-to-end QoS, because it only supports reservation with neighbors. In this paper, we propose the routing protocol, R-HWMP(Reservation-based HWMP) which has the resource reservation to support the end-to-end QoS. The proposed protocol can reserve the channel slots and find optimal path in T-WMNs. We analyzed the performance of the proposed protocol and showed that end-to-end QoS is guaranteed using NS-2 simulation.

IEEE 802.11 MAC based Multi-hop Reservation and Backoff Scheme in MIMC Tactical Ad Hoc Networks (전술 애드 혹 네트워크에서 다중 홉 전송을 위한 자원 예약 및 백오프 기법)

  • Cho, Youn-Chul;Yoon, Sun-Joong;Ko, Young-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.16-27
    • /
    • 2012
  • In multi-interface multi-channel(MIMC) based tactical ad hoc networks, QoS support for required operational capacity is one of the main challenging issues for multi-hop transmissions. To support QoS in such a harsh environment, we propose a novel MAC scheme to minimize multi-hop as well as per-hop delay. The current IEEE 802.11 MAC protocols should contend to reserve the channel resource at every hop by each sender. The every-hop channel contention results in a degradation of end-to-end delay for multi-hop transmissions. The basic idea of our scheme is to make a "multi-hop reservation" at the MAC layer by using the modified RTS frame. It contains additional information such as destination information, packet priority, and hop count, etc. In addition, we differentiate the contention window area according to the packet priority and the number of hops to deliver packets in the predefined allowed latency. Our scheme can minimize the multi-hop delay and support the QoS of the critical data in real time(i.e., VoIP, sensing video data, Video conference between commanders). Our simulation study and numerical analysis show that the proposed scheme outperforms the IEEE 802.11 MAC.

Proposal of Traffic Management Strategy between Hierarchical Mobile-WiMAX/WLAN Networks (계층적 Mobile-WiMAX/WLAN 네트워크에서의 트래픽 관리 전략에 관한 연구연구)

  • Moon, Tae-Wook;Kim, Moon;Cho, Sung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.153-160
    • /
    • 2009
  • A hierarchical network between Mobile-WiMAX and WLAN systems is to make it possible to utilize wireless internet services including time sensitive applications such as VoIP, VOD, visual telephony etc. During the process of vertical handoff decision from Mobile-WiMAX to WLAN hotspot, vertical handoff delay causes user dissatisfaction because it doesn't provide the seamless wireless internet service. We make use of type of service (ToS) parameters in IEEE 802.16e specification as the criterion parameter of vertical handoff decision process in hierarchical Mobile-WiMAX/WLAN networks. In this paper, we propose the process of vertical handoff decision for seamless wireless internet service which is sensitive to time delay. If type of service is time sensitive application, the decision of vertical handoff is withdrawn until the service is terminated. In focus on user satisfaction, if the proposed traffic management strategy in hierarchical Mobile-WiMAX/WLAN networks is used, user will utilize seamless wireless internet services including time sensitive applications.

Selective Unacknowledged Transmission in IEEE 802.15.4 Considering Energy Efficiency (IEEE 802.15.4에서 에너지 효율성을 고려한 선택적 Unacknowledged 전송)

  • Yang, Hyun;Park, Tan-Se;Park, Chang-Yun;Jung, Chung-Il
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.717-721
    • /
    • 2010
  • In general, wireless MAC uses the ACK for reliability. Meanwhile, in wireless sensor network, data is delivered periodically and redundantly. In these situations, every ACK transmission causes the reliability flexible applications to waste some energy. IEEE 802.15.4 developed for energy efficiency has the option of using ACK or not, but there are no researches exploiting this peculiarity. In this paper, we proposed the selective unacknowledged transmission satisfying some requirements (e.g., end-to-end delivery) by removing the ACK when frames are delivered well and using the ACK when frames are delivered poorly. Also, we performed several evaluations exploiting the NS2 simulator.

Design and Performance Evaluation of the QoS based Multimedia Services under Wibro Network Environment (휴대 인터넷 환경에서 QoS 기반 멀티미디어 서비스 제공 방안 및 성능 평가)

  • Yoe, Hyun;Eom, Ki-Bok;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.306-312
    • /
    • 2007
  • Present TCP/IP networks have some service quality problems. They delay various kinds of traffic, while increased traffic bottle necks, a phenomena experienced by too many internet users. Therefore, as use of the network increases, building up a stable network service is needed. Thus, network managers desperately need the best, most effective traffic control and wide-band services. Until now there has been no other way of increasing wide-band use of lines, particularly because of the expenses a limit solutions of solving continuously to increasing traffic problems. This study suggests a problem solving method under the base of 802.16e(Wibro) which will be widely used in the future.

  • PDF

Multi-hop Relay System for Multicast and Broadcast Service over Mobile WiMAX (멀티캐스트와 브로드캐스트 서비스의 성능 향상을 위한 모바일 와이맥스 중계 시스템)

  • Cho, Chi-Hyun;Youn, Hee-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.227-234
    • /
    • 2008
  • The development of wireless network technology allows high data rate seamless communication irrespective of the place and time in various emerging mobile service environment. Unlike wired networks, however, wireless networks utilize expensive limited bandwidth. MBS(Multicast Broadcast Service), which is supported by mobile WiMAX system based on IEEE802.16e, overcomes this problem using a shared downlink channel for efficiently supporting a number of users. However. the coverage and throughput of the system are significantly affected by the channel condition. In this paper we propose on MBS system employing Mobile Multi-Hop Relay(MMR) and adaptive modulation and coding(AMC) scheme. The result of NS-2 computer simulation shows that the throughput and transmission time are substantially improved by the proposed approach compared to the existing MBS system.

Link Adaptation and Selection Method for OFDM Based Wireless Relay Networks

  • Can, Basak;Yomo, Hiroyuki;Carvalho, Elisabeth De
    • Journal of Communications and Networks
    • /
    • v.9 no.2
    • /
    • pp.118-127
    • /
    • 2007
  • We propose a link adaptation and selection method for the links constituting an orthogonal frequency division multiplexing (OFDM) based wireless relay network. The proposed link adaptation and selection method selects the forwarding, modulation, and channel coding schemes providing the highest end-to-end throughput and decides whether to use the relay or not. The link adaptation and selection is done for each sub-channel based on instantaneous signal to interference plus noise ratio (SINR) conditions in the source-to-destination, source-to-relay and relay-to-destination links. The considered forwarding schemes are amplify and forward (AF) and simple adaptive decode and forward (DF). Efficient adaptive modulation and coding decision rules are provided for various relaying schemes. The proposed end-to-end link adaptation and selection method ensures that the end-to-end throughput is always larger than or equal to that of transmissions without relay and non-adaptive relayed transmissions. Our evaluations show that over the region where relaying improves the end-to-end throughput, the DF scheme provides significant throughput gain over the AF scheme provided that the error propagation is avoided via error detection techniques. We provide a frame structure to enable the proposed link adaptation and selection method for orthogonal frequency division multiple access (OFDMA)-time division duplex relay networks based on the IEEE 802.16e standard.

Channel-Adaptive Mobile Streaming Video Control over Mobile WiMAX Network (모바일 와이맥스망에서 채널 적응적인 모바일 스트리밍 비디오 제어)

  • Pyun, Jae-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.37-43
    • /
    • 2009
  • Streaming video service over wireless and mobile communication networks has received significant interests from both academia and industry recently. Specifically, mobile WiMAX (IEEE 802.16e) is capable of providing high data rate and flexible Quality of Service (QoS) mechanisms, supporting mobile streaming very attractive. However, we need to note that streaming videos can be partially deteriorated in their macroblocks and/or slices owing to errors on OFDMA subcarriers, as we consider that compressed video sequence is generally sensitive to the error-prone channel status of the wireless and mobile network. In this paper, we introduce an OFDMA subcarrier-adaptive mobile streaming server based on cross-layer design. This streaming server system is substantially efficient to reduce the deterioration of streaming video transferred on the subcarriers of low power strength without any modifications of the existing schedulers, packet ordering/reassembly, and subcarrier allocation strategies in the base station.

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.