• Title/Summary/Keyword: DTMC

Search Result 17, Processing Time 0.025 seconds

Interference Analysis of RFID Gen-2 System Considering Both PHY and MAC Layers (PHY/MAC 계층을 모두 고려한 RFID Gen-2 시스템의 간섭 분석)

  • Yoon, Hyun-Goo;Choi, Sun-Woong;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.7
    • /
    • pp.752-760
    • /
    • 2010
  • This paper investigates the performance of EPCglobal Generation-2(Gen-2) radio frequency identification(RFID) protocol under reader-to-reader interfering environments. We establish a modified discrete-time Markov chain(DTMC) model for the Gen-2 and accordingly obtain quantitative results of query success rate(QSR) and tag identification speed (TIS). Extensive simulations validate our theoretical analysis and demonstrate that the number of tags over 100 has little impact on the performance. TIS linearly decreases by 10 tags/sec/reader as the number of interfering readers increases. Our model for Gen-2 protocol is also useful to study the performance of other RFID protocols.

Mobility Management Scheme for Vehicles Moving Repeated Path (반복 경로를 운행하는 차량의 이동성 관리 기법)

  • Choi, Gyu-Yeon;Han, Sang-Hyuck;Lee, Jung-Girl;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.4
    • /
    • pp.104-111
    • /
    • 2012
  • It is advantageous to avoid the handover to cell whose dwell time is short or can be ignored in terms of service continuity and average throughput. This paper proposes the handover scheme that is suitable for vehicle in order to improve the wireless Internet service quality. In the proposed scheme, the handover process continues to be learned before being modeled to Discrete-Time Markov Chain (DTMC). This modeling reduces the handover frequency by preventing the handover to cell that could provide service sufficiently to passenger even when vehicle passed through the cell but there was no need to perform handover. In order to verify the proposed scheme, we observed the average number of handovers, the average RSSI and the average throughput on various moving paths that vehicle moved in the given urban environment.

Architectural model driven dependability analysis of computer based safety system in nuclear power plant

  • Wakankar, Amol;Kabra, Ashutosh;Bhattacharjee, A.K.;Karmakar, Gopinath
    • Nuclear Engineering and Technology
    • /
    • v.51 no.2
    • /
    • pp.463-478
    • /
    • 2019
  • The most important non-functional requirements for dependability of any Embedded Real-Time Safety Systems are safety, availability and reliability requirements. System architecture plays the primary role in achieving these requirements. Compliance with these non-functional requirements should be ensured early in the development cycle with appropriate considerations during architectural design. In this paper, we present an application of system architecture modeling for quantitative assessment of system dependability. We use probabilistic model checker (PRISM), for dependability analysis of the DTMC model derived from system architecture model. In general, the model checking techniques do not scale well for analyzing large systems, because of prohibitively large state space. It limits the use of model checking techniques in analyzing the systems of practical interest. We propose abstraction based compositional analysis methodology to circumvent this limitation. The effectiveness of the proposed methodology has been demonstrated using the case study involving the dependability analysis of safety system of a large Pressurized Water Reactor (PWR).

Survivability Evaluation Model in Wireless Sensor Network using Software Rejuvenation

  • Parvin, Sazia;Thein, Thandar;Kim, Dong-Seong;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.91-100
    • /
    • 2008
  • The previous works in sensor networks security have focused on the aspect of confidentiality, authentication and integrity based on cryptographic primitives. There has been no prior work to assess the survivability in systematic way. Accordingly, this paper presents a survivability model of wireless sensor networks using software rejuvenation for dual adaptive cluster head. The survivability model has state transition to reflect status of real wireless sensor networks. In this paper, we only focus on a survivability model which is capable of describing cluster head compromise in the networks and able to switch over the redundant cluster head in order to increase the survivability of that cluster. Second, this paper presents how to enhance the survivability of sensor networks using software rejuvenation methodology for dual cluster head in wireless sensor network. We model and analyze each cluster as a stochastic process based on Semi Markov Process (SMP) and Discrete Time Markov Chain (DTMC). The proof of example scenarios and numerical analysis shows the feasibility of our approach.

  • PDF

Estimation of Degradation Period Ratio for Adaptive Framework in Mobile Cellular Networks (이동 통신망에서 적응형 구조의 호 저하 시간 비율 추정)

  • Jeong Seong Hwan;Lee Se Jin;Hong Jeong Wan;Lee Chang Hun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.441-447
    • /
    • 2003
  • Recently there is a growing Interest In mobile cellula r network providing multimedia service. However, the link bandwidth of mobile cellular network is not sufficient enough to provide satisfactory services to use rs. To overcome this problem, an adaptive framework has been proposed in this study, we propose a new method of estimating DPR(degradation period ratio) in an adaptive multimedia network where the bandwidth of ongoing call can be dynamically adjusted during its lifetime. DPR is a QoS(quality of service) parameter which represents the ratio of allocated bandwidth below a pre-defined target to the whole service time of a call. We improve estimation method of DPR using DTMC(discrete time Markov chain) model. We also calculate mean degradation period and degradation probability more precisely than in existing studies. Under Threshold CAC(call admission control) algorithm, we present analytically how to guarantee QoS to users and illustrate the method by numerical examples. The proposed method is expected to be used as one of CAC schemes in guaranteeing predefined QoS level of DPR

  • PDF

Estimation of Degradation Period Ratio for Adaptive Framework in Mobile Cellular Networks (적응형 구조를 갖는 이동통신망에서 호 저하 시간 비율 추정)

  • Jung, Sung-Hwan;Lee, Sae-Jin;Hong, Jung-Wan;Lee, Chang-Hoon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.29 no.4
    • /
    • pp.312-320
    • /
    • 2003
  • Recently there is a growing interest in mobile cellular network providing multimedia service. However, the link bandwidth of mobile cellular network is not sufficient enough to provide satisfactory services to users. To overcome this problem, an adaptive framework has been proposed. In this study, we propose a new method of estimating DPR(Degradation Period Ratio) in an adaptive multimedia network where the bandwidth of ongoing call can be dynamically adjusted during its lifetime. DPR is a QoS(Quality of Service) parameter which represents the ratio of allocated bandwidth below a pre-defined target to the whole service time of a call. We improve estimation method of DPR using DTMC(Discrete Time Markov Chain) model by calculate mean degradation period, degradation probability more precisely than in existing studies. Under Threshold CAC(Call Admission Control) algorithm, we present analytically how to guarantee QoS to users and illustrate the method by numerical examples. The proposed method is expected to be used as one of CAC schemes in guaranteeing predefined QoS level of DPR.

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.