• Title/Summary/Keyword: Half Duplex Network

Search Result 34, Processing Time 0.022 seconds

User Scheduling Algorithm Based on Signal Quality and Inter-User Interference for Outage Minimization in Full-Duplex Cellular Networks (전이중 셀룰라 네트워크에서 아웃티지 최소화를 위한 신호 품질과 사용자간 간섭량 기반의 사용자 스케쥴링 알고리즘)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2576-2583
    • /
    • 2015
  • In a full-duplex (FD) wireless cellular network, uplink (UL) users induce the severe inter-user interference to downlink (DL) users. Therefore, a user scheduling that makes a pair of DL user and UL user to use the same radio resource simultaneously influences the system performances significantly. In this paper, we first formulate an optimization problem for user scheduling to minimize the occurrence of outage, aiming to guarantee the quality of service of users, and then we propose a suboptimal user scheduling algorithm with low complexity. The proposed scheduling algorithm is designed in a way where the DL user with a worse signal quality has a higher priority to choose its UL user that causes less interference. Simulation results show that the FD system using the proposed user scheduling algorithm achieves the optimal performance and significantly decreases the outage probability compared with the conventional half-duplex cellular system.

Full-Duplex Communication in Cooperative Cognitive Radio Network (협력 인지 통신망에서의 전 이중 통신)

  • Park, Sangwoo;Song, Iickho;Lee, Seungwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1374-1379
    • /
    • 2016
  • In almost all schemes of cooperative cognitive radio networks (CCRN), the users transmit and receive signals in half-duplex mode. In this paper, a design of CCRN adopting the full-duplex (FD) technique is addressed. In order to enable FD communication among users in the CCRN, simultaneous transmitting and receiving antennas are employed for the secondary users. Preliminary results from analysis and numerical evaluation indicate that the proposed FD multiple-input-multiple-output CCRN framework can provide a performance gain over the conventional CCRN frameworks.

One-round Protocols for Two-Party Authenticated Key Exchange (1-라운드 양자간 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.1_2
    • /
    • pp.110-118
    • /
    • 2006
  • Cryptographic protocol design in a two-party setting has of tel ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channel). In particular, most protocols for two-party key exchange have been designed assuming that parties alternate sending their messages (i.e., assuming a bidirectional half-duplex channel). However, by taking advantage of the communication characteristics of the network it may be possible to design protocols with improved latency. This is the focus of the present work. We present three provably-secure protocols for two-party authenticated key exchange (AKE) which require only a single round. Our first, most efficient protocol provides key independence but not forward secrecy. Our second scheme additionally provides forward secrecy but requires some additional computation. Security of these two protocols is analyzed in the random oracle model. Our final protocol provides the same strong security guarantees as our second protocol, but is proven secure in the standard model. This scheme is only slightly less efficient (from a computational perspective) than the previous ones. Our work provides the first provably- secure one-round protocols for two-party AKE which achieve forward secrecy.

A Three-way Handshaking Access Mechanism for Point to Multipoint In-band Full-duplex Wireless Networks

  • Zuo, Haiwei;Sun, Yanjing;Lin, Changlin;Li, Song;Xu, Hongli;Tan, Zefu;Wang, Yanfen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3131-3149
    • /
    • 2016
  • In-band Full-duplex (IBFD) wireless communication allows improved throughput for wireless networks. The current Half-duplex (HD) medium access mechanism Request to Send/Clear to Send (RTS/CTS) has been directly applied to IBFD wireless networks. However, this is only able to support a symmetric dual link, and does not provide the full advantages of IBFD. To increase network throughput in a superior way to the HD mechanism, a novel three-way handshaking access mechanism RTS/SRTS (Second Request to Send)/CTS is proposed for point to multipoint (PMP) IBFD wireless networks, which can support both symmetric dual link and asymmetric dual link communication. In this approach, IBFD wireless communication only requires one channel access for two-way simultaneous packet transmissions. We first describe the RTS/SRTS/CTS mechanism and the symmetric/asymmetric dual link transmission procedure and then provide a theoretical analysis of network throughput and delay using a Markov model. Using simulations, we demonstrate that the RTS/SRTS/CTS access mechanism shows improved performance relative to that of the RTS/CTS HD access mechanism.

Power Allocation and Mode Selection in Unmanned Aerial Vehicle Relay Based Wireless Networks

  • Zeng, Qian;Huangfu, Wei;Liu, Tong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.711-732
    • /
    • 2019
  • Many unmanned aerial vehicle (UAV) applications have been employed for performing data collection in facilitating tasks such as surveillance and monitoring objectives in remote and dangerous environments. In light of the fact that most of the existing UAV relaying applications operate in conventional half-duplex (HD) mode, a full-duplex (FD) based UAV relay aided wireless network is investigated, in which the UAV relay helps forwarding information from the source (S) node to the destination (D). Since the activated UAV relays are always floating and flying in the air, its channel state information (CSI) as well as channel capacity is a time-variant parameter. Considering decode-and-forward (DF) relaying protocol in UAV relays, the cooperative relaying channel capacity is constrained by the relatively weaker one (i.e. in terms of signal-to-noise ratio (SNR) or signal-to-interference-plus-noise ratio (SINR)) between S-to-relay and relay-to-D links. The channel capacity can be optimized by adaptively optimizing the transmit power of S and/or UAV relay. Furthermore, a hybrid HD/FD mode is enabled in the proposed UAV relays for adaptively optimizing the channel utilization subject to the instantaneous CSI and/or remaining self-interference (SI) levels. Numerical results show that the channel capacity of the proposed UAV relay aided wireless networks can be maximized by adaptively responding to the influence of various real-time factors.

Modeling and Evaluation of Wireless Communication System using CSMA inthe Distributed Packet Radio Network (분산 무선망에서 CSMA를 사용한 무선 통신 시스템의 모델링 및 성능 분석)

  • 조병록;최형진;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.10
    • /
    • pp.1508-1517
    • /
    • 1993
  • In this paper, we propose the modeling of a wireless communication system using CSMA protocol, present analytical evalution and simulation as a function of arrival rate and mean END-to-END delay in the distributed packet radio network. Asynchronous 1-persistent CSMA protocol is used in wireless communication system with half duplex. We assume that all terminals are to be in the close range of each other, suitably located in the local area. The traffic presented to a common channel is assumed to be poisson distribution. Analytical model is based on a M/D/1 with breakdown. In conclusion for wireless network model proposed in this paper is suitable for packet arrival rate of 2 packet/sec with mean packet delay time less than 2 times the packet transmission time.

  • PDF

Maximizing Secrecy Rate and Performance Analysis of Relay Selection for Cooperative Diversity Networks in Presence of an Eavesdropper (도청자가 존재하는 무선 협력 네트워크의 전달 단말 선택을 통한 보안 전송률 최대 전송기술 및 성능분석)

  • Ju, MinChul;Kwon, Tai-Gil;Cho, Jin-Woong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.533-540
    • /
    • 2015
  • We study relay selection in decode-and-forward (DF)-based relay networks consisting of a source, a destination, an eavesdropper, and multiple relays, where each terminal has a single antenna and operates in a half-duplex mode. In these networks, it is desirable to protect the confidential message from the source to the destination against the eavesdropper with the help of a single selected relay. Specifically, we begin by investigating DF-based networks for the scenario instantaneous signal-to-noise ratios (SNRs) related to the eavesdropper are available. For the scenario, we propose relay selection to maximize the secrecy rate of DF-based networks with and without direct-paths, and we derive the exact secrecy outage probabilities in closed-form.

Research on LTE D2D implementation and operation plan for PPDR communication (재난통신을 위한 LTE D2D 구현 및 운용 방안 연구)

  • Seong-Gyoon Park;Soong-Hwan Ro;Jongtae Ihm
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.579-586
    • /
    • 2023
  • Device-to-Device communication is a very important essential feature in PPDR(Public Protection Disaster Relief) communication, but it has not yet been implemented in LTE-based PPDR communication. In this study, we propose a solution to implement the LTE-based domestic PPDR communication network by evolving the terminals into D2D in-band terminals and effectively operating the current PS-LTE terminals and digital radios in the transitional period.

Polar coded cooperative with Plotkin construction and quasi-uniform puncturing based on MIMO antennas in half duplex wireless relay network

  • Jiangli Zeng;Sanya Liu
    • ETRI Journal
    • /
    • v.46 no.2
    • /
    • pp.175-183
    • /
    • 2024
  • Recently, polar code has attracted the attention of many scholars and has been developed as a code technology in coded-cooperative communication. We propose a polar code scheme based on Plotkin structure and quasi-uniform punching (PC-QUP). Then we apply the PC-QUP to coded-cooperative scenario and built to a new coded-cooperative scheme, which is called PCC-QUP scheme. The coded-cooperative scheme based on polar code is studied on the aspects of codeword construction and performance optimization. Further, we apply the proposed schemes to space-time block coding (STBC) to explore the performance of the scheme. Monte Carlo simulation results show that the proposed cooperative PCC-QUP-STBC scheme can obtain a lower bit error ratio (BER) than its corresponding noncooperative scheme.

Vector Network Analysis Using a One-Path, Frequency-Multiplied Photonic Link

  • Lee, Dong-Joon;Kwon, Jae-Yong;Kang, Jin-Seob;Whitaker, John F.
    • Journal of electromagnetic engineering and science
    • /
    • v.10 no.4
    • /
    • pp.282-289
    • /
    • 2010
  • A simplified, practical vector network analyzer (VNA) that uses mature radio-over-fiber technology has been designed and demonstrated. The measurement concept allows the full S-parameters of a microwave device (or antenna) to be obtained while minimizing the detrimental effects of electrical cables, which are replaced with a photonic link. A variety of high-frequency light modulation schemes with frequency sweeping capabilities are presented to realize a one-path (single, forward), frequency-multiplied optical link for VNA applications. Using the photonic one-path link, full two-port S-parameters have been extracted based on five-term error modeling, which has half the error terms compared with the standard duplex configuration. The S-parameters of a microwave filter and antenna measured using frequency-multiplied optical links are found to be in good agreement with those obtained using a conventional VNA.