• Title/Summary/Keyword: IEEE802.11a

Search Result 1,113, Processing Time 0.03 seconds

Research for Improving the Speed of Scrambler in the WAVE System (WAVE 시스템에서 스크램블러의 속도 향상을 위한 연구)

  • Lee, Dae-Sik;You, Young-Mo;Lee, Sang-Youn;Oh, Se-Kab
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.9
    • /
    • pp.799-808
    • /
    • 2012
  • Bit operation of scrambler in the WAVE System become less efficient because parallel processing is impossible in terms of hardware and software. In this paper, we propose algorism to find the starting position of the matrix table. Also, when bit operation algorithm of scrambler and algorithms for matrix table, algorithm used to find starting position of the matrix table were compared with the performance as 8 bit, 16bit, 32 bit processing units. As a result, the number of processing times per second could be done 2917.8 times more in an 8-bit, 5432.1 times in a 16-bit, 10277.8 times in a 32 bit. Therefore, algorithm to find the starting position of the matrix table improves the speed of the scrambler in the WAVE and the receiving speed of a variety of information gathering and precision over the Vehicle to Infra or Vehicle to Vehicle in the Intelligent Transport Systems.

The Algorithm Design and Implemention for Operation using a Matrix Table in the WAVE system (WAVE 시스템에서 행렬 테이블로 연산하기 위한 알고리즘 설계 및 구현)

  • Lee, Dae-Sik;You, Young-Mo;Lee, Sang-Youn;Jang, Chung-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4A
    • /
    • pp.189-196
    • /
    • 2012
  • A WAVE(Wireless Access for Vehicular Environment) system is a vehicle communication technology. The system provides the services to prevent vehicle accidents that might occur during driving. Also, it is used to provide various services such as monitoring vehicle management and system failure. However, the scrambler bit operation of WAVE system becomes less efficient in the organizations of software and hardware design because the parallel processing is impossible. Although scrambler algorithm proposed in this paper has different processing speed depending on input data 8 bit, 16 bit, 32 bit, and 64 bit. it improves the processing speed of the operation because it can make parallel processing possible depending on the input unit.

A Dual Band Microstrip Antenna with Two Y-Shaped Slots for Satellite Internet Service (위성 인터넷 서비스를 위한 두 개의 Y 형태 슬롯을 가지는 이중 대역 마이크로스트립 안테나)

  • Kim, Byoung-Chul;Lee, Sang-Un;Han, Sung-Min;Lee, Ho-Jin;Choo, Ho-Sung;Park, Ik-Mo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.2
    • /
    • pp.145-151
    • /
    • 2008
  • In this paper, a dual band microstrip antenna with similar radiation pattern for the satellite internet service is proposed. The proposed antenna has two Y-shaped slots on the microstrip patch that is fabricated on RO4003 substrate with a dielectric constant of 3.38 and a thickness of 0.508 mm, and operates in the 2 GHz and 5 GHz bands. The size of the antenna is $50\times47.5\times6.5\;mm^3$, and fed by coaxial cable. The measured bandwidths of the antenna are 2.398$\sim$2.507 GHz and 5.458$\sim$5.972 GHz for VSWR<2. The measured gains are 8.92 dBi and 7.74 dBi, respectively, for the lower and upper bands.

Algorithm Design and Implementation for Safe Left Turn at an Intersection Based on Vehicle-to-Vehicle Communications (교차로에서의 안전 좌회전을 위한 차량간 통신 기반 알고리즘 설계 및 구현)

  • Seo, Hyun-Soo;Kim, Hyo-Un;Noh, Dong-Gyu;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.165-171
    • /
    • 2013
  • WAVE(Wireless Access in Vehicular Environments) is a representative V2V communication protocol and its standards of MAC and PHY parts except for security were published. In order to control traffic flow and ensure driver's safety using V2V communication, various projects are conducting. In particular, safety application has been researched. Therefore, in this paper, we designed the safety application algorithm, which informs a driver of the dangerous status when driver tries to turn left in an intersection and we also implemented the algorithm. Proposed algorithm configures a model for a host vehicle and a vehicle coming in opposite lane and in case that there is collision hazard it provides warning message to driver by using HMI. In order to evaluate the proposed algorithm's performance, we configured the test bed using test vehicles and we tested the algorithm on proving ground with the composed test scenarios. As test results, our system showed excellent performance. If the infrastructures for V2I communications are constructed, we will optimize our system more precisely and stably.

WAVE Communication-based V2I Channel Modeling

  • Lee, Soo-Hwan;Kim, Jong-Chan;Lim, Ki-Taek;Cho, Hyung-Rae;Seo, Dong-Hoan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.899-905
    • /
    • 2016
  • Wireless access in vehicle environment (WAVE) communication is currently being researched as core wireless communication technologies for cooperative intelligent transport systems (C-ITS). WAVE consists of both vehicle to vehicle (V2V) communication, which refers to communication between vehicles, and vehicle to infrastructure (V2I) communication, which refers to the communication between vehicles and road-side stations. V2I has a longer communication range than V2V, and its communication range and reception rate are heavily influenced by various factors such as structures on the road, the density of vehicles, and topography. Therefore, domestic environments in which there are many non-lines of sight (NLOS), such as mountains and urban areas, require optimized communication channel modeling based on research of V2I propagation characteristics. In the present study, the received signal strength indicator (RSSI) was measured on both an experience road and a test road, and the large-scale characteristics of the WAVE communication were analyzed using the data collected to assess the propagation environment of the WAVE-based V2I that is actually implemented on highways. Based on the results of this analysis, this paper proposes a WAVE communication channel model for domestic public roads by deriving the parameters of a dual-slope logarithmic distance implementing a two-ray ground-reflection model.

The Comparison of RBS and TDP for the Sensor Networks Synchronization

  • Lee, Hyo-Jung;Kim, Byung-Chul;Kwon, Young-Mi
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.70-74
    • /
    • 2005
  • Sensor networks have emerged as an interesting and important research area in the last few years. These networks require that time be synchronized more precisely than in traditional Internet applications. In this paper, we compared and analyzed the performance of the RBS and TDP mechanisms in the view of the number of generated messages and the synchronization accuracy. The reason that we chose be RBS ad the TDP mechanism to be compared is because the RES is an innovative method to achieve the high accurate synchronization. And TDP is a new method taking over the NTP method which has been used widely in the Internet. We simulated the performance of two methods assuming the IEEE 802.11 CSMA/CA MAC. As for the number of nodes in the sensor networks, two situations of 25 (for the small size network) and 100 (for the large size network) nodes are used. In the aspect of the number of messages generated for the synchronization, TDP is far better than RBS. But, the synchronization accuracy of RBS is far higher than that of TDP. We cm conclude that in a small size sensor networks requiring very high accuracy, such as an application of very high speed objects tracking in a confined space, the RBS is more proper than TDP even though the RBS may generate more traffic than TDP. But, in a wide range sensor networks with a large number of nodes, TDP is more realistic though the accuracy is somewhat worse than RBS because RBS may make so many synchronization messages, and then consume more energies at each node. So, two mechanisms may be used selectively according to the required environments, without saying that the one method is always better than the other.

Assessing Efficiency of Handoff Techniques for Acquiring Maximum Throughput into WLAN

  • Mohsin Shaikha;Irfan Tunio;Baqir Zardari;Abdul Aziz;Ahmed Ali;Muhammad Abrar Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.172-178
    • /
    • 2023
  • When the mobile device moves from the coverage of one access point to the radio coverage of another access point it needs to maintain its connection with the current access point before it successfully discovers the new access point, this process is known as handoff. During handoff the acceptable delay a voice over IP application can bear is of 50ms whereas the delay on medium access control layer is high enough that goes up to 350-500ms. This research provides a suitable methodology on medium access control layer of the IEEE 802.11 network. The medium access control layer comprises of three phases, namely discovery, reauthentication and re-association. The discovery phase on medium access control layer takes up to 90% of the total handoff latency. The objective is to effectively reduce the delay for discovery phase to ensure a seamless handoff. The research proposes a scheme that reduces the handoff latency effectively by scanning channels prior to the actual handoff process starts and scans only the neighboring access points. Further, the proposed scheme enables the mobile device to scan first the channel on which it is currently operating so that the mobile device has to perform minimum number of channel switches. The results show that the mobile device finds out the new potential access point prior to the handoff execution hence the delay during discovery of a new access point is minimized effectively.

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • v.47 no.6
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

Differential 2.4-GHz CMOS Power Amplifier Using an Asymmetric Differential Inductor to Improve Linearity (비대칭 차동 인덕터를 이용한 2.4-GHz 선형 CMOS 전력 증폭기)

  • Jang, Seongjin;Lee, Changhyun;Park, Changkun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.6
    • /
    • pp.726-732
    • /
    • 2019
  • In this study, we proposed an asymmetric differential inductor to improve the linearity of differential power amplifiers. Considering the phase error between differential signals of the differential amplifier, the location of the center tap of the differential inductor was modified to minimize the error. As a result, the center tap was positioned asymmetrically inside the differential inductor. With the asymmetric differential inductor, the AM-to-AM and AM-to-PM distortions of the amplifier were suppressed. To confirm the feasibility of the inductor, we designed a 2.4 GHz differential CMOS PA for IEEE 802.11n WLAN applications with a 64-quadrature amplitude modulation (QAM), 9.6 dB peak-to-average power ratio (PAPR), and a bandwidth of 20 MHz. The designed power amplifier was fabricated using the 180-nm RF CMOS process. The measured maximum linear output power was 17 dBm, whereas EVM was 5%.

A Handover Authentication Scheme initiated by Mobile Node for Heterogeneous FMIPv6 Mobile Networks (이기종 FMIPv6 기반의 이동 망에서 이동 노드 주도형 핸드오버 인증 기법)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.103-114
    • /
    • 2007
  • The existing handover authentication schemes have authentication delay and overhead of the authentication server since they have been separately studied handover authentication at the link layer and the network layer. This paper proposes a handover authentication scheme initiated by Mobile Node on FMIPv6 based mobile access networks. The main idea of the paper is to generate a session key at the mobile node side, and transfer it to the next Access Router through the authentication server. Also, the scheme has a hierarchical key management at access router. There are two advantages of the scheme. First, the generated session key can be utilized for protecting the binding update messages and also for access authentication. Second, hierarchical key management at the access router reduced the handover delay time. The security aspects on the against PFS, PBS, and DoS attack of proposed scheme are discussed.