• Title/Summary/Keyword: IEEE802.16

Search Result 499, Processing Time 0.024 seconds

Interference Aware Downlink Channel Allocation Algorithm to Improve Throughput on OFDMA Cellular Multihop Networks with Random Topology (임의의 토폴로지를 갖는 OFDMA 다중홉 셀룰러 네트워크의 하향링크 간섭 완화를 위한 채널 할당 방법)

  • Lim, Sunggook;Lee, Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.43-51
    • /
    • 2015
  • Upcoming cellular networks such as LTE-advanced and IEEE 802.16m are enhanced by relay stations to support high data rate multimedia services and minimize the shadow zone with low cost. Enhancing the relay stations, however, divides the multihop cellular network into smaller microcells and the distance between microcells is closer, which intends large intra-cell and inter-cell interference. Especially the access link on downlink in the OFDMA cellular network is the throughput bottleneck due to the severe interference caused by base stations and relay stations transmitting large data to mobile stations simultaneously. In this paper, we present interference aware channel allocation algorithm to avoid severe interference on multihop cellular networks with random topology. Proposed algorithm increases SINR(signal to interference plus noise ratio) and decreases number of required control messages for channel allocation, so that increases overall throughput on the networks.

Performance Evaluation of Common Feedback Channels for Multicast Transmission and Optimization of System Parameters (멀티캐스트 전송을 위한 공용 피드백 채널의 성능 분석 및 파라미터 최적화 설계 방법)

  • Jung, Young-Ho;Kim, Byung-Gun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.489-497
    • /
    • 2009
  • In the 3GPP LTE and IEEE 802.16m standardizations for IMT-Advanced, the efficient transmission of multicast and broadcast data is one of the important issues to improve system performance. Especially, to guarantee each user's QoS in the multicast group, H-ARQ or adaptive modulation are considered to be adoption, however, reduction of feedback overhead is one of the most important issues. In this paper, performance of the previously proposed OOK (On-Off Keying) based common ACK/NACK feedback channel is analyzed through theoretical analysis and simulation. Based on the results, system parameter optimization methods for common feedback channel are proposed. In addition, through computer simulation, it is shown that the common feedback method according to the proposed feedback parameter optimization can feedback ACK/NACK information for multicast H-ARQ transmission, more reliably than the conventional user dedicated feedback method in 3GPP LTE systems, and can reduce the feedback overhead as well.

WiSMax : Wifi Speed Maximization Application (와이파이 속도 극대화 애플리케이션)

  • Ryu, Kyu-Sang;Choi, Min-Seok;Jang, Beakcheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3440-3446
    • /
    • 2015
  • One of technologies that make it possible for users to enjoy always-on Internet service using potable devices does be Wifi. However, users frequently feel its connection is not stable or its speed becomes slow. On the other hand, users see multiple available Wifi access points exist often. In this paper, we present a smartphone application, called to WiSMax, that periodically changes its Wifi connection to the best one among available Wifi access points to maximize its speed. Experimental results show that WiSMax presents faster Internet connection than IEEE802.11 as much as about fifteen percent and higher signal strength than IEEE802.11 as much as about five dBm.

Multi-Size Circular Shifter Based on Benes Network with High-Speed 3×3 Switch (고속 3×3 스위치를 이용한 Benes 네트워크 기반 Multi-Size Circular Shifter)

  • Kang, Hyeong-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2637-2642
    • /
    • 2015
  • The low-density parity check(LDPC) code is being widely used due to its outperformed error-correction ability. The decoder of the quasi-cyclic LDPC(QC-LDPC) codes, a kind of LDPC codes, requires a multi-size cyclic shifter(MSCS) performing rotation of various sizes. The MSCS can be implemented with a Benes network, which requires a $3{\times}3$ switch if the number of data to be rotated is a multiple of 3. This paper proposes a control signal generation with lower complexity and a faster $3{\times}3$ switch. For the experiment, the proposed schemes are applied to the MSCS of an IEEE 802.16e WiMAX QC-LDPC code decoder. The result shows that the delay is reduced by about 8.7%.

A Study on Chain Collision Prevention Scheme using Vehicle-to-Vehicle Communications (적응형 채널 접근을 이용한 차량 간 통신 기반 사고 알림 기술에 관한 연구)

  • Lee, Ji-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.330-335
    • /
    • 2013
  • It is expected that the vehicle safety systems using vehicle-to-vehicle communication can reduce the possibility of vehicle collision and prevent the chain crash by promptly delivering the status of neighboring vehicles. Many IEEE 802.11 DCF based Flooding schemes have been proposed, but they may generally expose the problems that the chances of a chain-collision reaction are sharply increased as the vehicle density has increased. Therefore, this paper proposes the chain-collision prevention scheme using a broadcasting-based adaptive report. The proposed method can adaptively allocate the preoccupancy right based on a quantitative priority order and then promptly deliver the warning messages in neighboring areas. Moreover, it is shown from simulation that the proposed scheme provides the performance gains over the existing Flooding based scheme.

Performance and Iteration Number Statistics of Flexible Low Density Parity Check Codes (가변 LDPC 부호의 성능과 반복횟수 통계)

  • Seo, Young-Dong;Kong, Min-Han;Song, Moon-Kyou
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.1
    • /
    • pp.189-195
    • /
    • 2008
  • The OFDMA Physical layer in the WiMAX standard of IEEE 802.16e adopts 114 LDPC codes with various code rates and block sizes as a channel coding scheme to meet varying channel environments and different requirements for transmission performance. In this paper, the performances of the LDPC codes are evaluated according to various code rates and block-lengths throueh simulation studies using min-sum decoding algorithm in AWGN chamois. As the block-length increases and the code rate decreases, the BER performance improves. In the cases with code rates of 2/3 and 3/4, where two different codes ate specified for each code rate, the codes with code rates of 2/3A and 3/4B outperform those of 2/3B and 3/4A, respectively. Through the statistical analyses of the number of decoding iterations the decoding complexity and the word error rates of LDPC codes are estimated. The results can be used to trade-off between the performance and the complexity in designs of LDPC decoders.

Utilization of AeroMACS Infrastructure for Airports and Airlines (공항 및 항공사를 위한 AeroMACS 인프라 활용 연구)

  • Lim, In-Kyu;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.373-379
    • /
    • 2019
  • AeroMACS spectrum is a national resource internationally allocated by ITU at WRC-07. AeroMACS is an airport broadband mobile communication infrastructure based on WiMAX-based IEEE 802.16e that enables real-time video, graphics, voice, and high-speed data transmission. With the approval of ICAO's development technology standards in 2008, 50 airports in 11 countries have already completed the testing of D-TAXI or A-SMGCS technology using the AeroMACS infrastructure in 2019, starting in the United States in 2009. With many advantages in safety and convenience in terrestrial telecommunications operations, the system is becoming an area of performance improvement for airport operations in accordance with ICAO's ASBU plan. This paper examines the current status of domestic development of AeroMACS and lists service areas applicable to airlines and operators. It also seeks to promote safe and efficient next-generation airport mobile communication system services by presenting feasible partners management in the mobile area and use of aircraft communication systems for active technology development.

A Distribution Key Management Protocol for improving Security of Inner Attack in WiMAX Environment (WiMAX 환경에서 내부 공격의 안전성을 향상시킨 분산 키 관리 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.107-115
    • /
    • 2009
  • The cryptological key which is used in WiMAX environment is used at regular intervals by mobile nodes (laptop computer, PDA, cell-phone) which is in the range of base station coverage. But it is very weak at local attack like man-in-the-middle when the mobile node is off the range of base station or enters into the range to communicate with base station because the communication section is activated wirelessly. This paper proposes a distribution key building protocol which can reuse security key used by nodes to reduce cryptological security attack danger and communication overhead which occurs when mobile node tries to communicate with base station. The proposed distribution key establishing protocol can reduce overhead which occurs between base station and mobile node through key reusing which occurs during the communication process and also, makes security better than IEEE 802.16 standard by creating shared key which is required for inter-certification through the random number which node itself creates.

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.

A Study on Similarity Analysis of SNMP MIB File (SNMP MIB 파일의 유사도 분석에 관한 연구)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2019
  • Many similarity analysis methods, one of the dispute resolution methods for computer programs, have been studied. This paper is about quantitative similarity analysis of MIB (Management Information Base) file. Quantitative similarity means that the source codes of two computers are analyzed and the results are compared with a certain standard. The source code to analyze is a program that provides network device management functions such as configuration management, fault management, and performance management using SNMP protocol for WiMAX CPE devices. Here, WiMAX refers to the IEEE 802.16 wireless network standard protocol and can be classified into fixed WiMAX and mobile WiMAX. WiMAX CPE is a wireless Internet terminal that is fixedly used in a customer's home or office. In this paper, we analyze the similarity between MIB file of company A and company B. We will analyze whether the MIB file leaked from the damaged company is not just a list to describe the product specifications, but whether the property value can be recognized.