• Title/Summary/Keyword: Wireless telecommunication protocol

Search Result 71, Processing Time 0.026 seconds

Cooperative spectrum leasing using parallel communication of secondary users

  • Xie, Ping;Li, Lihua;Zhu, Junlong;Jin, Jin;Liu, Yijing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1770-1785
    • /
    • 2013
  • In this paper, a multi-hop transmission protocol based on parallel communication of secondary users (SUs) is proposed. The primary multi-hop network coexists with a set of SUs by cooperative spectrum sharing. The main optimization target of our protocol is the overall performance of the secondary system with the guarantee of the primary outage performance. The energy consumption of the primary system is reduced by the cooperation of SUs. The aim of the primary source is to communicate with the primary destination via a number of primary relays. SUs may serve as extra decode-and-forward relays for the primary network. When an SU acts as a relay for a primary user (PU), some other SUs that satisfy the condition for parallel communication are selected to simultaneously access the primary spectrum for secondary transmissions. For the proposed protocol, two opportunistic routing strategies are proposed, and a search algorithm to select the SUs for parallel communication is described. The throughput of the SUs and the PU is illustrated. Numerical results demonstrate that the average throughput of the SUs is greatly improved, and the end-to-end throughput of the PU is slightly increased in the proposed protocol when there are more than seven SUs.

Feasibility study of wireless motion control (Wireless 모션제어의 가능성 연구)

  • Lee, Don-Jin;Ahn, Jung-Hwan
    • Proceedings of the KSME Conference
    • /
    • 2001.06b
    • /
    • pp.82-86
    • /
    • 2001
  • This papers deals with feasibility study of wireless motion control. Wireless telecommunication advances with development of IT technology and extends more and more areas. So we selected Bluetooth out of the technologies(Bluetooth, SWAP(SharedWireless Access Protocol), IrDA(Infra Red Data Association), WLAN(Wireless Local Area Network)) which was developed for local data communication and set up simple experimental system for wireless data transfer and server and client program for wireless data transfer was wrote. We successfully transferred some data wirelessly with this program.

  • PDF

Wireless Diagnostic Technique for Pole Transformer Using SMS of Mobile Telecommunication Network (이동통신망의 SMS 방식을 이용한 주상변압기 무선 진단 기법)

  • Kim Jin-Cheol;Lee Hyang-Beom
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.2 no.3
    • /
    • pp.61-71
    • /
    • 2003
  • This paper suggests a wireless diagnostic technique using SMS (Short Message Service) of mobile telecommunication network for pole transformer. The temperature and current of pole transformer are acquired and the average and standard deviation are transmitted using SMS of mobile telecommunication network when transformer is overloaded The algorithm and protocol is design to fit the wireless diagnostic technique. By using the wireless method, the weak point of accessability can overcome. It is possible to manage, control, and monitor many transformers with just one server.

  • PDF

Physical Layer Wireless Network Security Through Channel Coding (채널 부호화를 통한 물리계층 무선 네트워크 보안 기술)

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun;Kim, Gun-Seok;Kim, Nae-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.989-992
    • /
    • 2007
  • In this paper we introduce a new paradigm of physical layer security for wireless network. Existing security protocols like internet's transport layer security protocol has some security flaws that skilled hackers could exploit. Motivated from this point we introduce a new security protocol that works in physical layer which is much less vulnerable to hackers than any other higher layers. In our proposal, we incorporate the proposed security protocol within channel coding as channel coding is an essential part of wireless communication. We utilize the flexibility to choose a generator matrix (or generator polynomial) of a particular code that selects the code words as a core of our protocol. Each pair of wireless node will select a unique generator using their security key before they started to communicate with each other.

  • PDF

Context-Aware Mobile Gateway Relocation Scheme for Clustered Wireless Sensor Networks

  • Encarnacion, Nico N.;Yang, Hyunho
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.365-371
    • /
    • 2012
  • In recent years, researchers have been attracted to clustering methods to improve communication and data transmission in a network. Compared with traditional wireless networks, wireless sensor networks are energy constrained and have lower data rates. The concept of implementing a clustering algorithm in an existing project on gateway relocation is being explored here. Low energy adaptive clustering hierarchy (LEACH) is applied to an existing study on relocating a gateway. The study is further improved by moving the gateway to a specific cluster based on the number or significance of the events detected. The protocol is improved so that each cluster head can communicate with a mobile gateway. The cluster heads are the only nodes that can communicate with the mobile gateway when it (the mobile gateway) is out of the cluster nodes' transmission range. Once the gateway is in range, the nodes will begin their transmission of real-time data. This alleviates the load of the nodes that would be located closest to the gateway if it were static.

Symptoms-Based Power-Efficient Communication Scheme in WBSN

  • Sasi, Juniven Isin D.;Yang, Hyunho
    • Smart Media Journal
    • /
    • v.3 no.1
    • /
    • pp.28-32
    • /
    • 2014
  • It is practical nowadays to automate data recording in order to prevent loss and tampering of records. There are existing technologies that satisfy this needs and one of them is wireless sensor networks (WSN). Wireless body sensor networks (WBSN) are wireless networks and information-processing systems which are deployed to monitor medical condition of patients. In terms of performance, WBSNs are restricted by energy, and communication between nodes. In this paper, we focused in improving the performance of communication to achieve less energy consumption and to save power. The main idea of this paper is to prioritize nodes that exhibit a sudden change of vital signs that could put the patient at risk. Cluster head is the main focus of this study in order to be effective; its main role is to check the sent data of the patient that exceeds threshold then transfer to the sink node. The proposed scheme implemented added a time-based protocol to sleep/wakeup mechanism for the sensor nodes. We seek to achieve a low energy consumption and significant throughput in this study.

A study on the MAC protocol for an aeronautical mobile data communication (항공용 이동 무선 데이터 통신에 적합한 매체접속제어 프로토콜에 관한 연구)

  • 이은주;박효달
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2604-2612
    • /
    • 1997
  • Media access control(MAC) protocol that is used between aircraft and ground station now is non-persistent CSMA protocol, but this protocol hs defects to apply in the wireless mobile radio communication environment. In this paper, to solve this Problems, the modified ICMA/CD protocol which ban be applied in the wireless environment was proposed and analyzed. In the modified ICMA/CD protocol, instead of usig special control channel, control signal was inserted into the uplink message. After the analysis, simulation was performed to approve the analysis resutls. As a results, modified ICMA/CD protocol can solve the hidden termined effect of CSMA protocol and packet detection delay time problem of ICMA/CD protocol and acquired the same channel throughput as CSMA/CD protocol. This results shows the modified ICMA/CD protocol can be used in the aeronauical telecommunication.

  • PDF

Stochastic Optimization of Multipath TCP for Energy Minimization and Network Stability over Heterogeneous Wireless Network

  • Arain, Zulfiqar Arain;Qiu, Xuesong;Zhong, Lujie;Wang, Mu;Chen, Xingyan;Xiong, Yongping;Nahida, Kiran;Xu, Changqiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.195-215
    • /
    • 2021
  • Multipath Transport Control Protocol (MPTCP) is a transport layer protocol that enables multiple TCP connections across various paths. Due to path heterogeneity, it incurs more energy in a multipath wireless network. Recent work presents a set of approaches described in the literature to support systems for energy consumption in terms of their performance, objectives and address issues based on their design goals. The existing solutions mainly focused on the primary system model but did not discourse the overall system performance. Therefore, this paper capitalized a novel stochastically multipath scheduling scheme for data and path capacity variations. The scheduling problem formulated over MPTCP as a stochastic optimization, whose objective is to maximize the average throughput, avoid network congestion, and makes the system more stable with greater energy efficiency. To design an online algorithm that solves the formulated problem over the time slots by considering its mindrift-plus penalty form. The proposed solution was examined under extensive simulations to evaluate the anticipated stochastic optimized MPTCP (so-MPTCP) outcome and compared it with the base MPTCP and the energy-efficient MPTCP (eMPTCP) protocols. Simulation results justify the proposed algorithm's credibility by achieving remarkable improvements, higher throughput, reduced energy costs, and lower-end to end delay.

Design and Implementation of Reliable Asynchronous Image Transfer Protocol In Wireless Sensor Network (무선 센서네트워크에서의 신뢰성 있는 비동기적 이미지 전송 프로토콜 설계 및 구현)

  • Seon, Ju-Ho;Kwon, Young-Wan;Park, Chong-Myung;Lee, Heon-Guil;Jung, In-Bum
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.467-472
    • /
    • 2007
  • 무선 센서네트워크는 다양한 환경에서 감시와 정보수집 역할을 수행하는 시스템이다. 최근에는 하드웨어의 발달로 무선 센서네트워크를 이용하여 멀티미디어 데이터를 수집하기 위한 시도가 활발히 이루어지고 있다. 본 논문에서는 센서네트워크에서의 신뢰성 있는 비동기적 이미지 전송 프로토콜인 RAIT를 제안한다. RAIT는 작은 크기의 메모리를 갖는 센서노드의 특징을 고려하여 전송 중 발생하는 Overflew의 방지를 위하여 Token-Bucket 방식으로의 네트워크 트래픽 관리를 통해 이미지 전송의 신뢰성을 높인다. 또한 시뮬레이션 결과를 통해 RAIT의 이미지 전송 신뢰성을 확인하였다.

  • PDF

Performance Enhancement of CSMA/CA MAC DCF Protocol for IEEE 802.11a Wireless LANs (IEEE 802.11a 무선 LAN에서 CSMA/CA MAC DCF 프로토콜의 성능 향상)

  • Moon, Il-Young;Roh, Jae-Sung;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.8 no.1
    • /
    • pp.65-72
    • /
    • 2004
  • A basic access method using for IEEE 802.11a wireless LANs is the DCF method that is based on the CSMA/CA. But, Since IEEE 802.11 MAC layer uses original backoff algorithm (Exponential backoff method), when collision occurs, the size of contention windows increases the double size. Hence, packet transmission delay time increases and efficiency is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs using a proposed enhanced backoff algorithm. From the results, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between TCP packet size and total message transmission time, allowing for an inference of the optimal packet size in the TCP layer.

  • PDF