• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.031 seconds

The Performance Analysis of Cognitive-based Overlay D2D Communication in 5G Networks

  • Abdullilah Alotaibi;Salman A. AlQahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.178-188
    • /
    • 2024
  • In the near future, it is expected that there will be billions of connected devices using fifth generation (5G) network services. The recently available base stations (BSs) need to mitigate their loads without changing and at the least monetary cost. The available spectrum resources are limited and need to be exploited in an efficient way to meet the ever-increasing demand for services. Device to Device communication (D2D) technology will likely help satisfy the rapidly increasing capacity and also effectively offload traffic from the BS by distributing the transmission between D2D users from one side and the cellular users and the BS from the other side. In this paper, we propose to apply D2D overlay communication with cognitive radio capability in 5G networks to exploit unused spectrum resources taking into account the dynamic spectrum access. The performance metrics; throughput and delay are formulated and analyzed for CSMA-based medium access control (MAC) protocol that utilizes a common control channel for device users to negotiate the data channel and address the contention between those users. Device users can exploit the cognitive radio to access the data channels concurrently in the common interference area. Estimating the achievable throughput and delay in D2D communication in 5G networks is not exploited in previous studies using cognitive radio with CSMA-based MAC protocol to address the contention. From performance analysis, applying cognitive radio capability in D2D communication and allocating a common control channel for device users effectively improve the total aggregated network throughput by more than 60% compared to the individual D2D throughput without adding harmful interference to cellular network users. This approach can also reduce the delay.

Design and Implementation of an Ultrasonic Communication Modem for Underwater Sensor Networks (수중 센서네트워크를 위한 초음파 통신 모뎀 설계 및 구현)

  • Byeon, Moo-Kwang;Park, Sung-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6A
    • /
    • pp.437-444
    • /
    • 2009
  • Underwater sensor networks (USN) for ocean development and disaster prevention have been emerged as one of interesting research topics recently. Since a high-speed and inexpensive communication modem is a prerequisite for deployment of USN, we design and implement an underwater modem by utilizing general-purpose waterproof ultrasonic sensors in this paper. We also make experiments in indoor and outdoor environment with two modems facing each other to conduct a point-to-point communication. According to the experiments, we can achieve the data rates of 1.5 kbps in a water tank and 2 kbps in a pond. Also, the maximum communication distance between two modems is about 30 meters. Besides, we conduct a point-to-multipoint experiment imitating USN by deploying a gateway, a sink node and three sensor nodes in a water tank.

A Heuristic Algorithm for Optimal Facility Placement in Mobile Edge Networks

  • Jiao, Jiping;Chen, Lingyu;Hong, Xuemin;Shi, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3329-3350
    • /
    • 2017
  • Installing caching and computing facilities in mobile edge networks is a promising solution to cope with the challenging capacity and delay requirements imposed on future mobile communication systems. The problem of optimal facility placement in mobile edge networks has not been fully studied in the literature. This is a non-trivial problem because the mobile edge network has a unidirectional topology, making existing solutions inapplicable. This paper considers the problem of optimal placement of a fixed number of facilities in a mobile edge network with an arbitrary tree topology and an arbitrary demand distribution. A low-complexity sequential algorithm is proposed and proved to be convergent and optimal in some cases. The complexity of the algorithm is shown to be $O(H^2{\gamma})$, where H is the height of the tree and ${\gamma}$ is the number of facilities. Simulation results confirm that the proposed algorithm is effective in producing near-optimal solutions.

An amplify-and-forward relaying scheme based on network coding for Deep space communication

  • Guo, Wangmei;Zhang, Junhua;Feng, Guiguo;Zhu, Kaijian;Zhang, Jixiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.670-683
    • /
    • 2016
  • Network coding, as a new technique to improve the throughput, is studied combined with multi-relay model in this paper to address the challenges of long distance and power limit in deep space communication. First, an amplify-and-forward relaying approach based on analog network coding (AFNC) is proposed in multi-relay network to improve the capacity for deep space communication system, where multiple relays are introduced to overcome the long distance link loss. The design of amplification coefficients is mathematically formulated as the optimization problem of maximizing SNR under sum-power constraint over relays. Then for a dual-hop relay network with a single source, the optimal amplification coefficients are derived when the multiple relays introduce non-coherent noise. Through theoretic analysis and simulation, it is shown that our approach can achieve the maximum transmission rate and perform better over single link transmission for deep space communication.

Interference Mitigation Scheme by Antenna Selection in Device-to-Device Communication Underlaying Cellular Networks

  • Wang, Yuyang;Jin, Shi;Ni, Yiyang;Wong, Kai-Kit
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.429-438
    • /
    • 2016
  • In this paper, we investigate an interference mitigation scheme by antenna selection in device-to-device (D2D) communication underlaying downlink cellular networks. We first present the closed-form expression of the system achievable rate and its asymptotic behaviors at high signal-to-noise ratio (SNR) and the large antenna number scenarios. It is shown that the high SNR approximation increases with more antennas and higher ratio between the transmit SNR at the base station (BS) and the D2D transmitter. In addition, a tight approximation is derived for the rate and we reveal two thresholds for both the distance of the D2D link and the transmit SNR at the BS above which the underlaid D2D communication will degrade the system rate. We then particularize on the small cell setting where all users are closely located. In the small cell scenario, we show that the relationship between the distance of the D2D transmitting link and that of the D2D interfering link to the cellular user determines whether the D2D communication can enhance the system achievable rate. Numerical results are provided to verify these results.

A Full Duplex MAC Protocol of Asymmetric Traffic Environment (비대칭 트래픽 환경에서의 전이중 MAC 프로토콜)

  • Ahn, Hyeongtae;Kim, Cheeha
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.381-386
    • /
    • 2016
  • Recently full-duplex communication in wireless networks is enabled by the advancement of self-interference cancellation technology. Full-duplex radio is a promising technology for next-generation wireless local area networks (WLAN) because it can simultaneously transmit and receive signals within the same frequency band. Since legacy medium access control (MAC) protocols are designed based on half-duplex communication, they are not suitable for full-duplex communication. In this paper, we discuss considerations of full-duplex communication and propose a novel full-duplex MAC protocol. We conducted a simulation to measure the throughput of our MAC protocol. Through the simulation results, we can verify that significant throughput gains of the proposed full-duplex MAC protocol, thus comparing the basic full-duplex MAC protocol.

Spatio-Temporal Residual Networks for Slide Transition Detection in Lecture Videos

  • Liu, Zhijin;Li, Kai;Shen, Liquan;Ma, Ran;An, Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4026-4040
    • /
    • 2019
  • In this paper, we present an approach for detecting slide transitions in lecture videos by introducing the spatio-temporal residual networks. Given a lecture video which records the digital slides, the speaker, and the audience by multiple cameras, our goal is to find keyframes where slide content changes. Since temporal dependency among video frames is important for detecting slide changes, 3D Convolutional Networks has been regarded as an efficient approach to learn the spatio-temporal features in videos. However, 3D ConvNet will cost much training time and need lots of memory. Hence, we utilize ResNet to ease the training of network, which is easy to optimize. Consequently, we present a novel ConvNet architecture based on 3D ConvNet and ResNet for slide transition detection in lecture videos. Experimental results show that the proposed novel ConvNet architecture achieves the better accuracy than other slide progression detection approaches.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

An Efficient Markov Chain Based Channel Model for 6G Enabled Massive Internet of Things

  • Yang, Wei;Jing, Xiaojun;Huang, Hai;Zhu, Chunsheng;Jiang, Qiaojie;Xie, Dongliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4203-4223
    • /
    • 2021
  • Accelerated by the Internet of Things (IoT), the need for further technical innovations and developments within wireless communications beyond the fifth generation (B5G) networks is up-and-coming in the past few years. High altitude platform station (HAPS) communication is expected to achieve such high levels that, with high data transfer rates and low latency, millions of devices and applications can work seamlessly. The HAPS has emerged as an indispensable component of next-generations of wireless networks, which will therefore play an important role in promoting massive IoT interconnectivity with 6G. The performance of communication and key technology mainly depend on the characteristic of channel, thus we propose an efficient Markov chain based channel model, then analyze the HAPS communication system's uplink capability and swing effect through experiments. According to the simulation results, the efficacy of the proposed scheme is proven to meet the requirements of ubiquitous connectivity in future IoT enabled by 6G.

Analysis of Authentication Architecture in Integrated WLAN/3G Networks (통합된 WLAN/3G 네트워크의 증명 방법의 분석)

  • Shrestha, Anish Prasad;Han, Kyong-Heon;Cho, Byung-Lok;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.237-242
    • /
    • 2008
  • A number of wireless technologies have been implemented, but each technology has its limitation in terms of coverage and bandwidth. WLAN and 3G cellular network has emerged to be a complementary platform for wireless data communications. However, the mobility of roaming terminals in heterogeneous networks poses several risks. To maintain secure communications in universal roaming, the effective authentication must be implemented. The focus of this paper is on analysis of authentication architecture involved in integrated WLAN/3G networks.

  • PDF