• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.029 seconds

Chaotic Prediction Based Channel Sensing in CR System (CR 시스템에서 Chaotic 예측기반 채널 센싱기법)

  • Gao, Xiang;Lee, Juhyeon;Park, Hyung-Kun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.1
    • /
    • pp.140-142
    • /
    • 2013
  • Cognitive radio (CR) has been recently proposed to dynamically access unused-spectrum. Since the spectrum availability for opportunistic access is determined by spectrum sensing, sensing control is identified as one of the most crucial issues of cognitive radio networks. Out-of-band sensing to find an available channels to sense. Sensing is also required in case of spectrum hand-off. Sensing process needs to be done very fast in order to enhance the quality of service (QoS) of the CR nodes, and transmission not to be cut for longer time. During the sensing, the PU(primary user) detection probability condition should be satisfied. We adopt a channel prediction method to find target channels. Proposed prediction method combines chaotic global method and chaotic local method for channel idle probability prediction. Global method focus on channel history information length and order number of prediction model. Local method focus on local prediction trend. Through making simulation, Proposed method can find an available channel with very high probability, total sensing time is minimized, detection probability of PU's are satisfied.

Constant Envelope Enhanced FQPSK and Its Performance Analysis

  • Xie, Zhidong;Zhang, Gengxin;Bian, Dongming
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.442-448
    • /
    • 2011
  • It's a challenging task to design a high performance modulation for satellite and space communications due to the limited power and bandwidth resource. Constant envelope modulation is an attractive scheme to be used in such cases for their needlessness of input power back-off about 2~3 dB for avoidance of nonlinear distortion induced by high power amplifier. The envelope of Feher quadrature phase shift keying (FQPSK) has a least fluctuation of 0.18 dB (quasi constant envelope) and can be further improved. This paper improves FQPSK by defining a set of new waveform functions, which changes FQPSK to be a strictly constant envelope modulation. The performance of the FQPSK adopting new waveform is justified by analysis and simulation. The study results show that the novel FQPSK is immune to the impact of HPA and outperforms conventional FQPSK on bit error rate (BER) performance. The BER performance of this novel modulation is better than that of FQPSK by more than 0.5 dB at least and 2 dB at most.

A Multicoded-PPM Scheme for High Data Rate UWB Communication Systems

  • lung, Sung-Yoon;Park, Dong-Jo
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.271-278
    • /
    • 2009
  • A new modulation scheme called multicoded-pulse position modulation (MC-PPM) is proposed for an ultrawideband (UWB) impulse radio communication system. The multicoded signal is generated by using several orthogonal codes for transmitting data simultaneously. Then, each multi-level value of the multicoded signal is converted to pulse position which results in not only an improved data rate, but also a processing gain in reception, delivering the power-efficient benefit of PPM and guaranteeing the low pulse energy for UWB systems. We notice that the modulation of multi-level values of the multicoded signal to pulse position is more efficient in terms of achievable data rate than the modulation of transmitting data based on other PPM schemes within given bandwidth and pulse energy. Therefore, as a performance measure, we focus on the achievable data rate (link capacity) of the proposed scheme and analyze it theoretically. Through simulation, we compare the link capacity of the MC-PPM scheme and other PPM schemes, such as M -ary PPM and multiple PPM. With the fixed bandwidth and same pulse energy condition, the UWB system based on the proposed MC-PPM scheme shows good link capacity and an increased data rate as L increases, which is contrary to other PPM schemes.

The Remote Concert Education System on High-Speed Communication Network (초고속 정보 통신망을 이용한 원격 합주 교육 시스템)

  • Han, Chang-Ho;Lee, Gyeong-Myeong;Yun, Gwang-Seop;Ryu, Gi-Hong;Mo, Jong-Sik;Kim, Yu-Seong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1177-1188
    • /
    • 1999
  • Continuing advance in computers and MIDI devices has accelerated research on the computerized music technology, Realization of high speed computer communication networks facilitated on-line computer music systems, which needs to send a volume of multimedia data. This paper presents the design and implementation of the Remote Concert Education System which helps users practice ensemble without gathering in a room. The system maintains the music database, identifies tones and measures of the melody played with different instruments, check the correctness on-line, and finally provides the analysed results of the ensemble. The developed system can be used as a supporting system for music education if high speed communication network is available.

  • PDF

MAC Protocol for achieving energy efficiency and end-to-end delay minimization in wireless sensor networks (무선 센서 네트워크에서 에너지 효율성과 전송 지연 최소화를 동시에 고려한 MAC 프로토콜)

  • Song Young-Mi;Suh ChangSu;Ko Young-Bae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.493-495
    • /
    • 2005
  • 지금까지 무선 센서 네트워크에서 에너지를 효율적으로 사용하기 위한 많은 라우팅 및 MAC 프로토콜들이 개발되어 왔다. 특히 에너지 효율적 센서 MAC 프로토콜들 중 Sensor-MAC (S-MAC) 프로토콜은 listen 시간과 sleep 시간을 주기적으로 반복하여, 데이터 전송이 없을 경우 노드의 통신 모듈을 Sleep시킴으로써 그 만큼의 에너지를 절약한다. 노드의 sleep시간이 길수록 더 많은 에너지를 절약할 수 있으나, 대신 sleep시간에 발생된 데이터는 다시 다음 주기의 listen시간이 시작될 때까지 지연되어야 한다는 단점이 있다. 이러한 데이터 전송 지연은 센서 네트워크에서 다양한 어플리케이션을 지원하기 위해 반드시 개선되어야 할 사항이다. 본 논문에서는 S-MAC의 listen/sleep 주기를 그대로 사용하여 에너지를 절약하면서도, 큰 오버헤드를 발생시키지 않고 데이터 전송시의 지연 시간을 최소화하는 기법에 대해 논의한다. 또한 시뮬레이션을 통해 기존의 S-MAC 및 Adaptive S-MAC 프로토콜과 지연시간 및 에너지 소비량을 비교하여, 제안된 기법이 지연시간을 감소시키면서도 기존 MAC 프로토콜들과 비슷한 에너지 소비량을 갖는다는 것을 증명하였다.

  • PDF

Implementation of Elbow Method to improve the Gases Classification Performance based on the RBFN-NSG Algorithm

  • Jeon, Jin-Young;Choi, Jang-Sik;Byun, Hyung-Gi
    • Journal of Sensor Science and Technology
    • /
    • v.25 no.6
    • /
    • pp.431-434
    • /
    • 2016
  • Currently, the radial basis function network (RBFN) and various other neural networks are employed to classify gases using chemical sensors arrays, and their performance is steadily improving. In particular, the identification performance of the RBFN algorithm is being improved by optimizing parameters such as the center, width, and weight, and improved algorithms such as the radial basis function network-stochastic gradient (RBFN-SG) and radial basis function network-normalized stochastic gradient (RBFN-NSG) have been announced. In this study, we optimized the number of centers, which is one of the parameters of the RBFN-NSG algorithm, and observed the change in the identification performance. For the experiment, repeated measurement data of 8 samples were used, and the elbow method was applied to determine the optimal number of centers for each sample of input data. The experiment was carried out in two cases(the only one center per sample and the optimal number of centers obtained by elbow method), and the experimental results were compared using the mean square error (MSE). From the results of the experiments, we observed that the case having an optimal number of centers, obtained using the elbow method, showed a better identification performance than that without any optimization.

A Study on the performance improvement of CSMA in the distributed wireless communication network (분산 무선통신망에서 CSMA 성능 개선에 관한 연구)

  • 조병록;최병진;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.4
    • /
    • pp.605-613
    • /
    • 1994
  • In this paper, we evaluate performance of multiple access for distributed wireless communication network by CSMA protocol. It is envident that the existence of hidden node in an environment degrades the performance of CSMA. In order to improve performance due to the problem of hidden node, the previous paper used random multiple access protocols a as such as ISMA, BTMA, BCMA. In this paper, We propose a protocol that we can improve performance by allowing node to sense the carrier of any other transmission on the channel in the distributed wireless communication networks The probability of transmission success was obtained by steady stats analysis under given assumptions. We confirmed that hidden node problem be virtually elimated by using a new protocol.

  • PDF

A Study on Telecommunication Network Architecture for Intelligence Transportation System Based on DSRC Technology (DSRC 기술을 활용한 지능형 교통 시스템의 통신망 구조 연구)

  • Yee, Soung-Ryong;Choe, Kyung-Il;Lee, Hee-Sang;Kim, Yun-Bae
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.26 no.4
    • /
    • pp.345-353
    • /
    • 2000
  • ITS(Intelligent Transportation System) is an advanced system which can effectively handle the current transportation and tragic problems. In order to beneficially apply ITS to the current transportation infrastructure we need a telecommunication technology which guarantees high speed data transmission between the road side units and the on-board units in the vehicles. DSRC(Dedicated Short Range Communication) is considered as a promising technology since it has the capability of two-way communication and can serve to implement various ITS services. In this paper, we study an architecture of telecommunication network far ITS based on DSRC. We use the ISCNA(Information Systems and Communication Networks Architecture) framework for the method of approach. We first analyze the requirements for ITS services using DSRC in Korea, and then establish a logical architecture for the network. We also analyze the types of data and process between the network components. Based on these we propose an architecture for the telecommunication network for ITS. We also briefly discuss the simulation which we perform to validate the proposed network architecture.

  • PDF

A Study on the Flow Analysis on the Software-Defined Networks through Simulation Environment Establishment (시뮬레이션 환경 구축을 통한 소프트웨어-정의 네트워크에서 흐름 분석에 관한 연구)

  • Lee, Dong-Yoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.88-93
    • /
    • 2020
  • Recently, SDN technology is applied to real communication business, users are getting bigger, and as the amount of data flowing in the network increases, interest in network data flow management is increasing. During this process, it must be ensured that the confidentiality, integrity, availability, and traceability of the data on the network being transmitted. In addition, it is necessary to develop an environment for observing the flow of data in real time on a network required in various fields and visually confirming the control. In this paper, first, Mininet is applied to construct a network topology and various environment attributes. Second, we added OpenDayLight in Mininet environment to develop a simulation environment to visually check and control network traffic flow in network topology.

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.