• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.028 seconds

A Distributed Wireless Local Area Network (WLAN) Access Scheme for Efficient WLAN Communication in Busy Train Stations (혼잡 철도 역사에서 효율적인 무선랜 통신을 위한 무선랜 분산 접속 방법)

  • Koh, Seoung-Chon;Choi, Kyu-Hyoung;Kim, Ronny Yongho
    • Journal of the Korean Society for Railway
    • /
    • v.17 no.6
    • /
    • pp.402-409
    • /
    • 2014
  • Wireless local area network (WLAN) is a widely used wireless access method due to its easy usability and excellent performance. However, its performance degrades significantly as the number of users increases. In busy train stations, where the number of WLAN users are large and, more importantly the number of simultaneous packet transmission attempts is extremely large due to the time synchronization upon train arrival, the packet transmission delay problem is very severe and almost impossible for WLAN stations to initiate communication with WLAN networks. In this paper, a novel distributed WLAN access scheme for efficient WLAN communication in busy train stations is proposed. Using the proposed scheme, WLAN access delay can be significantly reduced under highly congested traffic environments. Therefore, a significant performance enhancement for the WLAN performance used in the Communication Based Train Control (CBTC) can be achieved.

A Design and Implementation of Wi-Fi Based Unmanned Ship Control System (무선랜 기반 무인선박 제어시스템 설계 및 구현)

  • Kim, Dong-Hyun;Lee, Chae-Seok;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.437-444
    • /
    • 2014
  • The unmanned ship control system controls the unmanned ship at a distance in ocean. Expecially, in order to control the unmanned ship, it needs the wireless communication networks and we use the IEEE 802.11 based WLAN. The IEEE 802.11 based WLAN technology for supporting a wide bandwidth is suitable for unmanned ship control system which has to transmit the multimedia data. First, we design the system structure for controlling the unmanned ship. Then, in order to overcome the limited communication area, we design the network structure for the unmanned ship communication network which can use a various communication network. we implemented and evaluated the unmanned ship system based on WLAN. We controlled the unmanned ship by use the WLAN and confirmed the signal feature of WLAN in the ocean.

Performance Analysis of a Dense Device to Device Network

  • Kim, Seung-Yeon;Lim, Chi-Hun;Cho, Choong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.2967-2981
    • /
    • 2014
  • Device-to-Device (D2D) communication is a technology component for long-term evolution-advanced (LTE-A). In D2D communication, users in close proximity to each other can communicate directly without going through a base station; such direct communication can improve spectral efficiency. Although D2D communication brings improvement in spectral efficiency, it also causes interference to the cellular network as a result of spectrum sharing. In particularly, D2D communication can generate interference for each D2D pair when the common wireless medium in a co-located limited area is accessed. Even though the interference management for between the D2D pair and cellular networks has been proposed, the interference reducing methods have still not been fully studied for the D2D pairs. In this paper, we investigate the problem of D2D pair coexistence in which interference is considered between D2D pairs. Using a signal to interference model for a target D2D pair, we provide an analysis of the aggregated throughput of a dense D2D network. For a target D2D pair, we assume that the desired signal and interference signals obey multipath fading and shadow fading. Through analysis, we demonstrate the effect of cluster size such as the number of D2D pairs and the size of the considered area on the network performance. The analytical results are compared with computer simulations. Our work can be used for a rough guideline for controlling the system throughput in a dense D2D network environment.

Relay Network using UAV: Survey of Physical Layer and Performance Enhancement Issue (무인항공기를 이용한 중계네트워크: 물리계층 동향분석 및 성능향상 이슈)

  • Cho, Woong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.901-906
    • /
    • 2019
  • UAV (Unmanned Aerial Vehicle) is widely used in various areas such as civil and military applications including entertainment industries. Among them, UAV based communication system is also one of the important application areas. Relays have been received much attention in communication system due to its benefits of performance enhancement and coverage extension. In this paper, we investigate UAVs as relays especially focusing on physical layer. First, we introduce the research on UAV application for the relays, then the basic performance of relay networks in dual-hop communication system is analyzed by adopting decode-and-forward (DF) relaying protocol. The performance is represented using symbol error rate (SER) and UAV channels are applied by assuming asymmetric environments. Based on the performance analysis, we discuss performance enhancement issues by considering physical layer.

Implementation Access Control System Based on CAN Communication (CAN통신 기반 출입통제 시스템 구현)

  • Song, Chong-kwan;Park, Jang-sik;Kim, Hyun-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.467-470
    • /
    • 2009
  • CAN communication developed for communication between electric control devices in vehicle, was recently applied to automatic braking devices, and can also be applied to field bus for production automation. Recently, field bus is introduced in engine control, etc. for large ship. In this paper, cabin access control system can be implemented, based on CAN communication. The cabin access control system based on CAN communication consists of access control server, embedded system based on ARM9, and micro-controller built-in CAN controller. The access control server can be able to manage overall access control system by accessing with manager. And embedded system adopted ARM9 processor transmits access information of RFID reader controller connected with CAN networks to server, also performs access control. The embedded system can carry CAN frames to server, so it can be used as gateway.

  • PDF

Neighbor-Based Probabilistic Rebroadcast Routing Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

  • Harum, Norharyati;Hamid, Erman;Bahaman, Nazrulazhar;Ariff, Nor Azman Mat;Mas'ud, Mohd Zaki
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.1-8
    • /
    • 2021
  • In Mobile Ad-Hoc Network (MANET) Application, routing protocol is essential to ensure successful data transmission to all nodes. Ad-hoc On-demand Distance Vector (AODV) Protocol is a reactive routing protocol that is mostly used in MANET applications. However, the protocol causes Route Request (RREQ) message flooding issue due to the broadcasting method at the route request stage to find a path to a particular destination, where the RREQ will be rebroadcast if no Request Response (RREP) message is received. A scalable neighbor-based routing (SNBR) protocol was then proposed to overcome the issue. In the SNBR protocol, the RREQ message is only rebroadcast if the number of neighbor nodes less than a certain fix number, known as drop factor. However, since a network always have a dynamic characteristic with a dynamic number of neighbor nodes, the fix drop factor in SNBR protocol could not provide an optimal flooding problem solution in a low dense network environment, where the RREQ message is continuously rebroadcast RREQ message until reach the fix drop factor. To overcome this problem, a new broadcasting method as Dynamic SNBR (DSNBR) is proposed, where the drop factor is determined based on current number of neighbor nodes. This method rebroadcast the extra RREQ messages based on the determined dynamic drop factor. The performance of the proposed DSNBR is evaluated using NS2 and compared with the performance of the existing protocol; AODV and SNBR. Simulation results show that the new routing protocol reduces the routing request overhead, energy consumption, MAC Collision and enhances end-to-end delay, network coverage ratio as a result of reducing the extra route request messages.

LTE Load Balancer for Emergency Based on Raspberry Pi and OpenWRT (라즈베리 파이를 활용한 OpenWRT 기반 LTE 비상망 로드밸런서)

  • Baek, Seung-Hyun;Jang, Min-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.97-110
    • /
    • 2019
  • Recently, the 4th Industrial Revolution has been emerged and various products are developed and commercialized in preparation of the communication failure. Many solutions are underway in Back-Up Network for IDC Servers, but not in the personal or sensor for low-power system use. Therefore we used the OpenWRT Firmware in Raspberry Pi which can be easily obtained in online market, and it created a low-power load balancer. Therefore, we developed the device that uses LTE Antenna based on USB Interface for communication fault notification and important data. The equipment used in this paper is easy to buy in online shop for anyone. Also, it can be applied in other vendors' boards by using USB. We hope that this paper will contribute to the stability of individual sensor networks.

A Message Authentication and Key Distribution Mechanism Secure Against CAN bus Attack (CAN 버스 공격에 안전한 메시지 인증 및 키 분배 메커니즘)

  • Cho, A-Ram;Jo, Hyo Jin;Woo, Samuel;Son, Young Dong;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1057-1068
    • /
    • 2012
  • According to advance on vehicle technology, many kinds of ECU(Electronic Control Unit) are equipped inside the vehicle. In-vehicle communication among ECUs is performed through CAN(Controller Area Networks). CAN have high reliability. However, it has many vulnerabilities because there is not any security mechanism for CAN. Recently, many papers proposed attacks of in-vehicle communication by using these vulnerabilities. In this paper, we propose an wireless attack model using a mobile radio communication network. We propose a secure authentication mechanism for in-vehicle network communication that assure confidentiality and integrity of data packets and also protect in-vehicle communication from the replay attack.

Performance of OFDM-QPSK System in Impulsive Noise Environment Based on Measurement Data (측정 데이터 기반의 임펄스 잡음 환경에서 OFDM-QPSK 시스템의 성능)

  • Roh, Jae-sung
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.587-592
    • /
    • 2020
  • The giant information exchange enabled by the Internet of Things paradigm will likely exploit electrical lines as a ready-to-use infrastructure. The advantage of using the pre-installed infrastructure of wiring networks makes power line communication a competitive technology for broad-band communications. Therefore, there has been a growing interest towards the use of existing power line communication channels as an effective means for transmitting high speed data and Internet service. One of the main noise types affecting power line communication systems is the impulsive noise, and the focus of this work is on the impact of this impulsive noise on the performance of OFDM-QPSK systems. For the performance analysis of impulsive noise, data measured in three environments were used. Through the analysis, it is shown that OFDM-QPSK system outperforms QPSK system for most of the impulsive noise cases. Also, RS-coded OFDM-QPSK system can achieve good BER performance under 3 cases impulsive noise environment.

Examining the Use of Geotags on Instagram: Motivation, Satisfaction, and Location-based Information Sharing in Hong Kong

  • Chan, Hiu Feng;Cho, Hee Jung;Lee, Hye Eun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.64-77
    • /
    • 2022
  • The advent of location-based social networks (LBSNs), and the pervasive use of smartphones have allowed individuals to easily inform their status through locational information. This led to a new trend in social media: to upload geotagged photos that illustrate the location of the images and then share them with others. In this circumstance, the current study aims to examine the use of geotags on Instagram. Further, the motivations for using geotags as well as the relationship among the motivation, satisfaction, and location information sharing behavior are analyzed. The online survey was conducted on 411 respondents of Hong Kong who are active Instagram users. Based on uses and gratification theory and goal theory, the users' motivations and goals for utilizing geotags were divided into mainly two categories; task-involved and self-involved goals. Then, four different motivations (contribution, memory aid, showing off, and reputation gaining) were further examined. The result indicated that contribution, memory aid, and reputation gaining were the goals and motivation for the users to utilize geotags on Instagram, having a positive impact on satisfaction. However, a positive relationship between showing off and geotag satisfaction was not supported. Among four different factors, memory aid was found to have the strongest influence on geotagging satisfaction. The result of testing the relationship between geotag satisfaction and further location information sharing behavior also turned out to have a positive relationship. The implications and limitations of findings are also discussed in the study.