• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.032 seconds

Design and Performance Evaluation of the QoS based Multimedia Services under Wibro Network Environment (휴대 인터넷 환경에서 QoS 기반 멀티미디어 서비스 제공 방안 및 성능 평가)

  • Yoe, Hyun;Eom, Ki-Bok;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.306-312
    • /
    • 2007
  • Present TCP/IP networks have some service quality problems. They delay various kinds of traffic, while increased traffic bottle necks, a phenomena experienced by too many internet users. Therefore, as use of the network increases, building up a stable network service is needed. Thus, network managers desperately need the best, most effective traffic control and wide-band services. Until now there has been no other way of increasing wide-band use of lines, particularly because of the expenses a limit solutions of solving continuously to increasing traffic problems. This study suggests a problem solving method under the base of 802.16e(Wibro) which will be widely used in the future.

  • PDF

Performance Analysis of Coded FSK System for Multi-hop Wireless Sensor Networks (멀티 홉 무선 센서 네트워크를 위한 부호화된 FSK 시스템의 성능 해석)

  • Oh, Kyu-Tae;Roh, Jae-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.408-414
    • /
    • 2007
  • Research advances in the areas of micro-sensor device and wireless network technology, has made it possible to develop energy efficient and low cost wireless sensor nodes. In this paper, the forward error control (FEC) scheme for lower power consumption and excellent BER(Bit Error Rate) performance during transmission propose in multi-hop wireless sensor network based on FSK modem. The FEC technique uses extra processing power related to encoding and decoding, it is need complex functions to be built into the sensor node. The probability of receiving a correct bit and codeword for relaying a frame over h nodes to the sink node is calculated as a function of channel parameter, number of hops, number of bits transmitted and the distance between the different nodes.

  • PDF

End-to-End Performance of Packet Aggregation Transmission over MANETs under Blackhole Attacks (블랙홀 공격이 있는 MANET에서 패킷취합전송의 종단간 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.1
    • /
    • pp.71-76
    • /
    • 2013
  • In this paper, end-to-end performances for some VoIP traffics are measured and analyzed over MANET(Mobile Ad-hoc Networks) with packet aggregation transmission under blackhole attacks. A VoIP simulator based on NS-2 is used for performance measure. In the simulation, MOS, call connection ratio, network delay and packet loss rate are measured for end-to-end transmission performance. With analysis of measured data, characteristics of each traffics for performance parameters of packet aggregation transmission is showed on MANET under blackhole attack, As a results of this paper, some considerations be required for packet aggregation transmission are suggested to implement VoIP services on MANET under blackhole attacks.

XMPP-based Vehicle messaging System for Collaboration and Contents Sharing (협업 및 콘텐츠 공유를 위한 XMPP기반 차량용 메시징 시스템)

  • Jung, Hun;Park, HaeWoo;KU, Jahyo
    • Journal of the Korea society of information convergence
    • /
    • v.5 no.2
    • /
    • pp.67-76
    • /
    • 2012
  • XML-based open protocol, XMPP users to pass messages to other users, which means that a decentralized communication network is the network infrastructure and enable it. In addition, XMPP servers using a professional server-to-server protocol to communicate with each other and decentralized social networks and collaboration framework provides an important possibility. In this paper, the features of XMPP messaging protocol is applicable to automotive telematics terminals XMPP-based platform design, and presence of two-way communication point for the problem, point-to-point session setup issues, security issues, compatibility issues, and to solve the scalability problem XMPP-based messaging system was implemented.

  • PDF

Cooperative Relaying Protocol using Fountain Codes under Interference Constraint Networks (간섭 제약 네트워크에서 파운틴 코드를 사용한 협동 릴레이 프로토콜 설계)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.39-45
    • /
    • 2013
  • In this paper, we propose a cooperative relaying protocol using Fountain codes for secondary network under interference constraint. In the proposed protocol, a secondary source uses Fountain codes to transmit its message to a secondary destination with help of a secondary relay. The secondary source and relay operate in the underlay model, in which they must adapt their transmit power so that the interference caused at a primary user is lower than an allowable threshold. To evaluate performance of the proposed protocol, we derive the expressions of average number of transmission times over Rayleigh fading channel. Various Monte-Carlo simulations are presented to verify the derivations.

Implementation of 3GPP RLC Testbed for Protocol Verification and Evaluation (3GPP RLC 프로토콜의 검증 및 평가 테스트베드의 구축)

  • Sung, Junghwan;Suh, Hyo-Joong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.111-118
    • /
    • 2013
  • The connection based TCP protocol provides reliable packet delivery, but it takes certain overhead compare to the connection-less UDP protocol. Thus, 3GPP devise the upper-layer RLC protocol which provides reliability based upon the UDP protocol. Consequently, each implement of a base station and/or mobile terminal require the development of the RLC protocol, and it must qualify various interoperable tests. In this paper, we implement a testbed which verifies the RLC protocol under various packet losses/inversion circumstances of networks. Finally, we propose our testbed as the RLC protocol tester for the developments.

A Handover Admission Control in Mobile Communication Networks (이동통신망에서의 핸드오버 수락 제어 방법)

  • Lee, Jong-Chan;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1067-1072
    • /
    • 2014
  • As the service continuity of mobile multimedia service is affected by packet loss and delay, the efficient handover control is essentially required. This paper proposes a handover admission control scheme to satisfy service continuity of mobile multimedia services in LTE-Advanced System. In this method, based on context information of mobile terminal and base station changes, the sequence diagrams between the function modules for controlling new sessions and ISHO sessions are proposed. Simulation is done for performance analysis with the measure of transmission delay and packet loss rate.

Cooperative Relaying with Interference Cancellation for Secondary Spectrum Access

  • Dai, Zeyang;Liu, Jian;Long, Keping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2455-2472
    • /
    • 2012
  • Although underlay spectrum sharing has been shown as a promising technique to promote the spectrum utilization in cognitive radio networks (CRNs), it may suffer bad secondary performance due to the strict power constraints imposed at secondary systems and the interference from primary systems. In this paper, we propose a two-phase based cooperative transmission protocol with the interference cancellation (IC) and best-relay selection to improve the secondary performance in underlay models under stringent power constraints while ensuring the primary quality-of-service (QoS). In the proposed protocol, IC is employed at both the secondary relays and the secondary destination, where the IC-based best-relay selection and cooperative relaying schemes are well developed to reduce the interference from primary systems. The closed-form expression of secondary outage probability is derived for the proposed protocol over Rayleigh fading channels. Simulation results show that, with a guaranteed primary outage probability, the proposed protocol can achieve not only lower secondary outage probability but also higher secondary diversity order than the traditional underlay case.

Home Monitoring Server System using Smart Interface over Wireless Networks (무선네트워크 통신을 활용한 스마트 연동 홈 모니터링 서버 시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.225-231
    • /
    • 2012
  • In this paper, we implement a wireless home monitoring system using physical computing platform with the open source type for house environment management. Sensors for temperature, optics and ultrasonic waves are used for home environment elements detection and control for the home safety. To obtain information related with home and transmit it to RIA Windows server system, XBee wireless communication system is used and the transmitted information is saved in mySQL database for history management. The possibility of prevention against fire disaster of a house situated in a dense buildings area and highly populated environments is suggested by adopting the proposed system.

A Study on Simplification of Machine Learning Model (기계학습 모델의 간략화 방법에 대한 연구)

  • Lee, Gye-Sung;Kim, In-Kook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.147-152
    • /
    • 2016
  • One of major issues in machine learning that extracts and acquires knowledge implicit in data is to find an appropriate way of representing it. Knowledge can be represented by a number of structures such as networks, trees, lists, and rules. The differences among these exist not only in their structures but also in effectiveness of the models for their problem solving capability. In this paper, we propose partition utility as a criterion function for clustering that can lead to simplification of the model and thus avoid overfitting problem. In addition, a heuristic is proposed as a way to construct balanced hierarchical models.