• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.029 seconds

Capacity Analysis of VoIP over LTE Network (LTE 무선 네트워크에서 Voice over IP 용량 분석)

  • Ban, Tae Won;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2405-2410
    • /
    • 2012
  • The 4th generation mobile communication system, LTE, does not support an additional core network to provide voice service, and it is merged into a packet network based on all IP. Although Voice service over LTE can be supported by VoIP, it will be provided by the existing 3G networks because of the discontinuity of LTE coverage. However, it is inevitable to adopt VoIP over LTE to provide high quality voice service. In this paper, we investigate the capacity of VoIP over LTE. Our results indicate that spectral efficiency can be significantly improved as channel bandwidth increases in terms of VoLTE capacity. In addition, we can achieve higher VoLTE capacity without decreasing control channel capacity.

Supporting Trusted Soft Decision Scheme Using Volatility Decay in Cooperative Spectrum Sensing

  • Zhao, Feng;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2067-2080
    • /
    • 2016
  • Cooperative spectrum sensing (CSS) for vacant licensed bands is one of the key techniques in cognitive radio networks. Currently, sequential probability ratio test scheme (SPRT) is considered as a powerful soft decision approach to improve the sensing result for CSS. However, SPRT assumes all secondary users (SU) are honest, and thus offering opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack). To combat such misbehaved behaviors, recent efforts have been made to trust mechanism. In this paper, we argue that powering SPRT with traditional trust mechanism is not enough. Dynamic SSDF attackers can maintain high trust in an alternant process of submitting honest or false sensing data, resulting in difficultly detecting them. Noting that the trust value of dymamic SSDF attackers behave highly volatile, a novel trusted SPRT scheme (VSPRT) based on volatility decay analysis is proposed in this paper to mitigate the harmful effect of dynamic SSDF attackers in the process of the soft-decision data fusion, and thus improving the accuracy of the final sensing result. Simulation results show that the VSPRT scheme outperforms the conventional SPRT schemes.

Radio environment maps: The survey of construction methods

  • Pesko, Marko;Javornik, Tomaz;Kosir, Andrej;Stular, Mitja;Mohorcic, Mihael
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3789-3809
    • /
    • 2014
  • Radio environment maps (REMs) and geolocation database represent an important source of information for the operation of cognitive radio networks, replacing or complementing spectrum sensing information. This paper provides a survey of methods for constructing the radio frequency layer of radio environment map (RF-REM) using distributed measurements of the signal levels at a given frequency in space and time. The signal level measurements can be obtained from fixed or mobile devices capable of sensing radio environment and sending this information to the REM. The signal measurements are complemented with information already stored in different REM content layers. The combined information is applied for estimation of the RF-REM layer. The RF-REM construction methods are compared, and their advantages and disadvantages with respect to the spatial distribution of signal measurements and computational complexity is given. This survey also indicates possible directions of further research in indirect RF-REM construction methods. It emphasizes that accurate RF-REM construction methods should in the best case support operation with random and clustered signal measurements, their operation should not be affected by measurements outliers, and it must estimate signal levels comparably on all RF-REM locations with moderate computational effort.

Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming

  • Dubin, Ran;Hadar, Ofer;Dvir, Amit;Pele, Ofir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3804-3819
    • /
    • 2018
  • The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties in shaping their encrypted video traffic via DPI. This highlights the need for new traffic classification methods for encrypted HTTP adaptive video streaming to enable smart traffic shaping. These new methods will have to effectively estimate the quality representation layer and playout buffer. We present a new machine learning method and show for the first time that video quality representation classification for (YouTube) encrypted HTTP adaptive streaming is possible. The crawler codes and the datasets are provided in [43,44,51]. An extensive empirical evaluation shows that our method is able to independently classify every video segment into one of the quality representation layers with 97% accuracy if the browser is Safari with a Flash Player and 77% accuracy if the browser is Chrome, Explorer, Firefox or Safari with an HTML5 player.

Relaying Protocols and Delay Analysis for Buffer-aided Wireless Powered Cooperative Communication Networks

  • Zhan, Jun;Tang, Xiaohu;Chen, Qingchun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3542-3566
    • /
    • 2018
  • In this paper, we investigate a buffer-aided wireless powered cooperative communication network (WPCCN), in which the source and relay harvest the energy from a dedicated power beacon via wireless energy transfer, then the source transmits the data to the destination through the relay. Both the source and relay are equipped with an energy buffer to store the harvested energy in the energy transfer stage. In addition, the relay is equipped with a data buffer and can temporarily store the received information. Considering the buffer-aided WPCCN, we propose two buffer-aided relaying protocols, which named as the buffer-aided harvest-then-transmit (HtT) protocol and the buffer-aided joint mode selection and power allocation (JMSPA) protocol, respectively. For the buffer-aided HtT protocol, the time-averaged achievable rate is obtained in closed form. For the buffer-aided JMSPA protocol, the optimal adaptive mode selection scheme and power allocation scheme, which jointly maximize the time-averaged throughput of system, are obtained by employing the Lyapunov optimization theory. Furthermore, we drive the theoretical bounds on the time-averaged achievable rate and time-averaged delay, then present the throughput-delay tradeoff achieved by the joint JMSPA protocol. Simulation results validate the throughput performance gain of the proposed buffer-aided relaying protocols and verify the theoretical analysis.

A Cluster-based Routing Protocol with Energy Consumption Balance in Distributed Wireless Sensor Networks (분산 무선센서 네트워크의 클러스터-기반 에너지 소비 균형 라우팅 프로토콜)

  • Kim, Tae-Hyo;Ju, Yeon-Jeong;Oh, Ho-Suck;Kim, Min-Kyu;Jung, Yong-Bae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.4
    • /
    • pp.155-161
    • /
    • 2014
  • In this paper, a cluster-based routing protocol in distributed sensor network is proposed, which enable the balanced energy consumption in the sensor nodes densely deployed in the sensor fields. This routing protocol is implemented based on clusters with hierarchical scheme. The clusters are formed by the closely located sensor nodes. A cluster node with maximum residual energy in the cluster, can be selected as cluster head node. In routing, one of the nodes in the intersection area between two clusters is selected as a relay-node and this method can extend the lifetime of all the sensor nodes in view of the balanced consumption of communication energy.

SPMC-MAC : Slim Preamble Multi-Channel MAC Protocol with Transmission Power Control in Wireless Sensor Networks (무선 센서 네트워크에서 다중 채널과 전송세기 제어를 이용한 맥 프로토콜)

  • Yoon, Jang-Muk;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.876-884
    • /
    • 2008
  • In this paper, we propose an asynchronous MAC protocol to minimize energy usage and to maximize data throughput for a wireless sensor network in multi channel environments. Our proposed SPMC-MAC (Slim Preamble Multi-Channel Media Access Control) adopts the preamble sliming mechanism proposed in [6] that takes advantage of the knowledge about the wakeup time of the receiver node. The preamble contains the receiver's ID and a randomly selected channel ID for data communication, and it is transmitted over a dedicated common channel. The power control has the benefit of keeping an appropriate number of nodes with the communication range, resulting in reduced collision and interference. We compare our SPMC-MAC and X-MAC extensively in terms of energy consumption and throughput using mathematical analysis and simulation.

Intrabed Networks in a Patient Monitoring System (환자 모니터링 시스템에서의 통신 방식(I) : 인트라베드 통신망)

  • 우응제;박승훈;김경수;최근호;김승태;이희철;서재준;김형진
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.4
    • /
    • pp.373-380
    • /
    • 1997
  • In this paper, we describe the intrabed network in a patient monitoring system we developed The intrabed network handles data communication between the main unit of a bedside patient monitor and parameter modules plugged in it. We designed the intrabed network based on RS-485 and HDLC protocol with 1 Mbps data rate. Message exchanges are implemented based on three data structures of packet frame. and stream. We present the specification and the performance of the data communication network for the developed patient monitor.

  • PDF

Improvement of Peer Search Time and Control Messages with Rendezvous Peer in P2P Virtual Network

  • Jeong, Wang-Boo;Sohn, Young-Ho;Suh, Hyun-Gon;Kim, Ki-Hyung
    • International Journal of Contents
    • /
    • v.5 no.1
    • /
    • pp.21-26
    • /
    • 2009
  • Peer to Peer (P2P) utilizes the resources of an offered service without the need for a central server or preexistent server-client, making it a desirable network environment for data exchange based on direct connection between peers. Proposed by Sun Microsystems. JXTA(Juxtapose) is a typical P2P system and distributed computing model that does not require central service resources and is flexible to deal with various network configuration changes. Meanwhile. Mobile Ad-hoc NETwork(MANET) is a typical wireless network configured with mobile nodes and without an infrastructure. where a network is established by direct connection or through other peers in the propagation area. Thus, MANET maintains the latest path information by establishing paths and changing path information for communication between peers in a highly mobile wireless network. Accordingly. this article proposes the JXTAMANET method for wireless networks to enable JXTA to be applied to MANET. NS2 is used to evaluate the performance and the proposed architecture is shown to produce better results than a conventional flooding method.

Research Publishing by Library and Information Science Scholars in Pakistan: A Bibliometric Analysis

  • Ali, Muhammad Yousuf;Richardson, Joanna
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.1
    • /
    • pp.6-20
    • /
    • 2016
  • Scholarly communication plays a significant role in the development and dissemination of research outputs in library and information science (LIS). This study presents findings from a survey which examines the key attributes that characterize the publishing by Pakistani LIS scholars, i.e. academics and professionals, in national journals. A pilot-tested, electronic questionnaire was used to collect the data from the target population. 104 respondents (or 69.3% of target) provided feedback on areas such as number of articles published, number of citations, and the nature of any collaboration with other authors. The findings of this survey revealed that, among the various designated regions of Pakistan, the Punjab region was the most highly represented. In articles published in national journals, there was a clear preference among all respondents to collaborate with at least one other author. The citation metrics for LIS articles in national journals were relatively low (30.22%), which aligns with Scimago’s Journal and Country Rankings. The uptake of social scholarly networks mirrors international trends. Respondents were asked to score factors which could impact negatively on their ability to undertake research and/or publish the results. The study recommends that concerned stakeholders work together, as appropriate, to address concerns. In addition, it recommends that further research be undertaken to define patterns of Pakistani co-authorship in the social sciences.