• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.036 seconds

Design of CIC Interpolators with Improved Passband and Transition Region for Underwater Acousitc Communication (통과대역 및 전이영역 특성이 개선된 수중음파통신용 CIC 인터폴레이터 설계)

  • Kim, Sunhee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.660-665
    • /
    • 2018
  • Research into underwater wireless networks that enable the monitoring and controlling of the ocean environments has been continuing for disaster prevention and military proposes, as well as for the exploitation of ocean resources throughout the world. A research group led by Hoseo university has been studying a distributed underwater monitoring and controlling network. In this study, we developed an interpolator for acoustic communication between an underwater base station controller and underwater base station, which is included in this network. The underwater acoustic communication provided by this network defines four links whose sampling rates are different. Low power consumption is one of the most important requirements. Therefore, we adopted CIC interpolators, which are known to act as filters with a low power consumption, and some CIC interpolators with an appropriate changing rate were selected depending on the link. However, these interpolators have a large passband drop and wide transition region. To solve these problems, we added a compensator and half-band filter. After verifying the algorithm by using Matlab, we designed and verified it with Verilog-HDL in a ModelSim environment.

A Study of the Disaster Safety Management Systems on the Satellite Communication Networks for Solar Maximum (태양극대기 대비 위성통신망에 관한 재난안전관리시스템에 관한 연구)

  • Oh, Jongwoo
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.78-85
    • /
    • 2012
  • This paper takes precautions proposals against prospective disasters from the space weather maximum in 2013. The space weather maximum could wreak havoc in this world. A geomagnetic space storm sparked by a solar eruption like the one that flared toward earth is bound to strike again and could wreak havoc across the modern world. Despite of the fact that not only researches by colleges and institutions current researches have been focusing on warning systems of space communication and the earth network systems, but also management and control systems are not situated for the space weather blasters. The purpose of the study is that the damage reduces methods implementation on the ultimate space weather communication systems by above lists proposed type analysis. In result, the implementation of the communication disaster management systems deals with the smart IT converged GIS analysis on the flare, solar proton event, geomagnetic storm to the effects of the geomagneticsphere, ionosphere and troposphere from solar maximum. This research can provide affective methods for the saving lives and property protections that implementation of the disaster prediction and disaster prevention systems adapts smart IT systems and converged high tech information systems using decision making support systems of the GIS methodology.

Transmitter Beamforming and Artificial Noise with Delayed Feedback: Secrecy Rate and Power Allocation

  • Yang, Yunchuan;Wang, Wenbo;Zhao, Hui;Zhao, Long
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.374-384
    • /
    • 2012
  • Utilizing artificial noise (AN) is a good means to guarantee security against eavesdropping in a multi-inputmulti-output system, where the AN is designed to lie in the null space of the legitimate receiver's channel direction information (CDI). However, imperfect CDI will lead to noise leakage at the legitimate receiver and cause significant loss in the achievable secrecy rate. In this paper, we consider a delayed feedback system, and investigate the impact of delayed CDI on security by using a transmit beamforming and AN scheme. By exploiting the Gauss-Markov fading spectrum to model the feedback delay, we derive a closed-form expression of the upper bound on the secrecy rate loss, where $N_t$ = 2. For a moderate number of antennas where $N_t$ > 2, two special cases, based on the first-order statistics of the noise leakage and large number theory, are explored to approximate the respective upper bounds. In addition, to maintain a constant signal-to-interferenceplus-noise ratio degradation, we analyze the corresponding delay constraint. Furthermore, based on the obtained closed-form expression of the lower bound on the achievable secrecy rate, we investigate an optimal power allocation strategy between the information signal and the AN. The analytical and numerical results obtained based on first-order statistics can be regarded as a good approximation of the capacity that can be achieved at the legitimate receiver with a certain number of antennas, $N_t$. In addition, for a given delay, we show that optimal power allocation is not sensitive to the number of antennas in a high signal-to-noise ratio regime. The simulation results further indicate that the achievable secrecy rate with optimal power allocation can be improved significantly as compared to that with fixed power allocation. In addition, as the delay increases, the ratio of power allocated to the AN should be decreased to reduce the secrecy rate degradation.

Congestion Control Algorithms Evaluation of TCP Linux Variants in Dumbbell (덤벨 네트워크에서 TCP 리눅스 변종의 혼잡 제어 알고리즘 평가)

  • Mateen, Ahamed;Zaman, Muhanmmad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.139-145
    • /
    • 2016
  • Dumbbell is the most basic topology that can be used in almost all kind of network experiment within it or just by little expansion. While Transmission Control Protocol TCP is the basic protocol that is used for the connectivity among networks and stations. TCP major and basic goal is to provide path and services to different applications for communication. For that reason TCP has to transfer a lot of data through a communication medium that cause serious congestion problem. To calculate the congestion problem, different kind of pre-cure solutions are developer which are Loss Based Variant and Delay Based Variant. While LBV keep track of the data that is going to be passed through TCP protocol, if the data packets start dropping that means congestion occurrence which notify as a symptom, TCP CUBIC use LBV for notifying the loss. Similarly the DBV work with the acknowledgment procedure that is used in when data ACK get late with respect to its set data rate time, TCP COMPOUND/VAGAS are examples of DBV. Many algorithms have been purposed to control the congestion in different TCP variants but the loss of data packets did not completely controlled. In this paper, the congestion control algorithms are implemented and corresponding results are analyzed in Dumbbell topology, it is typically used to analyze the TCP traffic flows. Fairness of throughput is evaluated for different TCP variants using network simulator (NS-2).

How the Three Major Korean Network Television News Report on Issues Involving their Own Interests A Content Analysis (방송은 자사의 이익과 관련된 이슈에 대해 어떻게 보도하는가? 광고총량제, 700MHz 대역 주파수 재분배, 수신료 인상 보도 내용 분석)

  • Kim, Dokyung;Yoon, Youngmin
    • Korean journal of communication and information
    • /
    • v.74
    • /
    • pp.109-135
    • /
    • 2015
  • This study investigated the news report tendency and frame by three major Korean television networks(KBS, MBC, and SBS) in their news reports on issues involving their own interests and considering in social level. The three issues chosen for this study are 'advertising regulations for total amount', 'the reallocation of 700MHz spectrum' and 'raising TV license fee'(this issue applicable only to KBS). By using content analysis method, this study identified extremely weighted tendency toward themselves by the network television channels. They have used highly biased tone and sources to reinforce their private interests in news reports about the three controversial issues. In terms of story content, the news reports have used attribution of responsibility frame dominantly in 'advertising regulations for total amount' issue, whereas the moral frame was dominant in the other two issues.

  • PDF

Ubiquitous u-Health System using RFID & ZigBee (RFID와 ZigBee를 이용한 유비쿼터스 u-Health 시스템 구현)

  • Kim Jin-Tai;Kwon Youngmi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.79-88
    • /
    • 2006
  • In this paper, we designed and implemented ubiquitous u-Health system using RFE and ZigBee. We made a wireless protocol Kit which combines RFE Tag recognition and ZigBee data communication capability. The software is designed and developed on the TinyOS. Wireless communication technologies which hold multi-protocol stacks with RFID and result in the wireless ubiquitous world could be Bluetooth, ZigBee, 802.11x WLAN and so on. The environments that the suggested u-Health system may be used is un-manned nursing, which would be utilized in dense sensor networks such as a hospital. The the size of devices with RFID and ZigBee will be so smaller and smaller as a bracelet, a wrist watch and a ring. The combined wireless RFID-ZigBee system could be applied to applications which requires some actions corresponding to the collected (or sensed) information in WBAN(Wireless Body Area Network) and/or WPAN(Wireless Person Area Network). The proposed ubiquitous u-Health system displays some text-type alert message on LCD which is attached to the system or gives voice alert message to the adequate node users. RFE will be used as various combinations with other wireless technologies for some application-specific purposes.

Fault Tolerance for IEEE 1588 Based on Network Bonding (네트워크 본딩 기술을 기반한 IEEE 1588의 고장 허용 기술 연구)

  • Altaha, Mustafa;Rhee, Jong Myung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.331-339
    • /
    • 2018
  • The IEEE 1588, commonly known as a precision time protocol (PTP), is a standard for precise clock synchronization that maintains networked measurements and control systems. The best master clock (BMC) algorithm is currently used to establish the master-slave hierarchy for PTP. The BMC allows a slave clock to automatically take over the duties of the master when the slave is disconnected due to a link failure and loses its synchronization; the slave clock depends on a timer to compensate for the failure of the master. However, the BMC algorithm does not provide a fast recovery mechanism in the case of a master failure. In this paper, we propose a technique that combines the IEEE 1588 with network bonding to provide a faster recovery mechanism in the case of a master failure. This technique is implemented by utilizing a pre-existing library PTP daemon (Ptpd) in Linux system, with a specific profile of the IEEE 1588 and it's controlled through bonding modes. Network bonding is a process of combining or joining two or more network interfaces together into a single interface. Network bonding offers performance improvements and redundancy. If one link fails, the other link will work immediately. It can be used in situations where fault tolerance, redundancy, or load balancing networks are needed. The results show combining IEEE 1588 with network bonding enables an incredible shorter recovery time than simply just relying on the IEEE 1588 recovery method alone.

Content Insertion Technology using Mobile MMT with CMAF (CMAF 기반 Mobile MMT를 활용한 콘텐츠 삽입 기술)

  • Kim, Junsik;Park, Sunghwan;Kim, Doohwan;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.25 no.4
    • /
    • pp.560-568
    • /
    • 2020
  • In recent years, as network technology develops, the usage of streaming services by users is increasing. However, the complexity of streaming services is also increasing due to various terminal environments. Even when streaming the same content, it is necessary to re-encode the content according to the type of service. In order to solve the complexity and latency of the streaming service, Moving Picture Experts Group (MPEG) has standardized the Common Media Application Format (CMAF). In addition, as content transmission using a communication network becomes possible, the Republic of Korea's Ultra High Definition (UHD) broadcasting standard has been enacted as a hybrid standard using a broadcasting network and a communication network. The hybrid service enables various services such as transmitting additional information of contents or providing user-customized contents through a communication network. The Republic of Korea's UHD transmission standard utilizes MPEG Media Transport (MMT), and Mobile MMT is an extension of MMT to provide mobile network-specific functions. This paper proposes a method of inserting CMAF contents suitable for various streaming services using signaling messages of MMT and Mobile MMT. In addition, this paper proposes a model for content insertion system in heterogeneous network environment using broadcasting and communication networks, and verifies the validity of the proposed technology by checking the result of content insertion.

Emotional Network System Based On M2P Technology Using Context Awareness (상황인식 기반의 M2P 감성통신 서비스 응용)

  • Ahn, Hyoung-joo;Kim, Ji-man;Choi, Seon-suk;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.48-51
    • /
    • 2013
  • This paper described an emotional communication service based on context awareness. Especially it provides with a natural as-like a person communication in the interactive object service between machine and person. The machine should behave as naturally like human. For these things the service object has to provide the function which analyzing and storing users' behavior and handling it. This paper contains the way how to analyze and handle users' pattern by using context awareness. Furthermore, we have studied the method which makes users feel like talking with machine by re-writing messages through 'purpose-extraction algorithm' and 'message re-writing algorithm', which allow service become M2P on networks environment. Moreover we developed 'message recommending algorithm' which recommend several messages by analyzing users' past messages. This emotional communication technology can provide more efficient and user-friendly service by providing personified service on network. Furthermore we can expect this messenger system provided from emotional communication service based on context awareness can be applied a plenty of application services.

  • PDF

Network Performance Verification for Next-Generation Power Distribution Management System Using FRTU Simulator (FRTU 시뮬레이터를 이용한 차세대 배전지능화시스템 네트워크 성능검증)

  • Yeo, Sang-Uk;Son, Sung-Yong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.523-529
    • /
    • 2020
  • Power distribution management system is essential for the efficient management and operation of power distribution networks. The power distribution system is a system that manages the distribution network based on IT, and has been evolving along with the development of the power industry. The current power distribution system is designed to operate at a relatively low network transmission speed based on the independent operation of the main equipment. However, due to distributed resources such as photovoltaic or energy storage devices, which are rapidly increasing in popularity in recent years, the operation of future distribution environments is becoming more complex, and various information needs to be collected in real time. In this study, the requirements of the next-generation power distribution system were derived to overcome the limitations of the existing power distribution system, and based on this, the communication network system and performance requirements for the distribution system were defined. In order to verify the performance of the designed system, a software-based terminal device simulator was developed because it takes excessive time and cost to introduce a large-scale system such as a power distribution system. Using the simulator, a test environment similar to the actual operation was established, and the number of terminal devices was increased up to 1,000. The proposed system was shown to satisfy the requirements to support the functions of the next-generation power distribution system, recording less than 10 % of the communication network bandwidth.