• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.038 seconds

Performance Analysis of Directional CSMA/CA for IEEE 802.15.3c under Saturation Environments

  • Kim, Mee-Joung;Kim, Yong-Sang;Lee, Woo-Yong
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.24-34
    • /
    • 2012
  • In this paper, the directional carrier sense multiple access/collision avoidance (CSMA/CA) protocol in the immediate acknowledgement mode for IEEE 802.15.3c is analyzed under saturation environments. For the analysis, a sensing region and an exclusive region with a directional antenna are computed probabilistically and a Markov chain model in which the features of IEEE 802.15.3c and the effects of using directional antennas are incorporated is analyzed. An algorithm to find the maximal number of concurrently transmittable frames is proposed. The system throughput and the average transmission delay are obtained in closed forms. The numerical results show the impact of directional antennas on the CSMA/CA media access control (MAC) protocol. For instance, the throughput with a small beamwidth of antenna is more than ten times larger than that for an omnidirectional antenna. The overall analysis is verified by a simulation. The obtained results will be helpful in developing an MAC protocol for enhancing the performance of mmWave wireless personal area networks.

A Study of the 3D Unmanned Remote Surveying for the Curved Semi-Shield Tunneling

  • Lee, Jin-Yi;Jun, Jong-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1791-1796
    • /
    • 2005
  • Semi-shield tunneling is one of the propulsion construction methods used to lay pipes underground between two pits named 'entrance' and 'destination', respectively. Usually a simple composition, such as 'a fiducial target at the entrance+a total station (TS)+a target on the machine', is used to confirm the planned course. However, unavoidable curved sections are present in small-sized pipe lines, which are laid after implementation of a road system, for public works such as waterworks, sewer, electrical power, and gas and communication networks. Therefore, if the planned course has a curved section, it is difficult to survey the course with the abovementioned simple composition. This difficulty could be solved by using the multiple total stations (MTS), which attaches the cross type linear LED target to oneself. The MTS are disposed to where each TS can detect the LED target at the other TS or the base point or the machine. And the accurate relative positions between each MTS and target are calculated from measured data. This research proposes the relative and absolute coordinate calculation algorithm by using three MTS to measure a curved course with 20m curvature at 30m maximum distance, and verifies the algorithm experimentally.

  • PDF

Enhancement of Hearability in Geolocation Using Mobile WiMAX Network with Interference Cancellation and Long Integration (간섭 상쇄 기법과 장기 누적 기법을 이용한 WiBro 지상파 측위 시스템의 가청성 향상)

  • Park, Ji-Won;Lim, Jeong-Min;Sung, Tae-Kyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.4
    • /
    • pp.375-383
    • /
    • 2012
  • Together with the GPS-based approach, geolocation through mobile communication networks is a key technology for location-based service. Since the Mobile WiMAX system is considered as a candidate for fourth-generation mobile systems, it is important to investigate its location capability. The geolocation of Mobile WiMAX can be realized when the preamble symbols in the down-link channel are appropriately used for a TDOA (Time-Difference-of-Arrival) approach. However, the cellular structure of Mobile WiMAX inevitably generates co-channel interference, and it is difficult for the mobile terminal to acquire distance measurements from multiple base stations. Therefore, for geolocation via multilateration using the Mobile WiMAX network, it is very important to increase hearability. This paper proposes a geolocation method for Mobile WiMAX which employs interference cancellation and preamble signal overlapping for the enhancement of hearability. A novel interference cancellation strategy for complex-valued Mobile WiMAX signals is presented which has an iterative structure. Simulation results show that the proposed geolocation method provides the user's position with an accuracy of less than 20 m through the Mobile WiMAX cellular network if there is no multi-path or NLOS (None-Line-of-Sight).

The Construction of Logical, Physical Network Separation by Virtualization (가상화를 이용한 논리적, 물리적 망분리 구축)

  • Lee, YongHui;Yoo, SeungJae
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • With the development of information and communication, public institutions and enterprises utilize the business continuity using the Internet and Intranet. In this environment, public institutions and enterprises is to be introduced the number of solutions and appliances equipment to protect the risk of leakage of inside information. However, this is also the perfect external network connection is not enough to prevent leakage of information. To overcome these separate internal and external networks are needed. In this paper, we constructed the physical and logical network separation is applied to the network using the virtualization and thus the network configuration and network technical review of the various schemes were proposed for the separation.

The Information Leisure Activity of the Aging Generation and the Analysis of Meaning (노년기 소비자의 정보화 여가활동 연구와 의미 분석)

  • Kim, Yeon-Jeong
    • Journal of Family Resource Management and Policy Review
    • /
    • v.14 no.4
    • /
    • pp.323-340
    • /
    • 2010
  • Many social and environmental changes have emerged due to the increasing size of the aging generation. This study explored the current status of the information leisure activity of the aging generation (computer use activity, internet service participation, social community participation and blogging, UCC, etc.) and the need for serious games among elderly consumers. It analyzed the current status of serious game and information leisure span as determined by experts on elderly care at the aging welfare institute. The research methods involved applying content analysis and focus group interviews. The results were as follows: The elderly are willing to enjoy the internet and economics networks. In particular, economic investment, economic news, health, meetings, and communication are the main internet search categories. The results for serious games are less interesting than those for IT participation. The components of usefulness in terms of serious games, as identified by care experts, are simplicity, a user-friendly interface, efficacy, and certainty in using the game device. Care experts recognize that serious games represent a supplementary device to traditional physical and emotional therapy.

  • PDF

A study on improving TCP performance in mobile communication systems with a high transmission error (전송오류가 큰 이동통신 환경에서 TCP 성능 개선에 관한 연구)

  • 장재신
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9B
    • /
    • pp.813-822
    • /
    • 2003
  • Conventional TCPs are designed to work efficiently on wired network where any transmission errors rarely take place. However, the probability of transmission error in a wireless network is much higher than in a wired network, due to pass loss, multipath fading, and many kinds of interference. There were many researches on preventing the degradation of TCP performance in these wireless networks with bad channel condition. One of these researches is the SNOOP protocol which is link-layer solution for achieving high throughput of TCP. However, this SNOOP protocol is apt to retransmit some TCP segments unnecessarily, which could cause some increased traffic loads in a wireless network. In this paper, we propose a new algorithm to prevent the unnecessary retransmission of TCP segments and to achieve increased performance of TCP.

Design and evaluation of an alert message dissemination algorithm using fuzzy logic for VANETs

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.4
    • /
    • pp.783-793
    • /
    • 2010
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or propagate useful traffic information to other vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collisions at the link layer due to an excessive number of broadcast packets. We present a fuzzy alert message dissemination algorithm to improve performance for road safety alert application in Vehicular Ad-hoc Network (VANET). In the proposed algorithm, when a vehicle receives an alert message for the first time, the vehicle rebroadcasts the alert message according to the fuzzy control rules for rebroadcast degree, where the rebroadcast degree depends on the current traffic density of the road and the distance between source vehicle and destination vehicle. Also, the proposed algorithm is the hybrid algorithm that uses broadcast protocol together with token protocol according to traffic density. The performance of the proposed algorithm is evaluated through simulation and compared with that of other alert message dissemination algorithms.

The Design of mBodyCloud System for Sensor Information Monitoring in the Mobile Cloud Environment

  • Park, Sungbin;Moon, Seok-Jae;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • v.5 no.1
    • /
    • pp.1-7
    • /
    • 2016
  • Recently, introduced a cloud computing technology to the IT industry, smart phones, it has become possible connection between mobility terminal such as a tablet PC. For dissemination and popularization of movable wireless terminal, the same operation have focused on a viable mobile cloud in various terminal. Also, it evolved Wireless Sensor Network(WSN) technology, utilizing a Body Sensor Network(BSN), which research is underway to build large Ubiquitous Sensor Network(USN). BSN is based on large-scale sensor networks, it integrates the state information of the patient's body, it has been the need to build a managed system. Also, by transferring the acquired sensor information to HIS(Hospital Information System), there is a need to frequently monitor the condition of the patient. Therefore, In this paper, possible sensor information exchange between terminals in a mobile cloud environment, by integrating the data obtained by the body sensor HIS and interoperable data DBaaS (DataBase as a Service) it will provide a base of mBodyCloud System. Therefore, to provide an integrated protocol to include the sensor data to a standard HL7(Health Level7) medical information data.

An LBX Interleaving Watermarking Method with Robustness against Image Removing Attack (영상제거 공격에 강인한 LBX 인터리빙 워터마킹 방법)

  • 고성식;김정화
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.6
    • /
    • pp.1-7
    • /
    • 2004
  • The rapid growth of digital media and communication networks has created an urgent need for self-contained data identification methods to create adequate intellectual property right(IPR) protection technology. In this paper we propose a new watermarking method that could embed the gray-scale watermark logo in low frequency coefficients of discrete wavelet transform(DWT) domain as the marking space by using our Linear Bit-eXpansion(LBX) interleaving of gray-scale watermark, to use lots of watermark information without distortion of watermarked image quality and particularly to be robust against attack which could remove a part of image. Experimental results demonstrated the high robustness in particular against attacks such as image cropping and rotation which could remove a part of image.

Certificate Management System of MANET for Stable Ubiquitous Service (안전한 유비쿼터스 서비스를 위한 MANET의 인증서 관리 시스템에 관한 연구)

  • Oh Suk-Sim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1558-1564
    • /
    • 2006
  • This study addressed security requirements for ad-hoc network environments, which lies at the hour of the ubiquitous computing revolution and proposed a partially-distributed certificate management system that can ensure security in mobile ad-hoc networks. The proposed model is characterized by ie ability to handle dynamic mobility of nodes, minimize routing load and enhance expandability of network by allowing participating nodes to authenticate each other without being interrupted by joining the cluster. The security, efficiency and robustness of the proposed model were evaluated through simulation.