• Title/Summary/Keyword: user relay

Search Result 205, Processing Time 0.023 seconds

Distributed Matching Algorithms for Spectrum Access: A Comparative Study and Further Enhancements

  • Ali, Bakhtiar;Zamir, Nida;Ng, Soon Xin;Butt, Muhammad Fasih Uddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1594-1617
    • /
    • 2018
  • In this paper, we consider a spectrum access scenario which consists of two groups of users, namely Primary Users (PUs) and Secondary Users (SUs) in Cooperative Cognitive Radio Networks (CCRNs). SUs cooperatively relay PUs messages based on Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative techniques, in exchange for accessing some of the spectrum for their secondary communications. From the literatures, we found that the Conventional Distributed Algorithm (CDA) and Pragmatic Distributed Algorithm (PDA) aim to maximize the PU sum-rate resulting in a lower sum-rate for the SU. In this contribution, we have investigated a suit of distributed matching algorithms. More specifically, we investigated SU-based CDA (CDA-SU) and SU-based PDA (PDA-SU) that maximize the SU sum-rate. We have also proposed the All User-based PDA (PDA-ALL), for maximizing the sum-rates of both PU and SU groups. A comparative study of CDA, PDA, CDA-SU, PDA-SU and PDA-ALL is conducted, and the strength of each scheme is highlighted. Different schemes may be suitable for different applications. All schemes are investigated under the idealistic scenario involving perfect coding and perfect modulation, as well as under practical scenario involving actual coding and actual modulation. Explicitly, our practical scenario considers the adaptive coded modulation based DF schemes for transmission flexibility and efficiency. More specifically, we have considered the Self-Concatenated Convolutional Code (SECCC), which exhibits low complexity, since it invokes only a single encoder and a single decoder. Furthermore, puncturing has been employed for enhancing the bandwidth efficiency of SECCC. As another enhancement, physical layer security has been applied to our system by introducing a unique Advanced Encryption Standard (AES) based puncturing to our SECCC scheme.

Implementation and Performance Evaluation of Reporting Interval-adaptive Sensor Control Scheme for Energy Efficient Data Gathering (에너지 효율적 센서 데이터 수집을 위한 리포팅 허용 지연시간 적응형 센서 제어 기법 구현 및 성능평가)

  • Shon, Tae-Shik;Choi, Hyo-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.459-464
    • /
    • 2010
  • Due to the application-specific nature of wireless sensor networks, the sensitivity to such a requirement as data reporting latency may vary depending on the type of applications, thus requiring application-specific algorithm and protocol design paradigms which help us to maximize energy conservation and thus the network lifetime. In this paper, we implement and evaluate a novel delay-adaptive sensor scheduling scheme for energy-saving data gathering which is based on a two phase clustering (TPC), in wireless sensor networks. The TPC is implemented on sensor Mote hardwares. With the help of TPC implemented, sensors selectively use direct links for control and forwarding time critical sensed data and relay links for data forwarding based on the user delay constraints given. Implementation study shows that TPC helps the sensors to increase a significant amount of energy while collecting sensed data from sensors in a real environment.

Reliable Transmission Using Intermediate Relay Node-based Transmission for Reliability in Sensor Network (센서 네트워크의 고 신뢰성을 위한 중계 노드 기반 전송)

  • Lee Bo-Hyung;Yoon Hyung-Wook;Park Jongho;Chung Min Young;Lee Tea-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.850-857
    • /
    • 2005
  • Sensor networks consist of sensor nodes with small size, low cost, lowpower consumption, and multi-functions to sense, to process and to communicate. The main issue in sensor networks has been focused on minimizing power consumption of sensors to maximize network life time. In some critical applications, however, the most important issue is to transmitsensing information to the end user (the sink node) with reliability. Reliable information forwarding using multiple paths in sensor networks (ReinForM) has been proposed to achieve desired reliability in the error-prone channel, but it needs increasing transmission riverhead as the channel error rate becomes high and the number of hops between the source node and the sink node increases. In this paper, we propose a reliable transmission rnechanissmusing intermediate source nodes in sensor networks (ReTrust) to reduce packet overhead while keeping the desired reliability. ReTrust has beenshown to provide desired reliability and reduced overhead via simulationsand analysis.

Seamless Intra MR-BS Handover Based on IEEE802.16j (IEEE802.16j MR-BS내에서 끊김없는 핸드오버 기술)

  • Lee, Il-Shin;Yoo, Jae-Ho;Lee, Yoon-Ju;Kwon, Dong-Seung;Chung, Jae-Hak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5A
    • /
    • pp.381-390
    • /
    • 2009
  • In this paper, we propose a seamless intra MR-BS handover scheme based on IEEE802.16j transparent. The proposed scheme estimates the outage probability of mobile stations at a base station, finds the optimum relay user, and provides low handover latency for seamless data transmission. The simulation results show that the proposed scheme outperforms the conventional handover schemes in terms of the handover latency by 65% of conventional scheme. Moreover, the proposed scheme exhibits lower packet error rate compared with the conventional handover scheme when a mobile station moves to outside of the cell coverage and reduce both outage probability and the number of handover about 50% from setting forgetting factor and redundant threshold.

Design and Implementation of an Automatic Switching Technology Between Ad-Hoc and Infrastructure Modes in Wireless LANs (무선 LAN에서 Ad-Hoc과 Infrastructure 모드의 자동전환 기술 설계 및 구현)

  • Shin Taek-Su;Jo Sung-Min;Min Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9A
    • /
    • pp.892-899
    • /
    • 2006
  • In this paper, we propose an automatic switching technology between the ad-hoc and the infrastructure modes without user intervention in the IEEE 802.11b wireless LAN. Also, we design our proposed technology and implemented on the Linux machine. For this operation, the area within an Access Point (AP) coverage is defined as a switching area, and a node without any transmission in this area is assumed to be able to relay frames between the AP and nodes in the shaded area that is outside the coverage and cannot reach the AP. By using the proposed technology, it is possible to provide the seamless Internet access service to nodes at the ad-hoc mode in the shaded area. In this paper, we explains the operation of the detection method of the switching area, presents the flowchart and implementation environment. To prove the operation of our technology, we obtain the results of captured packets transmitted between nodes and throughput results through ftp transmission experiment. Hence, we can see that our proposed scheme can be improve the wireless access service in wireless and mobile networks.

DESIGN OF CAMERA CONTROLLER FOR HIGH RESOLUTION SPACE-BORN CAMERA SYSTEM

  • Heo, Haeng-Pal;Kong, Jong-Pil;Kim, Young-Sun;Park, Jong-Euk;Yong, Sang-Soon
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.130-133
    • /
    • 2007
  • In order to get high quality and high resolution image data from the space-borne camera system, the image chain from the sensor to the user in the ground-station need to be designed and controlled with extreme care. The behavior of the camera system needs to be controlled by ground commands to support on-orbit calibration and to adjust imaging parameters and to perform early stage on-orbit image correction, like gain and offset control, non-uniformity correction, etc. The operation status including the temperature of the sensor needs to be transferred to the ground-station. The preparation time of the camera system for imaging with specific parameters should be minimized. The camera controller needs to synchronize the operation of cameras for every channel and for every spectral band. Detail timing information of the image data needs to be provided for image data correction at ground-station. In this paper, the design of the camera controller for the AEISS on KOMPSAT-3 will be introduced. It will be described how the image chain is controlled and which imaging parameters are to be adjusted The camera controller will have software for the flexible operation of the camera by the ground-station operators and it can be reconfigured by ground commands. A simple concept of the camera operations and the design of the camera controller, not only with hardware but also with controller software are to be introduced in this paper.

  • PDF

Advertisement Coverage Analysis of Social Commerce Service with D2D Communications (D2D 통신을 이용한 소셜커머스 광고 커버리지 분석)

  • Kim, Jun-Seon;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1547-1556
    • /
    • 2014
  • In this paper, we propose cost-effective device-to-device (D2D) advertisement scenario with properties of proximity and timeliness through the convergence of D2D communications and social commerce service. We numerically analyze advertisement dissemination effect of the proposed scenario according to the number of sectors, and demonstrate the performance of the normalized D2D coverage, the average number of D2D users, and the average D2D coverage per user via intensive simulations. We verify the accuracy of the results for our numerical analysis compared with the simulation results.

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

MPICH-GP : An MPI Extension to Supporting Private IP Clusters in Grid Environments (MPICH-GP : 그리드 상에서 사설 IP 클러스터 지원을 위한 MPI 확장)

  • Park, Kum-Rye;Yun, Hyun-Jun;Park, Sung-Yong;Kwon, Oh-Young;Kwon, Oh-Kyoung
    • The KIPS Transactions:PartA
    • /
    • v.14A no.1 s.105
    • /
    • pp.1-14
    • /
    • 2007
  • MPICH-G2 is an MPI implementation to solve complex computational problems by utilizing geographically dispersed computing resources in grid environments. However, the computation nodes in MPICH-G2 are exposed to the external network due to the lack of supporting the private IP clusters, which raises the possibility of malicious security attacks. In order to address this problem, we propose MPICH-GP with a new relay scheme combining NAT(Network Address Translation) service and an user-level proxy. The proxy running on the front-end system of private IP clusters forwards the incoming connection requests to the systems inside the clusters. The outgoing connection requests out of the cluster are forwarded through the NAT service on the front-end system. Through the connection path between the pair of processes, the requested MPI jobs can be successfully executed in grid environments with various clusters including private IP clusters. By simulations, we show that the performance of MPICH-GP reaches over 80% of the performance of MPICH-G2, and over 95% in ease of using RANK management method.

Management of Base Stations having Cell Zooming Capability for Green Cellular Networks (그린 셀룰러 네트워크를 위한 Cell Zooming 가능을 가진 기지국들의 관리)

  • Jun, Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.904-909
    • /
    • 2011
  • Cell zooming adjusts the cell range of base stations depending on traffic condition. The cell zooming can be implemented by the adjustment of antenna angles, the clustering of the base stations, and the cell relay. The base stations can adjust the cell range in term of energy efficiency, which can then reduce the overall energy consumption of cellular networks. There is, however, a trade-off between the energy savings and the blocking probability of user calls. A periodic scheme that manages the cell zooming of the base stations was proposed but it was inadequate for dealing with the dynamic nature of traffic patterns. This paper proposes a semi-periodic cell zooming scheme along with the algorithms that select such base stations and define the operation procedure. Simulation results show that the proposed method outperforms the existing scheme in terms of the energy savings without the degradation of the blocking probability.