• Title/Summary/Keyword: wireless data

Search Result 5,114, Processing Time 0.028 seconds

Throughput Analysis of Wireless Transmission Platform using Multiple Wireless Chips for M2M Networks (M2M 어플리케이션 지원을 위한 무선 결합 전송 플랫폼의 전송률 분석)

  • Wang, Hanho;Woo, Choongchae
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.3
    • /
    • pp.195-199
    • /
    • 2014
  • Various M2M applications have different quality-of-service(QoS) requirements to be implemented practically. QoS requirements are normally data rate and delay constraint. However, there are limited number of wireless communication chip solutions which cannot support QoS requirements for all M2M application. Hence, aggregated usage of plural wireless communication chip solutions should be needed to implement M2M applications. In this paper, we consider the case that two wireless communication chips using random access protocol work together to transmit data of an M2M application. In such case, data rate and delay performance are mathematically analyzed. In our results, practical data rate can be improved from 2.5 to 7 times while delay constraints are satisfied if we simply use two wireless communication chips together.

Efficient Multicast Tree Construction in Wireless Mesh Networks

  • Nargesi, Amir-Abbas;Bag-Mohammadi, Mozafar
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.613-619
    • /
    • 2014
  • Multicast routing algorithms designed for wireline networks are not suitable for wireless environments since they cannot efficiently exploit the inherent characteristics of wireless networks such as the broadcast advantage. There are many routing protocols trying to use these advantages to decrease the number of required transmissions or increase the reception probability of data (e.g., opportunistic routing).Reducing the number of transmissions in a multicast tree directly decreases the bandwidth consumption and interference and increases the overall throughput of the network. In this paper, we introduce a distributed multicast routing protocol for wireless mesh networks called NCast which take into account the data delivery delay and path length when constructing the tree. Furthermore, it effectively uses wireless broadcast advantage to decrease the number of forwarding nodes dynamically when a new receiver joins the tree.Our simulation results show that NCast improves network throughput, data delivery ratio and data delivery delay in comparison with on demand multicast routing protocol. It is also comparable with multichannel multicast even though it does not use channeling technique which eliminates the interference inherently.

Applying Artificial Intelligence Based on Fuzzy Logic for Improved Cognitive Wireless Data Transmission: Models and Techniques

  • Ahmad AbdulQadir AlRababah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.13-26
    • /
    • 2023
  • Recently, the development of wireless network technologies has been advancing in several directions: increasing data transmission speed, enhancing user mobility, expanding the range of services offered, improving the utilization of the radio frequency spectrum, and enhancing the intelligence of network and subscriber equipment. In this research, a series of contradictions has emerged in the field of wireless network technologies, with the most acute being the contradiction between the growing demand for wireless communication services (on operational frequencies) and natural limitations of frequency resources, in addition to the contradiction between the expansions of the spectrum of services offered by wireless networks, increased quality requirements, and the use of traditional (outdated) management technologies. One effective method for resolving these contradictions is the application of artificial intelligence elements in wireless telecommunication systems. Thus, the development of technologies for building intelligent (cognitive) radio and cognitive wireless networks is a technological imperative of our time. The functions of artificial intelligence in prospective wireless systems and networks can be implemented in various ways. One of the modern approaches to implementing artificial intelligence functions in cognitive wireless network systems is the application of fuzzy logic and fuzzy processors. In this regard, the work focused on exploring the application of fuzzy logic in prospective cognitive wireless systems is considered relevant.

Method to Limit The Spread of Data in Wireless Content-Centric Network (무선 Content-Centric Network에서 Data 확산 제한 방법)

  • Park, Chan-Min;Kim, Byung-Seo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.1
    • /
    • pp.9-14
    • /
    • 2016
  • Since Devices such labtop, tablet, smartphone have been developed, a lots of huge data that can be classified as content is flooded in the network. According to changing Internet usage, Content-Centric Network(CCN) what is new concept of Internet Architecture is appeared. Initially, CCN is studied on wired network. but recently, CCN is also studied on wireless network. Since a characteristic of wireless environment is different from a characteristic of wired environment, There are issues in wireless CCN. In this paper, we discuss improvement method of Data spread issue on wireless CCN. The proposed scheme of this paper use MAC Address of nodes when Interest and Data Packet are forwarded. As using the proposed scheme, we reduce the spread of Data and offer priority of forwarding to nodes of shortest path, reduce delay by modifying retransmission waiting time.

Wireless Fieldbus for Networked Control Systems using LR-WPAN

  • Choi, Dong-Hyuk;Kim, Dong-Sung
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.1
    • /
    • pp.119-125
    • /
    • 2008
  • This paper examines the use of a wireless Fieldbus based on IEEE 802.15.4 MAC protocol. The superframe of IEEE 802.15.4 is applied to a transmission scheme of real-time mixed data. The transmission and bandwidth allocation scheme are proposed for real-time communication using a superframe. The proposed wireless Fieldbus protocol is able to transmit three types of data (periodic data, sporadic data, and non real-time messages), and guarantee realtime transmission simultaneously within a limited timeframe.

Energy-aware Virtual Resource Mapping Algorithm in Wireless Data Center

  • Luo, Juan;Fu, Shan;Wu, Di
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.819-837
    • /
    • 2014
  • Data centers, which implement cloud service, have been faced up with quick growth of energy consumption and low efficiency of energy. 60GHz wireless communication technology, as a new option to data centers, can provide feasible approach to alleviate the problems. Aiming at energy optimization in 60GHz wireless data centers (WDCs), we investigate virtualization technology to assign virtual resources to minimum number of servers, and turn off other servers or adjust them to the state of low power. By comprehensive analysis of wireless data centers, we model virtual network and physical network in WDCs firstly, and propose Virtual Resource Mapping Packing Algorithm (VRMPA) to solve energy management problems. According to VRMPA, we adopt packing algorithm and sort physical resource only once, which improves efficiency of virtual resource allocation. Simulation results show that, under the condition of guaranteeing network load, VPMPA algorithm can achieve better virtual request acceptance rate and higher utilization rate of energy consumption.

The Study about TCMS Wireless Depot Analytical Equipment Development and Test Results at SeoulMetro Line2 (서울2호선 TCMS 무선지상장치 개발 및 시험결과에 대한 고찰)

  • Kim, Do-Hoon;Seo, Sang-Jun;Han, Jeong-Soo;Kim, Chul-Ho
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.353-362
    • /
    • 2008
  • Operation data and fault data are recorded at the TCMS(Train Control and Monitoring System) of train are very important record for repairs and inspection of train. there are two ways to transfer the data today. one is using memory card and the other is using wireless communications. This paper is proposed about TCMS wireless depot analytical equipment that transfers data recorded in train to depot equipment via wireless method. The TCMS wireless depot equipment configuration is an AP(Access Point) and a central server PC at depot equipment. This method has the advantage of decrease of personnel expenses, collection time and convenience of staffs. This paper is verified about the utility of use, efficient establishment position of an AP at depot, the safety of data receiving, the exactitude of data and the shortening of transmission time. and this equipment is now operating at shin-jeong depot of SeoulMetro.

  • PDF

Predicting required licensed spectrum for the future considering big data growth

  • Shayea, Ibraheem;Rahman, Tharek Abd.;Azmi, Marwan Hadri;Han, Chua Tien;Arsad, Arsany
    • ETRI Journal
    • /
    • v.41 no.2
    • /
    • pp.224-234
    • /
    • 2019
  • This paper proposes a new spectrum forecasting (SF) model to estimate the spectrum demands for future mobile broadband (MBB) services. The model requires five main input metrics, that is, the current available spectrum, site number growth, mobile data traffic growth, average network utilization, and spectrum efficiency growth. Using the proposed SF model, the future MBB spectrum demand for Malaysia in 2020 is forecasted based on the input market data of four major mobile telecommunication operators represented by A-D, which account for approximately 95% of the local mobile market share. Statistical data to generate the five input metrics were obtained from prominent agencies, such as the Malaysian Communications and Multimedia Commission, OpenSignal, Analysys Mason, GSMA, and Huawei. Our forecasting results indicate that by 2020, Malaysia would require approximately 307 MHz of additional spectrum to fulfill the enormous increase in mobile broadband data demands.

The Impact of Wireless Data Technologies in New Zealand: A Study of New Zealand Small and Medium-Sized Enterprises

  • Barnes, Stuart J.
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.60-64
    • /
    • 2004
  • The rapidly improving price-performance of wireless technologies is providing an unprecedented platform for the development of wireless applications for the business. Such applications are able to take advantage of a new paradigm of mobility for data services, with the ability to sensitize to location, time and personal features. While big business has been a central feature of wireless implementation, it is now clear that small- and medium-sized enterprises (SMEs) are beginning to take advantage of the strategic benefits of wireless data communications. This study examines the state-of-the-art of wireless data services in New Zealand. It provides a survey of 127 current applications in use, as well as two short illustrative cases of application use. The paper rounds off with a summary and conclusions.

  • PDF

Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks

  • Wei, Min;Kim, Kee-Cheon
    • Journal of Communications and Networks
    • /
    • v.14 no.3
    • /
    • pp.310-318
    • /
    • 2012
  • Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.