• Title/Summary/Keyword: wireless data broadcasting

Search Result 291, Processing Time 0.03 seconds

Throughput-efficient Online Relay Selection for Dual-hop Cooperative Networks

  • Lin, Yuan;Li, Bowen;Yin, Hao;He, Yuanzhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2095-2110
    • /
    • 2015
  • This paper presents a design for a throughput-efficient online relay selection scheme for dual-hop multi-relay cooperative networks. Problems arise with these networks due to unpredictability of the relaying link quality and high time-consumption to probe the dual-hop link. In this paper, we firstly propose a novel probing and relaying protocol, which greatly reduces the overhead of the dual-hop link estimation by leveraging the wireless broadcasting nature of the network. We then formulate an opportunistic relay selection process for the online decision-making, which uses a tradeoff between obtaining more link information to establish better cooperative relaying and minimizing the time cost for dual-hop link estimation to achieve higher throughput. Dynamic programming is used to construct the throughput-optimal control policy for a typically heterogeneous Rayleigh fading environment, and determines which relay to probe and when to transmit the data. Additionally, we extend the main results to mixed Rayleigh/Rician link scenarios, i.e., where one side of the relaying link experiences Rayleigh fading while the other has Rician distribution. Numerical results validate the effectiveness and superiority of our proposed relaying scheme, e.g., it achieves at least 107% throughput gain compared with the state of the art solution.

Delay Analysis of Carrier Sense Multiple Access with Collision Resolution

  • Choi, Hyun-Ho;Lee, In-Ho;Lee, Howon
    • Journal of Communications and Networks
    • /
    • v.17 no.3
    • /
    • pp.275-285
    • /
    • 2015
  • To improve the efficiency of carrier sense multiple access (CSMA)-based medium access control (MAC) protocols, CSMA with collision resolution (CSMA/CR) has been proposed. In the CSMA/CR, a transmitting station can detect a collision by employing additional sensing after the start of a data transmission and then resolve the next collision that might occur by broadcasting a jam signal during a collision detection (CD) period. In this paper, we analyze the delay of a CSMA/CR based on a generic p- persistent CSMA model and obtain the minimum achievable delay of the CSMA/CR by finding the optimal length of the CD period according to the number of contending stations. Through this delay analysis, we also investigate the throughput-delay characteristics of the CSMA/CR protocol according to various parameters. Analysis and simulation results show that the CSMA/CR has a considerably lower delay and its throughput-delay characteristic is significantly improved than the conventional CSMA/CA and wireless CSMA/CD protocols.

Energy-Efficient Index Scheme in Mobile P2P Environments (모바일 P2P 환경에서의 에너지 효율을 고려한 인덱스 기법)

  • Park, Kwang-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.1-6
    • /
    • 2009
  • In this paper, we propose an energy efficient index scheme for Nearest Neighbor queries, specially designed for mobile P2P environments. we propose a PMBR (P2P Minimum Boundary Rectangle) index that provides the client with the ability of selective contacting and tuning from other nodes. The mobile client is able to identify whether or not the neighbor nodes have the desired information by accessing PMBR. Thus, the client immediately switches to change to another node's broadcast channel if the index does not contain the desired information. Furthermore, the client is able to predict the arrival time of the desired data items and only needs to tune into the broadcast channel when the requested data items arrives, by first accessing PMBR. Thus, the mobile client can stay in power save mode most of time, and tune into the broadcast channel only when the requested data items arrive. Experiments are conducted to evaluate the performance of the proposed scheme. Comprehensive experiments illustrate that the proposed scheme is more efficient than the previous techniques in terms of energy consumption.

  • PDF

Modeling & Performance Analysis of the MAC Protocol for VDL in the Aeronautical Mobile Communication System (항공이동통신 시스템에서 VDL을 위한 MAC 프로토콜 모델링 및 성능 분석)

  • Kim, Yong-Joong;Park, Hyo-Dal
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.327-336
    • /
    • 2009
  • This paper analysis the STDMA protocol in aviation wireless data communications and carry out the performance analysis with simulation. The STDMA protocol that is currently being used in VDL Mode-4 has TDMA system characteristics, which provides time-division into several slots per one frame. The results of modeled STDMA protocol's data channel analysis show approximate 0.7 channel throughput at the transmission probabilities 0.045, 0.2, and 0.3 in the aspects of channel throughput. The delay time are 2.32434sec, 2.0293sec, and 2.12128sec respectively. These results shows the good stability in spite of variable transmission probabilities. Consequently, it is expected that STDMA protocol would be used properly for domestic communication demands and supervision system improvement by means of applying this to point-to-point communication and data/location broadcasting as a fundamental technology in CNS/ATM.

  • PDF

Anomaly Detection Mechanism against DDoS on BcN (BcN 상에서의 DDoS에 대한 Anomaly Detection 연구)

  • Song, Byung-Hak;Lee, Seung-Yeon;Hong, Choong-Seon;Huh, Eui-Nam;Sohn, Seong-Won
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.55-65
    • /
    • 2007
  • BcN is a high-quality broadband network for multimedia services integrating telecommunication, broadcasting, and Internet seamlessly at anywhere, anytime, and using any device. BcN is Particularly vulnerable to intrusion because it merges various traditional networks, wired, wireless and data networks. Because of this, one of the most important aspects in BcN is security in terms of reliability. So, in this paper, we suggest the sharing mechanism of security data among various service networks on the BcN. This distributed, hierarchical architecture enables BcN to be robust of attacks and failures, controls data traffic going in and out the backbone core through IP edge routers integrated with IDRS. Our proposed anomaly detection scheme on IDRS for BcN service also improves detection rate compared to the previous conventional approaches.

  • PDF

A Synchronous Digital Duplexing Technique for Wireless Transmission in Indoor Environments (옥내 환경에서 무선 전송을 위한 동기식 디지털 이중화 방식)

  • Park, Chang-Hwan;Ko, Yo-Han;Park, Kyung-Won;Jeon, Won-Gi;Paik, Jong-Ho;Lee, Seok-Pil;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12C
    • /
    • pp.971-982
    • /
    • 2008
  • In this paper, we propose a new digital duplexing scheme, called SDD(Synchronous Digital Duplexing), which can increase data efficiency and flexibility of resource by transmitting uplink signal and downlink signal simultaneously. In order to transmit uplink data and downlink data simultaneously, the proposed SDD obtains mutual informations between AP(access point) and each SSs(subscriber station), SS and other SSs by mutual ranging procedure. These informations are used for selection of transmission time, decision of CS insertion, setting of CS length, and FFT duration resetting, etc. It is shown that the proposed SDD is appropriate for duplexing scheme in indoor environments over the conventional TDD(Time Division Duplexing) and FDD(Frequency Division Duplexing).

Comparison of propagation models based on DTV field strength measurement in urban environment (대도심 DTV 전계강도 측정에 기반한 전파예측 모델 비교)

  • Kang, Young-Heung;Kwon, Yong-Ki;Kim, Hyeong-Seob
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.484-490
    • /
    • 2013
  • With the rapid development of wireless communication at VHF and UHF bands, there is an increasing need for the reliable propagation prediction tools. Therefore, the different propagation models that have been developed in many countries as well as korea has been trying to secure a model suitable for their geographical area but then it is giving us a different result when we compared it to measured values. In this paper, based on the measurements of DTV broadcasting services in domestic urban area, analysis and comparison of ITU-R P.1546 and BCAST models provide errors between measured and predicted values, and some points for improving SMI system has been proposed. As a result, P.1546 model provides the valid predicted data similar to measured data, but BCAST model has some problems of large deviation and higher prediction to measured data. In future, these problems and diffractions due to high buildings need to be studied further.

Vulnerabilities and Attack Methods in Visible Light Communications Channel (가시광 통신 채널의 취약성 및 공격 방법)

  • Park, So-Hyun;Joo, Soyoung;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.469-471
    • /
    • 2021
  • As wireless communication technology advances to ensure high accuracy and safety at high speeds, research and development of Visible Light Communication (VLC) technology has been accelerated as an alternative to traditional radio frequency (RF) technology. As the radio spectrum of RF communication becomes more congested and demand for bandwidth continues to increase, VLCs that can use unlicensed frequency band are proposed as a solution. However, VLC channels have broadcasting characteristics that make them easily exposed to eavesdropping and jamming attacks, and are vulnerable to MITM (Man-In-The-Middle) due to their line of sight (LOS) propagation characteristics. These attacks on VLC channels compromise the confidentiality, integrity, and availability of communications links and data, resulting in higher data retransmission rates, reducing throughput and increasing power consumption, resulting in lower data transmission efficiency. In this work, we model vulnerable VLC channels to analyze the impact of attacks and communications vulnerabilities by malicious jammers.

  • PDF

A Multimedia Contents Recommendation System using Preference Transition Probability (선호도 전이 확률을 이용한 멀티미디어 컨텐츠 추천 시스템)

  • Park, Sung-Joon;Kang, Sang-Gil;Kim, Young-Kuk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.2
    • /
    • pp.164-171
    • /
    • 2006
  • Recently Digital multimedia broadcasting (DMB) has been available as a commercial service. The users sometimes have difficulty in finding their preferred multimedia contents and need to spend a lot of searching time finding them. They are even very likely to miss their preferred contents while searching for them. In order to solve the problem, we need a method for recommendation users preferred only minimum information. We propose an algorithm and a system for recommending users' preferred contents using preference transition probability from user's usage history. The system includes four agents: a client manager agent, a monitoring agent, a learning agent, and a recommendation agent. The client manager agent interacts and coordinates with the other modules, the monitoring agent gathers usage data for analyzing the user's preference of the contents, the learning agent cleans the gathered usage data and modeling with state transition matrix over time, and the recommendation agent recommends the user's preferred contents by analyzing the cleaned usage data. In the recommendation agent, we developed the recommendation algorithm using a user's preference transition probability for the contents. The prototype of the proposed system is designed and implemented on the WIPI(Wireless Internet Platform for Interoperability). The experimental results show that the recommendation algorithm using a user's preference transition probability can provide better performances than a conventional method.

A Real-time H.264 to MPEG-2 Transcoding for Ship to Shore Communication (선박-육지간 통신을 위한 실시간 H.264 to MPEG-2 트랜스코딩)

  • Son, Nam-Rye;Jeong, Min-A;Lee, Seong-Ro
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.1
    • /
    • pp.90-102
    • /
    • 2011
  • Recently, the grade of users using wireless communication services which transmits and re-transmits to the signal via the broadcasting satellite have a variety. However the ships not preparing of H.264 standard devices should not received the realtime data because the broadcasting stations have transmitted the compressed video data through the satellite communication. Therefore this paper proposes H.264 to MPEG-2 transcoding for the ships using MPEG-2 devices. Proposed method improves a speed and object quality in H.264 to MPEG-2 transcoding by analysis features of macroblock modes in H.264. In the Intra mode of P-frame, it proposes new method by computing coincidence proportion after comparing of Intra mode methods of H.264 and MPEG-2. In the Inter mode, it proposes a PMV(predictive motion vector) considering movement of motion vectors in H.264 decoder. we reuses a PMV directly as like the final MV in MPEG-2 encoder and refinements the MV after coincidence ratio comparing of variable motion vectors of H.264 and these of MPEG-2. The experimental results from proposed method show a considerable reduction in processing time, as much as 70% and 67% respectively, with a small objective quality reduction in PSNR.