scholarly journals Performance Analysis of Wireless Communication Systems Traffic using Erlang Models: A Case Study of Yankari Game Reserve in Nigeria

2014 ◽  
Vol 13 (11) ◽  
pp. 5179-5186
Author(s):  
Mohammed Aliyu Gadam ◽  
A.M Maryam ◽  
E Kevin ◽  
A.Y Ibrahim

In any developing nation such as Nigeria, the level of her telecommunication and ICT development is an issue that requires adequate planning especially when consideration is given to the amount of traffic and the available bandwidth in the system. Tourism is one of the areas that the Nigerian Government is considering as a source of internally generated revenue and therefore, infrastructure such as traffic free wireless communication system and fast internet accesss need to be provided to woo tourists and make them feel at home. This cannot be achieved unless the traffic is modeled and its analyzed .Yankari Game Reserve is one of the tourist attraction located in Bauchi state, north-eastern Nigeria. Wireless Communication and internet traffic is analysed in this paper using erlang models to improve the systems quality of service. It is shown that a multi-server system is the most appropriate model to reduce amount of delay in a peak period. It is also proven that delay time is reduced significantly when the number of users increases in a multi-server system.

Author(s):  
A. Suresh Babu ◽  
B. Anand

: A Linear Feedback Shift Register (LFSR) considers a linear function typically an XOR operation of the previous state as an input to the current state. This paper describes in detail the recent Wireless Communication Systems (WCS) and techniques related to LFSR. Cryptographic methods and reconfigurable computing are two different applications used in the proposed shift register with improved speed and decreased power consumption. Comparing with the existing individual applications, the proposed shift register obtained >15 to <=45% of decreased power consumption with 30% of reduced coverage area. Hence this proposed low power high speed LFSR design suits for various low power high speed applications, for example wireless communication. The entire design architecture is simulated and verified in VHDL language. To synthesis a standard cell library of 0.7um CMOS is used. A custom design tool has been developed for measuring the power. From the results, it is obtained that the cryptographic efficiency is improved regarding time and complexity comparing with the existing algorithms. Hence, the proposed LFSR architecture can be used for any wireless applications due to parallel processing, multiple access and cryptographic methods.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1439
Author(s):  
Janghyuk Youn ◽  
Woong Son ◽  
Bang Chul Jung

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.


Sign in / Sign up

Export Citation Format

Share Document