• Title/Summary/Keyword: 3G Wireless Networks

Search Result 130, Processing Time 0.02 seconds

Optimized Handoff Scheme with Fuzzy logic in Heterogeneous Vehicular Mobile Networks (이종의 차량 모바일 네트워크에서 퍼지 로직을 이용한 최적의 핸드오프 기법)

  • Roh, Youngsam;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.35-46
    • /
    • 2012
  • The development of wireless communication systems has resulted in the availability of several access technologies at any geographic area, such as 3G networks, wireless local area networks (WLANs) and wireless broadband networks. The development of these technologies is provided for users who have experienced mobile network environments which are slow or fast-movement environment and change distance between the AP(Access Point). This paper describes network performance issues in various environmental changes. Also, Fuzzy logic is applied to evaluate the performance in vehicle networks around users' environmental factors to focusing on the minimizing of transfer time and costs. First, WLAN and 3G networks fixed distance between AP, Second, WLAN and 3G networks random distance between APs, finally above two environmental with vehicle Ad hoc networks is analyzed. These V2I and V2V environmental condition are assumed. Results which based on Fuzzy logic suggest an optimal performance in vehicle network environments according to vehicle speed and distance between APs. Proposed algorithm shows 21% and 13% improvement of networks performance in V2I and V2V environment.

Strategic and Technological Challenges for Wireless Communications beyond 3G

  • Evci, Cengiz;Barth, Ulrich;Sehier, Philippe
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.302-313
    • /
    • 2002
  • In order to facilitate and to meet the ever increasing demands for the wireless communication in the next decade and also to satisfy the high data rates for the new services, the future development of 3G (IMT2000) and systems beyond 3G (B3G) are foreseen. This article presents the need for these developments and motivations for systems beyond 3G taking into account both strategic and technological challenges to be faced. Moreover, the concepts and potential technologies involved including multiple airinterfaces, efficient spectrum allocation and utilisation for the success of systems B3G are briefly reviewed.

A Study on AI-based MAC Scheduler in Beyond 5G Communication (5G 통신 MAC 스케줄러에 관한 연구)

  • Muhammad Muneeb;Kwang-Man Ko
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.891-894
    • /
    • 2024
  • The quest for reliability in Artificial Intelligence (AI) is progressively urgent, especially in the field of next generation wireless networks. Future Beyond 5G (B5G)/6G networks will connect a huge number of devices and will offer innovative services invested with AI and Machine Learning tools. Wireless communications, in general, and medium access control (MAC) techniques were among the fields that were heavily affected by this improvement. This study presents the applications and services of future communication networks. This study details the Medium Access Control (MAC) scheduler of Beyond-5G/6G from 3rd Generation Partnership (3GPP) and highlights the current open research issues which are yet to be optimized. This study provides an overview of how AI plays an important role in improving next generation communication by solving MAC-layer issues such as resource scheduling and queueing. We will select C-V2X as our use case to implement our proposed MAC scheduling model.

  • PDF

A Study on the Performance of Home Embedded System Using a Wireless Mesh Network (무선 메쉬 네트워크를 이용한 홈 임베디드 시스템의 성능에 대한 연구)

  • Roh, Jae-Sung;Ye, Hwi-Jin
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.323-328
    • /
    • 2007
  • Communication systems beyond 3G should provide more than 100 Mbps for wireless access. In addition to smart antennas, wireless multi-hop networks are proposed to increase the cell size and throughput. For example, Zigbee technology is expected to provide low cost and low power connectivity and can be implemented in wireless mesh networks larger than is possible with Bluetooth. Also, home embedded system using wireless mesh network is one of the key market areas for Zigbee applications. If the line-of-sight path is shadowed by home obstacles, a direct connection between the access point (AP) and the node is not possible at high frequencies. Therefore, by using multi-hop relay scheme the end node can be reached to AP. In this paper, the relaying of data between the AP and the end node is investigated and the throughput and PER(Packet Error Rate) are evaluated in multi-hop wireless mesh networks by using DSSS/BPSK system.

  • PDF

The case study on wireless lan design technique for Bansong purification plant using network integrated management system and security switch (네트워크 통합관리시스템과 보안스위치를 이용한 반송정수장 무선랜 구축사례)

  • Park, Eunchul;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.32 no.4
    • /
    • pp.309-315
    • /
    • 2018
  • Currently, the commercialization of the $5^{th}$ Generation (5G) service is becoming more prevalent in domestic communication network technology. This has reduced communication delay time and enabled large-capacity data transmission and video streaming services in real-time. In order to keep pace with these developments, K-water has introduced a smart process control system in water purification plants to monitor the status of the water purification process. However, since wireless networks are based on the public Long Term Evolution (LTE) network, communication delay time remains high, and high-resolution video services are limited. This is because communication networks still have a closed structure due to expense and security issues. Therefore, with 5G in its current form, it is very difficult to accommodate future services without improving the infrastructure of its communication networks. In recognition of these problems, this study implemented the authentication and management function of wireless networks on a wired network management system in the K-water Bansong water purification plant. The results confirmed that wired Local Area Network (LAN) services give a higher security performance than an expensive commercial wireless LAN system. This was achieved by using an Internet Protocol (IP) address management system of wired networks and the packet filtering function of the Layer2 (L2) switch. This study also confirmed that it is possible to create a wireless LAN service that is 3.7 times faster than the existing LTE communication network.

Technology Development Trends in Integration of Communication and Sensing in 6G Networks (6G 센싱-통신 융합 서비스의 기술 개발 동향)

  • S.J. You;H.J. Kim;J.Y. Ahn;J.H. Hwang;J.J. Park;S.K. Park
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.1
    • /
    • pp.25-35
    • /
    • 2024
  • Wireless communication, including mobile networks and local area networks, has become an essential service in the society. Wireless communication is evolving to include sensing services, as demonstrated by the increasing attention in organizations and standards such as 3GPP and IEEE 802.11. This survey presents technology trends in the integration of sensing and communication. The standardization status along with use cases provided by standards are explained. In addition, core and supporting technologies such as channel modeling, waveform design, and artificial intelligence are analyzed.

AAA System for PLMN-WLAN Internetworking

  • Janevski Toni
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.192-206
    • /
    • 2005
  • Integration of mobile networks and Internet has started with 2.5 generation of mobile cellular networks. Internet traffic is today dominant traffic type worldwide. The hanger for higher data rates needed for data traffic and new IP based services is essential in the development of future wireless networks. In such situation, even 3G with up to 2 Mbit/s has not provided data rates that are used by Internet users with fixed broadband dial-up or through wired local area networks. The solution to provide higher bit rates in wireless access network has been found in wireless LAN although initially it has been developed to extend wired LAN into wireless domain. In this paper, we propose and describe a solution created for interoperability between mobile cellular network and WLAN. The integration between two networks, cellular and WLAN, is performed on the authentication, authorization, and accounting, i.e., AAA side. For that purpose we developed WLAN access controller and WLAN AAA gateway, which provide gateway-type access control as well as charging and billing functionalities for the WLAN service. In the development process of these elements, we have considered current development stadium of all needed network entities and protocols. The provided solution provides cost-effective and easy-to-deploy PLMN-WLAN Internetworking scenario.

A Robust Mobile Video Streaming in Heterogeneous Emerging Wireless Systems

  • Oh, Hayoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2118-2135
    • /
    • 2012
  • With the rapid development of heterogeneous emerging wireless technologies and numerous types of mobile devices, the need to support robust mobile video streaming based on the seamless handover in Future Internet is growing. To support the seamless handover, several IP-based mobility management protocols such as Mobile IPv6 (MIPv6), fast handover for the MIPv6 (FMIPv6), Hierarchical MIPv6 (HMIPv6) and Proxy Mobile IPv6 (PMIPv6) were developed. However, MIPv6 depreciates the Quality-of-Service (QoS) and FMIPv6 is not robust for the video services in heterogeneous emerging wireless networks when the Mobile Node (MN) may move to another visited network in contrast with its anticipation. In Future Internet, the possibility of mobile video service failure is more increased because mobile users consisting of multiple wireless network interfaces (WNICs) can frequently change the access networks according to their mobility in heterogeneous wireless access networks such as 3Generation (3G), Wireless Fidelity (Wi-Fi), Worldwide Interoperability for Microwave Access (WiMax) and Bluetooth co-existed. And in this environment, seamless mobility is coupled according to user preferences, enabling mobile users to be "Always Best Connected" (ABC) so that Quality of Experience is optimised and maintained. Even though HMIPv6 and PMIPv6 are proposed for the location management, handover latency enhancement, they still have limit of local mobility region. In this paper, we propose a robust mobile video streaming in Heterogeneous Emerging Wireless Systems. In the proposed scheme, the MN selects the best-according to an appropriate metric-wireless technology for a robust video streaming service among all wireless technologies by reducing the handover latency and initiation time when handover may fail. Through performance evaluation, we show that our scheme provides more robust mechanism than other schemes.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Techniques study of IMS/SIP based Lawful Interception in 3G networks (3G 네트워크에서의 IMS/SIP 기반 합법적 감청 기법)

  • Lee, Myoung-rak;Pyo, Sang-Ho;In, Hoh Peter
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1411-1420
    • /
    • 2015
  • Lawful interception(LI) standard of telephone networks has technical limitations to lawfully intercept IMS/SIP-based mobile communication network subscriber who using Android and iPhone device. In addition, the technical standards related to legal interception of the IMS/SIP of the wireless network is insufficient compared to the systematic study of the development of a wireless network infrastructure. The architecture proposed in the standard of ETSI(European Telecommunications Standards Institute) for the seamless LI is insufficient to overcome the limitations of traditional voice-centric LI techniques. This paper proposes an IMS/SIP-based architecture to perform LI under 3G networks that focuses on mobility-supported environments with merging cellular networks and the Internet. We implemented the simulation to verify the efficiency of the proposed architecture, and the experimental results show that our method achieves higher lawful interception rate than that of existing interception methods.