• Title/Summary/Keyword: 3G network

Search Result 827, Processing Time 0.03 seconds

A Resource Management Scheme in Heterogeneous Access Network Architectures (이종 액세스 네트워크 구조에서 자원관리 방안)

  • Park, Sang-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.2
    • /
    • pp.83-92
    • /
    • 2005
  • Access networks connected in B3G networks provide its property network service. Hence, though mobile users may utilize only a network service from an access network, they can also use variety of network services from several access networks for their service satisfaction. To support heterogeneous changeable network service in access networks, the mobile terminal must implement heterogeneous system techniques so that it is able to change the network service by ISHO (Inter-System Handover) In this paper, we present the ISHO condition by the policy-based framework in B3G networks. Also, we propose an ISHO scheme to control network resources for the QoS management of a mobile session between UMTS and WLAN access networks. To support the QoS management, the proposed scheme is that it will be implemented before the resource exhaustion occurs to effect network performances.

  • PDF

5G 망에서의 Network Slicing 요구사항 및 제공 구조

  • Kim, Sang-Hun
    • Information and Communications Magazine
    • /
    • v.33 no.6
    • /
    • pp.9-17
    • /
    • 2016
  • 본고에서는 5G 망에서의 서비스 요구사항을 만족하기 위한 구조로서 Network Slicing 구조를 제안하고 세부 적용방안을 기술한다. 이를 위해 5G 서비스를 우선 정의하고 그에 따른 서비스 요구사항을 도출한 후, 이러한 요구사항과 관련해 현재 망의 문제점에 대해 기술하고 망 개선을 위한 기술 요구사항을 정립한다. 특히, 5G에서의 중요성이 높아질 것으로 전망되고 있는 'Network Slicing'의 필요성 및 개념에 대해 서술한다. Network Slicing에 대한 제조사들의 솔루션 동향, 3GPP 등 단체의 표준화 동향, APN 방식의 P-LTE/DECOR/RAN Slicing 등 관련 기술의 발전 동향을 포함한 5G Network Slicing 주요 기술 동향에 대해서 알아본다. 또한, Slice의 관리 및 BSS/OSS등과의 연계를 위한 통신사업자 입장에서의 플랫폼 요구사항을 정리한다. 5G Network Slicing을 충족하기 위한 주요 기술로 C/U plane 분리구조, 범용 서버를 활용한 NFV/SDN, Edge 기반의 분산된 수평적 네트워크, 데이터 오프로딩 및 지연시간 절감을 위한 Edge Computing 등을 들 수 있고 효율적인 자원 관리를 위한 Orchestration 등에 대해서도 알아본다. 이를 기반으로 하여 사업자 입장에서 5G Core Network 기술을 선도함은 물론이고 향후, 조기 상용화를 위한 진화 방향을 제시하고자 한다.

Comparative Analysis on Network Slicing Techniques in 5G Environment (5G 환경에서의 네트워크 슬라이싱 연구 비교 분석)

  • A Reum Ko;Ilhwan Ji;Hojun Jin;Seungho Jeon;Jung Taek Seo
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.84-96
    • /
    • 2023
  • Network slicing refers to a technology that divides network infrastructure into multiple parts. Network slicing enables flexible network configuration while minimizing the physical resources required for network division. For this reason, network slicing technology has recently been developed and introduced in a form suitable for the 5G environment for efficient management of large-scale network environments. However, systematic analysis of network slicing research in the 5G environment has not been conducted, resulting in a lack of systematic analysis of the technology. Accordingly, in this paper, we provide insight into network slicing technology in the 5G network environment by conducting a comparative analysis of the technology. In this study's comparative analysis, 13 literatures on network slicing in the 5G environment was identified and compared and analyzed through a systematic procedure. As a result of the analysis, three network slicing technologies frequently used for 5G networks were identified: RAN (radio access network) slicing, CN (core network) slicing, and E2E (end-to-end) sliding. These technologies are mainly used for network services. It was confirmed that research is being conducted to achieve quality improvement and network isolation. It is believed that the results of this comparative analysis study can contribute to 6G technology research as a future direction and utilization plan for network slicing research.

  • PDF

A study of handover for dynamic QoS in B3G networks (B3G 네트워크에서 동적 QoS를 위한 핸드오버 연구)

  • Park, Sang-Joon;Lee, Jong-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1373-1379
    • /
    • 2011
  • The SLA (Service Level Agreement) is once determined between service provider and users in B3G networks so that the network service must be provided as QoS management. Here, the network situation is changed as the time flow, and the service environment is also altered. Hence, dynamic QoS management scheme should be considered. In this paper, we propose a handover scheme for dyanamic QoS as the network situation in B3G networks. The heterogeneous networks can be used for dynamic QoS management in B3G networks.

The Fault Tolerance of Interconnection Network HCN(n, n) and Embedding between HCN(n, n) and HFN(n, n) (상호연결망 HCN(n, n)의 고장허용도 및 HCN(n, n)과 HFN(n, n) 사이의 임베딩)

  • Lee, Hyeong-Ok;Kim, Jong-Seok
    • The KIPS Transactions:PartA
    • /
    • v.9A no.3
    • /
    • pp.333-340
    • /
    • 2002
  • Embedding is a mapping an interconnection network G to another interconnection network H. If a network G can be embedded to another network H, algorithms developed on G can be simulated on H. In this paper, we first propose a method to embed between Hierarchical Cubic Network HCN(n, n) and Hierarchical Folded-hypercube Network HFN(n, n). HCN(n, n) and HFN(n, n) are graph topologies having desirable properties of hypercube while improving the network cost, defined as degree${\times}$diameter, of Hypercube. We prove that HCN(n, n) can be embedded into HFN(n, n) with dilation 3 and congestion 2, and the average dilation is less than 2. HFN(n, n) can be embedded into HCN(n, n) with dilation 0 (n), but the average dilation is less than 2. Finally, we analyze the fault tolerance of HCN(n, n) and prove that HCN(n, n) is maximally fault tolerant.

Key Management for Wireless Interworking (무선 네트워크 연동을 위한 키 관리)

  • Cho, Tae-Nam;Han, Jin-Hee;Jun, Sung-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.7-16
    • /
    • 2007
  • 3G telecommunication and wireless LAN provide various wireless communication services with their own native advantages and disadvantages. Currently WiBro service was developed to make up for the disadvantages of those services, and 3G-WLAN-WiBro underworking system which enables a user who uses triple-mode terminals to use those three networks was proposed. Even though each network adopts mutual authentication process between users and networks to provide security and accounting, they use different authentication protocols. In this paper, integrated authentication and key management protocol is proposed which makes use of previously used authentication information and supports safe roaming when a user moves from one network to another one under a same service provider on the 3G-WLAN-WiBro interworking network.

Design of Validation Procedure for Certification for PKI Based Next Generation Mobile Networks (PKI 방식의 차세대 이동통신 망에 적용 가능한 인증서 검증 절차 설계)

  • Jeong, Jang-Min;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.22 no.A
    • /
    • pp.95-100
    • /
    • 2002
  • When the wireless PKI is applied to 3G/4G mobile network which requires mutual authentication among all entities, the wired PKI procedure is not feasible for validating visited network's certifications because of the wireless environmental limitations. Also, if we depend on WAP based PKI, we cannot support confidence about certification validation since the information offered from visited network is not authenticated. Therefore, in this paper we consider various and unique characteristics of mobile environment for certification validation at 3G/4G mobile networks based on wireless PKI and then propose two certification validation procedures.

  • PDF

Wireless Access Network Architecture and Virtualization Scenarios for Next-Generation Mobile Communication Networks (차세대 이동통신 네트워크를 위한 무선 액세스 망 구조 및 가상화 시나리오)

  • Kim, Myunghwan;Kim, Su Min;Jung, Bang Chul;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2150-2162
    • /
    • 2012
  • In accordance with evolution of next-generation mobile Internet, 2G, 3G, 4G, and B4G mobile communication wireless access networks will be co-existed and service providers will be merged as an integrated service provider. In addition, multiple virtual service operators will appear. In order to provide complicated unified-services, in the future Internet, wireless network virtualization where network resource is shared by various service operators is necessary. Therefore, in this paper, we investigate network architectures and virtualization scenarios for wireless access network virtualization where various wireless access technologies are flexibly operated by multiple service providers over next-generation wireless access networks. We expect that the virtualization scenario and network architecture yielded from this study can play a role as a basis for development of wireless access network virtualization algorithms.

An Analysis of Security Vulnerabilities Using 5G NAS COUNT (5G NAS COUNT 취약점을 이용한 보안 위협 분석)

  • Kim, Min-Jae;Park, Jong-Geun;Shin, Ji-Soo;Moon, Dae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.565-573
    • /
    • 2022
  • Current mobile communication system is in the mid-process of conversion from 4G LTE to 5G network. According to the generalization of mobile communication services, personal information such as user's identifiers and location information is transmitted through a mobile communication network. The importance of security technology is growing according to the characteristics of wireless mobile communication networks, the use of wireless shared channels is inevitable, and security technology cannot be applied to all network system elements in order to satisfy the bandwidth and speed requirements. In particular, for security threat analysis, researches are being conducted on various attack types and vulnerability analysis through rogue base stations or attacker UE to make user services impossible in the case of 5G networks. In this paper, we established a 5G network testbed using open sources. And we analyzed three security vulnerabilities related to NAS COUNT and confirmed the validity of two vulnerabilities based on the testbed or analyzing the 3GPP standard.

A P2P Service Protocol using The Open Mobile Network API for The Femtocell based Wireless Enterprise Network (Femtocell을 활용하는 기업무선망 환경을 위한 개방형 모바일 네트워크 API 기반 P2P 서비스 프로토콜)

  • Lee, Sung-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.1
    • /
    • pp.21-28
    • /
    • 2009
  • In this paper, we consider the Femtocell based enterprise wireless network using 2G/3G/4G cellular network technologies. And, we apply the open network service API which enable an easy development of ISP or enterprise services to P2P enterprise services. Based on the proposed scheme, enterprise services can be always connected at anywhere and anytime via heterogeneous devices. By using a qualitative analysis, we evaluate the performance of the proposed scheme and compare with that of the famous P2P service - Skype. Results show that the proposed scheme requests smaller servers and flows with enhanced service quality.