• Title/Summary/Keyword: Mobile network operator

Search Result 63, Processing Time 0.025 seconds

Strategic Differentiation of Internationalization in the Mobile Telecommunications Industry: Case Studies

  • Kim, Whan-Seon;Lee, Myeong-Ho;Kim, Kyung-Don
    • ETRI Journal
    • /
    • v.31 no.1
    • /
    • pp.51-61
    • /
    • 2009
  • We present a unified explanation of the internationalization strategies of major mobile network operators (MNOs). We have developed a framework that analyzes the strategies of major international MNOs in terms of the relationship between their degree of involvement in international business operations and the degree of equity participation. The results show a positive association between these two dimensions as expected, but they also reveal some exceptional cases in which certain MNOs are actively involved in the business operations of other foreign MNOs, even with minor (or zero) equity investments. In this paper, we argue that the strategic actions of the major MNOs which are the largest shareholders of foreign MNOs are in an equilibrium status because these major MNOs derive maximum benefit from full or considerable management control and active involvement. Finally, we predict that latecomers (MNOs who are just about to enter foreign telecommunications markets) may adopt an incremental investment approach because most developed markets and deregulated emerging markets with growth potential are already preempted by major MNOs. Therefore, the window of opportunity for internationalization in those markets is currently small.

  • PDF

A Multi-Attribute Intuitionistic Fuzzy Group Decision Method For Network Selection In Heterogeneous Wireless Networks Using TOPSIS

  • Prakash, Sanjeev;Patel, R.B.;Jain, V.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5229-5252
    • /
    • 2016
  • With proliferation of diverse network access technologies, users demands are also increasing and service providers are offering a Quality of Service (QoS) to satisfy their customers. In roaming, a mobile node (MN) traverses number of available networks in the heterogeneous wireless networks environment and a single operator is not capable to fulfill the demands of user. It is crucial task for MN for selecting a best network from the list of networks at any time anywhere. A MN undergoes a network selection situation frequently when it is becoming away from the home network. Multiple Attribute Group Decision (MAGD) method will be one of the best ways for selecting target network in heterogeneous wireless networks (4G). MAGD network selection process is predominantly dependent on two steps, i.e., attribute weight, decision maker's (DM's) weight and aggregation of opinion of DMs. This paper proposes Multi-Attribute Intuitionistic Fuzzy Group Decision Method (MAIFGDM) using TOPSIS for the selection of the suitable candidate network. It is scalable and is able to handle any number of networks with large set of attributes. This is a method of lower complexity and is useful for real time applications. It gives more accurate result because it uses Intuitionistic Fuzzy Sets (IFS) with an additional parameter intuitionistic fuzzy index or hesitant degree. MAIFGDM is simulated in MATLAB for its evaluation. A comparative study of MAIFDGM is also made with TOPSIS and Fuzzy-TOPSIS in respect to decision delay. It is observed that MAIFDGM have low values of decision time in comparison to TOPSIS and Fuzzy-TOPSIS methods.

The analysis of technology of the connected car (커넥티드 카의 기술 분석)

  • Shim, Hyun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.211-215
    • /
    • 2015
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving. The intelligent vehicle network is comprised for the driving information offering changing rapidly of the communication(V2V: Vehicle to Vehicle) between the car and the car, communication(V2I : Vehicle to Infrastructure) between the infrastructure and the car, and V2X (Vehicle to Nomadic).

  • PDF

Design and Implementation of Network Self-Configuration Based on Bluetooth (Bluetooth 기반 네트워크 자동형성 설계 및 구현)

  • Kang, Seong-Ho;Choo, Young-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1376-1384
    • /
    • 2008
  • Numerous researches on network self-configuration have been conducted on Wireless Sensor Network (WSN) and Ad Hoc network but the results have not been applied yet for factory automation. This paper presents development of intelligent process management systems conducting process monitoring and control irrelevant to physical position of a plant operator. The systems are indispensable for diagnosis of rotating machines which cannot exploit wired network. The system was implemented in a Personal Digital Assistant (PDA) using Bluetooth communication protocol. When a mobile terminal reaches to communication range of the process management server, the server detects the mobile terminal to reconfigure plant network automatically. The server authenticates a user of the terminal to download and installs monitoring and control program considering authorized level of the user. If the terminal leaves communication range of the server, it deletes the node from the network and removes the program automatically to save resources and prevent security problems such as missing terminal. Operation of developed functions was verified in a testbed emulating steel-making plant.

  • PDF

An Optimal Strategy of 3G Mobile Handset Distribution by 3-Person Game (3자간게임모형에 의한 3G 이동통신단말기의 치적유통전략)

  • Joo, Young-Jin;Moon, Hyoung-Don
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.34 no.4
    • /
    • pp.185-204
    • /
    • 2009
  • The USIM(universal subscriber identity module)-unlock introducing in July 1, 2008 might be led to a significant change that mobile service provider's dominance is considerably dispersed to the handset manufacturer and distributor. Under USIM-unlock environment, mobile service provider, handset manufacturer, and distributor have to make their decisions on their handset distribution channel strategies: the closed distribution channel strategy or the open distribution channel strategy. The change of distribution channel strategy between members in distribution channel can be understood as a matter of strategy choice, and we have developed a theoretical model and analyzed how to make a decision for the member's optimal distribution strategy based on 3-person game model between members of mobile phone distribution channel, under both of '1 subscriber-1 handset' and '1 subscriber-multiple handset' assumptions. Under '1 subscriber-1 handset' assumption, the closed strategy controlled by mobile service provider is all players' optimal solution because the maximum size of the mobile phone market is limited by subscribers. But, as total expected profit by the handset and distribution subsides is a deficit, mobile service provider have to choose the open strategy and consider the conversion to MNO(mobile network operator). Under '1 subscriber-multiple handset' assumption, mobile service provider is trying to find the way how to lock-in its service and mobile phone and how to maximize ARPU(average revenue per unit), while handset manufacturer and distributor have to look for the way how to maximize the mobile phone market using their own marketing efforts, because it is expected that total mobile handset demand for the open market is bigger than demand for the closed market under '1 subscriber-multiple handset' assumption.

Ultra Wide Area Wireless Backhaul Network System Based on Large Scale Array Antenna (대형 어레이 안테나 기반 초광역 무선 백홀망 시스템)

  • Go, SeongWon;Kim, Hyoji;Lee, Ju Yong;Cho, Dong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1354-1362
    • /
    • 2015
  • Heterogeneous network technology is expected to be a core technology for 5G mobile communications. 5G mobile network would be composed of many base stations even have mobility, then the operator should connect base stations through the wireless backhaul technology. This paper presents Ultra Wide Area Wireless Backhaul Network System with massive array antenna. We conducted link budget analysis for Ultra Wide Area Wireless Backhaul Network and performance analysis of massive array antenna system through the transmission simulator based on beamforming technology. In wide area ($10km^2$) wireless backhaul system composed of massive antenna, we achieved 5 bps/Hz average spectral efficiency with 1 W transmission power per beam.

A Study on the User Authentication and Key Exchange Service for Group Environment (그룹 환경의 사용자 인증 및 키 교환 서비스 프로토콜 연구)

  • Byun, Jin-Wook;Lee, Su-Mi;Lee, Dong-Hoon
    • Journal of Information Technology Services
    • /
    • v.8 no.2
    • /
    • pp.117-136
    • /
    • 2009
  • Over the years a password has been used as a popular authentication method between a client and a server because of its easy-to-memorize property. But, most password-based authentication services have focused on a same password authentication scheme which provides an authentication and key exchange between a client and a server with the same password. With rapid change of communication environments in the fields such as mobile networks, home networking, etc., the end-to-end security allowing users to hold different password is considered as one of main concerns. In this paper, we consider a new authentication service of how each client with different own password is able to authenticate each other, which is a quite new service paradigm among the existing services. This new service can be used in the current or next generation network environment where a mobile user in cell A wants to establish a secure end-to-end channel with users in ceil B, C, and D using only their memorable passwords. This end-to-end security service minimizes the interferences from the operator controlled by network components. To achieve this end-to-end security, we propose an authentication and key exchange service for group users in different realm, and analyze its security in a formal way. We also discuss a generic construction with the existing authentication schemes.

A Survey of Regulations on Smishing and Mobile Micropayment and a Research of Regulations and Laws for Reducing Monetary Damages in Mobile Micropayment (스미싱 제도와 소액결제 제도의 현황 조사 및 소액결제 피해를 줄이기 위한 법·제도 연구)

  • Park, Hanjin;Kim, Injung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1189-1199
    • /
    • 2017
  • With the rapid increase in mobile device users, there are many cyber attacks using SMS messages to infect the mobile device. The monetary demage from those attacks are also increasing. Since those demage are generally related to mobile micropayement systems, we study the details of the incidents on smishing and mobile micropayment. We have identified several limitations of current regulations and laws of them. Thus, we propose new regulations and laws to reduce the financial demage from simishing and to strengthen the security and responsibility of the mobile network operator, payment gateway, and content providers who are participating in the structure of a mobile micropayment systems, such as a regulation for information security evaluation system, several laws for compensation of financial demage within mobile micropayement system.

The Technology of Connected Car (커넥티드 카의 기술)

  • Shim, Hyun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.590-598
    • /
    • 2016
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving.

Adaptive Image Converting for More Efficient Mobile Web Service (모바일 웹 서비스를 효율적으로 제공하기 위한 적응적 이미지 변환 기법)

  • Sim, Kun-Ho;Ko, Hee-Ae;Kim, Jong-Keun;Zhao, Mei-Hua;Lim, Yung-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.37-46
    • /
    • 2011
  • The importance of data service with mobile is becoming more and more significant with the development of wireless network. However, due to the several type of mobile devices and contents, there is a problem that mobile contents should be edited according to the features of the mobile devices and the service providers. Fortunately, there is some solutions that convert mobile contents automatically according to mobile operator. Nevertheless, it has some issues that the response time of content service is delayed when converting mobile contents in real-time. In this paper, we propose an image cache replacement algorithm for minizing the volume of the real-time image transformation. Also, using both of the pre-conversion method and the real-time conversion method to improve storage space and response time.