• Title/Summary/Keyword: Mobile wireless networks

Search Result 1,356, Processing Time 0.02 seconds

A Study on Secure Routing for a Maritime Network Based on Mobile Multi-hop Wireless Networks (이동 다중 홉 무선망 모델에 기반한 해양통신망을 위한 경로배정 보안 연구)

  • Mun, Seong-Mi;Son, Joo-Young
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.33 no.1
    • /
    • pp.120-130
    • /
    • 2009
  • In recent years, many mobile wireless communication devices and applications have been deployed on the planet. The mobile multi-hop wireless network models appeared to provide means to access to networks where few infrastructure exists. However, the mobile multi-hop wireless networks have weaker points in attacks and intrusions than the wired and one-hop wireless networks. In this paper, the secure routing issues in most mobile multi-hop wireless network models are surveyed in depth. The state-of-the-art technologies and research activities are explained. Finally, the issues and technologies for the secure routing specific to a maritime network model are sufficiently discussed as conclusions.

A Seamless Layer-2 Handover Scheme for mobile WiMAX based Wireless Mesh Networks (Mobile WiMAX 기반의 무선 메쉬 네트워크에서 끊김없는 2계층 핸드오버 방안)

  • Kim, Min;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2A
    • /
    • pp.113-123
    • /
    • 2009
  • Wireless mesh networks have been studied as the next generation technology to solve problems of conventional wireless networks. Particularly, mobile WiMAX based wireless mesh networks are noticed due to many advantages. In this paper, we propose a layer-2 handover scheme for mobile WiMAX based wireless mesh networks. A layer-2 handover scheme based on mobile WiMAX causes many handover failures over mobile WiMAX based wireless mesh networks because it does not consider the characteristics of wireless mesh networks. The proposed scheme does not bring about packet losses achieving lower handover latency than a conventional handover scheme. Simulation results show that the proposed scheme achieves loss-free and low handover latency during the layer-2 handover.

Adaptive Resource Allocation Schemes in Wireless Mobile Networks (무선 이동 네트워크에서의 적응적 자원 할당 방법)

  • Kang, Yoo-Hwa;Suh, Young-Joo;An, Syung-Og
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.477-488
    • /
    • 2001
  • In wireless networking environments, supporting guaranteed quality of service to mobile hosts is difficult due to the facts that wireless networks have limited bandwidth and mobile hosts frequently move in and out of cells. In spite of the characteristics of wireless communications, the quality of some types of services, i.e., real-time services, must be guaranteed at a certain level. When a mobile host moves into another cell, service rates for mobile hosts in wireless networks may be adjusted since wireless networks have limited bandwidths. In this paper, we propose two resource allocation algorithms in wireless mobile networks, using quality of service (QoS) specifications. For efficient use of resources of wireless networks, the proposed algorithms dynamically allocate rates of flows in proportion to QoS with limited resources.

  • PDF

Deep learning-based scalable and robust channel estimator for wireless cellular networks

  • Anseok Lee;Yongjin Kwon;Hanjun Park;Heesoo Lee
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.915-924
    • /
    • 2022
  • In this paper, we present a two-stage scalable channel estimator (TSCE), a deep learning (DL)-based scalable, and robust channel estimator for wireless cellular networks, which is made up of two DL networks to efficiently support different resource allocation sizes and reference signal configurations. Both networks use the transformer, one of cutting-edge neural network architecture, as a backbone for accurate estimation. For computation-efficient global feature extractions, we propose using window and window averaging-based self-attentions. Our results show that TSCE learns wireless propagation channels correctly and outperforms both traditional estimators and baseline DL-based estimators. Additionally, scalability and robustness evaluations are performed, revealing that TSCE is more robust in various environments than the baseline DL-based estimators.

A Mobile-aware Adaptive Rate Control Scheme for Improving the User Perceived QoS of Multimedia Streaming Services in Wireless Broadband Networks

  • Koo, Ja-Hon;Chung, Kwang-Sue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1152-1168
    • /
    • 2010
  • Recently, due to the prevalence of various mobile devices and wireless broadband networks, there has been a significant increase in interest and demand for multimedia streaming services such as the mobile IPTV. In such a wireless broadband network, transmitting a continuous stream of multimedia data is difficult to achieve due to mobile stations (MSs) movement. Providing Quality of Service (QoS) for multimedia video streaming applications requires the server and/or client to be network-aware and adaptive. Therefore, in order to deploy a mobile IPTV service in wireless broadband networks, offering users efficient wireless resource utilization and seamlessly offering user perceived QoS are important issues. In this paper, we propose a new adaptive streaming scheme, called MARC (Mobile-aware Adaptive Rate Control), which adjusts the quality of bit-stream and transmission rate of video streaming based on the wireless channel status and network status. The proposed scheme can control the rate of multimedia streaming to be suitable for the wireless channel status by using awareness information of the wireless channel quality and the mobile station location. The proposed scheme can provide a seamless multimedia playback service in wireless broadband networks in addition to improving the QoS of multimedia streaming services. The proposed MARC scheme alleviates the discontinuity of multimedia playback and allocates a suitable client buffer to the wireless broadband network. The simulation results demonstrate the effectiveness of our proposed scheme.

Converged Mobile Cellular Networks and Wireless Sensor Networks for Machine-to-Machine Communications

  • Shan, Lianhai;Li, Zhenhong;Hu, Honglin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.147-161
    • /
    • 2012
  • In recent years, machine-to-machine (M2M) communications are under rapid development to meet the fast-increasing requirements of multi-type wireless services and applications. In order to satisfy M2M communications requirements, heterogeneous networks convergence appears in many areas, i.e., mobile cellular networks (MCNs) and wireless sensor networks (WSNs) are evolving from heterogeneous to converged. In this paper, we introduce the system architecture and application requirement for converged MCN and WSN, where mobile terminals in MCN are acting as both sensor nodes and gateways for WSN. And then, we discuss the joint optimization of converged networks for M2M communications. Finally, we discuss the technical challenges in the converged process of MCN and WSN.

Migration Using Reordering Recovery in Wired/Wireless Networks

  • Lee, Dong-Chun
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.115-121
    • /
    • 2007
  • Due on failures of communication nodes for the wireless and wired networks, mobile agents may be blocked even if there is available service in the networks. To solve it, we propose migration policy with reordering of the paths to guarantee the migration of mobile agents and the paper will provide the extension with the autonomous migration of mobile agents.

  • PDF

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

An Integrated Management Scheme for Wired and Wireless Networks Using Mobile Agents (이동 에이전트를 이용한 유무선 네트워크의 통합관리 기법)

  • Na, Ho-Jin;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.117-124
    • /
    • 2010
  • Appling centralized network management architecture SNMP(Simple Network Management Protocol) to wireless networks causes the network overhead, NAT(Network Address Translation) problem on AP, and performance degradation of mobile nodes. In this paper, we propose an integrated management scheme for wired and wireless networks using mobile agents in order to solve above problems. In our proposed scheme, SNMP is applied to manage wired networks and MAs of SNMP are implemented in APs or wireless nodes to manage wireless networks. In addition, we propose a method to reduce the redundant OID information within SNMP response messages. Through the analysis, we show that our proposal resolves the given problems and reduces the processing delay of the wireless nodes.

A Robust Mobile Video Streaming in Heterogeneous Emerging Wireless Systems

  • Oh, Hayoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2118-2135
    • /
    • 2012
  • With the rapid development of heterogeneous emerging wireless technologies and numerous types of mobile devices, the need to support robust mobile video streaming based on the seamless handover in Future Internet is growing. To support the seamless handover, several IP-based mobility management protocols such as Mobile IPv6 (MIPv6), fast handover for the MIPv6 (FMIPv6), Hierarchical MIPv6 (HMIPv6) and Proxy Mobile IPv6 (PMIPv6) were developed. However, MIPv6 depreciates the Quality-of-Service (QoS) and FMIPv6 is not robust for the video services in heterogeneous emerging wireless networks when the Mobile Node (MN) may move to another visited network in contrast with its anticipation. In Future Internet, the possibility of mobile video service failure is more increased because mobile users consisting of multiple wireless network interfaces (WNICs) can frequently change the access networks according to their mobility in heterogeneous wireless access networks such as 3Generation (3G), Wireless Fidelity (Wi-Fi), Worldwide Interoperability for Microwave Access (WiMax) and Bluetooth co-existed. And in this environment, seamless mobility is coupled according to user preferences, enabling mobile users to be "Always Best Connected" (ABC) so that Quality of Experience is optimised and maintained. Even though HMIPv6 and PMIPv6 are proposed for the location management, handover latency enhancement, they still have limit of local mobility region. In this paper, we propose a robust mobile video streaming in Heterogeneous Emerging Wireless Systems. In the proposed scheme, the MN selects the best-according to an appropriate metric-wireless technology for a robust video streaming service among all wireless technologies by reducing the handover latency and initiation time when handover may fail. Through performance evaluation, we show that our scheme provides more robust mechanism than other schemes.