• Title/Summary/Keyword: Network Evolution

Search Result 643, Processing Time 0.023 seconds

Technology Trends and Research Direction of 6G Mobile Core Network (6G 모바일 코어 네트워크 기술 동향 및 연구 방향)

  • Ko, N.S.;Park, N.I.;Kim, S.M.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.4
    • /
    • pp.1-12
    • /
    • 2021
  • The competition to lead the next generation of mobile technologies, 6G, is underway while the deployment of 5G has not been implemented worldwide. ITU-R plans to develop technical requirements and standards after completing the 6G Vision by 2023. It can be considered too early to have a concrete view of the 6G core network architecture from this timeline. However, major stakeholders have started making their presence felt by publishing their views. From updated analysis on the technology and service trends proposed, we present a list of research directions on 6G core network from several perspectives: distribution of network functions to nearer edge locations; future fixed-mobile convergence, including low earth orbit satellites; highly-precise QoS guarantee; supporting an extremely wide variety of service requirements; AI-native automation and intelligence; and aligning with the evolution of radio access network.

Two-Stage Evolutionary Algorithm for Path-Controllable Virtual Creatures (경로 제어가 가능한 가상생명체를 위한 2단계 진화 알고리즘)

  • Shim Yoon-Sik;Kim Chang-Hun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.682-691
    • /
    • 2005
  • We present a two-step evolution system that produces controllable virtual creatures in physically simulated 3D environment. Previous evolutionary methods for virtual creatures did not allow any user intervention during evolution process, because they generated a creature's shape, locomotion, and high-level behaviors such as target-following and obstacle avoidance simultaneously by one-time evolution process. In this work, we divide a single system into manageable two sub-systems, and this more likely allowsuser interaction. In the first stage, a body structure and low-level motor controllers of a creature for straight movement are generated by an evolutionary algorithm. Next, a high-level control to follow a given path is achieved by a neural network. The connection weights of the neural network are optimized by a genetic algorithm. The evolved controller could follow any given path fairly well. Moreover, users can choose or abort creatures according to their taste before the entire evolution process is finished. This paper also presents a new sinusoidal controller and a simplified hydrodynamics model for a capped-cylinder, which is the basic body primitive of a creature.

A Study of the Performance Degradation Factors of An Internal Network (내부 네트워크의 성능저하요인에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.43-50
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network and most of the network through a various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information Assets from External attacks. But, The use of Security Systems and Network deployment inside the network makes a significant impact on Security and Performance. Therefore, In this paper, it will be to analyze the Performance Degradation Factors of the Internal Network according to the Security System's use and placement. In a future, This paper is expected to serve as a valuable information for the Network Performance and Security improvements.

The Structure and Evolution of Renewable Energy Trade Networks in the RCEP Region: Application of SNA Method

  • Jinyan Tian;Qianli Wu;Congying Sun;Ziyang Liu
    • East Asian Economic Review
    • /
    • v.28 no.1
    • /
    • pp.3-35
    • /
    • 2024
  • This paper utilizes social network analysis to examine the structural characteristics and trade dynamics of the renewable energy (hydropower, wind energy, and solar energy) trade network within the RCEP region from 2011 to 2020. The findings reveal: (1) The renewable energy trade network within the RCEP exhibits dynamism, heterogeneity, and an uneven development. The solar energy network is the most balanced and stable, while the wind energy network lags and shows marked fluctuations, with the hydropower network falling between these two. This demonstrates the diversity of energy trade within the region. (2) China, Singapore, and Japan are identified as the key exporting and importing countries, with Vietnam showing substantial growth potential. Individual analyses shed light on the stark disparities in trade status among nations, reflecting the diverse roles and future potential of member countries. (3) The QAP regression analysis reveals a significant influence of environmental pressure, particularly carbon dioxide emissions, on the renewable energy trade network. This study contributes to promoting environmental sustainability and energy security in the RCEP region and provides empirical evidence for global renewable energy trade strategies.

A Performance Enhancement Scheme for Heterogeneous Network Systems Utilizing Remote Radio Heads (원격송신국을 활용하는 이종 네트워크 시스템의 성능 개선 방안)

  • Yoo, Hyung-Gil;Sung, Won-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1B
    • /
    • pp.31-38
    • /
    • 2012
  • In this paper, we propose a method to improve cell edge users' performance in HetNet (heterogeneous network) systems by cooperatively transmitting signals using remote radio heads (RRHs) located near coverage boundaries, referred to as edge RRHs. The proposed method locates the edge RRHs in specific locations of the cell boundary and provides an efficient operational strategy by adjusting the duty cycle of the edge RRHs and base stations. The effectiveness of the method is demonstrated by experimental performance based on the system model parameters of the CoMP (coordinated multi-point transmission and reception) scenario, which is discussed in LTE-Advanced (Long Term Evolution - Advanced) standard contributions. When compared with conventional methods, utilization of edge RRHs is especially advantageous for the performance improvement of lower percentile users in terms of average throughput and effectively improves the fairness among users.

Diffusion Patterns of Telecommunications Services with Network Evolution (네트워크 진화에 따른 통신서비스 확산 패턴의 변화)

  • Kim Moon-Soo;Kim Ho
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.93-102
    • /
    • 2006
  • Traditionally, diffusion of telecommunications services has been considerably affected by presence of critical mass and network externalities, and thus shown the so-called late take-off phenomenon. However, as telecommunications network evolves from circuit switching to packet switching, enabling diverse new services such as Internet access, Internet banking and web hosting, it seems this traditional diffusion patterns are changing. By comparing diffusion of the packet-based services with those of circuit-based services and durable goods, we have found the late take-off phenomenon is not involved in diffusion of newly introduced the packet-based services. Moreover, we concluded diffusion of the packet-based services is much faster than that of durable goods, thus showing early take-off phenomenon. Based on this empirical result, we suggest Telcos and ISPs should pay as much attention to the growth state as the introduction stage in order for their packet-based services to be successful in the markets.

  • PDF

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

An Enhanced Secure Health Data Transmission Protocol using Key Insulation in Remote Healthcare Monitoring System (원격 헬스케어 모니터링 시스템에서 키 격리기법을 이용한 개선된 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.12
    • /
    • pp.1981-1991
    • /
    • 2016
  • In recent, the advancement of wearable devices and wireless body area networking technologies motivate researchers to pay attention to remote healthcare system for monitoring patients health and disease progression effectively. However, in order to implement a practical remote healthcare system, we must consider the security and privacy of patient's personal health information transmitted to healthcare servers through the network. Hence, in this paper, we propose a secure health data transmission protocol in remote healthcare monitoring system to protect patient's health information and prevent privacy from eavesdropping on the network. To achieve our security goals, we design an efficient secure protocol based on the identity-based cryptography with key evolution technique, and then confirm the superiority and the efficiency of the proposed protocol as compared with the existing protocol of Yang et al.

Dynamic Reservation Scheme of Physical Cell Identity for 3GPP LTE Femtocell Systems

  • Lee, Poong-Up;Jeong, Jang-Keun;Saxena, Navrati;Shin, Ji-Tae
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.207-220
    • /
    • 2009
  • A large number of phone calls and data services will take place in indoor environments. In Long Term Evolution (LTE), femtocell, as a home base station for indoor coverage extension and wideband data service, has recently gained significant interests from operators and consumers. Since femtocell is frequently turned on and off by a personal owner, not by a network operator, one of the key issues is that femtocell should be identified autonomously without system information to support handover from macrocell to femtocell. In this paper, we propose a dynamic reservation scheme of Physical Cell Identities (PCI) for 3GPP LTE femtocell systems. There are several reserving types, and each type reserves a different number of PCIs for femtocell. The transition among the types depends on the deployed number of femtocells, or the number of PCI confusion events. Accordingly, flexible use of PCIs can decrease PCI confusion. This reduces searching time for femtocell, and it is helpful for the quick handover from macrocell to femtocell. Simulation results show that our proposed scheme reduces average delay for identifying detected cells, and increases network capacity within equal delay constraints.