• Title/Summary/Keyword: Personal Communication Networks

Search Result 157, Processing Time 0.021 seconds

Optimal Mobility Management of PCNs Using Two Types of Cell Residence Time (이동 통신망에 있어서 새로운 셀 체류시간 모형화에 따른 최적 이동성 관리)

  • 홍정식;장인갑;이창훈
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.27 no.3
    • /
    • pp.59-74
    • /
    • 2002
  • This study investigates two basic operations of mobility management of PCNs (Personal Communication Networks), i.e., the location update and the paging of the mobile terminal. From the realistic consideration that a user either moves through several cells consecutively or stays in a cell with long time, we model the mobility pattern by introducing two types of CRT (Cell Residence Time). Mobility patterns of the mobile terminal are classified Into various ways by using the ratios of two types of CRT. Cost analysis is performed for distance-based and movement-based location update schemes combined with blanket polling paging and selective paging scheme. It is demonstrated that in a certain condition of mobility pattern and call arrival pattern, 2-state CRT model produces different optimal threshold and so, is more effective than IID ( Independently-Identically-Distributed) CRT model. An analytical model for the new CRT model is compact and easily extendable to the other location update schemes.

Service Profile Replication Scheme with Local Anchor for Next Generation Personal Communication Networks

  • Jinkyung Hwang;Bae, Eun-Shil;Park, Myong-Soon
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.215-221
    • /
    • 2003
  • It is expected that per-user customized services are widely used in next generation Personal Communication Network. To provide personalized services for each call, per-user service profiles are frequently referenced and signaling traffic is considerably large. Since the service calls are requested from the places where user stays, we can expect that the traffic is localized. In this paper, we propose a new service profile replication scheme, named Follow-Me Replication with local Anchor (FMRA). By replicating user's service profile in a user-specific location area, local anchor of each region, the signaling traffic for call and mobility can be distributed to local network. We compared the performance of the FMRA with two typical schemes: Intelligent Network-based !Central scheme and IMT-2000 based full replication scheme, as we refer it to Follow-Me Replication Unconditional (FMRU). Performance results indicate that FMRA lies between Central and FMRU schemes according to call to mobility ratio, and we identified the efficient ranges of CMR for FMRA depending on the various network parameters.

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF

Personal Mutual Authentication System for Ubiquitous Wireless Environments (유비쿼터스 무선환경을 위한 개인 상호인증 시스템)

  • Kim Byung-Gi;Hong Sang-Sun;Jouhn Young-Keel
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.99-111
    • /
    • 2004
  • Two general security measures in computing networks are secure data transmission and user authentication, These problems are still critical in the wireless LAN environments. Thus security becomes most significant issue in personal network environments and ubiquitous networks based on wireless LANs. We purpose a new authentication system for these kind of environments, and coined it UPMA(Ubiquitous Personal Mutual Authen-tication) model. UPMA supports authenticating configurations which provides personal verification for each system. It guarantees secure communications through the session key setup, and provides mutual authentication by verifying each user and his/her station. UPMA solves security problems in ubiquitous networks without accessing authentication server, Instead it performs mutual authentication between terminals or between systems. It is a global authentication system which enables global roaming service through the Internet or other public networks, It can be used to guarantee safe and convenient access to a company Intranet or to a home network.

  • PDF

Adaptive GTS allocation scheme with applications for real-time Wireless Body Area Sensor Networks

  • Zhang, Xiaoli;Jin, Yongnu;Kwak, Kyung Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1733-1751
    • /
    • 2015
  • The IEEE 802.15.4 standard not only provides a maximum of seven guaranteed time slots (GTSs) for allocation within a superframe to support time-critical traffic, but also achieves ultralow complexity, cost, and power in low-rate and short-distance wireless personal area networks (WPANs). Real-time wireless body area sensor networks (WBASNs), as a special purpose WPAN, can perfectly use the IEEE 802. 15. 4 standard for its wireless connection. In this paper, we propose an adaptive GTS allocation scheme for real-time WBASN data transmissions with different priorities in consideration of low latency, fairness, and bandwidth utilization. The proposed GTS allocation scheme combines a weight-based priority assignment algorithm with an innovative starvation avoidance scheme. Simulation results show that the proposed method significantly outperforms the existing GTS implementation for the traditional IEEE 802.15.4 in terms of average delay, contention free period bandwidth utilization, and fairness.

A Study on Efficient Numbering Plan of Communication Networks (통신망의 효율적인 번호배분에 관한 연구)

  • 김석태;최영상
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.4
    • /
    • pp.485-494
    • /
    • 1998
  • Communication network numbers are used in classifying each kind of network, identifying the communication companies and choosing services that are supplied by the companies. In the present, a new numbering system is needed to distinguish a new additional communication network. However the present numbering system of domestic communication network has some problems such as exhaustion of network number, excessive local numbers, and so forth So, in this thesis we call the wire and the wireless telephone network, the pager network and the personal number as communication networks, and consider the present condition and problems of our country, Korea, and foreign countries. Then we propose the efficient numbering plan. Firstly, the present 10 numbering systems that are distributed, such as communication networking number $\ulcorner$01X$\lrcorner$ are diminished into 5 communication network numbers that have same quality. Secondly, subscriber numbers are united to 8 digit and 144 area codes are made into widened 5 area codes. Thirdly, the personal numbering services are cross-distributed by century. And we examine the technical convening plan and the legal converting plan and investigate expecting efficiency of proposed numbering system. If this numbering plan is executed, subscriber's number on communication networks are unified at 8 digits, 5 reserve numbers are secured in exhausted communication network number of $\ulcorner$01X$\lrcorner$, and they can distribute subscriber numbers over twice as much. In addition, number acceptability is enlarged from 237,600 thousands to 400,000 thousands. Personal number can be classified at not only century but also a decade. Accordingly, acceptable numbers are increased two folds enough to provide unification and population increase. We were able to confirm all the efficiencies.

  • PDF

Capacity Analysis of UWB Networks in Three-Dimensional Space

  • Cai, Lin X.;Cai, Lin;Shen, Xuemin;Mark, Jon W.
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.287-296
    • /
    • 2009
  • Although asymptotic bounds of wireless network capacity have been heavily pursued, the answers to the following questions are still critical for network planning, protocol and architecture design: Given a three-dimensional (3D) network space with the number of active users randomly located in the space and using the wireless communication technology, what are the expected per-flow throughput, network capacity, and network transport capacity? In addition, how can the protocol parameters be tuned to enhance network performance? In this paper, we focus on the ultra wideband (UWB) based wireless personal area networks (WPANs) and provide answers to these questions, considering the salient features of UWB communications, i.e., low transmission/interference power level, accurate ranging capability, etc. Specifically, we demonstrate how to explore the spatial multiplexing gain of UWB networks by allowing appropriate concurrent transmissions. Given 3D space and the number of active users, we derive the expected number of concurrent transmissions, network capacity and transport capacity of the UWB network. The results reveal the main factors affecting network (transport) capacity, and how to determine the best protocol parameters, e.g., exclusive region size, in order to maximize the capacity. Extensive simulation results are given to validate the analytical results.

Design of BACnet/Zigbee Intrated System (BACnet/Zigbee 통합 시스템의 설계)

  • Kim, Se-Hwan;Park, Dong-Kyu;Hong, Seung-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.6
    • /
    • pp.1063-1068
    • /
    • 2008
  • BACnet(Building Automation and Control Networks) is a standard data communication protocol specifically designed for building automation and control systems, BACnet provides six options for data link layer protocols and these six data link layer options can be applied with various wired transmission media. Recently wireless technology prevails in automation area. ZigBee is an IEEE 802.15.4 based standard communication protocol for low-rate wireless personal area networks. In this study, we propose a BACnet over ZigBee model that adopts ZigBee communication channel as a wireless data link layer protocol in a BACnet-based communication network system. The technology proposed in this paper can expand the BACnet application using the advantages of wired and wireless integrated network solution.

Enhancing Internet of Things Security with Random Forest-Based Anomaly Detection

  • Ahmed Al Shihimi;Muhammad R Ahmed;Thirein Myo;Badar Al Baroomi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.67-76
    • /
    • 2024
  • The Internet of Things (IoT) has revolutionized communication and device operation, but it has also brought significant security challenges. IoT networks are structured into four levels: devices, networks, applications, and services, each with specific security considerations. Personal Area Networks (PANs), Local Area Networks (LANs), and Wide Area Networks (WANs) are the three types of IoT networks, each with unique security requirements. Communication protocols such as Wi-Fi and Bluetooth, commonly used in IoT networks, are susceptible to vulnerabilities and require additional security measures. Apart from physical security, authentication, encryption, software vulnerabilities, DoS attacks, data privacy, and supply chain security pose significant challenges. Ensuring the security of IoT devices and the data they exchange is crucial. This paper utilizes the Random Forest Algorithm from machine learning to detect anomalous data in IoT devices. The dataset consists of environmental data (temperature and humidity) collected from IoT sensors in Oman. The Random Forest Algorithm is implemented and trained using Python, and the accuracy and results of the model are discussed, demonstrating the effectiveness of Random Forest for detecting IoT device data anomalies.

Simulation of Slotted CSMA/CA MAC in IEEE 802.15.4 WPAN (IEEE 802.15.4 무선 PAN의 Slotted CSMA/CA MAC 시뮬레이션)

  • Lee Hae Rim;Chung Min Young;Lee Tae-Jin
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.10-14
    • /
    • 2005
  • IEEE 802.15.4 low-rate Wireless Personal Area Networks(WPAN) are expected to provide ubiquitous networking between small personal/home devices and sensors with low power consumption and low cost features. The technology employs special CSMA/CA (Carrier Sense Multiple Access/collision Avoidance) to save power consumption for small or portable WPAN-enabled devices. In this paper, we simulation the slotted CSMA/CA of IEEE 802.15.4 MAC and evaluate its performance limit in order to grasp the characteristics of Medium Access Control (MAC) of IEEE 802.15.4 WPAN.

  • PDF