• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.033 seconds

Adaptive Beamwidth Control Technique for Low-orbit Satellites for QoS Performance improvement based on Next Generation Military Mobile Satellite Networks (차세대 군 모바일 위성 네트워크 QoS 성능 향상을 위한 저궤도 위성 빔폭 적응적 제어 기법)

  • Jang, Dae-Hee;Hwang, Yoon-Ha;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.1-12
    • /
    • 2020
  • Low-Orbit satellite mobile networks can provide services through miniaturized terminals with low transmission power, which can be used as reliable means of communication in the national public disaster network and defense sector. However, the high traffic environment in the emergency preparedness situation increases the new call blocking probability and the handover failure probability of the satellite network, and the increase of the handover failure probability affects the QoS because low orbit satellites move in orbit at a very high speed. Among the channel allocation methods of satellite communication, the FCA shows relatively better performance in a high traffic environment than DCA and is suitable for emergency preparedness situations, but in order to optimize QoS when traffic increases, the new call blocking and the handover failure must be minimized. In this paper, we propose LEO-DBC (LEO satellite dynamic beam width control) technique, which improves QoS by adaptive adjustment of beam width of low-orbit satellites and call time of terminals by improving FCA-QH method. Through the LEO-DBC technique, it is expected that the QoS of the mobile satellite communication network can be optimally maintained in high traffic environments in emergency preparedness situations.

A Study on Improvement for Identification of Original Authors in Online Academic Information Service (온라인 학술정보 서비스 상 원저작자 식별 개선 방안 연구)

  • Jung-Wan Yeom;Song-Hwa Hong;Sang-Hyun Joo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.133-138
    • /
    • 2024
  • In the modern academic research environment, the advancement of digital technology provides researchers with increasingly diverse and rich access to information, but at the same time, the issue of author identification has emerged as a new challenge. The problem of author identification is a major factor that undermines the transparency and accuracy of academic communication, potentially causing confusion in the accurate attribution of research results and the construction of research networks. In response, identifier systems such as the International Standard Name Identifier (ISNI) and Open Researcher and Contributor ID (ORCID) have been introduced, but still face limitations due to low participation by authors and inaccurate entry of information. This study focuses on researching information management methods for identification from the moment author information is first entered into the system, proposing ways to improve the accuracy of author identification and maximize the efficiency of academic information services. Through this, it aims to renew awareness of the issue of author identification within the academic community and present concrete measures that related institutions and researchers can take to solve this problem.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

Visibility Analysis of Iridium Communication for SNIPE Nano-Satellite (SNIPE 초소형위성용 Iridium 통신 모듈의 가시성 분석)

  • Cho, Dong-Hyun;Kim, Hongrae;Kim, Hae-Dong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.2
    • /
    • pp.127-135
    • /
    • 2022
  • Compared to the continuous increase of domestic nano-satellite development cases, the initial communication success rate is relatively low. In a situation where communication cases of LEO satellites using commercial satellite communication networks are increasing recently. In this situation, the SNIPE project developed by the KASI(Korea Astronomy and Space Science Institute), KARI(Korea Aerospace Research Institute), and Yonsei University apply an Iridium module for communication test to the SNIPE nano-satellites. Therefore, in this paper, the visibility analysis of the iridium module on the SNIPE satellite was analyzed under considering the orbital and communication environment of the iridium satellite constellation and the attitude control mode. In the case of LEO satellites, the communication possibility was limited due to the relatively small iridium communication coverage for high altitude and the high doppler shift considered in the iridium communication network. For this reason, in this paper, it could be simulated that there was a more performance difference according to the difference in relative RAAN(Right Ascension of Ascending Node) angle with the Iridium constellation. Finally, by checking the visibility of communication module under the tumbling situation that occurred during the initial deployment of the nano-satellite, the possibility of using the iridium communication technology was analyzed.

Transmission Protocol for Cellular-Aided Device-to-Device Communication (기지국 협력 Device-to-Device 통신 전송 프로토콜 연구)

  • Jeon, Sang-Woon;Choi, Sang Won;Kim, Juyeop;Shin, Won-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1619-1629
    • /
    • 2016
  • We study an efficient transmission protocol for the cellular-aided device-to-device communication model. In particular, two source-destination pairs communicate with the help of unlink and downlink cellular links. For the proposed scheme, two transmitters send their messages and the base station and two receivers receive at the first phase. Then, at the second phase, the base station sends the XOR of the messages to two receivers and they try to decode their own messages from the received signals after the first and second phases. We analyze the outage-based throughput achievable by the proposed scheme and demonstrate by simulations that the proposed scheme provides an improved outage performance compared to the conventional device-to-device communication schemes.

A Vehicle-to-Vehicle Communication Protocol Scheme for Forwarding Emergency Information in Intelligent Cars Transportation Systems (지능형 차량 전송시스템에서 긴급정보 전송을 위한 Vehicle-to-Vehicle 통신 프로토콜)

  • Kim, Kyung-Jun;Cha, Byung-Rae;Kim, Chul-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.2
    • /
    • pp.70-80
    • /
    • 2007
  • Inter-vehicular communication suffers from a variety of the problem on the road, resulting in large delay in propagating emergency warning. An energy depletion as well as a transmission delay may induced by traffic accident. A transmission delay are caused by direct contention from nodes that can hear each other or indirect contention from nodes that can not hear each other, but simultaneously transmit to the same destination. A variety of works have been researched to solve the transmission delay and energy consumption problem in intelligent cars transportation systems. We consider a vehicle-to-vehicle communication protocol for disseminating an emergency information that include end-to-end and energy efficient transmission. In this paper, we propose A vehicle-to-vehicle communication protocol scheme for dissemination emergency information in intelligent cars communication based on IEEE 802.15.3 wireless personal area networks. Results from a simulation study reveal that our scheme can achieves low latency in delivering emergency warnings, and efficiency in consuming energy in stressful road scenarios.

  • PDF

A 2.65 GHz Doherty Power Amplifier Using Internally-Matched GaN-HEMT (내부정합된 GaN-HEMT를 이용한 2.65 GHz Doherty 전력증폭기)

  • Kang, Hyunuk;Lee, Hwiseob;Lim, Wonseob;Kim, Minseok;Lee, Hyoungjun;Yoon, Jeongsang;Lee, Dongwoo;Yang, Youngoo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.3
    • /
    • pp.269-276
    • /
    • 2016
  • This paper presents a 2.65 GHz Doherty power amplifier with internally-matched GaN HEMT. Internal matching circuits were adopted to match its harmonic impedances inside the package. Simultaneously, due to the partially matched fundamental impedance, input and output matching networks become simpler. Bond wires and parasitic elements of transistor package were predicted by EM simulation. For the LTE signal with 6.5 dB PAPR, the implemented Doherty power amplifier shows a power gain of 13.0 dB, a saturated output power of 55.4 dBm, an efficiency of 49.1 %, and ACLR of -26.3 dBc at 2.65 GHz with an operating voltage of 48 V.

Interference analysis of mutual radio communication in subway (지하철 무선환경의 전파간섭 영향 분석 방안 연구)

  • Oh, Sungkyun;Kim, Moon Hwan;Kim, Deokwon;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.4
    • /
    • pp.135-141
    • /
    • 2013
  • Subway in Korea, most of a metropolitan public transport use only worth ten million people a day floating population of wireless communication can be considered HOT SOPT. These three operators' 2G/3G/4G / Wi-Fi / T-DMB frequency and the number of services to co-exist, and the subway train passengers and subway party for operation and management of the communication network is also the co-subway passenger safety and for this service for the effects of mutual interference of whether the verification was necessary. This research and testing different frequency / communication interference between services and testing to determine whether, through the subway authorities and mobile operators in each frequency-specific interaction check and there is no interference to the safety and quality of subway passengers communication services that can be verified as the data was found. The verification methods in the metro area, not just from one region to determine whether the interference with a common verification methods can be applied.

Performance of Interference Mitigation using Optical Relay and Optical Beamforming in Visible Light Communication Systems (가시광 통신 시스템에서 Optical Relay와 Optical Beamforming을 통한 간섭 완화 성능)

  • Hwang, Yu Min;Kim, Yoon Hyun;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.63-68
    • /
    • 2012
  • The VLC (visible light communication) system is communication technology using visible rays (RGB) that come out in LED device. It is energy curtailment effect and possible in ubiquitous network service applications. Also, VLC system has the above advantage about that the communication throughout the whole room is enabled by high power lighting and lighting equipment with white colored LED which are easy to install and have good outward appearance. However, the signal detection performance for the receiver near the network of transmitter boundary is severely degraded and the transmission efficiency decreased due to the influence of the interference signal from the adjacent networks. In this paper, we propose an interference mitigation method with optical relay and optical beamforming scheme in VLC systems, and evaluate the reception performance. For the system BER, the proposed system demonstrates the performance enhancement compared to the not using the optical relay and optical beamforming scheme, and SNR performance gain and higher channel capacity is achieved.

Effect Analysis of a Authentication Algorithm in IPsec VPN Satellite Communication (IPsec VPN 위성통신에서 인증알고리즘이 미치는 영향 분석)

  • Jeong, Won Ho;Hwang, Lan-Mi;Yeo, Bong-Gu;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.147-154
    • /
    • 2015
  • Satellite broadcasting networks, like if you have if you have just received information that everyone must bring the required security attributes this earth should be done as encryption. In this paper, a satellite communication network AH additional security header in transport mode IPsec VPN by applying the SHA-256 and MD-5 authentication algorithm to authenticate the data portion Error rate and analyze the BER and Throughput. First, to generate a normal IP packet added to IPsec transport mode security header AH were constructed internal authentication data by applying the SHA-256 and MD-5 algorithm. Channel coder was applied to the Rate Compatible Punctured Turbo Codes, packet retransmission scheme Hybrid-ARQ Type-II and Type-III were used. Modulation method was applied to the BPSK, the wireless channel Markov channel (Rician 80%, Rayleigh 20% and Rician 90%, Rayleigh 10%) as an authentication algorithm according to the satellite channel state analyzed how they affect the error rate and Throughput.