• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.035 seconds

Technical Trend of Mobile VoIP (Mobile VoIP 기술 동향 및 분석)

  • Lee, Young-Pyo;Park, Jun-Su;Kim, Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.97-101
    • /
    • 2008
  • Voice over IP is a telephone service which sends and receives the voices through the Internet. Because the infrastructure of wireless and mobile communication networks such as 3G, Wi-Fi and WiMAX has expanded, the study about Mobile VoIP, which provides the voice service from wireless network, has been actively in progress. Since Rei 6 HSPA in 3GPP and Rev A lxEVDO in 3GPP2, VoIP through the data channel is more efficient than circuit switch. It is predicted that VoIP over 4G will be more effective and 4G mobile VoIP business will be vitalized in the future. In addition, there are businesses which offer VoWLAN by using software such as Skype and Fring. They provide services which cheapen the price of international calls and long distance calls. This paper will present the Korean and other countries' mobile VoIP trends, its classification along the network connection, the study on techniques, and conditions of mobile VoIP. It also will be described a view of terminal convergence and service convergence.

  • PDF

The Congestion Control using Multiple Time Scale under Self-Similar Traffic of TCP (TCP의 자기 유사성 트래픽 조건하에서 다중 시간 간격을 이용한 혼잡 제어)

  • 김광준;윤찬호;김천석
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.310-323
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to window-based congestion control, in particular, TCP This is performed by interfacing TCP with a large tine scale control nodule which adjusts the aggressiveness of bandwidth consumption behavior exhibited by TCP as a function of "large time scale" network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by RTT Our contribution is threefold. First, we define a modular extension of TCP-a function call with a simple interface-that applies to various flavors of TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that multiple time scale TCP endows the underlying feedback control with preactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of three traffic control dimensions-tracking ability, connection duration, and fairness-on performance. Performance evaluation of multiple time scale TCP is facilitated by a simulation bench-mark environment which is based on physical modeling of self-similar traffic.

Media Access Scheme for Achieving an Effective Traffic Control Mechanism and Energy Efficiency in Sensor Networks (센서 네트워크에서 효과적인 트래픽 제어 방법과 에너지 효율성을 고려한 Media Access 기법)

  • Min Byung-Ung;Kim Dong-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1060-1064
    • /
    • 2006
  • Data collected by sensors in field are transmitted to the base station gathering all of data. Because sensors have to gather data in surroundings and periodically transmit data to the base station, it makes energy consumed much. In this paper, we mose the scheme that is to avoid traffic congestion with achievement of energy efficiency, so collected data is transmitted efficiently. This is to adjust transmission rate differently in case of increasing or decreasing traffic and minimize the energy consumption with setting ideal options up basic CSMA(Carrier Sense Multiple Access) protocol in each sensor. Through the simulation, we find the ideal CSMA options and apply the proposed scheme of traffic control mechanism to them and analyze them, then show energy efficiency and effective traffic control mechanism.

A study on link-efficiency and Traffic analysis for Packet-switching using the link state algorithm (링크상태 알고리즘을 이용한 패킷스위칭의 트래픽분석과 링크효율에 관한 연구)

  • 황민호;고남영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.1
    • /
    • pp.30-35
    • /
    • 2002
  • Dynamic routing uses routing protocols to select the best routes and to update the routing table. RP (Routing Information Protocol)using a distance-vector algorithm becomes generally known a routing protocol on the network. RIP selects the route with the lowest "hop count" (metric) as the best route. but RIP has a serious shortcoming. a mP router cannot maintain a complete routing table for a network that has destinations more than 15 hops away. To overcome this defect, It uses the OSPF (Open Shortest Path First) of link -state protocols developed for TCP/IP. It is suitable for very large networks and provides several advantages over RIP. This paper analyzes the traffic and the link efficiency between two protocols such as message delivery and delay, link utilization, message counts on the same network.e network.

A Study on Efficient Numbering Plan of Communication Networks (통신망의 효율적인 번호배분에 관한 연구)

  • 최영상;남지연;김석태
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1998.05a
    • /
    • pp.82-86
    • /
    • 1998
  • 통신망 번호는 각종 통신망의 분류와 통신망 사업자를 식별하고, 통신망 사업자가 제공하는 서비스를 선택하는데 사용된다. 최근에는 전화망내에 새로운 통신망이 추가되면서 이들간의 식별을 위한 새로운 번호체계가 요구되고 있다. 현재의 국내 통신망 번호체계는 망번호 고갈, 지역번호 과다 등의 문제점을 안고 있다. 이에 본 논문에서는 먼저 전화망내의 유ㆍ무선전화망, 무선호출망과 개인번호를 통신망이라 지칭하여 통신망 번호체계의 현황과 문제점을 살펴본다. 그 후 효율적인 번호배분방안으로 첫째, 현 10개의 통신망 번호체계를 통신서비스 특성이 동일한 점을 이용하여 5개로 통합하고, 둘째, 144개의 과다 지역번호를 5개로 광역화시키며, 셋째, 개인번호 서비스를 세기별로 교차 할당시키는 방법을 제안한다. 그리고 본 방안을 현실화시키기 위한 기술적 전환방안과 제도적 전환방안을 살펴보고 제안된 번호체계의 기대효과를 고찰한다. 본 번호계획을 시행시 통신망 가입자 번호가 8자리로 일원화되고, 통신망 번호 $\ulcorner$01X$\lrcorner$대에 5개의 예비번호가 확보되어 가입자번호도 1배이상 배분가능하다. 또한 지역번호 광역화로 번호수용이 23,760만에서 40,000만으로 늘어나며, 개인번호는 세기별, 10년 단위까지 구분이 가능하고 수용번호도 2배로 늘어 통일 및 향후 인구증가까지 대비할 수 있음을 확인할 수 있었다.

  • PDF

Efficient Data Storage & Query Processing Methods in Military Ubiquitous Sensor Networks (군 USN 환경에서 효율적인 데이터 저장 및 질의 처리 방법 연구)

  • Kwon, Young-Mo;Choi, Hyun-Sik;Chung, Yon-Dohn
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.875-885
    • /
    • 2010
  • Recently, the role of Ubiquitous Sensor Network(USN) has been considered to be essential for supporting the near future Network Centric Warfare(NCW) and Tactical Information Communication Network(TICN). In this paper, we explore a set of data storage methods(external storage, local storage and data storage) and query processing methods in WSN. In particular, we focus on analyzing a novel data structure for supporting the local storage method, named the partial ordered tree(POT). The main idea behind POT is that sensor readings are usually correlated with the physical spatial domain. With the help of POT, only a small portion of sensor nodes participate in query processing tasks, and thus network lifetime is greatly increased. Through a series of simulation experiments, we demonstrate that the POT based local storage method clearly outperforms the existing data storage methods in terms of the energy-efficiency, which directly affects the network lifetime, for processing exact match queries, range queries and top-k queries.

Modeling and Posture Control of Lower Limb Prosthesis Using Neural Networks

  • Lee, Ju-Won;Lee, Gun-Ki
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.2
    • /
    • pp.110-115
    • /
    • 2004
  • The prosthesis of current commercialized apparatus has considerable problems, requiring improvement. Especially, LLP(Lower Limb Prosthesis)-related problems have improved, but it cannot provide normal walking because, mainly, the gait control of the LLP does not fit with patient's gait manner. To solve this problem, HCI((Human Computer Interaction) that adapts and controls LLP postures according to patient's gait manner more effectively is studied in this research. The proposed control technique has 2 steps: 1) the multilayer neural network forecasts angles of gait of LLP by using the angle of normal side of lower limbs; and 2) the adaptive neural controller manages the postures of the LLP based on the predicted joint angles. According to the experiment data, the prediction error of hip angles was 0.32[deg.], and the predicted error of knee angles was 0.12[deg.] for the estimated posture angles for the LLP. The performance data was obtained by applying the reference inputs of the LLP controller while walking. Accordingly, the control performance of the hip prosthesis improved by 80% due to the control postures of the LLP using the reference input when comparing with LQR controller.

An Adaptive Drop Marker for Edge Routers in DiffServ Networks

  • Hur, Kyeong
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.411-419
    • /
    • 2011
  • In this paper, we propose an Adaptive Regulating Drop (ARD) marker, as a novel dropping strategy at the ingressive edge router, to improve TCP fairness in assured services (ASs) without a decrease in the link utilization. To drop packets pertinently, the ARD marker adaptively changes a Temporary Permitted Rate (TPR) for aggregate TCP flows. The TPR is set larger than the current input IN packet rate of aggregate TCP flows while inversely proportional to the measured input OUT packet rate. To reduce the excessive use of greedy TCP flows by notifying droppings of their IN packets constantly to them without a decrease in the link utilization, the ARD marker performs random early fair remarking of their excessive IN packets to OUT packets at the aggregate flow level according to the TPR. In addition, an aggregate dropper is combined to drop some excessive IN packets fairly and constantly according to the TPR. Thus, the throughput of a TCP flow no more depends on only the sporadic and unfair OUT packet droppings at the RIO buffer in the core router. Then, the ARD marker regulates the packet transmission rate of each TCP flow to the contract rate by increasing TCP fairness, without a decrease in the link utilization.

A Method for Improving Accuracy of Image Matching Algorithm for Car Navigation System

  • Kim, Jin-Deog;Moon, Hye-Young
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.447-451
    • /
    • 2011
  • Recently, various in-vehicle networks have been developed respectively in order to accomplish their own purposes such as CAN and MOST. Especially, the MOST network is usually adapted to provide entertainment service. The car navigation system is also widely used for guiding driving paths to driver. The position for the navigation system is usually acquired by GPS technology. However, the GPS technique has two serious problems. The first is unavailability in urban canyons. The second is inherent positional error rate. The problems have been studied in many literatures. However, the second still leads to incorrect locational information in some area, especially parallel roads. This paper proposes a performance tuning method of image matching algorithm for the car navigation system. The method utilizes images obtained from in-vehicle MOST network and a real-time image matching algorithm which determines the direction of moving vehicle in parallel section of road. In order to accuracy improvement of image matching algorithm, three conditions are applied. The experimental tests show that the proposed system increases the accuracy.

A Study of Key Node Search in Reconnaissance Surveillance Sensor Networks (감시정찰 센서네트워크에서 중요노드 탐색 연구)

  • Kook, Yoon-Ju;Kang, Ji-Won;Kim, Jeom-Goo;Kim, Kiu-Nam
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1453-1458
    • /
    • 2009
  • Sensor network for the human approach in a difficult area and a wide range of surveillance and the boundaries for the purpose and mission is the utilization significantly. In this paper we searched important nodes from the surveillance reconnaissance sensor network based on the virtual data. we generated data within the sensor's measurement range in the data transmitted from sensor nodes, and used PCA(Principle Component Analysis) for searching key node. If the important sensor node searched, and we can have easy management and establishing security measures when security problems is happened about nodes. This is for the sensor network in terms of effectiveness and cost-effectively and is directly connected with life span.