• Title/Summary/Keyword: wireless communication service

Search Result 1,265, Processing Time 0.028 seconds

A Channel Allocation Scheme Based on Spectrum Hole Prediction in Cognitive Radio Wireless Networks (무선인지 통신망에서 스펙트럼 홀 예측에 의한 채널할당)

  • Lee, Jin-yi
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.318-322
    • /
    • 2015
  • In wireless communication networks, most of the prediction techniques are used for predicting the amount of resource required by user's calls for improving their demanding quality of service. However, we propose a channel allocation scheme based on predicting the resources of white spectrum holes for improving the QoS of rental user's spectrum handoff calls for cognitive radio networks in this paper. This method is supported by Wiener predictor to predict the amount of white spectrum holes of license user's free spectrum resources. We classify rental user's calls into initial calls and spectrum handoff calls, and some portion of predicted spectrum-hole resources is reserved for spectrum handoff calls' priority allocation. Simulations show that the performance of the proposed scheme outperforms in spectrum handoff call's dropping rate than an existing method without spectrum hole prediction(11% average improvement in 50% reservation).

Design and Implementation of Resources Management System for Extension of outside Data Space in Mobile Device (모바일 디바이스에서 외부 데이터 영역의 확장을 위한 자원관리시스템의 설계 및 구현)

  • 나승원;오세만
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.2
    • /
    • pp.33-48
    • /
    • 2003
  • Wireless Internet, created through the merging of mobile communication with Internet technology, provides the advantage of mobility, but the restrictions of the mobile environment are deterring it from growing into a mass public service. Of the restricting factors of the wireless environment, narrow memory space creates the disadvantage of not being able to manage resources in mobile devices efficiently Because there is a limit to obtaining sufficient memory space from hardware made with consideration of portability, future devices will need to have a platform design with storage area extended from internal storage to external storage space. In this paper, we present a mobile agent that extends the memory space from only the inside of a mobile device to an external server making it possible to use data by on-line Run-time, and can also manage internal files efficiently. We have designed and implemented a RMS(Resources Management System) as a realization. Devices using the proposed RMS will be able to apply extended processes with the 'Mobile Space Extension' and will be benefited with optimal memory space through efficient internal file management.

  • PDF

An On-demand Station Location Management scheme using 6-address structure of IEEE 802.11s (IEEE 802.11s 6-Address 구조를 이용한 On-demand 방식 단말 위치 관리기법)

  • Jang, Jeong-Hun;Kong, Jong-Min;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.829-836
    • /
    • 2013
  • Wireless mesh networks(WMNs) are wireless backbone networks technology consisting of a multi-hop routers. Location management is essential to provide a service to the terminal in WMNs. IEEE 802.11s standards have two basic location management scheme for location management - the proxy registration procedure and the associated station discovery protocol. These basic schemes, however, suffer from serious drawbacks including redundancy control message, ineffective location information maintenance, additional delay time. This paper propose an on-demand station location management scheme using 6-address structure of IEEE 802.11s. Through analysis and experimental evaluation on simulation, we show that proposal scheme reduce control message and forwarding delay time.

Efficient Content Sharing in Ad Hoc Networks (애드 혹 네트워크에서의 효율적인 콘텐츠 공유 방법)

  • Kang, Seung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.209-220
    • /
    • 2007
  • Mobile devices become a pak of our daily life due to their versatility, such as the wireless phone calls, the wireless accessibility to Internet, the display of multimedia content, and the communication with nearby mobile devices. Third generation telecommunication service provides an easy access to the Internet for nubile devices. Mobile users pay a fee charged by the telecommunication provider based on the amount of data transferred. This paper introduces a special ad hoc network in which mobile devices cooperate each other to download an interesting content from the Internet in order to reduce the telecommunication cost. The mobile devices, called the peers, in the ad hoc network are assigned a portion of the target file, and are responsible for downloading the portion using their 3G connection. Then, the peers exchange their downloaded portion with other participating peers using their cost-free ad hoc connection in order to reconstruct the whole content. According to the simulation results, large number of participating peers saves the telecommunication cost up to 90% with as few as 10 peers, although it slightly increase the overall content reconstruction time.

  • PDF

A Cluster-Header Selecting Method for more Secure and Energy-Efficient in Wireless Sensor Network (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 헤더 선출 기법)

  • Kim, Jin-Mook;Lee, Pung-Ho;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.107-118
    • /
    • 2007
  • Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network. In this paper, first each node transmit residual electric power and authentication message to BS (Base-Station). BS reflects "Validity Authentication Rate" and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates "Validity Authentication Rate" of former round. Finally, BS can select more secure cluster header.

  • PDF

Performance Analysis on the Impact of Mutual Interference and the Interference Suppression Method for CBTC System in the Presence of WPAN System (CBTC시스템과 WPAN시스템의 상호간섭영향 및 간섭신호 억제방안에 대한 성능분석)

  • Kim, Seong Cheol
    • Journal of the Korean Society for Railway
    • /
    • v.15 no.5
    • /
    • pp.454-458
    • /
    • 2012
  • The CBTC(Communication based Train Control) and WPAN(Wireless Personal Area Network) systems employed on 2.4GHz ISM band wireless networks provide complementary service within the same environment. Coexistence between the networks will be impaired if the mutual packets are uncertainty associated the timing or gaussian distance. This paper analyzes the impact of the mutual interference and proposed method to minimize the effect of the WPAN system signals on CBTC system. The performance analysis is illustrated by examining the symbol error rate versus signal to noise interference ratio in terms of carrier frequency offset. The method contributes to reduce the symbol error rate drastically. However it can't be a fundamental solution for the impact on the interference problem. It may be needed for railway only frequency after checking the problems of the current railway frequency.

An empirical study Influencing the Wireless Battery Charger on Choice to Repurchase Intention : Based Big Data Analysis (사물인터넷 관련 실증연구에 대한 문헌적 분석 : 빅 데이터 분석을 중심으로)

  • Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.130-133
    • /
    • 2015
  • Recently, with information communication technology becomes advanced, the importance of future internet is emphasized and in part of that, internet of things is magnified in terms of importance and usage in public and private sector. Because of that, as the interest in this area out focused, many kinds of technology and new service are being exploited in this field. Therefore, we conducted a review research based on the internet of things. Also, this study was targeted a total of 34 research papers that are setting up the related internet of things among the research papers published in domestic academic journals since 2010. In this review, the studies related internet of things showed that the most is studied between 2014 and 2015. This study suggests practical and theoretical implications based on the results.

  • PDF

Two Kinds of Hybrid Localization System Design Techniques Based on LED IT (LED IT 기반의 두 가지 하이브리드 측위 시스템 설계 기법)

  • Lee, Yong Up;Kang, Yeongsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.155-164
    • /
    • 2013
  • Two design techniques for more accurate and more convenient hybrid positioning system with visible light communication (VLC) and ad-hoc wireless network infrastructure are proposed, in order to overcome the problems of high estimation error, high cost, and limited service range of the conventional positioning techniques. First method is based on a non-carrier VLC based hybrid positioning technique for applications involving of low data rate optical sensing and narrow-range visible light reception from transmitter, and long-range positioning. The second method uses a 4 MHz carrier VLC-based hybrid positioning technique for a high data rate optical sensing and wide-range visible light receiving from transmitter, and mid-range positioning applications. In indoor environments with obstacles where there are long-range 7731.4cm and mid-range 2368cm distances between an observer and a target respectively, the hybrid positioning developed with two design techniques are tested, and the proposed system is verified and analyzed in this paper.

Algorithm of GTS Time Slots Allocation Based on Weighted Fair Queuing in Environments of WBAN (WBAN 환경에서 Weighted Fair Queuing 기반의 GTS 타임 슬롯 할당 알고리즘)

  • Kim, Kyoung-Mok;Jung, Won-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.45-56
    • /
    • 2011
  • WBAN is short range wireless communication technology which is consists of several small devices close to, attached to or implanted into the human body. WBAN is classified into between medical and non-medical by applications based on technology and medical data with periodic characteristics is used the GTS method for transmitting data to guarantee the QoS. In this paper we proposed algorithm that resolve lack of GTSs while data transmit GTS method in superframe structure of WBAN. Coordinator dynamically allocates GTSs according to the data rate of devices and make devices share GTSs when lack of GTSs. We compared delay bounds, throughput for performance evaluation of the proposed algorithm. In other words, we proposed algorithm adaptive WFQ scheduling that GTS allocation support differential data rate in environments of WBAN. The experiment results show the throughput increased and the maximum delay decreased compared with Round Robin scheduling.

Cyber-attack and Cybersecurity Design for a Smart Work System (스마트워크 시스템을 위한 사이버 공격 및 사이버 보안 설계)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • The speed of technological development is increasing, and high-performance digital devices are spreading. Wired digital devices such as PCs have been optimized for existing wired environments, but needs are shifting away from the constraints of space and space to smart work that enables efficient work anywhere and anytime. The Smart Work System security design is needed to secure integrity and availability in the face of various security threats including physical threats (lost, stolen, and damaged terminals), technical threats (data theft, DoS: denial of service), and unauthorized access outside the wired environment. In this study, we analyzed smart work network systems, wired / wireless link systems, and digital smart devices. We also studied cyber-attack analysis and cybersecurity design methods for a Smart Work wired system and a future wireless system. This study will be used as basic data for building a secure Smart Work system.