• Title/Summary/Keyword: wireless communication service

Search Result 1,265, Processing Time 0.036 seconds

A operation scheme to the power consumption of base station in wireless networks (무선망에서 기지국의 전력소모에 대한 운영 방안)

  • Park, Sangjoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.285-289
    • /
    • 2020
  • The configuration of hierarchical wireless networks is provided to support diverse network environments. In the base station, two system state can be basically considered for the operation management so that the state transition may be occurred between active and sleep modes. Hence, to reduce energy consumption the system operation management of the low power should be considered to the base station system. In this paper we consider the analytical model of Discontinuous Reception (DRX) to investigate the system management. We provide the analysis scheme of base station system by the DRX model, and the low power factor would be investigated for the energy consumption. We also use the finite-state Markov system model that in a system state period the wireless resource request and the operation of service call arrival interval is considered to numerically analyze the performance of energy saving operations of base station.

A Study on the Characteristics of Methods for Experiencing Contents and Network Technologies in the Exhibition space applied with Location Based Service - Focus on T.um as the Public Exhibition Center for a Telecommunication Company - (위치기반서비스(LBS) 적용 전시관의 콘텐츠 체험방식과 기술특성에 관한 연구 - 이동통신 기업홍보관 티움(T.um)을 중심으로 -)

  • Yi, Joo-Hyoung
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.5
    • /
    • pp.173-181
    • /
    • 2010
  • Opened on November 2008, as the public exhibition center of a telecommunication company, T.um is dedicated for delivering the future ubiquitous technologies and business vision of the company leading domestic mobile communication business to the global expected clients and business partners. Since the public opening, not only over 18,000 audiences in 112 nations have been visiting T.um, but also the public media have been releasing news regarding the ubiquitous museum constantly. By the reasons, T.um is regarded as a successful case for public exhibition centers. The most distinguished quality of the museum is established by the Location Based Service technology in the initial construction stage. A visitor in anyplace of T.um can be detected by digital devices equipped GPS systems. The LBS system in T.um allows visitors to get the information of relevant technologies as well as the process of how to operating each content at his own spots by smart phone of which wireless network systems make it possible. This study is focusing on analyzing and defining the T.um special qualities in terms of technologies to provide the basic data for following exhibition space projects based on LBS. The special method of experiencing contents can be designed by utilizing the network system applied to T.um in the planning stage.

Routing in Vehicular Ad Hoc Networks: Issues and Protocols

  • Shrestha, Raj K.;Moh, Sang-Man;Chung, Il-Yong
    • Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.28-40
    • /
    • 2008
  • Vehicular ad hoc networks (VANETs) are a practical application class of wireless ad hoc networks, which consist of moving vehicles equipped with radio communication capabilities that collaborate to form a temporary network. This paper addresses issues and protocols of multihop routing in such emerging networks in the context of safety and infotainment applications. Due to the highly dynamic mobility of vehicles, frequent link breakage and short connection time are inevitable and, thus, the routing is a challenging task and interest for many researchers and industrial community. The frequent and dynamic change of topology makes the topology-based routing unreliable but the position-based routing more effective. The position-based routing consists of the location service which maps a node id to a geo-graphical position and the forwarding scheme which selects the next hop based on geo-graphical information of the node, its neighbors and the destination. The routing techniques are further categorized into geographical forwarding, trajectory forwarding and opportunistic forwarding based on the forwarding scheme. In this paper, we first present the distinguished properties of VANETs and the challenges and intractable issues posed in designing the routing protocols, followed by the comprehensive survey of existing routing protocols. Then, the different routing protocols designed for VANETs are compared in terms of characteristics, performance and application domains.

  • PDF

A Route Selection Scheme for WLAN Off-Loading in EPC Network with a Cloud Server (Cloud 서버를 포함한 EPC 망에서 WLAN 오프로딩 경로 선택)

  • Kim, Su-Hyun;Min, Sang-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2527-2532
    • /
    • 2013
  • There coexist various access network for mobile terminals, such as mobile phones, smart phones, and tablet PC, in mobile and wireless network. In these circumstance, the network traffic overload unexpected causes the service degradation or discontinuity. To solve this problem, we consider a off-loading route selection by a cloud server which monitors traffic volume and selects an appropriate route. With our proposed scheme, it is possible for the EPC network with untrusted WLAN access networks to operate efficiently to a trusted service level. Also, an optimal handover with satisfying service requirements could be achieved by the proposed offload scheme.

Handoff Scheme for Real Time Service in Home Network based on Wireless LAN (WLAN 기반 네트워크에서 실시간서비스 지원을 위한 핸드오프 방식)

  • Kwon Soo-Kun;Jeong Yeon-Joon;Oho Yeon-Joon;Paik Eei-Hyun;Park Kang-Roh
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.3
    • /
    • pp.1-9
    • /
    • 2006
  • The handoff in IEEE 802.11 WLAN is a hard handoff. In hard handoff, a station has to stop the communication. As a result, the station is likely to miss some packets that arrival during the handoff process. To recover these lost packets, buffer-and-forward scheme is used. But, buffer-and-forward scheme is not efficient for real time service. In this paper, we propose new handoff scheme for real time service in home network based WLAN. The scheme uses priority queue which is recommended in IEEE 802.lie, and priority of priority queue is given to real time handoff calls. The simulation results show that the proposed scheme reduces traffic loss and transmission sequence error.

  • PDF

A Route Selection Scheme for WLAN Offloading with Cloud Server in EPC Network (Cloud 서버를 포함한 EPC 망에서 WLAN 오프로딩 경로 선택 방안)

  • Kim, Su-hyun;Min, Sang-won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.603-606
    • /
    • 2013
  • Mobile and wireless communication technologies to the development of a variety of next-generation mobile networks such as smart phones, tablet PC and mobile terminals will coexist various access networks. In a variety of network service continuity and quality of service degradation due to network conditions, and the EPC network traffic overload phenomenon still remains a problem. In this paper, the EPC network traffic overload in distributed cloud servers is proposed to select. Our proposed scheme using an efficient network handover can provide optimal service according to the network condition.

  • PDF

Emergency Rescue Request Notification Service Using Bluetooth Low Energy Technology (Bluetooth Low Energy 기술을 이용한 긴급구조요청 알림서비스)

  • Kim, Sung-Jin;Cho, Kyoung-woo;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.529-530
    • /
    • 2016
  • When the mountain accident occurred, the accident victims should inform anyone of information of the location and accident situation rapidly. But if you are in the radio shadow area where you cannot use GPS, 3G/4G, and wireless communication, you can't inform someone your accidents. In this paper, we suggest the emergency rescue request notification service in situation that victims can't report their accidents. This service is to send request message for rescue in radio shadow area, in mountain accident, by BLE(Bluetooth Low Energy).

  • PDF

An Enhanced Location Determination Mechanism for Supporting Location Based Service of Mobile WiMAX Networks (모바일 와이맥스 망의 위치 기반 서비스 지원을 위한 위치 결정 방식)

  • Lee, Kye-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.329-334
    • /
    • 2010
  • Due to the advancement of mobile wireless networks, various LBS's (Location Based Service) with the knowledge of mobile station's current position are emerging. Providing LBS is very essential feature in Mobile WiMAX networks such as WiBro networks for their competitiveness. To this end, WiMAX Forum has established recently the network architecture and protocols for providing LBS and they are included in the Network working group's release 1.5 documents. Though there have been many research efforts on location determination in Wibro networks, none of them addresses the location determination mechanism complying to Forum's recent LBS standards. This paper proposes an enhanced TDOA-RTD combined location determination mechanism, which complies to the Forum's LBS architecture.

Design and Implementation of the Gateway Node for the Localization of the Mobile Object in Wireless Sensor Network (무선 센서 네트워크에서 이동 객체의 위치인식을 위한 게이트웨이 노드설계 및 구현)

  • Lee, Joa-Hyoung;Park, Chong-Myung;Jo, Young-Tae;Kwon, Young-Wan;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.7
    • /
    • pp.1314-1320
    • /
    • 2008
  • Recently, LBS(Location Based Service) which provides useful service based on the location of objects or human has drawn the attention of the research community. To provide LBS, many researchers have proposed many localization systems such as Cricket or Ubisense, however, these systems have the limit that it is very hard to perform the complicated computation on these systems because these systems consist of sensor nodes which have very limited computing power. In the paper, we propose a new localization system with the gateway node which has very high computing power and resource which is suitable for the complicated computation needed for localization.

System Access Control Technique for Secure Cloud Computing

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.67-76
    • /
    • 2019
  • Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.