• Title/Summary/Keyword: 단말

Search Result 3,728, Processing Time 0.037 seconds

Performance Analysis on Link Quality of Handover Mechanism based on the Terminal Mobility in Wired and Wireless Integrated Networks (유무선 복합망에서 이동 단말 기반 핸드오버의 링크 품질에 관한 성능 분석)

  • Park, Nam-Hun;Gwon, O-Jun;Kim, Yeong-Seon;Gam, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8S
    • /
    • pp.2608-2619
    • /
    • 2000
  • This paper proposes the Handover Scheme for the mobile and describes the result of the performance analysis. In the conventional scheme of handover request, the withdrawal of terminal may occur because handover request is performed based on fixed signal level without considering network load and terminal mobility. The proposed scheme offers the minimization of withdrawal and handover blocking probability by means of the handover request of terminal based on the network load and terminal mobility. Conventional handover scheme has the sequential procedure that network performs resource check and path rerouting on the handover by MT(Mobile Terminal). Proposed handover scheme pre-processes the resource check before the handover request by predicting the handover request timo so that handover latency can be reduced. Moreover, path optimization is executed after the completion of handover in order to reduce handover latency. The rdduction of handover latency prevents the dropping of service by minimizing backward handover blocking. In summary, we propose the prediction of handover request time and decision method based on terminal, validating the performance of proposed scheme considering various cases of simulation.

  • PDF

Implementation of Domain Separation-based Security Platform for Smart Device (안전한 스마트 단말을 위한 도메인 분리 기반 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.471-476
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices. The domain separation based smart device security platform technology in this paper blocks unauthorized access and leakage of sensitive information in device. Also it will be the solution can block transmission and execution of malicious code in various area including variety of IoT devices in internet rather than just smart devices.

Neighbor Discovery for Mobile Systems based on Deep Learning (딥러닝을 이용한 주변 무선단말 파악방안)

  • Lee, Woongsup;Ban, Tae-Won;Kim, Seong Hwan;Ryu, Jongyeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.527-533
    • /
    • 2018
  • Recently, the device-to-device (D2D) communication has been conceived as the key technology for the next-generation mobile communication systems. The neighbor discovery in which the nearby users are found, is essential for the proper operation of the D2D communication. In this paper, we propose new neighbor discovery scheme based on deep learning technology which has gained a lot of attention recently. In the proposed scheme, the neighboring users can be found using the uplink pilot transmission of users only, unlike conventional neighbor discovery schemes in which direct pilot communication among users is required, such that the signaling overhead can be greatly reduced in our proposed scheme. Moreover, the neighbors with different proximity can also be classified accordingly which enables more accurate neighbor discovery compared to the conventional schemes. The performance of our proposed scheme is verified through the tensorflow-based computer simulations.

Implementation of Virtualization-based Domain Separation Security Platform for Smart Devices (안전한 스마트 단말을 위한 가상화 기반 도메인 분리 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.116-123
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices.

MediaRenderer Service for Interoperability of UPnP AV Devices (UPnP AV 단말의 상호운용을 위한 미디어랜더러 서비스)

  • Kim, Sang-Ok;Lee, Kang-Hee;Lee, Hyun-Ju;Yun, He-Jin;Kim, Sang-Wook
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.634-636
    • /
    • 2005
  • 본 논문은 UPnP 기반의 홈 네트워크 환경에서 미디어 서비스를 이용하는 사용자가 위치 이동에 따라 AV 서비스 단말의 전환을 요구하는 경우 QoS 저하 없이 유연하게 상호연동 서비스하기 위한 UPnP AV 확장 서비스 모델을 제안한다. 사용자는 AV 서비스를 받기 위하여 기존의 이동단말기기 뿐만 아니라 일반 데스크탑, 그리고 셋탑박스 등의 다양한 형태의 단말환경을 상호연동하여 유기적으로 연결하여 사용할 수 있다. 하나의 단말환경에서 제공되던 미디어 컨텐츠는 미디어 랜더러와 컨트롤 포인트에 의해 다른 단말 환경에서 사용자의 조작 없이 미디어를 연속하여 제공 받을 수 있으며, 사용자는 이러한 UPnP AV 서비스를 별도의 설정 없이 이용할 수 있다. 논문에서 제안된 UPnP AV 확장 서비스는 사용자의 이동에 따라 단말에서 컨텐츠 재생을 위한 미디어 랜더러와 서로 다른 단말의 미디어 랜더러에 서비스하기 위한 컨트롤 포인트 그리고 각기 다른 단말장치로 컨텐츠가 제공되기 위한 미디어 서버로 구성된다. UPnP 포럼에서 정의하는 표준 서비스에 UPnP 프로토콜의 특성을 이용한 SwithingModule을 미디어 랜더러에 구현하여, 사용자의 이동 상황에 따라 AV 서비스를 받기 위한 미디어 전환 서비스를 지원한다.

  • PDF

Application of Software Decoder Based on H.264/AVC in Mobile Device (모바일 단말에서 H.264/AVC기반 소프트웨어 디코더 적용방안)

  • Jung, Sa-Kyun;Chang, Ok-Bae;Yoo, Cheol-Jung;Kim, Eun-Mi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.800-803
    • /
    • 2005
  • 모바일 단말 기반 동영상 서비스 기술에 관한 연구는 최근에 이르기까지 활발히 수행되고 있으며, 인터넷 기반에서 상용화가 가능한 기술 분야를 모바일에 응용하는 시도가 계속되고 있다. 모바일 단말 기반 영상서비스와 관련하여 최신형 모바일 단말에서는 관련기술을 하드웨어적으로 구현하거나 독자적 동영상 압축기술을 적용한 소프트웨어적 구현을 통하여 동영상 서비스를 제공하고 있다. 그러나 상당한 비율을 점하고 있는 기존 모바일 단말에서는 이들 하드웨어 칩이 없거나 추가적으로 애드온(add-on) 할 수 있는 표준적인 방법이 정해지지 않아 최신의 동영상 서비스 기술을 제공받을 수 없다. 따라서 시시각각으로 변화하는 모바일 동영상 서비스 환경에 적극적으로 대처하기 위해서는 소프트웨어적 해결방안이 필수적이라는 인식이 대두되고 있다. 본 연구에서는 모바일 단말에서 소프트웨어 디코더를 이용하여 기존 단말에서 뿐만 아니라 향후 최신단말에서도 적극적으로 대처하기 위하여 H.264/AVC 기반 소프트웨어 디코더를 모바일 단말에 적용하는 방안에 대하여 제안한다.

  • PDF

Design of a Wireless ATM MAC Protocol for Multimedia Services (멀티미디어 서비스를 위한 무선 ATM MAC 프로토콜의 설계)

  • 임재환;방기천
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.3
    • /
    • pp.329-338
    • /
    • 1999
  • In this paper we propose a WATM MAC protocol called DTDD/PS (Dynamic Time Division Duplex using Poll/Select scheme). The idea of the DTDD/PS protocol is based that a radio cell is considered as queueing system. The MAC controller in base station is charged in coordinating terminals for the QoS requirement from each terminal. For that reason, terminals send it's own dynamic parameter represented its status, and controller controls the access of terminals and assigns time slots dynamically using received parameters. Therefore this system can satisfy the QoS of real-time service in wireless environments. To evaluate DTDD/PS protocol simulations are executed. In 25Mbps channel capacity, the voice and data coexist traffic situation, as the total number of terminal is increased, the delay of data terminals is increased rapidly. But the case of only increasing data terminals, the number of supported voice terminals is not varying. Therefore we can expect that DTDD/PS protocol can applied to multimedia traffic effectively.

  • PDF

An Energy-Efficient Ad-hoc Routing Protocol Based on DSDV (DSDV 기반의 에너지 효율적 Ad-hoc 라우팅 프로토콜)

  • Seong Jin-Kyu;Lee Won-Joo;Jeon Chang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.677-683
    • /
    • 2006
  • If a node stops functioning in an ad-hoc wireless network, routing paths involving the node will also fail, when construction of replacement routes is required. A major cause of node failure is energy exhaustion, and route replacements may in turn lead to successive node failures by making more nodes consume their energy. The result could be performance degradation of networks. Therefore it is important to ensure that nodes with limited remaining energy are not included in route construction from the beginning. In this paper we propose a new routing protocol, which takes residue energy of nodes into account in order to prevent node failures resulting from energy shortage. Our routing protocol examines the smallest value of node residue energy ($E_{m}$) from each of all possible routing paths and selects the path which has the largest value of $E_{m}$. We prove, through simulation, that our routing protocol extends the lifetime of nodes which have limited amount of energy, reducing chances of path replacement. It is also shown that our proposed protocol helps alleviate network performance degradation.

QoS-Aware Group Scan Scheduling in WiMAX Networks (WiMAX 네트워크에서 QoS 기반의 그룹 스캔 스케쥴링 기법)

  • Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2A
    • /
    • pp.186-195
    • /
    • 2010
  • For the fast target base station channel decision in WiMAX networks, fast group scanning scheme was suggested, in which mobile stations in proximity of each other form a group and scan the candidate channels dispersively. However, the previous group scanning scheme does not consider the different QoS requirements of each MS in a group. In this paper we propose the enhanced group scanning scheme, so-called QoS-aware group scan scheduling scheme, that makes mobile stations in a group scan the candidate channels without deteriorating the QoS requirements. We introduce the QoS-aware channel scanning concept of a individual mobile station and show the different scanning latencies due to the different QoS requirements. With the help of the efficient channel allocation by the serving BS, in the proposed scanning scheme, a mobile station with relatively higher QoS in a group scans less amount of candidate channels than the others with relatively lower QoS, while the mobile stations in a group still guarantees the fast target base station decision. The performance results show that our proposed scanning scheme results in the fast target base station decision while considering the QoS requirements of each MS.

A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management (상황 인지 기술과 모바일 단말 관리 기술을 이용한 비인가 단말 탐지 및 차단 기법)

  • Mun, Jiman;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.1-8
    • /
    • 2014
  • This paper proposed a method that prevents data leakage and modulation and detects an unauthorized device by using AP and mobile device. Most of existing method for detecting and preventing an unauthorized device are similar to type of Evil Twin. However, in previous studies can not resolve many security accident and have the problem to cope with effectively security accident on various network. In order to solve these problem, companies prepare security accident through the varies policy and guideline. but It is hard to prevent all security accident because it is consistently increasing everyday. This paper suggests technique of detecting and preventing an unauthorized device using Context Awareness and Mobile Device Management. Firstly, when mobile device go into internal network, server distinguish access permission and authorization of mobile device using acquiring the conetxt information of mobile device. By using this result, server applies the appropriate management technique to the mobile device for leakage and accident of internal network.