• Title/Summary/Keyword: 셀룰러 시스템

Search Result 308, Processing Time 0.03 seconds

Design and implementation of a connectivity analyzer for the hybrid vehicular network (하이브리드 차량 네트워크를 위한 연결성 분석기의 설계 및 구현)

  • Lee, Junh-Hoon;Kim, Cheol-Min;Kwon, Sang-Cheol
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.3
    • /
    • pp.45-54
    • /
    • 2008
  • This paper designs and Implements a connectivity analyzer for the hybrid vehicular network based on the real-life movement history data achieved from the Taxi telematics system currently in operation, aiming at providing a useful guideline and information to build a telematics network. The simulator traces the location of each vehicle, sets the vehicle type, either gateway or normal, decides whether it can be connected to a mobile gateway, keeps track of status of the vehicle, and calculates the duration of disconnected state. With this analysis considering the transmission range and gateway ratio, we can decide the cost-effective number of mobile gateways having both cellular and ad-hoc network interfaces, and buffer space requirement based on the measured disconnection time and message generation ratio.

  • PDF

Efficient Resource Allocation Schemes for Relay-based Cooperative Networks in 3GPP LTE-Advanced Systems (3GPP LTE-Advanced 시스템에서 릴레이 기반의 협력 네트워크를 위한 효율적인 자원할당 기법)

  • Kim, San-Hae;Yang, Mo-Chan;Lee, Je-Yeon;Shin, Yo-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.555-567
    • /
    • 2010
  • Unlike single-hop systems, multi-hop systems that use relay nodes assign a part of the overall resources to relay communications. If efficient resource allocation schemes are not adopted, this leads to a loss of resources. Moreover, because we may not be able to guarantee high-link performance due to the adjacent-cell interference in relay-based cellular systems, resource efficiency can be severely decreased. In this paper, we propose efficient resource allocation schemes for downlink relay-based networks in 3GPP (3rd Generation Partnership Project) LTE (Long Term Evolution)-Advanced systems. Unlike conventional schemes that have static resource regions for each data link, the proposed schemes dynamically allocate the resources of each link to resource blocks, by considering the channel state and the capacity of each link. We also propose resource overlapping schemes in which two different links overlap at the same resource region, so as to improve cell or user throughput performance. The proposed resource overlapping schemes do not require additional processes such as interference cancellation in users, thank to considering additional interference from resource overlapping in advance.

Enhanced WMAN System based on Region and Time Partitioning D-TDD OFDM Architecture (영역/시간 세분화 D-TDD OFDM 구조에 기반한 새로운 WMAN 시스템 구조 설계)

  • Kim, Mee-Ran;Cheong, Hee-Jeong;Kim, Nak-Myeong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.68-77
    • /
    • 2006
  • In accommodating the asymmetric traffic for future wireless multimedia services, the dynamic time division duplexing (D-TDD) scheme is considered as one of the key solutions. With the D-TDD mode, however, the inter-BS and inter-MS interference is inevitable during the cross time slot (CTS) period, and this interference seriously degrades the system performance. To mitigate such interference, we propose a region and time partitioning D-TDD architecture for OFDM systems. Each time slot in the CTS period is split into several minislots, and then each cell is divided into as many regions as the number of minislots per time slot. We then assign the minislots only to the users in its predefined corresponding region. On top of such architecture which inherently separates the interfering entities farther from each other, we design a robust time slot allocation scheme so that the inter-cell interference can be minimized. By the computer simulation, it has been verified that the proposed scheme outperforms the conventional time slot allocation methods in both the outage probability and the bandwidth efficiency.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Hybrid Offloading Technique Based on Auction Theory and Reinforcement Learning in MEC Industrial IoT Environment (MEC 산업용 IoT 환경에서 경매 이론과 강화 학습 기반의 하이브리드 오프로딩 기법)

  • Bae Hyeon Ji;Kim Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.263-272
    • /
    • 2023
  • Industrial Internet of Things (IIoT) is an important factor in increasing production efficiency in industrial sectors, along with data collection, exchange and analysis through large-scale connectivity. However, as traffic increases explosively due to the recent spread of IIoT, an allocation method that can efficiently process traffic is required. In this thesis, I propose a two-stage task offloading decision method to increase successful task throughput in an IIoT environment. In addition, I consider a hybrid offloading system that can offload compute-intensive tasks to a mobile edge computing server via a cellular link or to a nearby IIoT device via a Device to Device (D2D) link. The first stage is to design an incentive mechanism to prevent devices participating in task offloading from acting selfishly and giving difficulties in improving task throughput. Among the mechanism design, McAfee's mechanism is used to control the selfish behavior of the devices that process the task and to increase the overall system throughput. After that, in stage 2, I propose a multi-armed bandit (MAB)-based task offloading decision method in a non-stationary environment by considering the irregular movement of the IIoT device. Experimental results show that the proposed method can obtain better performance in terms of overall system throughput, communication failure rate and regret compared to other existing methods.

A Handover Algorithm Using Fuzzy Set Theory (퍼지 이론을 이용한 핸드오버 알고리즘)

  • 정한호;김준철;이준환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.6
    • /
    • pp.824-834
    • /
    • 1993
  • In cellular mobile communication systems, if the size of a cell is decreasing for economic utilization of frequency resources, frequent handovers may be requested because the time a mobile stays in a cell is decreasing. In general the measured parameters to decide handover including RSSI, BER, and the distance between mobile station and base station, are usually incorrect and handover decision using single parameter insufficient. Therefore, the better handover algorithm should take over the problems of this uncertain measurements, and make the decision more robust and flexible by the consideration of all those decision parameters at the same time. We propose a novel handover algorithm based the multicriteria decision making, in which those parameters are participated in the decision process using aggregation function in fuzzy set theory. As a simulation results, the overall decision making is more reliable and flexible than the conventional method using only one parameter, RSSI in terms of call force ratio, and handover request ratio.

  • PDF

Analysis of Mobility Robustness Optimization Technology in LTE Self Organization Networks (LTE 자가구성 네트워크에서 MRO 기술 분석)

  • Yang, Mo-Chan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1025-1030
    • /
    • 2019
  • This paper describes SON(: Self Organization Network) technology in LTE networks. The SON is a unique feature of LTE compared to previous cellular systems such as UMTS and GSM, and it is a tool that effectively derives the best performance in the time-varying wireless radio environment. Also, the SON has the ability for the operator to automate the setting of the network, allowing for centralized planning and reducing the need for manual work. The SON is largely divided into three categories: Self-Configuration, Self-Optimization, and Self-Healing. Each large categories has a detailed description of technology, and the technologies in each categories are gathered to complete the technology called the SON. In this paper, we focus on MRO which is one of the Self-Optimization technique in each of the three categories.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering Weighted Feature Values (가중 특징 값을 고려한 러프 집합 기반 비정상 행위 탐지방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju;Lee, Kyung-Sook
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1030-1036
    • /
    • 2006
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function considering weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the method that assigns different weighted values to feature attributes depending on importance.

  • PDF

An Efficient Hand-off Mechanism in Micro-Domain (마이크로 도메인에서의 효율적인 핸드오프 방안)

  • Kim Eung do;Kim Hwa sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3A
    • /
    • pp.195-202
    • /
    • 2005
  • The third generation cellular system requires the seamless macro/micro mobility support. Mobile IP provides a simple and scalable macro mobility solution but lacks the support for fast handoff control in micro-domain. However, A lot of micro-mobility protocols have been proposed to complement the Mobile IP capability by providing the fast, seamless, and local handoff control. Cellular If also provides the seamless mobility support in limited geographical area. But semi-soft handoff mechanism of Cellular IP produces the packet loss and the duplication problem due to the difference of propagation delay between the new path and the old path. In this paper, we present an efficient handoff mechanism in micro-domain. The proposed handoff mechanism uses the SCD (Suitable Cross Delay) in order to minimize the packet loss and the duplication problem during the handoff. Also, the proposed mechanism is verified by the performance evaluation through the NS-2 Simulation.

Effective Interference Alignment for Device-to-Device Communication Underlaid in Multi-Cell Interference Network (다중셀 간섭 네트워크와 중첩된 D2D 통신을 위한 효과적인 간섭 정렬 기법)

  • Qu, Xin;Kang, Chung Gu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.3
    • /
    • pp.161-163
    • /
    • 2014
  • We consider the device-to-device (D2D) communication underlaying multi-cell interference system, in which the cellular downlink (DL) resource is reused by K cells and two D2D transmission links within each cell. In this paper, it has been shown that the downlink intra-cell and inter-cell interference can be effectively handled by interference alignment (IA) technique, as long as the simultaneous D2D links are properly selected or power-controlled so that they may not incur interference to the base stations in the same and neighbor cells. In particular, we provides the IA technique that can achieve the theoretically maximum possible degree of freedom (DOF), demonstrating that a total of (K+1)M degrees of freedom (DOFs) can be achieved for K-cell interference system with two underlaying D2D links, where base stations, cellular UE's, and D2D UE's all have M transmit and receive antennas.