• Title/Summary/Keyword: 차세대 이동통신

Search Result 739, Processing Time 0.025 seconds

Admission Control for Voice and Stream-Type Data Services in DS-CDMA Cellular System (직접 대역확산 부호분할 시스템에서 음성 및 흐름형 데이터 서비스를 위한 호 수락제어 기법)

  • Chang Jin-weon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.737-748
    • /
    • 2005
  • Two flexible admission control schemes for integrated voice and stream-type data services are proposed in DS-CDMA systems. Most Previous studies on admission control have focused on integration of short, bursty Packet-type data services and conventional voice services. However, stream-type data services with a relatively long service holding time are expected to be a considerable portion of data traffic in future generation cellular systems. Scheme I is a basic scheme that accommodates both voice and data services with full bandwidth. However, voice services are given priority over data services using the duration difference between the holding times for these services. Scheme ll uses a different method to efficiently give priority to voice services over stream-type data services. An additional interference margin for voice services is provided by suppressing interference from stream-type data services according to voice access requests and a varying interference status. Performance of the two schemes is evaluated by developing Markovian models. Numerical results show that the voice capacity is highly sensitive to the service holding time of data services while the performance measures of data services are not highly sensitive. Scheme H is a significant improvement over Scheme I for accommodating voice and stream-type data services

A Simple Bit Allocation Scheme Based on Grouped Sub-Channels for V-BLAST OFDM Systems (V-BLAST OFDM 시스템을 위한 그룹화된 부채널 기반의 간단한 형태의 비트 할당 기법)

  • Park Dae-Jin;Yang Suck-Chel;Kim Jong-Won;Yoo Myung-Sik;Lee Won-Cheol;Shin Yo-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.680-690
    • /
    • 2006
  • In this paper, we present a bit allocation scheme based on grouped sub-channels for MIMO-OFDM (Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing) systems using V-BLAST (Vertical-Bell laboratories LAyered Space-Time) detector. A fully adaptive modulation and coding scheme may provide optimal performance in the MIMO-OFDM systems, however it requires excessive feedback information. Instead, SBA (Simplified Bit Allocation) scheme for reduction of feedback overhead, which applies the same modulation and coding to all the good sub-channels, may be considered. The proposed scheme in this paper named SBA-GS (Simplified Bit Allocation based on Grouped Sub-channels) groups sub-channels and assigns the same modulation and coding to the set of selected sub-channel groups. Simulation results show that the proposed scheme achieves comparable bit error rate performance of the conventional SBA scheme, while significantly reducing the feedback overhead in multipath channels with small delay spreads.

Unified Radio Resource Management for Hybrid Division Duplex System (Hybrid Division Duplex 시스템을 위한 통합 무선 자원관리 기법)

  • Kim, Pil-Geun;Kang, Chang-Gu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1076-1084
    • /
    • 2006
  • In this paper, we first review a concept of hybrid division duplexing (HDD) scheme, which has been proposed as a new type of duplexing scheme useful for a next generation mobile communication system and its implementation issues, including the unified radio resource management for HDD scheme. The HDD scheme maintains the advantages of both TDD and FDD at the same time while providing a useful structure to control the inter-cell interference, caused by an asymmetric traffic load of multimedia services over uplink and downlink in the TDD scheme. Employing two frequency bands, one for TDD scheme and the other for FDD scheme, uplink is operating under the TDD scheme only, while downlink is operating under the TDD or FDD scheme, depending on the location of mobile station. In the HDD scheme, therefore, it must determine a type of duplexing scheme to employ in the downlink and futhermore, a ratio of uplink and downlink duration to meet a given traffic load of asymmetric service, which requires some unified radio resource management for handling the subsequent inter-cell interference. In this paper, we propose a distributed adaptive control approach as a means of unified radio resource management for a HDD system that maximizes the overall system efficiency by fully utilizing the resource in TDD band, while minimizing the inter-cell interference.

Development of V2I2V Communication-based Collision Prevention Support Service Using Artificial Neural Network (인공신경망을 활용한 V2I2V 통신 기반 차량 추돌방지 지원 서비스 개발)

  • Tak, Sehyun;Kang, Kyeongpyo;Lee, Donghoun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.126-141
    • /
    • 2019
  • One of the Cooperative Intelligent Transportation System(C-ITS) priority services is collision prevention support service. Several studies have considered V2I2V communication-based collision prevention support services using Artificial Neural Networks(ANN). However, such services still show some issues due to a low penetration of C-ITS devices and large delay, particularly when loading massive traffic data into the server in the C-ITS center. This study proposes the Artificial Neural Network-based Collision Warning Service(ACWS), which allows upstream vehicle to update pre-determined weights involved in the ANN by using real-time sectional traffic information. This research evaluates the proposed service with respect to various penetration rates and delays. The evaluation result shows the performance of the ACWS increases as the penetration rate of the C-ITS devices in the vehicles increases or the delay decreases. Furthermore, it reveals a better performance is observed in more advanced ANN model-based ACWS for any given set of conditions.

Multiplex Certification System Using XML For WBI (WBI에서의 XML 다중인증 시스템)

  • 신영준;이동휘;김정재;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.297-302
    • /
    • 2004
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submint various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. And XML electronic signature raise interworking between digital signature systems used by various field of using XML document. Using these merit and complementing defect are main contents that users have to pay about Certification service to get CA certificate from 2004 june. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF

Hybrid ARQ scheme using RCPC codes in Wireless (무선 ATM 환경에서 RCPC 코드를 이용한 하이브리드 ARQ 기법)

  • Han, Eun-Jung;Cho, Young-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.7
    • /
    • pp.12-21
    • /
    • 2002
  • In this paper, we propose a new hybrid ARQ scheme to consider real-time and non real-time services in a wireless ATM network. Real-time and non-real-time services require different error control schemes according to each service characteristics. Therefore, in the next generation mobile communication environments where these service scenarios should be deployed, hybrid ARQ scheme using RCPC code with variable coding rate becomes one of the most suitable solutions. Because the variable coding rate is applied according to traits of transmitted frame and channel status, hybrid ARQ scheme using RCPC code can expect UEP effect. The UEP scheme does not apply equal error protection level to all information, but does high error protection level to more important information. In Our scheme, UEP of high error protection level is applied to real-time service, and UEP of low error protection and retransmission techniques are applied to non real-time service. We show that the proposed hybrid ARQ scheme improves channel utilization efficiency and yields high error correction behaviors.

A Inter-layer Path Provisioning System Architecture in Multi-layer Networks (다계층 광네트워크에서 계층간 경로설정 시스템 구조 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.25-31
    • /
    • 2013
  • Looking at the recent value change of users and the usage pattern of network users, it is changing from simple web information, one-way information acquisition and data transmission to increase of usage of multimedia, increasing demand for security and customization, and increasing demands for free mobility. Due to this change of demand, the services which were provided individually, developed into a form which is merged, the network also seems to develop into the combined network from the individual network for individual service, and the communication network control technology which is the core technology is also rapidly developing. To reflect the users' demands, the next generation network created the multi-layer network which is based on the WDM/IP transmission system and added the to make it easy to restructure. P-OTS (Packet-Optical Transport System) can be defined as a platform that combines SONET/SDH, Ethernet, DWDM, optical transport network (OTN) switching and reconfigurable optical add-drop multiplexers (ROADMs). In this paper, we suggested that the optimum path choice be performed through diversification of the PCE-based path selection using the information of various layers altogether in the multi-layer environment, compared with the established path selection method when the path was selected using the information of each layers.

CPW-Fed Super-wideband Semicircular-Disc-Shaped Dipole Antenna (CPW-급전 초광대역 반원-디스크-모양 다이폴 안테나)

  • Junho Yeo;Jong-Ig Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.3
    • /
    • pp.356-361
    • /
    • 2024
  • This paper deals with the design and fabrication of a coplanar waveguide (CPW)-fed super-wideband semicircular-disk-shaped dipole antenna operating in a frequency band of 2.4 GHz or higher. To feed the antenna, a CPW feed line was appended to the center of the lower arm of the semicircular-disk-shaped dipole antenna. For miniaturization, square patches were added to the ends of the two arms of the semicircular-disk-shaped dipole, whereas the slot width of the CPW feed line at the center of the dipole antenna was increased to improve impedance matching in the 5.4-6.3 GHz band. The simulated frequency band of the proposed antenna for a voltage standing wave ratio (VSWR) less than 2 was 2.369-30 GHz(170.7%), whereas the fabricated antenna was maintained VSWR less than 2 in the frequency range of 2.378-20 GHz when measured using a network analyzer operating up to 20 GHz so it can be applied as a super-wideband antenna for next-generation mobile communications.

A Resource Scheduling Based on Iterative Sorting for Long-Distance Airborne Tactical Communication in Hub Network (허브 네트워크에서의 장거리 공중 전술 통신을 위한 반복 정렬 기반의 자원 스케줄링 기법)

  • Lee, Kyunghoon;Lee, Dong Hun;Lee, Dae-Hong;Jung, Sung-Jin;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1250-1260
    • /
    • 2014
  • In this paper, a novel resource scheduling, which is used for hub network based long distance airborne tactical communication, is proposed. Recently, some countries of the world has concentrated on developing data rate and networking performance of CDL, striving to keep pace with modern warfare, which is changed into NCW. And our government has also developed the next generation high capacity CDL. In hub network, a typical communication structure of CDL, hybrid FDMA/TDMA can be considered to exchange high rate data among multiple UAVs simultaneously, within limited bandwidth. However, due to different RTT and traffic size of UAV, idle time resource and unnecessary packet transmission delay can occur. And these losses can reduce entire efficiency of hub network in long distance communication. Therefore, in this paper, we propose RTT and data traffic size based UAV scheduling, which selects time/frequency resource of UAVs by using iterative sorting algorithm. The simulation results verified that the proposed scheme improves data rate and packet delay performance in low complexity.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.