• Title/Summary/Keyword: 3G network

Search Result 823, Processing Time 0.024 seconds

A Comparative Study on 3D Data Performance in Mobile Web Browsers in 4G and 5G Environments

  • Nam, Duckkyoun;Lee, Daehyeon;Lee, Seunghyun;Kwon, Soonchul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.8-19
    • /
    • 2019
  • Since their emergence in 2007, smart phones have advanced up to the point that 5G mobile communication in 2019 started to be commercialized. Accordingly, now it is possible to share 3D modeling files and collaborate by means of a mobile web. As the recently commercialized 5G mobile communication network is so useful in sharing 3D modeling files and collaborating that even large-size geometry files can be transmitted at ultra high speed with ultra low transfer delay. We examines characteristics of major 3D file formats such as STL, OBJ, FBX, and glTF and compares the existing 4G LTE (Long Term Evolution) network with the 5G NR (New Radio) mobile communication network. The loading time and packets of each format were measured depending on the mobile web browser environments. We shows that in comparison with 4G LTE, the loading time of STL and OBJ file formats were reduced as much as 6.55 sec and 9.41 sec, respectively in the 5G NR and Chrome browsers. The glTF file format showed the most efficient performance in all of the 4G/5G mobile communication networks, Chrome, and Edge browsers. In the case of STL and OBJ, the traffic was relatively excessive in 5G NR and Edge browsers. The findings of this study are expected to be utilized to develop a 3D file format that reduces the loading time in a mobile web environment.

Femtocell 시스템 구조 및 망 적용시 고려사항

  • O, Jong-Min;Song, Seung-Ho
    • Information and Communications Magazine
    • /
    • v.26 no.11
    • /
    • pp.3-8
    • /
    • 2009
  • 본고에서는 Femtocell의 장비 특성을 고려한 3G Network에서의 활용 방안에 대해 알아보고, 상용 서비스 제공 시 예상되는 Femtocell 기술 이슈 분석을 통해 향후 3G 이동전화 Network에 적용하기 위해 개선되어야 하는 기술 사항에 대해서 알아본다.

A Study on Antecedents of Customer Switching Behavior in Mobile Services (이동통신 서비스 전환행동에 영향을 미치는 요인에 관한 연구)

  • Yoon, Jung-In;Sung, Su-Jung;Lee, Jung-Woo
    • Korean Management Science Review
    • /
    • v.26 no.3
    • /
    • pp.169-184
    • /
    • 2009
  • Recently, mobile telecommunication businesses contend with each other to expand their customer base by using aggressive marketing strategies. In order to determine if there strategies are effective, customer's switching behavior needs to be studied. This study identifies and analyzes direct, indirect factors that may customer switching behavior : attractiveness of alternatives, network externality, and switching cost. Results reveals that attractiveness of alternatives, network externalities have a direct impact on customer switching behavior. These two factors also have moderating effects on customer switching behavior but the switching cost does not In short, network externalities and alternatives strategically determine the success of 3.5G service. In this regard, mobile business should improve their own attractiveness of alternatives by developing specialized service in 3.5G service.

Analysis of Deregistration Attacks in 5G Standalone Non-Public Network

  • Kim, Keewon;Park, Kyungmin;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.81-88
    • /
    • 2021
  • In this paper, we analyze the possibility of deregistration attack in 5G SNPN (Standalone Non-Public Network) based on 3GPP standard document. In the deregistraion attack, the attacker pretends to be a UE that is normally registered with AMF (Access and Mobility Management Function) and attempts to establish a spoofed RRC (Radio Resource Control) connection, causing AMF to deregister the existing UE. The existing deregistration attack attempts a spoofed RRC connection to the AMF in which the UE is registered. In addition, this paper analyzes whether deregistration attack is possible even when an attacker attempts to establish a spoofed RRC connection to a new AMF that is different from the registered AMF. When the 5G mobile communication network system is implemented by faithfully complying with the 3GPP standard, it is determined that a deregistration attack of a UE is impossible.

An Efficient Authentication Mechanism Strengthen the Privacy Protection in 3G Network (3G 네트워크에서 프라이버시 보호를 강화한 효율적인 인증 메커니즘)

  • Jeon, Seo-Kwan;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.5049-5057
    • /
    • 2010
  • As communication technologies are developed and variety of services to mobile devices are provided, mobile users is rapidly increasing every year. However, mobile services running on wireless network environment are exposed to various security threats, such as illegal tampering, eavesdropping, and disguising identity. Accordingly, the secure mobile communications services to 3GPP were established that the standard for 3GPP-AKA specified authentication and key agreement. But in the standard, sequence number synchronization problem using false base station attack and privacy problem were discovered through related researches. In this paper, we propose an efficient authentication mechanism for enhanced privacy protection in the 3G network. We solve the sequence number synchronization existing 3GPP authentication scheme using timestamp and strengthen a privacy problem using secret token. In addition, the proposed scheme can improve the bandwidth consumption between serving network and home network and the problem of authentication data overhead for the serving network because it uses only one authentication vector.

Paving the Road to Systems Beyond 3G - The IST BRAIN and MIND Projects

  • Wisely, Dave;Mitjana, Enric
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.292-301
    • /
    • 2002
  • Wireless LAN technology is complementary to 3G systems and could be used to provide high bandwidth hotspot coverage, for example in railway stations and offices, in order to provide the high bandwidth video and broadband services such as those emerging on DSL fixed access. The IST Projects BRAIN and MIND have investigated a number of key technical enablers for such a system beyond 3G. These include scenarios and business models, design of an all-IP access network, consideration of ad hoc network extensions, enhancing Wireless LAN efficiency and compatibility with IP and, finally, terminal middleware and signalling for rapid adaptations to network QoS changes.

Embedding algorithms among hypercube and star graph variants (하이퍼큐브와 스타 그래프 종류 사이의 임베딩 알고리즘)

  • Kim, Jongseok;Lee, Hyeongok
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.2
    • /
    • pp.115-124
    • /
    • 2014
  • Hypercube and star graph are widely known as interconnection network. The embedding of an interconnection network is a mapping of a network G into other network H. The possibility of embedding interconnection network G into H with a low cost, has an advantage of efficient algorithms usage in network H, which was developed in network G. In this paper, we provide an embedding algorithm between HCN and HON. HCN(n,n) can be embedded into HON($C_{n+1},C_{n+1}$) with dilation 3 and HON($C_d,C_d$) can be embedded into HCN(2d-1,2d-1) with dilation O(d). Also, star graph can be embedded to half pancake's value of dilation 11, expansion 1, and average dilation 8. Thus, the result means that various algorithms designed for HCN and Star graph can be efficiently executed on HON and half pancake, respectively.

  • PDF

An Enhanced Control Protocol Design for LADN in 5G Wireless Networks

  • Kim, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.109-117
    • /
    • 2020
  • In this paper, we analyze LADN(Local Area Data Network) that provides high throughput, low latency and service localization for 5G wireless networks and propose an enhanced control protocol design for LADN in 5G wireless networks. The concept of LADN is newly introduced in 3GPP 5G communication system and the LADN is a data network to which the UE(User Equipment) can connect with a specific LADN session only when the UE is located in a certain service area. If the LADN information between the UE and core network is not identical, the LADN session cannot be properly established. The proposed approach promplty synchronizes the LADN information between the UE and core network by using the specific registration procedure and appropriately establishes the LADN session, when the establishment of the LADN session is failed. Consequently, the proposed enhanced control protocol design(ECP) can prevent unnecessary signalling overhead and communication delay for LADN in 5G wireless networks.

A Method for Detecting Unauthorized Access Point over 3G Network (3G망을 사용하는 인가되지 않은 AP 탐지 방법)

  • Kim, I-luk;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.259-266
    • /
    • 2012
  • Malicious rogue AP has been used for variety attacks such as packet sniffing and Man-In-The-Middle Attack. It is used for the purpose of data leakage via 3G network within companies, and the unauthorized AP could be a reason of security incidents even though it is not intended. In this paper, we propose the method for detecting unauthorized access point over 3G networks throughout the RTT (Round Trip Time) value for classification. Through the experiments, we show that the method can classify the AP which is installed by normal way and the AP over 3G networks successfully.

Green Supply Chain Network Model: Genetic Algorithm Approach (그린 공급망 네트워크 모델: 유전알고리즘 접근법)

  • Yun, Young Su;Chuluunsukh, Anudari
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.3
    • /
    • pp.31-38
    • /
    • 2019
  • In this paper, we design a green supply chain (gSC) network model. For constructing the gSC network model, environmental and economic factors are taken into consideration in it. Environmental factor is to minimize the $CO_2$ emission amount emitted when transporting products or materials between each stage. For economic factor, the total cost which is composed of total transportation cost, total handling cost and total fixed cost is minimized. To minimize the environmental and economic factors simultaneously, a mathematical formulation is proposed and it is implemented in a genetic algorithm (GA) approach. In numerical experiment, some scales of the gSC network model is presented and its performance is analyzed using the GA approach. Finally, the efficiencies of the gSC network model and the GA approach are proved.