• Title/Summary/Keyword: 3GPP Standard

Search Result 77, Processing Time 0.025 seconds

Design of IMS solution based on Embedded (임베디드 기반의 IMS 솔루션 설계)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.39-44
    • /
    • 2014
  • IMS(IP Multi-Media Subsystem) base on the IP service platform which can offer multimedia as the voice, audio, video, and data is service platform. In 3G mobile communication in the early day, IMS had a suggestion for supporting to multimedia service in the 3GPP. But now It is broadly substituting in the IPTV, wire phone company and it is substituted in internet platform base on the soft-switch in currently. Especially nowadays, 4G LTE in a mobile communication company is rapidly growing in market. Therefore, in this study, we had designed to the main prosser that can admit to 1,000 user over and SIP gateway which can link the IMS 코어 that can link SIP Device which adopt the standard protocol on the SIP.

An Efficient Transmission Technique for Real-Time Video Data Transport over 3G Wireless Network (3G 네트웍에서 의 효율적 인 실시 간 비디오 전송에 대한 연구)

  • 박정훈;김소영
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.47-50
    • /
    • 2002
  • In this paper, the efficient transmission technique of real time video data over 3G wireless networks is presented. To understand the transmission characteristic of 3G networks on real time video data, we implemented the data transport structure of 3G wireless networks. Also this research is based on current 3G wireless network specification of 3GPP, 3GPP2 standard organization to evaluate the result over real 3G wireless network environment. The retransmission by radio link layer results in the delay factor. To implement video data transmission efficiently, we Propose to use both no-retransmission and forward error correction method.

  • PDF

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.

Industrial IoT Standardization Trend of the 5G Mobile Network (5G 모바일 네트워크의 Industrial IoT 표준기술 동향)

  • Kim, K.S.;Kang, Y.H.;Kim, C.K.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.13-24
    • /
    • 2021
  • Industrial networks has been developing various technologies from fieldbus technology to industrial Ethernet and time-sensitive networking. The industry expects that the 5G mobile network will solve the diverse and highly specific industrial site requirements. Accordingly, 3GPP has been developing standard functions to provide ultra-high reliability, ultra-high speed, ultra-connection, and ultra-low latency services, and 3GPP Rel-16 began developing ultra-low latency and ultra-high reliability communication functions for 5G mobile networks to support vertical industries. In this paper, we show the related standardization trends and requirements to apply industrial IoT service scenarios to 5G mobile networks, and in particular, we introduce 5G system features and extended 5G system architecture to provide time sensitive communication and time synchronization services.

The Seamless Handoff Algorithm based on Multicast Group Mechanism among RNs in a PDSN Area (PDSN 영역내의 여러 RN간 멀티캐스트 그룹 메커니즘 기반의 Seamless 핸드오프 알고리즘)

  • Shin, Dong-Jin;Kim, Su-Chang;Lim, Sun-Bae;Oh, Jae-Chun;Song, Byeong-Kwon;Jeong, Tae-Eui
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.97-106
    • /
    • 2002
  • In 3GPP2 standard, MIP is used and a PDSN performs the function of FA to support macro mobility. When a MS is roaming from a PDSN area to another, the mobility supported is called macro mobility, while it is called micro mobility when a MS is roaming from a RN area to another in a PDSN area. Since a PDSN performs the function of FA in 3GPP2 standard, it is possible to support mobility but its mechanism is actually for supporting macro mobility, not for micro mobility, thus it is weak in processing fast and seamless handoff to support micro mobility. In this paper, we suggest the seamless handoff algorithm barred on multicast group mechanism to support micro mobility. Depending on the moving direction and velocity of a MS, the suggested algorithm constructs a multicast group of RNs on the forecasted MS's moving path, and maximally delays RNs'joining to a multicast group to increase the network efficiency. Moreover, to resolve the buffer overhead problem of the existent multicast scheme, the algorithm suggests that each RN buffers data only after the forecasted handoff time. To prove deadlock freeness and liveness of the algorithm. we use state transition diagrams, a Petri-net modeling and its reachability tree. Then, we evaluate the performance by simulation.

Comparison of Radio Wave Propagation Models for Mobile Networks

  • Altayeva, Aigerim Bakatkaliyevna;Cho, Young Im
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.192-199
    • /
    • 2015
  • Heterogeneous cellular networks are gaining momentum in industry and the research community, and are attracting the attention of standard bodies such as 3GPP LTE and IEEE 802.16j, whose objectives are to increase the capacity and coverage of cellular networks. In this article, we provide an overview of expansion strategies, optimal locations of base stations with different characteristics, and radio-planning models.

5G Network Standard Trend (5G 네트워크 표준화 동향)

  • Won, J.W.;Kwon, Y.S.;Shin, J.H.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.6
    • /
    • pp.97-106
    • /
    • 2016
  • 본고는 2016년 3GPP 표준에서 다루어지고 있는 5G 네트워크의 표준에 관한 동향을 살펴보고자 한다. 주요분야인 네트워크 슬라이싱 기술, QoS, Mobility, Core Network 분야로 나누어 설명한다. SA2에서 TR23.799의 기술문서에 기록될 내용을 개요, Key Issue별로 다루어지는 워크태스크(Work Task)내용, 그리고 솔루션과 표준동향으로 나누어 3단계로 설명하였다.

  • PDF

Design and Implementation of User Authentication Protocol for Wireless Devices based on Java Card (자바카드 기반 무선단말기용 사용자 인증 프로토콜의 설계 및 구현)

  • Lee, Ju-Hwa;Seol, Kyoung-Su;Jung, Min-Soo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.585-594
    • /
    • 2003
  • Java card is one of promising smart card platform with java technology. Java card defines necessary packages and classes for Embedded device that have small memory such as smart card Jana card is compatible with EMV that is Industry specification standard and ISO-7816 that is international standard. However, Java card is not offers user authentication protocol. In this paper, We design and implement an user authentication protocol applicable wireless devices based on Java Card using standard 3GPP Specification (SMS), Java Card Specification (APDU), Cryptography and so on. Our Java Card user authentication techniques can possibly be applied to the area of M-Commerce, Wireless Security, E-Payment System, Mobile Internet, Global Position Service, Ubiquitous Computing and so on.

Design and Implementation of JAIN SIP-based Softphone Client (JAIN SIP 기반 소프트폰 클라이언트의 설계 및 구현)

  • Kim, Byung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2301-2306
    • /
    • 2008
  • SIP(Session Initiation Protocol) has become an universal standard for multimedia communications for both wired and wireless networks since it has been adopted as a standard protocol for IMS platform in 3GPP standardization organization at November 2000. In this paper, we design and implement a SIP-based softphone client program which provides telephony service between internet users and a call center equipped with VoIP gateway. A softphone client based on PC-to-phone connection should guarantee to provide interoperability with various VoIP gateways and higher portability to be able to operate on different PC environments. The softphone client program in this paper has been developed with SIP 2.0 standard protocol to support interoperability and with JAIN SIP and JMF package to achieve higher portability.

Implementation of the T:1 protocol based on lava Card for USIM (자바 카드를 기반으로 한 UISM 용 T=1 프로토콜의 구현)

  • 주홍일;한종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.800-803
    • /
    • 2004
  • This paper describes the design and implementation of the T=1 protocol based on lava Card. The T=1 protocol implemented in this paper complies with ISO/IEC 7816 standard. Also, JCOS(Java Card Operating Systems) including the contactless card protocol conforms to Java Card 2.2.1 specification and is running on 32-bit ARM7/TDMI processor. The protocol stack proposed and implemented in this paper is easy to maintenance of protocol independently. To verify the T=1 protocol implemented in this paper we tested the T=1 protocol scenarios defined in ISO/IEC 7816-3 Annex A. And we tested using USIM(Universal Subscriber Identity Module) cards, which include the implemented T=1 protocol. The T=1 protocol was tested and passed all against the specification 3GPP TS 31.122, which was the Conformance Test Specification for USIM cards including the test suites of both transmission protocols.

  • PDF