• Title/Summary/Keyword: 4G network

Search Result 678, Processing Time 0.037 seconds

The open API for reconfiguration in 4G network (4G network에서 재구성성을 위한 개방형 API)

  • Hong Sung-June;Lee Young-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.219-226
    • /
    • 2005
  • This paper describes the open API with integration of semantic web service with PARLAY X based open API in 4G mobile network. It can be expected that the intelligence such as the context-awareness, adaptation and personalization in 4G mobile network will be deployed. But the existing PARLAY based network lacks in considering context-awareness, adaptation and personalization. Therefore, the object of this paper is to support the architecture and the Application Programming Interface (API) of the network service for the context-awareness, adaptation and Personalization in 4G mobile network The open API is to provide users with the adaptive network service to the changing context constraints as well as detecting the changing context and user's Preference. For instance, the open API can Provide users with QoS in network according to the detected context and user's preference, after detecting the context such as location and speed and user's preference.

  • PDF

A Study on Security System of 4G Network System (4세대 네트워크 시스템의 보안시스템에 관한 연구)

  • Kim, Hee-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.15-23
    • /
    • 2016
  • In this paper we presented 4G security models in an open environment. 4G networks have still more security holes and open issues for expert to notice. In here. we show that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. it tells about the security issues and vulnerabilities present in the above 4G standards.. we try to present several architectures behind 4G infrastructure for example WiMAX and 3GPP LTE architecture. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention. When you make a big dada program, If you use this network architecture then you can improve your learning speed.

Trends and Analysis of 4G Wireless User Access Networks Issues (4G 무선가입자망 구축 동향 및 고도화 방안)

  • Hwang, Ho-Young;Hong, Jung-Wan;Kim, Seung-Cheon;Roh, Kwang-Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.145-158
    • /
    • 2011
  • Recently, the rapidly increased use of smartphone devices provides both opportunity and problems at the same time to the telecom companies in domestic and world wide. It provides a great opportunity to overcome the market stagnation of the existing voice- centric communications, and also problems of building a highly efficient new wireless access networks to accommodate huge volume of data traffic among smart devices. Facing with the age of keen competition, telecom companies have two kinds of strategies for network transition; a strategy of building uniform LTE -based 4G networks as fast as possible, and a hybrid network enhancement strategy compounding 3G and 4G networks using HSP A+, WiFi, cloud computing, etc. It is difficult to predict which strategy will have more successful outcome in the near future. This paper studies the trends and issues of network enhancement policies and transition strategies to the 4G network era, and tries to draw appropriate and efficient ways for network enhancement and operation.

The Detection of Signaling Dos on 4G LTE Cellular Network (4G LTE 이동통신망에서의 시그널링 DoS 탐지 기술)

  • Jang, Woung;Kim, Se-Kwon;Oh, Joo-Hyung;Im, Chae-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.146-149
    • /
    • 2013
  • For in recently years, global cellular network service is changing rapidly to 4G. However, the fast introducing of 4G has been going with not enough research about security threat, it could be many kind of vulnerability. Therefore the research about security threat on 4G network is ongoing in external countries, but not sufficient in domestic. particularly in domestic situation of rapidly increased subscribers, The security threats which are hindering stability and usability could make a fatal effect on many users. 4G network should be considered about the feature of mobile network to protect 4G network stable. Mobile network has limited radio resources, it releases the radio resource which is not used in selected time and reallocate when detected the data transmission. Many signaling messages are transferred in the network entities to allocate or release the radio resource. In this paper, it will be introduced the technology to detect signaling DoS traffic hindering the stability and usability of network entities managing the radio resources by huge signaling message from the repetitive wireless connection/release message.

  • PDF

Portable 4K UHD Broadcasting Device using 5G Mobile Network as a Transmission Channel (5G 이동통신망을 전송채널로 활용하는 휴대형 4K UHD 방송중계 장치)

  • Paik, Junghoon;Kim, Yongsuk
    • Journal of Broadcast Engineering
    • /
    • v.25 no.5
    • /
    • pp.789-797
    • /
    • 2020
  • In this paper, we propose a protocol structure of a portable 4K Ultra High Definition (UHD) broadcast relay device that utilizes a 5G mobile communication network as a transport channel, and construct a prototype to conduct a broadcast relay performance test through a 5G mobile communication network. The test shows that the encoding time of the 4K UHD encoder is from a minimum of 86.28ms to a maximum of 88.41ms, the relay delay time in the 5G mobile communication network is 13.645ms on average, the delay variation is 17.49ms, and the glass-to-glass delay time is 289.90 on average, the delay variation is 27.63ms. Using the developed prototype, a relay test between Seoul and Anseong is conducted, and the possibility of 4K UHD broadcasting through a 5G mobile communication network is confirmed.

5G Radio Access Network Architecture for Mobile Augmented Reality Service (모바일 증강현실 서비스 구현을 위한 5G 무선 액세스 네트워크 구조)

  • Cho, Hyoungjun;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.27-34
    • /
    • 2017
  • In this paper, the analysis of mobile augmented reality service using 5G network are provided. First of all, the introduction and required performance of mobile augmented reality(MAr) service are provided. After that, 5G network key features, target performance, and network architecture are analyzed. At the end, the additional network entity and functions for the realization of mobile augmented reality service are proposed. The mobile augmented reality service time. At the end, the service delay in existing LTE system and proposed 5G MAr system by using real device and network parameters.

Proposal of Research Issues related to the Technology, Service, Policy and Business Model in Commercializing and Promoting 5G Network (5G 실용화 및 활성화에 필요한 관련 기술, 서비스, 정책 및 비즈니스 모델에 관련된 연구 이슈 제안)

  • Song, In-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.129-135
    • /
    • 2019
  • Recently, it is anticipated that 5G network would play the significant role of the neural network for 4th generation industry revolution and create huge value for the new market. However, in spite of proliferating prospect of 5G network industry and leading position in the launch of 5G, network operators have hesitated to give their full support to establishing proper network. Due to the lack of business models promoting 5G industry, network operators feel that they will not realize the return from the exorbitant investment in 5G network establishment. Moreover, the rigorous research efforts to investigate and analyze the various business environments regarding 5G rarely exists. Therefore, the purpose of the research is to holistically propose the research issues related to the technology, service providing method, governmental policy, and business models in commercializing and promoting 5G network.

A Study of 4G Network for Security System

  • Kim, Suk-jin;Lee, Hyangran;Lee, Malrey
    • International Journal of Advanced Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.77-86
    • /
    • 2015
  • In this paper there is an overview of some standards and security models which are implemented in such an IP-based and heterogeneous networks and we also present some security models in an open environment and finally we obtain that as a result of the nature of 4G networks there are still more security holes and open issues for expert to notice. Our survey shows that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. Other than that, it tells about the security issues and vulnerabilities present in the above 4G standards are discussed. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention and future work by the research and advanced technology industry.

Wireless Access Network Architecture and Virtualization Scenarios for Next-Generation Mobile Communication Networks (차세대 이동통신 네트워크를 위한 무선 액세스 망 구조 및 가상화 시나리오)

  • Kim, Myunghwan;Kim, Su Min;Jung, Bang Chul;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2150-2162
    • /
    • 2012
  • In accordance with evolution of next-generation mobile Internet, 2G, 3G, 4G, and B4G mobile communication wireless access networks will be co-existed and service providers will be merged as an integrated service provider. In addition, multiple virtual service operators will appear. In order to provide complicated unified-services, in the future Internet, wireless network virtualization where network resource is shared by various service operators is necessary. Therefore, in this paper, we investigate network architectures and virtualization scenarios for wireless access network virtualization where various wireless access technologies are flexibly operated by multiple service providers over next-generation wireless access networks. We expect that the virtualization scenario and network architecture yielded from this study can play a role as a basis for development of wireless access network virtualization algorithms.

$K^4$-chain Reductions for Computing 2-terminal Reliability in an Undirected Network (무방향 네트워크의 2-터미날 신뢰성 계산을 위한 $K^4$-chain 축소)

  • 홍정식
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.21 no.3
    • /
    • pp.215-225
    • /
    • 1996
  • For an undirected stochastic network G, the 2-terminal reliability of G, R(G) is the probability that the specific two nodes (called as terminal nodes) are connected in G. A. typical network reliability problem is to compute R(G). It has been shown that the computation problem of R(G) is NP-hard. So, any algorithm to compute R(G) has a runngin time which is exponential in the size of G. If by some means, the problem size, G is reduced, it can result in immense savings. The means to reduce the size of the problem are the reliability preserving reductions and graph decompositions. We introduce a net set of reliability preserving reductions : the $K^{4}$ (complete graph of 4-nodes)-chain reductions. The total number of the different $K^{4}$ types in R(G), is 6. We present the reduction formula for each $K^{4}$ type. But in computing R(G), it is possible that homeomorphic graphs from $K^{4}$ occur. We devide the homemorphic graphs from $K^{4}$ into 3 types. We develop the reliability preserving reductions for s types, and show that the remaining one is divided into two subgraphs which can be reduced by $K^{4}$-chain reductions 7 polygon-to-chain reductions.

  • PDF