• Title/Summary/Keyword: 5G mobile network

Search Result 182, Processing Time 0.029 seconds

Multihop Vehicle-to-Infrastructure Routing Based on the Prediction of Valid Vertices for Vehicular Ad Hoc Networks

  • Shrestha, Raj K.;Moh, Sangman;Chung, IlYong;Shin, Heewook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.243-253
    • /
    • 2010
  • Multihop data delivery in vehicular ad hoc networks (VANETs) suffers from the fact that vehicles are highly mobile and inter-vehicle links are frequently disconnected. In such networks, for efficient multihop routing of road safety information (e.g. road accident and emergency message) to the area of interest, reliable communication and fast delivery with minimum delay are mandatory. In this paper, we propose a multihop vehicle-to-infrastructure routing protocol named Vertex-Based Predictive Greedy Routing (VPGR), which predicts a sequence of valid vertices (or junctions) from a source vehicle to fixed infrastructure (or a roadside unit) in the area of interest and, then, forwards data to the fixed infrastructure through the sequence of vertices in urban environments. The well known predictive directional greedy routing mechanism is used for data forwarding phase in VPGR. The proposed VPGR leverages the geographic position, velocity, direction and acceleration of vehicles for both the calculation of a sequence of valid vertices and the predictive directional greedy routing. Simulation results show significant performance improvement compared to conventional routing protocols in terms of packet delivery ratio, end-to-end delay and routing overhead.

A study on the capacity analysis of wide area radio trunking system (광역 무선 Trunking 시스템의 통신용량 분석에 관한 연구)

  • 김낙명
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.4
    • /
    • pp.1-11
    • /
    • 1997
  • In this paper, modeling of the communication channel occupancy characteristics at the base station in the wide area radio trunking syste has been performed. Using the results, mathematical analysis for the switching capacity at the network switch has also been done. Specificatlly, we propose a G/M/m queueing model for the single service area modeling, and analyze changes in call blockingprobabilities accoridng to changes in the burstness characteristics of group paging calls. As a result, we have observe dthat the channel occupancy variations become larger as the burstness characteristics become more apparent, to make the call blocking probability higher. Next, based on the single service area analysis, we have anayzed mathematically the average switching capacity required to serve mobile subscribers for a wide area radio trunking sytem, where multiple switching port assignments are required when the people in the same group are distributed over several base stations. Accordingly, we have observed that the average and the variance of switching channel occupancy are closely related to the mobility characteristics of subscribers, and that we need a netowrk switch having bigger capacity as subscribers show wider distribution. Especially, with the call dropping probability within 0.2%, a switch having about 5 to 6 times bigger can be required, compared with the one when the mobility of subscribers is mostly restricte dto a single service area.

  • PDF

Energy Efficiency Optimization for multiuser OFDM-based Cognitive Heterogeneous networks

  • Ning, Bing;Zhang, Aihua;Hao, Wanming;Li, Jianjun;Yang, Shouyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2873-2892
    • /
    • 2019
  • Reducing the interference to the licensed mobile users and obtaining the energy efficiency are key issues in cognitive heterogeneous networks. A corresponding rate loss constraint is proposed to be used for the sensing-based spectrum sharing (SBSS) model in cognitive heterogeneous networks in this paper. Resource allocation optimization strategy is designed for the maximum energy efficiency under the proposed interference constraint together with average transmission power constraint. An efficiency algorithm is studied to maximize energy efficiency due to the nonconvex optimal problem. Furthermore, the relationship between the proposed protection criterion and the conventional interference constraint strategy under imperfect sensing condition for the SBSS model is also investigated, and we found that the conventional interference threshold can be regarded as the upper bound of the maximum rate loss that the primary user could tolerate. Simulation results have shown the effectiveness of the proposed protection criterion overcome the conventional interference power constraint.

Enhancing Service Availability in Multi-Access Edge Computing with Deep Q-Learning

  • Lusungu Josh Mwasinga;Syed Muhammad Raza;Duc-Tai Le ;Moonseong Kim ;Hyunseung Choo
    • Journal of Internet Computing and Services
    • /
    • v.24 no.2
    • /
    • pp.1-10
    • /
    • 2023
  • The Multi-access Edge Computing (MEC) paradigm equips network edge telecommunication infrastructure with cloud computing resources. It seeks to transform the edge into an IT services platform for hosting resource-intensive and delay-stringent services for mobile users, thereby significantly enhancing perceived service quality of experience. However, erratic user mobility impedes seamless service continuity as well as satisfying delay-stringent service requirements, especially as users roam farther away from the serving MEC resource, which deteriorates quality of experience. This work proposes a deep reinforcement learning based service mobility management approach for ensuring seamless migration of service instances along user mobility. The proposed approach focuses on the problem of selecting the optimal MEC resource to host services for high mobility users, thereby reducing service migration rejection rate and enhancing service availability. Efficacy of the proposed approach is confirmed through simulation experiments, where results show that on average, the proposed scheme reduces service delay by 8%, task computing time by 36%, and migration rejection rate by more than 90%, when comparing to a baseline scheme.

Modulation Scheme for Network-coded Bi-directional Relaying over an Asymmetric Channel (양방향 비대칭 채널에서 네트워크 부호화를 위한 변조 방식)

  • Ryu, Hyun-Seok;Kang, Chung-G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2B
    • /
    • pp.97-109
    • /
    • 2012
  • In this paper, we propose a modulation scheme for a network-coded bi-directional relaying (NBR) system over an asymmetric channel, which means that the qualities of the relay channel (the link between the BS and RS) and access channel (the link between the RS and MS) are not identical. The proposed scheme employs a dual constellation in such a way that the RS broadcasts the network-coded symbols modulated by two different constellations to the MS and BS over two consecutive transmission intervals. We derive an upper bound on the average bit error rate (BER) of the proposed scheme, and compare it with the hybrid constellation-based modulation scheme proposed for the asymmetric bi-directional link. Furthermore, we investigate the channel utilization of the existing bi-directional relaying schemes as well as the NBR system with the proposed dual constellation diversity-based modulation (DCD). From our simulation results, we show that the DCD gives better average BER performance about 3.5~4dB when $E_b/N_0$ is equal to $10^{-2}$, while maintaining the same spectral efficiency as the existing NBR schemes over the asymmetric bi-directional relaying channel.

Performance Analysis of Drone-type Base Station on the mmWave According to Radio Resource Management Policy (무선자원 운용방안에 따른 밀리미터파 대역에서의 드론형 기지국 성능분석)

  • Jeong, Min-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.917-926
    • /
    • 2019
  • At present, TICN has been developed and distributed for military command control. TICN is known as the 3.5G mobile communication technology based on WiBro, which shows technical limitation in the field operation situation. Accordingly, the drone-type base station platform is attracting attention as an alternative to overcome technical limitations such as difficulty in securing communication LoS and limiting expeditious network configuration. In this study, we performed simulation performance evaluation of drone-type base station operation in 28 GHz that is considered most suitable for cellular communication within mmWave frequency band. Specifically, we analyzed the changes in throughput and fairness performance according to radio resource management policies such as frequency reuse and scheduling in multi-cell topology. Through this, we tried to provide insights on the operation philosophy on drone-type base station.

The Sub Authentication Method For Driver Using Driving Patterns (운전 패턴을 이용한 운전자 보조 인증방법)

  • Jeong, Jong-Myoung;Kang, Hyung Chul;Jo, Hyo Jin;Yoon, Ji Won;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.919-929
    • /
    • 2013
  • Recently, a variety of IT technologies are applied to the vehicle. However, some vehicle-IT technologies without security considerations may cause security problems. Specially, some researches about a smart key system applied to automobiles for authentication show that the system is insecure from replay attacks and modification attacks using a wireless signal of the smart key. Thus, in this paper, we propose an authentication method for the driver by using driving patterns. Nowadays, we can obtain driving patterns using the In-vehicle network data. In our authentication model, we make driving ppatterns of car owner using standard normal distribution and apply these patterns to driver authentication. To validate our model, we perform an k-fold cross validation test using In-vehicle network data and obtain the result(true positive rate 0.7/false positive rate is 0.35). Considering to our result, it turns out that our model is more secure than existing 'what you have' authentication models such as the smart key if the authentication result is sent to the car owner through mobile networks.

A Study on Polynomial Pre-Distortion Technique Using PAPR Reduction Method in the Next Generation Mobile Communication System (차세대 이동통신 시스템에 PAPR 감소기법을 적용한 다항식 사전왜곡 기법에 관한 연구)

  • Kim, Wan-Tae;Park, Ki-Sik;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.684-690
    • /
    • 2010
  • Recently, the NG(Next Generation) system is studied for supporting convergence of various services and multi mode of single terminal. And a demand of user for taking the various services is getting increased, for supporting these services, many systems being able to transmit a large message have been appeared. In the NG system, it has to be supporting the CDMA and WCDMA besides the tele communication systems using OFDM method with single terminal An intergrated system can be improved with adopting of SoC technique. For adopting SoC technique on the intergrated terminal, we have to solve the non linear problem of HPA(High Power Amplifier). Nonlinear characteristic of HPA distorts both amplitude and phase of transmit signal, this distortion cause deep adjacent channel interference. We adopt a polynomial pre-distortion technique for this problem. In this paper, a noble modem design for NG mobile communication service and a method using polynomial pre-distorter with PAPR technique for counterbalancing nonlinear characteristic of the HPA are proposed.

On MIMO OTA Performance Characterization Method for Mobile Devices with Multiple Antennas (MIMO 무선 성능 성능평가 방법에 관한 연구)

  • Cho, Y.S.;Kim, Y.R.;No, S.P.;Shim, H.J.;Kim, I.K.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.5
    • /
    • pp.84-90
    • /
    • 2012
  • Since the major cellular data service providers in U.S, Japan as well as in Korea started the LTE (Long Term Evolution) service, there has been more strong need for the methods that can accurately measure the MIMO (Multi Input-Multi Outout) OTA (Over The Air) performance of LTE handsets because the performance of the MIMO antenna determines the packet data rates in the downlink and therefore the higher system throughput of the network. In this regard, there has been a lot discussions in 3GPP on the candidate MIMO OTA test solutions. In this paper, a faire comparison has been done for the conventional method, the Envelop Correlation Coefficient (ECC) measurements, and the anechoic chamber based MIMO OTA test solution, one of the candidate system being discussed in 3GPP. The evaluations and the comparisons are conducted by numerically and experimentally.

Research on the Uses and Gratifications of Tiktok (Douyin short video)

  • Yaqi, Zhou;Lee, Jong-Yoon;Liu, Shanshan
    • International Journal of Contents
    • /
    • v.17 no.1
    • /
    • pp.37-53
    • /
    • 2021
  • With the advent of the 5G era, smart phones and communications network technology have progressed, and mobile short video of people's life can be made, Of the new tools of communication, at present, China's social short video industry has shown rapid development, and the most representative of the short video app is Douyin (international version: Tiktok). Under the background of Uses and Gratifications Theory, this study discusse the relationship between Douyin users' preference degree, use motivation, use satisfaction and attention intention. This study divides the content of Douyin video into 10 categories, selects the form of an online questionnaire survey, uses SPSS software to conduct quantitative analysis of 202 questionnaires after screening, and finally draws the following conclusions: (1) The content preference degree of Douyin short video (the high group and low group) is different in users' use motivation, users' satisfaction degree and users' attention intention. ALL results are within the range of statistical significance.(2) Douyin users' video content preference degree has a positive impact on users' use motivation, users' satisfaction degree, and users' attention intention. (3) Douyin users' motivation has a positive impact on users' satisfaction and user' attention intention. (4) Douyin users' satisfaction degree has a positive impact on users' attention intention. Based on the research results, we suggest that Douyin platform pushes videos according to users' preferences. In addition, as the preference degree has an impact on users' motivation, satisfaction degree and attention intention of using the platform, it is important that the platform's focus should to pay attention to the preference degree of users. Collecting users' preferences at the early stage of users' entering the platform is a good way to learn from, and doing a good job of big data collection and management in the later operation.