• Title/Summary/Keyword: Access networks

Search Result 2,024, Processing Time 0.025 seconds

Radio Resource Management Scheme for Heterogeneous Wireless Networks Based on Access Proportion Optimization

  • Shi, Zheng;Zhu, Qi
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.527-537
    • /
    • 2013
  • Improving resource utilization has been a hot issue in heterogeneous wireless networks (HWNs). This paper proposes a radio resource management (RRM) method based on access proportion optimization. By considering two or more wireless networks in overlapping regions, users in these regions must select one of the networks to access when they engage in calls. Hence, the proportion of service arrival rate that accesses each network in the overlapping region can be treated as an optimized factor for the performance analysis of HWNs. Moreover, this study considers user mobility as an important factor that affects the performance of HWNs, and it is reflected by the handoff rate. The objective of this study is to maximize the total throughput of HWNs by choosing the most appropriate factors. The total throughput of HWNs can be derived on the basis of a Markov model, which is determined by the handoff rate analysis and distribution of service arrival rate in each network. The objective problem can actually be expressed as an optimization problem. Considering the convexity of the objective function, the optimization problem can be solved using the subgradient approach. Finally, an RRM optimization scheme for HWNs is proposed. The simulation results show that the proposed scheme can effectively enhance the throughput of HWNs, i.e., improve the radio resource utilization.

AAA System for PLMN-WLAN Internetworking

  • Janevski Toni
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.192-206
    • /
    • 2005
  • Integration of mobile networks and Internet has started with 2.5 generation of mobile cellular networks. Internet traffic is today dominant traffic type worldwide. The hanger for higher data rates needed for data traffic and new IP based services is essential in the development of future wireless networks. In such situation, even 3G with up to 2 Mbit/s has not provided data rates that are used by Internet users with fixed broadband dial-up or through wired local area networks. The solution to provide higher bit rates in wireless access network has been found in wireless LAN although initially it has been developed to extend wired LAN into wireless domain. In this paper, we propose and describe a solution created for interoperability between mobile cellular network and WLAN. The integration between two networks, cellular and WLAN, is performed on the authentication, authorization, and accounting, i.e., AAA side. For that purpose we developed WLAN access controller and WLAN AAA gateway, which provide gateway-type access control as well as charging and billing functionalities for the WLAN service. In the development process of these elements, we have considered current development stadium of all needed network entities and protocols. The provided solution provides cost-effective and easy-to-deploy PLMN-WLAN Internetworking scenario.

A study to network access in modebile networks (이동 네트워크에서 네트워크 접속에 대한 연구)

  • Park, Sangjoon;Lee, Jongchan;Shin, Sungyun;Park, Gi-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.679-680
    • /
    • 2012
  • The B3G network architecture by the connection of access network is divided into two forms:tightly-coupled networks and loosely-coupled networks. In this paper, we consider the loosely-coupled networks in the internetworking architecture of mobile network.

  • PDF

MODELING AND ANALYSIS FOR OPPORTUNISTIC SPECTRUM ACCESS

  • Lee, Yu-Tae;Sim, Dong-Bo
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.5_6
    • /
    • pp.1295-1302
    • /
    • 2011
  • We present an analytic model of an unslotted opportunistic spectrum access (OSA) network and evaluate its performance such as interruption probability, service completion time, and throughput of secondary users. Numerical examples are given to show the performance of secondary users in cognitive networks. The developed modeling and analysis method can be used to evaluate the performance of various OSA networks.

Evolution of optical access networks (가입자망 진화방향)

  • Kim, Bo-Gyum;Koh, Seok-Bong;Lee, Won-Hyung;Han, Jin-Woo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.187-189
    • /
    • 2009
  • Fibre to the home (FTTH) in KOREA has grown rapidly in recent years. The number of FTTH subscribers exceeded 6.6 millions by end of DEC 2008. It seems that FTTH has moved from the initial, the growth stage to the mature stage. Some design techniques have been developed in order to construct the access network effectively for the mature stage. This paper deal with design, construction and maintenance of optical fibre access networks immediately, effectively and economically.

  • PDF

Simple Protocol for Dynamic Bandwidth Allocation in WDM/SCM-FTTH Access Network (WDM/SCM-FTTH 가입자망에서 효율적인 대역할당을 위한 프로토콜)

  • 조충건;박혁규;김영철;강동국;안계현;김영천
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.73-76
    • /
    • 2003
  • The capacity of backbone networks has largely kept pace with the tremendous of growth of Internet traffic. But there has been little progress in the access networks. In this paper, we introduce the access network that is able to offers high bandwidth and its simple protocol. The network architecture is basically multiple ring and use WDM(Wavelength Division Multiplexing), SCM (SubCarrier Multiplexing), and static WADM (Wavelenth Add/Drop Multiplexer) for simplicity, low cost, and offering high bandwidth.

  • PDF

PERIODIC SENSING AND GREEDY ACCESS POLICY USING CHANNEL MODELS WITH GENERALLY DISTRIBUTED ON AND OFF PERIODS IN COGNITIVE NETWORKS

  • Lee, Yutae
    • Journal of applied mathematics & informatics
    • /
    • v.32 no.1_2
    • /
    • pp.129-136
    • /
    • 2014
  • One of the fundamental issues in the design of dynamic spectrum access policy is the modeling of the dynamic behavior of channel occupancy by primary users. Under a Markovian modeling of channel occupancy, a periodic sensing and greedy access policy is known as one of the simple and practical dynamic spectrum access policies in cognitive radio networks. In this paper, the primary occupancy of each channel is modeled as a discrete-time alternating renewal process with generally distributed on- and off-periods. A periodic sensing and greedy access policy is constructed based on the general channel occupancy model. Simulation results show that the proposed policy has better throughput than the policies using channel models with exponentially distributed on- or off-periods.

Modeling of Access Networks and Applications for the Economics of New Access Network Technology (신규 가입자망 기술의 경제성 평가를 위한 망 구조모형과 그 응용)

  • 류태규;이정동;김태유
    • Journal of Korea Technology Innovation Society
    • /
    • v.4 no.2
    • /
    • pp.157-171
    • /
    • 2001
  • This paper discusses the economics of local loop architecture focusing on existing technologies, ADSL, HFC, and new one, PLC, and suggests a new modeling approach of access network system and the numerical equations. To modelize access network system and drive the numerical equations, we consider the double star and the tree & branch architecture and made block diagram of each access system. In addition, we introduce the density of subscriber as a variable and the equation of seeking the optimal number of cell in a service area. The economics of local loop architecture is analyzed in two ways, i.e. with and without consideration of the cost of cable and infrastructure. From the numerical analysis, we find that in case of not including the cost of cable and infrastructure, there is no much difference in the cost per one subscriber, while, in case of including it, there is remarkable difference among technologies. Therefore we conclude that the economics of local loop architecture is depend on the density of subscriber and existing network infrastructures.

  • PDF

An Efficient Priority Based Adaptive QoS Traffic Control Scheme for Wireless Access Networks

  • Kang Moon-sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.762-771
    • /
    • 2005
  • In this paper, an efficient Adaptive quality-of-service (QoS) traffic control scheme with priority scheduling is proposed for the multimedia traffic transmission over wireless access networks. The objective of the proposed adaptive QoS control (AQC) scheme is to realize end-to-end QoS, to be scalable without the excess signaling process, and to adapt dynamically to the network traffic state according to traffic flow characteristics. Here, the reservation scheme can be used over the wireless access network in order to get the per-flow guarantees necessary for implementation of some kinds of multimedia applications. The AQC model is based on both differentiated service model with different lier hop behaviors and priority scheduling one. It consists of several various routers, access points, and bandwidth broker and adopts the IEEE 802.1 le wireless radio technique for wireless access interface. The AQC scheme includes queue management and packet scheduler to transmit class-based packets with different per hop behaviors (PHBs). Simulation results demonstrate effectiveness of the proposed AQC scheme.

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.