• Title/Summary/Keyword: MTC 통신

Search Result 28, Processing Time 0.021 seconds

Design of a Large-scale Task Dispatching & Processing System based on Hadoop (하둡 기반 대규모 작업 배치 및 처리 기술 설계)

  • Kim, Jik-Soo;Cao, Nguyen;Kim, Seoyoung;Hwang, Soonwook
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.613-620
    • /
    • 2016
  • This paper presents a MOHA(Many-Task Computing on Hadoop) framework which aims to effectively apply the Many-Task Computing(MTC) technologies originally developed for high-performance processing of many tasks, to the existing Big Data processing platform Hadoop. We present basic concepts, motivation, preliminary results of PoC based on distributed message queue, and future research directions of MOHA. MTC applications may have relatively low I/O requirements per task. However, a very large number of tasks should be efficiently processed with potentially heavy inter-communications based on files. Therefore, MTC applications can show another pattern of data-intensive workloads compared to existing Hadoop applications, typically based on relatively large data block sizes. Through an effective convergence of MTC and Big Data technologies, we can introduce a new MOHA framework which can support the large-scale scientific applications along with the Hadoop ecosystem, which is evolving into a multi-application platform.

Key Management for Group-based Device-to-Device Communications in LTE-Advanced (LTE-Advanced에서 그룹 기반의 단말 간 직접 통신을 위한 키 관리 기법)

  • Choi, Dae-Sung;Hong, Sung-Dae;Kim, Seung-Ryong;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.541-543
    • /
    • 2013
  • 사람이 개입할 필요 없이 기기 및 사물들을 셀룰러 망으로 연결하여 언제 어디서나 다양한 서비스를 제공하는 MTC(Machine Type Communications)는 차세대 통신의 주요 이슈로 고려되고 있다. 하지만 MTC 환경은 다수의 단말들이 존재하기 때문에 LTE-Advanced 네트워크에 상당한 혼잡과 부하 문제를 줄 수 있다. 이 문제를 해결하기 위해 단말 간 직접 통신 기술이 등장하였다. 본 논문에서는 단말 간 직접 통신에서 eNB와의 통신을 줄이고, 그룹 간의 안전한 통신이 가능한 그룹 키 관리 기법을 제안하고, 이에 따른 연산 및 통신 오버헤드를 분석한다.

Standardization on Machine Type Communications in 3GPP (3GPP의 Machine Type Communications 표준화 동향)

  • Shin, J.S.;Park, A.S.
    • Electronics and Telecommunications Trends
    • /
    • v.27 no.2
    • /
    • pp.59-69
    • /
    • 2012
  • 모든 사물들을 네트워크를 통해 연결하므로 언제 어디서나 다양한 서비스를 손쉽게 이용할 수 있게 하는 M2M(Machine to Machine)/IoT(Internet of Things)가 차세대 통신을 위한 주요 이슈로 고려되고 있으며, 여러 네트워크 중 이동통신 네트워크를 기반으로 하는 M2M에 대한 관심이 고조되고 있다. UMTS(Universal Mobile Telecom. System), LTE(Long Term Evolution) 등 대표적인 이동통신 시스템을 위한 표준화 단체인 3GPP(3rd Generation Partnership Project)에서는 2005년 M2M을 위한 타당성 연구를 시작으로, 2008년부터 Machine Type Communications(MTC)를 위한 본격적인 표준화 작업이 진행되었으며, 현재 Release 10을 위한 규격 작업을 마무리하고 Release 11 및 12를 위한 표준규격을 작성하고 있다. 본고에서는 3GPP에서 진행하고 있는 MTC의 표준화 현황을 간략히 기술한다.

  • PDF

Modeling of simulated combat training system based on LTE-MTC (LTE-MTC 기반 모의 전투훈련체계 모델)

  • Jin, Dae-Ha;Cho, Yong-Woo;Shin, Heon-Shik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.112-113
    • /
    • 2012
  • 본 논문에서는 실전적인 전투 훈련을 체험할 수 있는 육군 과학화 전투 훈련단의 시스템을 상용 이동통신망(LTE)을 기반으로 한 MTC(장비 또는 기계간의 통신)에 적용하여, 저비용이면서도 신뢰성있는 체계 모델을 제안하며 이를 통해 공군의 각 기지/부대 별 특성에 맞는 실전적 기지방호 훈련이 가능하게 되어 실질적인 전투 능력을 향상시킬 수 있을 것으로 기대한다.

An efficient security protocol for group in 3GPP MTC (3GPP MTC 환경에서 그룹에 효율적인 보안 및 인증 기법)

  • Hong, Sung-Dae;Kang, Seong-Yong;Choi, Dae-Sung;Kim, Seung-Ryong;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.603-606
    • /
    • 2013
  • Machine to Machine (M2M) 통신은 수 많은 장비들이 우리 주변환경의 정보를 감지하여 상호간에 주고받는 방법을 활용한다. Third generation partnership project (3GPP)는 이러한 M2M 통신을 활용하여 유비쿼터스 환경과 자가인식형 서비스를 제공하려 하고 있다. 본 논문은 이러한 추세에 맞추어 새로운 개념의 통신인 3GPP M2M 통신의 시스템 구조, 특징들과 이에 대한 3GPP의 연구방향 등에 대한 튜토리얼로 사용될 수 있도록 하기 위해 작성되었다. 특히 M2M 통신에서의 특징들을 구체화하는 과정에서의 보안상 위협과 이에 대처하기 위한 요구사항들에 대해서 강조하였다. 이러한 보안상 위협을 제거하는 요구사항을 만족하면서 네트워크에 과부하를 가하지 않도록 하기 위한 그룹 기반의 최적화된 인증 프로토콜을 제안한다. 본 논문에서는 그룹을 기반으로 bilinear pairing을 사용하여 인증을 진행하며, 통신 딜레이를 줄이고 네트워크의 중심 장비에 과부하를 줄이기 위해 HSS(Home Subscriber Server)의 참여를 제한한 인증 및 키 동의 프로토콜을 제안하고, 이에 따른 연산 및 통신 오버헤드를 분석한다.

Reliability Constrained Resource Allocation in Cellular Network Uplink Scheduler (이동통신 역방향 스케줄러에서의 고신뢰성 자원 할당 기법)

  • Lee, Sung-Won;Jung, Kwang-Ryul;Park, Ae-Soon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.57-66
    • /
    • 2010
  • In this paper, we propose the reliability constrained resource allocation scheduling algorithm in cellular network for uplink transmission, where uplink transmission is supported via packet switching schemes without the dedicated uplink circuit links. We evaluate the performance of the proposed algorithm, and compared with the conventional works to identify the pros and cons. The proposed uplink scheduling algorithm is to satisfy the constraints requirements of the MTC services which is considered as the core technology for future mobile wireless networks. It is different to conventional works which target to maximize the link capacity. The proposed algorithm provides reliable uplink transmission independent to the location and the quality of the wireless link of the mobile terminal. Based on the performance evaluation results, we conclude that the proposed method provides enhanced reliability performance than conventional works.

Performance Assessment of an Access Point for Human Data and Machine Data

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1081-1090
    • /
    • 2015
  • This work proposes a theoretic framework for the performance assessment of an access point in the IP network that accommodates MD (Machine Data) and HD (Human Data). First, we investigate typical resource allocation methods in LTE for MD and HD. After that we carry out a Max-Min analysis about the surplus and deficiency of network resource seen from MD and HD. Finally, we evaluate the performance via numerical experiment.

A New RFID Multi-Tag recognition Algorithm using Collision-Bit (RFID 충돌 비트를 이용한 다중 태그 인식 알고리즘)

  • Ji, Yoo-Kang;Cho, Mi-Nam;Hong, Sung-Soo;Park, Soo-Bong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.999-1005
    • /
    • 2008
  • RFID(Radio Frequency IDintification) leader is collision of data, when recognizing the multiple tag the inside area. This collision became the cause which delays the tag recognition time of the leader. The protocol which prevents the delay of tag recognition time of the leader the place where representative it uses QT(Query Tree) algorithms, it uses a collision bit position from this paper and are improved QT-MTC(Query Tree with Multi-Tag Cognition) algorithms which it proposes. This algorithm stored the bit position which bit possibility and the collision where the collision happens occurs in the stack and goes round a tree the number of time which, it reduced could be identified two tags simultaneously in order, it was planned. A result of performance analysis, It compared in QT protocols and the this algorithm against the tag bit which is continued a high efficiency improvement effect was visible.

Slotted ALOHA Random Access with Multiple Coverage Classes for IoT Applications (사물인터넷 응용을 위한 다중 커버리지 클래스를 지원하는 슬롯화된 알로하 랜덤 접속)

  • Kim, Sujin;Chae, Seungyeob;Cho, Sangjin;Rim, Minjoong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.554-561
    • /
    • 2017
  • IoT (Internet of Things) devices are often located in environments where indoor or underground, signals are difficult to reach. In addition, the transmission power is low, the base station should be designed to be able to receive signals even at low reception sensitivity. For this reason, a device having a poor channel condition can be transmitted at a low data rate using a low coding rate or repetition. When the coverage class is divided according to the channel condition and the data rate, the packet length may vary from one coverage class to another, and the performance of the slotted aloha random access may be degraded. We will focus on two methods of using shared-resource and seperate resources among multiple slotted aloha methods. In particular, when devices with different coverage classes use shared resources, performance of a device with a bad channel condition may deteriorate. Conversely, when using separate resources for each coverage class, there is a problem that congestion may occur which increases the number of devices that perform random access to one resource area. In this paper, we propose some methods to overcome this problem. This study is mainly focused on MTC devices, and is considered to be a high possibility of future development.

A New RFID Multi-Tag recognition Algorithm using Collision-Bit (RFID 충돌 비트를 이용한 다중 태그 인식 알고리즘)

  • Ji, Yoo-Kang;Cho, Mi-Nam;Hong, Sung-Soo;Park, Soo-Bong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.55-58
    • /
    • 2008
  • RFID(Radio frequency IDentification) leader is collision of data, when recognizing the multiple tag the inside area. This collision became the cause which delays the tag recognition time of the leader. The protocol which prevents the delay of tag recognition time of the leader the place where representative it uses QT(Query Tree) algorithms, it uses a collision bit position from this paper and are improved QT-MTC(Query Tree with Multi-Tag Cognition) algorithms which it proposes. This algorithm stored the bit position which bit possibility and the collision where the collision happens occurs in the stack and goes round a tree the number of time which, it reduced could be identified two tags simultaneously in order, it was planned. A result of performance analysis, It compared in QT protocols and the this algorithm against the tag bit which is continued a tush efficiency improvement effect was visible.

  • PDF