• 제목/요약/키워드: Mobile Networks

검색결과 3,070건 처리시간 0.035초

WiFi와 mobile WiMax간 핸드오버 방안 (Handover Scheme between WiFi and Mobile WiMax)

  • 박승균
    • 한국콘텐츠학회논문지
    • /
    • 제11권1호
    • /
    • pp.34-41
    • /
    • 2011
  • 현재 무선 인터넷 접속 서비스는 3G 이동 통신 네트워크, mobile WiMAX, WiFi 등을 통해 언제 어디서든 이루어지고 있다. 다양한 무선 네트워크가 혼재해 있는 환경에서 사용자는 상황에 따라 네트워크를 선택할 수 있어야 하며 또한 동종 또는 이기종 네트워크간 이동성 지원도 필요로 하고 있다. 이러한 이유로, 서비스 지역이 가장 넓은 3G 네트워크를 주축으로 3G-mobile WiMAX(IEEE 802.16e)와 3G-WiFi(IEEE 802.11)에 대한 연동 방안들이 많이 연구되어 왔다. 그러나 최근 넷북, 전자책, 스마트폰 등의 등장과 함께 무선 인터넷 사용이 늘면서 mobile WiMAX와 WiFi 서비스 지역이 급속히 증가하고 있으며 특히 인터넷 전화 서비스와 같은 실시간 애플리케이션 사용이 가능해 짐에 따라 전통적인 음성 서비스를 하는 3G 이동 통신 네트워크의 비중은 점차 줄고 무선 인터넷 접속네트워크인 mobile WiMAX나 WiFi는 그 비중이 점차 커지고 있다. 따라서 본 논문에서는 mobile WiMAX와 WiFi간 이동성 지원과 핸드오버 지연을 최소화 하는 PMIPv6(Proxy Mobile IPv6) 기반의 핸드오버 방안을 제안한다. 제안한 방안에서 이동 노드(MN)는 WiFi와 mobile WiMAX 두 개의 인터페이스를 갖는 이중 스택 구조이며 WiFi가 이동성 지원을 하지 않으므로 기존 동종 네트워크간 핸드오버시 게이트웨이간 핸드오버 시그널링을 처리하는 기능을 이동 노드에 두도록 제안하고 있다. 동종 네트워크간 핸드오버와 비교해 제안된 핸드오버 방안은 해석적 평가를 통해 핸드오버 지연 및 전송 지연과 시그널링 오버헤드가 감소함을 보여준다.

무선 이동 네트워크에서의 적응적 자원 할당 방법 (Adaptive Resource Allocation Schemes in Wireless Mobile Networks)

  • 강유화;서영주;안성옥
    • 한국정보과학회논문지:정보통신
    • /
    • 제28권4호
    • /
    • pp.477-488
    • /
    • 2001
  • 무선 네트워크 환경에서는 네트워크의 제한된 대역폭과 이동 호스트의 잦은 셀 간 이동으로 인하여, 각 호스트가 요구하는 서비스의 질(Quality of Service)을 보장하기 힘들다. 이런 무선 통신의 특성에서도, 실시간 서비스와 같은 특정 종류의 서비스의 경우에는 요구되어지는 범위 내에서 그 서비스의 질이 반드시 보장되어야 한다. 본 논문에서는 무선 이동 네트워크 환경에서 각 서비스의 서비스 율을 어떻게 조정할 것인가에 대해 논의한다. 무선 네트워크 환경에서 이동 호스트가 다른 셀로 이동하였을 경우, 부족한 대역폭을 고려하여 호스트의 서비스 율이 조정된다. 본 논문에서 각 플로우의 QoS Spec을 고려하여 서비스 율을 할당하는 알고리즘을 제안한다. 제안된 알고리즘에서는 각 플로우가 요구하는 QoS spec 값에 비례하도록 서비스 율을 정하여 부족한 네트워크 자원을 동적으로 할당함으로써, 무선 네트워크 자원을 보다 효율적으로 사용할 수 있게 한다.

  • PDF

A Receiver-Aided Seamless And Smooth Inter-RAT Handover At Layer-2

  • Liu, Bin;Song, Rongfang;Hu, Haifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4015-4033
    • /
    • 2015
  • The future mobile networks consist of hyper-dense heterogeneous and small cell networks of same or different radio access technologies (RAT). Integrating mobile networks of different RATs to provide seamless and smooth mobility service will be the target of future mobile converged network. Generally, handover from high-speed networks to low-speed networks faces many challenges from application perspective, such as abrupt bandwidth variation, packet loss, round trip time variation, connection disruption, and transmission blackout. Existing inter-RAT handover solutions cannot solve all the problems at the same time. Based on the high-layer convergence sublayer design, a new receiver-aided soft inter-RAT handover is proposed. This soft handover scheme takes advantage of multihoming ability of multi-mode mobile station (MS) to smooth handover procedure. In addition, handover procedure is seamless and applicable to frequent handover scenarios. The simulation results conducted in UMTS-WiMAX converged network scenario show that: in case of TCP traffics for handover from WiMAX to UMTS, not only handover latency and packet loss are eliminated completely, but also abrupt bandwidth/wireless RTT variation is smoothed. These delightful features make this soft handover scheme be a reasonable candidate of mobility management for future mobile converged networks.

Efficient Authentication Protocol for Mobile Networks

  • 김기원;전준철;유기영
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.181-184
    • /
    • 2006
  • The mobile devices are constrained to be low battery, and the mobile data channel is low data rate. Therefore, the computational cost on the client side of the authentication protocol should be low. In 2005, Hwang and Su proposed an efficient authentication protocol for mobile networks. Hwang-Su protocol is more efficient than other related protocols. In this paper, we propose a new efficient authentication protocol for mobile networks. The proposed protocol is more efficient than Hwang-Su's in computational respect although our protocol is nearly equal to Hwang-Su's in communication respect. It is suitable to apply in the mobile networks.

  • PDF

P2P Network Simulation System for Performance Evaluation in Convergence Networks

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of information and communication convergence engineering
    • /
    • 제9권4호
    • /
    • pp.396-400
    • /
    • 2011
  • P2P(peer to Peer) network is a distributed network architecture composed of participants that make a portion of their resources directly available to other network participants, without the need for a central server. Currently, convergence network industry using wired and mobile are grows rapidly. So P2P protocols will be used between mobile and wired network. But current P2P protocols are focused on the wired networks only and there are no simulators for performance analysis of mobile P2P. In this paper, we design a P2P simulation system for performance analysis of P2P protocols in mobile, wired and convergence networks. It is constructed by a well-known mobile network simulator and wired based P2P protocol simulator. Finally we have implemented a smart TV test-bed using our P2P test-bed for convergence networks.

A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks

  • Lee, Myoung-Rak;Lee, Taek;Yoon, Byung-Sik;Kim, Hyo-Gon;In, Hoh Peter
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.626-633
    • /
    • 2009
  • Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

Analyzing the Economic Effects of Past Mobile Network Sharing Deals for Future Network Deployment

  • Kim, Dongwook;Kim, Sungbum;Zo, Hangjung
    • ETRI Journal
    • /
    • 제40권3호
    • /
    • pp.355-365
    • /
    • 2018
  • The increase in data traffic calls for investment in mobile networks; however, the saturating revenue of mobile broadband and increasing capital expenditure are discouraging mobile operators from investing in next-generation mobile networks. Mobile network sharing is a viable solution for operators and regulators to resolve this dilemma. This research uses a difference-in-differences analysis of 33 operators (including 11 control operators) to empirically evaluate the cost reduction effect of mobile network sharing. The results indicate a reduction in overall operating expenditure and short-term capital expenditure by national roaming. This finding implies that future technology and standards development should focus on flexible network operation and maintenance, energy efficiency, and maximizing economies of scale in radio access networks. Furthermore, mobile network sharing will become more viable and relevant in a 5G network deployment as spectrum bands are likely to increase the total cost of ownership of mobile networks and technical enablers will facilitate network sharing.

통신시장 유무선 서비스 도입과 주요국의 규제현황

  • 송영화
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2001년도 추계학술대회 논문집
    • /
    • pp.358-361
    • /
    • 2001
  • Fixed-mobile convergence services can be defined as the combination of previously separate fixed and mobile services, and networks and commercial practices. Examples of fixed-mobile convergence services include single voicemail box, single number and unified messaging across fixed and mobile networks. Recently as more voice is transferred to mobile networks, convergence services between fixed and mobile become more important. In Korea convergence services are only starting to become established, and are likely to become an important part of any operator's offering. In this paper, I search the different levels of fixed-mobile convergence services and the trends and regulations for fixed-mobile convergence services in major countries. And at the same time I also try to find a new direction of future regulatory principles related to fixed-mobile convergence services.

  • PDF

A Grid-based Efficient Routing Protocol for a Mobile Sink in Wireless Sensor Networks

  • Lee, Taekkyeun
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권2호
    • /
    • pp.35-43
    • /
    • 2018
  • In this paper, we propose a grid-based efficient routing protocol for a mobile sink in wireless sensor networks. In the proposed protocol, the network is partitioned into grids and each grid has a grid head. For the efficient routing to a mobile sink, the proposed protocol uses a mobile sink representative node to send the data to a mobile sink and grid heads are used as a mobile sink representative node. Furthermore, the proposed protocol uses nodes in the boundary of the center grid as position storage nodes. The position storage nodes store the position of a mobile sink representative node and provide source nodes with it for data delivery. With these features, the proposed protocol can reduce a lot of overhead to update the position information and improve the delay of data delivery to a mobile sink. The proposed protocol performs better than other protocols in terms of the delay and the energy consumption per node in the performance evaluation.

Self-Organized Authentication in Mobile Ad-Hoc Networks

  • Caballero-Gil, Pino;Hernandez-Goya, Candelaria
    • Journal of Communications and Networks
    • /
    • 제11권5호
    • /
    • pp.509-517
    • /
    • 2009
  • This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.