• Title/Summary/Keyword: Mobile Service Provider

Search Result 207, Processing Time 0.027 seconds

Consistent Distributed Lookup Service Architecture for Mobile Ad-hoc Networks

  • Malik Muhammad Ali;Kim Jai-Hoon
    • International Journal of Contents
    • /
    • v.2 no.2
    • /
    • pp.29-31
    • /
    • 2006
  • Mobile Ad hoc network is a self configuring network of mobile nodes. It allows mobile nodes to configure network spontaneously and share their services. In these networks, service discovery is very important because all nodes do not have same resources in term of memory and computing power. Nodes need to use different services offered by different servers. Some service discovery protocols have been proposed in last couple of years but they include significant traffic overhead and for small scale MANETS. In this paper, we present extensible lookup service scheme based on distributed mechanism. In our scheme neighboring nodes of service provider monitor service provider and send notification to lookup server when the service provider terminates its services unexpectedly. Lookup server can find other service provider or other alternative services in advance because of advance notification method and can provide consistent lookup services. In our scheme neighboring nodes also monitor lookup server and send notification to network when lookup server terminates unexpectedly. Simulation results show that our scheme can reduce up to 70% and 30% lookup failure as compare to centralize and simple distributed mechanism respectively.

  • PDF

Novel Pre-pushing & Downloading Model in Mobile Peer-assisted Streaming Network

  • Lin, Fuhong;Zhou, Xianewi;Chen, Changjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3135-3148
    • /
    • 2013
  • The popularization of streaming networks and mobile devices brings a new kind of network called mobile peer-assisted streaming network. In this network, service provider not only offers downloading services, but also pre-pushes resources to users for caching. Users can download their demanded resources while working as servers for uploading the cached data. Also the mobile characteristic makes high package losing probability in this network. So we study how the service provider pre-pushes or the user downloads resources efficiently and effectively while considering the package losing in this paper. We build utility models for service provider and user, and solve the models using Bellman's theory to achieve Nash Equilibrium which shows the service provider's optimal pre-pushing speed and user's optimal downloading speed. The numerical simulation demonstrates the efficiency and effectiveness of our proposed pre-pushing and downloading scheme by comparing to the traditional scheme.

An Optimal Strategy of 3G Mobile Handset Distribution by 3-Person Game (3자간게임모형에 의한 3G 이동통신단말기의 치적유통전략)

  • Joo, Young-Jin;Moon, Hyoung-Don
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.34 no.4
    • /
    • pp.185-204
    • /
    • 2009
  • The USIM(universal subscriber identity module)-unlock introducing in July 1, 2008 might be led to a significant change that mobile service provider's dominance is considerably dispersed to the handset manufacturer and distributor. Under USIM-unlock environment, mobile service provider, handset manufacturer, and distributor have to make their decisions on their handset distribution channel strategies: the closed distribution channel strategy or the open distribution channel strategy. The change of distribution channel strategy between members in distribution channel can be understood as a matter of strategy choice, and we have developed a theoretical model and analyzed how to make a decision for the member's optimal distribution strategy based on 3-person game model between members of mobile phone distribution channel, under both of '1 subscriber-1 handset' and '1 subscriber-multiple handset' assumptions. Under '1 subscriber-1 handset' assumption, the closed strategy controlled by mobile service provider is all players' optimal solution because the maximum size of the mobile phone market is limited by subscribers. But, as total expected profit by the handset and distribution subsides is a deficit, mobile service provider have to choose the open strategy and consider the conversion to MNO(mobile network operator). Under '1 subscriber-multiple handset' assumption, mobile service provider is trying to find the way how to lock-in its service and mobile phone and how to maximize ARPU(average revenue per unit), while handset manufacturer and distributor have to look for the way how to maximize the mobile phone market using their own marketing efforts, because it is expected that total mobile handset demand for the open market is bigger than demand for the closed market under '1 subscriber-multiple handset' assumption.

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

A Study on Activation of New Mobile Communication Spectrum in the Environment of Mobile Big Data Traffic (모바일 빅 데이터 트래픽 환경에서 새로운 이동통신 주파수의 활성화 방안 연구)

  • Chung, Woo-Ghee
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.2
    • /
    • pp.42-46
    • /
    • 2012
  • This paper analyses technical and economical conditions which activate the use of mobile communication spectrum not to limit the growth of mobile broadband service because of mobile big data traffic and proposes the method which activate the use of mobile communication spectrum. To activate new mobile communication spectrum the expenditure and income of investment should be balanced. The activation of new mobile communication spectrum to process mobile big data traffic depends on technical and economical conditions, internal and external factors of service provider. The investment expenditure is relate to CAPEX, OPEX which is internal factors of service provider and to spectrum price which is external factor of service. The investment income is relate to tariff system which is internal factors of service provider and to spectrum neutrality which is external factor of service provider. The activation of new mobile communication spectrum can be implemented when the investment expenditure and investment income meet the balance including the spectrum price in the investment expenditure and the tariff system which is able to extend network and the income based on traffic increase by external contents in the investment income.

Factors Affecting Subscribers' Switching between Providers within Mobile Number Portability System (이동전화 이용자의 번호이동에 영향을 미치는 요인에 대한 실증분석)

  • Kim, Ho;Park, Yoon-Seo;Jun, Duk-Bin;Yang, Liu
    • Korean Management Science Review
    • /
    • v.25 no.2
    • /
    • pp.57-71
    • /
    • 2008
  • We study factors that affect consumers' switching behaviors among service providers in Korean mobile telecommunications service market. For empirical analysis, quarterly time series data from the first quarter of 2004 through the second quarter of 2007 were used. We chose the number of switchers to each mobile service provider in each quarter as dependent variables. Independent variables include acquisition costs per subscriber, which play the role of subsidy to mobile handset, switching costs, time trend, structural change effect, and waiting demand effects. Through the empirical analysis, we found that each provider's churn-in customers are affected by different factors. Specifically, the number of churn-in customers into SK Telecom is explained mainly by SK Telecom's customer acquisition costs and waiting demand from KTF, while the number of customers switching into KTF is better explained by switching costs from the previous service provider and waiting demand from SK Telecom. Those who chose LG Telecom as their new provider, on the other hand, were mainly attracted by LG Telecom's high subscriber acquisition cost.

An Implementation of the Web Service for Authorization and Speech Recognition in the Mobile Environment (모바일 환경에서 인증과 음성인식을 위한 웹 서비스 구현)

  • Oh Jee-Young;Kim Yoon-Joong;Ko You-Jung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.225-232
    • /
    • 2005
  • A PDA has limitation of storage space and inconvenience of Pen-based equipment to input. To solve these problems, this paper implemented that previous Speech Recognition provides using XML(extensile Markup Language) Web Service and PDA Client is possible to use speech command by request Speech Recognition Web Service. This system consists of Mobile Client and Speech Recognition Web Service Provider. The Mobile Client transmits user information and speech data to the Speech Recognition Web Service Provider using DIME(Direct Internet Message Encapsulation). The Speech Recognition Web Service Provider returns recognition results and user name only to an authorized Mobile Client. So We are able to use speech service without installing Speech Recognition or Speech DB in PDA.

  • PDF

Mobile Payment Use in Light of Privacy Protection and Provider's Market Control

  • Mohammad Bakhsh;Hyein Jeong;Lingyu Zhao;One-Ki Daniel Lee
    • Asia pacific journal of information systems
    • /
    • v.31 no.3
    • /
    • pp.257-276
    • /
    • 2021
  • This study investigates the factors that facilitate or hinder people to use mobile payment, especially drawing upon the theoretical perspectives on individual's privacy protection motivation and perceived market condition. Survey data (n = 200) were collected through a web-based platform and used to test a theoretical model. The results show that one's privacy protection power is formed by various individual and technological factors (i.e., perceived data exposure, self-efficacy, and response efficacy), and in turn it determines his/her intention to use mobile payment. Moreover, the relationship between privacy protection power and mobile payment use is conditional on the perceived market control by the service provider - with a perception of the high level of provider's market control, one uses mobile payment regardless of his/her privacy protection power, while under the low level of provider's market control, the decision depends on the degree of privacy protection power. The findings would help our understanding of why some people are more susceptible to mobile payment and others are not.

Optimal Provider Mobility in Large-Scale Named- Data Networking

  • Do, Truong-Xuan;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4054-4071
    • /
    • 2015
  • Named-Data Networking (NDN) is one of the promising approaches for the Future Internet to cope with the explosion and current usage pattern of Internet traffic. Content provider mobility in the NDN allows users to receive real-time traffic when the content providers are on the move. However, the current solutions for managing these mobile content providers suffer several issues such as long handover latency, high cost, and non-optimal routing path. In this paper, we survey main approaches for provider mobility in NDN and propose an optimal scheme to support the mobile content providers in the large-scale NDN domain. Our scheme predicts the movement of the provider and uses state information in the NDN forwarding plane to set up an optimal new routing path for mobile providers. By numerical analysis, our approach provides NDN users with better service access delay and lower total handover cost compared with the current solutions.

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.