• Title/Summary/Keyword: Mobile Wireless Network

Search Result 1,918, Processing Time 0.023 seconds

TCP Throughput Effective Vertical Handoff Decision Scheme for Heterogeneous Wireless Networks (이기종 무선망에서의 TCP 성능 기반 수직적 핸드오프 결정 방안)

  • Seok, Woo-Jin;Choi, Young-Hwan;Kim, Sang-Ha
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.6
    • /
    • pp.505-513
    • /
    • 2007
  • Vertical handoff is a new type of handoff in wireless networks. It is issued when a mobile node moves over overlapping wireless networks with each proving a different access bandwidth, transmission latency, and coverage. By issuing the vertical handoff, the mobile node can obtain better network bandwidth. In the sense of TCP throughput, however, the vertical handoff does not always produce positive performance gain, so sometimes it is better for the mobile node to stay at lower bandwidth providing network rather than to select and move to higher bandwidth providing network. In this paper, we analyze TCP throughput for vertical handoff, and propose a new handoff decision scheme which can estimate TCP throughput at the moment of vertical handoff. Based on the estimation, a mobile node can decide to issue vertical handoff to produce better TCP throughput, and we verify the results by simulations.

Design of the 1.5kVA Class Wireless Power Transfer Device for Battery Charging of Integrated Power Control System in MSAP (군 이동기지국시스템(MSAP) 통합전원제어장치 배터리 충전용 1.5kVA급 무선전력전송기기의 설계)

  • Kim, Jin-Sung;Kim, Byung-Jun;Park, Hyeon-Jeong;Seo, Min-Sung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.413-420
    • /
    • 2020
  • The Tactical Information and Communication Network system provides real-time multimedia services such as voice and data by utilizing the Mobile Subscriber Access Point. At this time, an external transmission path is constructed through the Low Capacity Trunk Radio and the High Capacity Trunk Radio system. The communication devices of each wireless transmission system are mounted on a tactical vehicle and a secondary battery is used to prevent a power interruption when the supply power to the tactical vehicle is transferred to the integrated power control device. In this paper, the basic design of the Wireless Power Transfer device for charging the battery of the integrated power control system of the mobile base station system using the Loading Distribution Method and checking the number of primary windings and the core material selection by the air gap through the Finite Elements Method.

Mobile IP Router in Ad Hoc Network (Ad Hoc 네트워크에서 이동 IP Router)

  • Park, Chun-Kwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.169-175
    • /
    • 2011
  • This paper addresses mobile IP router which communicate between nodes in Ad Hoc network as well as supply attachment to outer Internet. Ad Hoc network is one which exchanges information through cooperations among nodes without wire infrastructure, mobile IP router considers the network as one mobile unit, and supports Internet connection in mobile as well as fixed spaces. Therefore, this router can accommodate the routing of Ad Hoc network, and provide nodes in Ad Hoc network with Internet connection. So mobile IP router can provide Ad-Hoc terminals with the diverse wireless services, such as Internet connection service, routing, mobility, and so on.

A New Roaming Authentication Framework For Wireless Communication

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin;Zhao, Qianqian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2061-2080
    • /
    • 2013
  • Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users. However, the classical approach requires the home server's participation during the authentication between the mobile user and the foreign server. So the more the roaming requests are performed the heavier burden will be on the home server. In this paper, we propose a new roaming authentication framework for wireless communication without the home server's participation. The new roaming authentication protocol in the new framework takes advantage of the ID-based cryptography and provides user anonymity. It has good performance compared with the roaming authentication protocols whose authentication do not need the home server's participation in terms of security and computation costs. Moreover, a new User-to-User authentication protocol in the new framework is also present. All the authentications proposed in this paper can be regarded as a common construction and can be applied to various kinds of wireless networks such as Cellular Networks, Wireless Mesh Networks and Vehicle Networks.

Wireless Communication Real-Time Travelling Control of Mobile Robot by Voice Command (음성명령에 의한 모바일로봇의 무선통신 실시간 주행제어)

  • Shim, Byoung-Kyun;Han, Sung-Hyun
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.10 no.6
    • /
    • pp.33-38
    • /
    • 2011
  • We describe a research about remote control of mobile robot based on voice command in this paper. Through real-time remote control and wireless network capabilities of an unmanned remote-control experiments and Home Security / exercise with an unmanned robot, remote control and voice recognition and voice transmission are possible to transmit on a PC using a microphone to control a robot to pinpoint of the source. Speech recognition can be controlled robot by using a remote control. In this research, speech recognition speed and direction of self-driving robot were controlled by a wireless remote control in order to verify the performance of mobile robot with two drives.

A Survey of Location Management Techniques in Wireless Mobile Networks (무선 이동 네트워크에서의 위치 관리 기술에 대한 고찰)

  • Kong, Ki-Sik
    • Journal of Digital Contents Society
    • /
    • v.11 no.4
    • /
    • pp.433-443
    • /
    • 2010
  • In this paper, we provide a comprehensive overview and classification on a wide range of the existing location management schemes which have been reported for wireless cellular networks and Mobile IP-based networks, respectively. In addition, from the various previous literature, we derive common key conceptual techniques, their main design goals and performance considerations on them, which can provide a useful guidance for understanding location management schemes regardless of network types. The aim of this paper is not to propose a new scheme for location management, but to highlight the various key design features involved in the design of the existing location management schemes, and to enhance an insight into the fundamental principles and techniques for designing more efficient and optimized location management scheme in future wireless mobile networks. We expect that regardless of network types, these underlying fundamental principles and conceptual techniques could be also easily tailored for more efficient mobility/QoS support in future mobile computing environments.

Data Weight based Scheduling Scheme for Fair data collection in Sensor Networks with Mobile Sink (모바일 싱크 기반 무선 센서 네트워크에서 균등한 데이타 수집을 위한 데이타 가중치 기반 스케줄링 기법)

  • Jo, Young-Tae;Park, Chong-Myung;Lee, Joa-Hyoung;Jung, In-Bum
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.21-33
    • /
    • 2008
  • The wireless sensor nodes near to the fixed sink node suffer from the quickly exhausted battery energy. To address this problem, the mobile sink node has been applied to distribute the energy consumption into all wireless sensor nodes. However, since the mobile sink node moves, the data collection scheduling scheme is necessary for the sink node to receive the data from all sensor nodes as fair as possible. The application fields of wireless sensor network need the real-time processing. If the uneven data collection occurs in the wireless sensor network, the real-time processing for the urgent events can not be satisfied. In this paper, a new method is proposed to support the lair data collection between all sensor nodes. The proposed method performs the scheduling algorithm based on the resident time of the sink node staying in a radius of communication range and the amount of data transferred already. In this paper, the proposed method and existing data collection scheduling schemes are evaluated in wireless sensor network with the mobile sink node. The result shows that the proposed method provides the best fairness among all data collection schemes.

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

A Case Study on the Implementation of a Real-time Patient Monitoring System based on Wireless Network (무선 네트워크 기반의 실시간 환자 모니터링 시스템 구축 사례 연구)

  • Choi, Jong-Soo;Kim, Dong-Soo
    • IE interfaces
    • /
    • v.23 no.3
    • /
    • pp.246-256
    • /
    • 2010
  • As wireless and mobile technologies have advanced significantly, lots of large sized healthcare organizations have implemented so called mobile hospital (m-Hospital) which provides a location independent and point of care (POC) clinical environment. Implementation of m-Hospital enhances quality of care because health professionals such as physicians and nurses can use hospital information systems at the very place where patients are located without any delay. This paper presents a real-time patient monitoring system based on wireless network technologies. A general framework for the patient monitoring process is introduced and the architecture and components of the proposed monitoring system is described. The system collects and analyzes biometric signals of in-patients who suffer from cancer. Specifically, it continuously monitors oxygen saturation of patients in bed and alarms health professionals instantly when an abnormal status of the patient is detected. The monitoring system has been used and clinically verified in a university hospital.

Indoor Environment Monitoring Using a PXA 270-based Mobile Embedded System (PXA 270 기반 이동형 임베디드 시스템을 이용한 실내 환경 모니터링)

  • Jeong, Goo-Jong;Kim, In-Hyuk;Son, Young-Ik
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.249-251
    • /
    • 2009
  • Mobile patrol robots are mainly used in aerospace and military engineering because they can work at dangerous environment replacing a man. This paper presents a study on the remote monitoring and control system of a mobile patrol robot platform using TCP/IP. The mobile robot consists of intel PXA270 and linux-based system. It can get environment information such as images, temperature, humidity and slope by using two cameras and various sensors. And it transmits information data to a monitoring system through the ad-hoc network which is one of wireless network solutions. At this time, a mobile robot is a server and a monitoring system is a client. Users can monitor environment information which is received from a mobile robot by an application based on PC. We have used TCP/IP protocol, socket programming, interface technique of process and devices and control algorithm to embody the mobile robot and its monitoring system. Experimental results shows that the system can be utilized as a remote patrol monitoring tool.

  • PDF