• Title/Summary/Keyword: Mobile communication

Search Result 6,804, Processing Time 0.032 seconds

The Study of Building Security-Established Enterprise Mobile-VPN on WiBro Network (WiBro망에서 보안성이 확립된 기업용 Mobile-VPN 구축 방안 연구)

  • Cho, Do-Hyeoun;Kang, Dae-Seok;Han, Kyu-Jeong;Ji, Yung-Ha;Han, Wan-Ok
    • 전자공학회논문지 IE
    • /
    • v.47 no.4
    • /
    • pp.48-52
    • /
    • 2010
  • Recently, WiBro service as a mobile internet has been being extended. The market of wireless data communication has been being extended rapidly due to the increase of mobile data communication service supply such as smart-phone, WiBro service and so on. As the result, security is also emphasized in the mobile Internet In this paper, we propose the methods that tighten up security in the upcoming Enterprise Mobile-VPN service on WiBro network.

Mobile RFID Technology Standardization Activities and Strategy (모바일 RFID 기술 표준화 활동 및 전략)

  • Oh, Se-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1698-1707
    • /
    • 2011
  • Mobile RFID technology as a typical Convergence technology combines RFID communication, mobile communication and network infrastructure, and information processing technology. As it enables users to communicate with the surroundings, Mobile RFID technology is now recognized to serve as the basis technology for the Ubiquitous Information Society where users can get the needed information anytime and anywhere. Through lots of efforts for the early technology development and standardization activities on Mobile RFID technology, Korea has been leading technology standardization as well as technology initiatives. Thus, this research paper describes the domestic and the international standardization activities on Mobile RFID technology as well as the latest standardization status. Further this paper summarizes the major standardization issues, and then proposes the standardization strategy of Mobile RFID technology by analyzing the relevant and influential factors.

A study on Handover Performance of Mobile IPv6 on Mobile IPv6 testbed (Mobile IPv6 테스트 베드 및 핸드오버 성능 평가에 관한 연구)

  • Kim, Dong-Il;Kim, Kwang-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1961-1965
    • /
    • 2008
  • During communication between wireless users, disconnection may occur during the handover process. The high handover latency during the process of handover degrades the service quality of the wireless communications. This problem becomes more crucial if the operation network is transmitting real-time multimedia applications. This paper studies the hanover procedure of mobile IPv6 and investigates various factors affecting the handover latency through mobile IPv6 testbed and evaluates the various parameters for reducing the handover latency.

The Performance Analysis of Mobile Data Traffic Offload using LIPA in Femtocell Networks (펨토셀 네트워크에서 LIPA를 이용한 모바일 데이터 트래픽 오프로드 성능 분석)

  • Kim, Se-Jin;Bae, Sang-Hyun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.1
    • /
    • pp.16-22
    • /
    • 2017
  • In this paper, we first introduce a mobile data traffic offload method called Local IP Access (LIPA) with femtocell networks. Then, we evaluate the traffic transmission time and probability of mobile data traffic that is transmitted to the core network (CN) when mobile devices transmit the mobile data traffic to indoor devices in three different scenarios, i.e., conventional systems, femtocell based systems, and femtocell and LIPA based systems. Through performance results, it is shown that the next generation mobile network with the femtocell and LIPA not only decrease the density of the mobile data traffic in CNs but also reduce the total transmission time of the mobile data traffic in indoor environments. That is, for the traffic transmission time, the conventional systems and femtocell based systems have 3 and 4 times higher than the femtocell and LIPA based systems, respectively, when the Internet delay is 10ms while 14 and 26 times higher than that, respectively, when the Internet delay is 100ms.

Implementation of Mobile Authentication System for Context-Awareness based on Near Field Communication (근거리 통신 기반의 상황 인식을 위한 모바일 인증 시스템의 구현)

  • Park, Hung-Bog;Seo, Jung-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.39-46
    • /
    • 2017
  • Today, mobile devices are becoming essential for everyday life, and integration of mobile computing, situation recognition and intellectual service accelerates mobile interaction. Surrounding intelligence detection technology is extremely important. These technologies can automatically acquire and recognize surrounding information and situations. Situation recognition can realize wide-range mobile recognition for intellectual services of users' diverse activities, by distinguishing many surrounding devices and recognizing their situations. Thus, this paper suggests application for students' mobile authentication such as college campus attendance authentication, and redesign existing plastic student ID as NFC-compatible mobile authentication system. Experiment results proved NFC-compatible mobile touch-based interactions can maximize the strengths of NFC technology because it can recognize limits in some situations such as tardiness and absences by automating student validation and preventing far-distance reading.

A Study on Fast Handover Scheme for Seamless Multimedia Transmission in Wireless Networks (무선환경에서 끊김없는 멀티미디어 전송을 위한 고속의 핸드오버 기법 연구)

  • Song, Min-Ho;Park, Byung-Joo;Park, Gil-Cheol;Kim, Yong-Tae;Lee, Dong-Cheul;Chang, Byeong-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.101-108
    • /
    • 2009
  • Since the use of wireless communication instruments was standardized, users expect to be provided with seamless information whenever and wherever they use the instruments. Also, some technology is required to satisfy the users' needs which will cover their mobility. To support the mobility of host, the Internet Engineering Task Force (lETF) Mobile IP Working Group proposed a protocol called MIPv6 (Mobile IPv6). But in the case of the existing MIPv6, sometimes Mobile Node cannot receive data packet if Handover occurs although it is a temporal phenomenon. For solving these Handover problems, there are many methods like FMIPv6 (Fast Handover for Mobile IPv6) and HMIPv6 (Hierarchical Mobile IPv6) have been suggested. This paper suggested the use of Dual Buffer of Access Point and an effective way of registration as a way of reducing delayed time caused by Handover. Also, it analyzed and compare the existing MIPv6 with a proposed scheme concerning delayed time of Handover. Finally, the main objective of this paper is to proposed scheme that can reduce the delayed time of Handover compare to the existing MIPv6.

  • PDF

A Strategy using Updatable Message for Retaining the Cache Consistency in the Mobile Computing Environment (이동 컴퓨팅 환경에서 갱신가능 메시지를 이용한 캐쉬 일과성 유지 정책)

  • Park, Seong-Bae;Hwang, Bu-Hyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1694-1705
    • /
    • 1997
  • In the future mobile computing environment, it will be generalized that a mobile host with portable Laptop of Palmtop accesses to database through wireless communication channel. For solving the problems which are caused from low bandwidth of wireless communication, mobile hosts cache the datum used frequently on them. Thus the mobile hosts must always retain the cache consistency for the correctness of the cached datum. the cache consistency is mainly affected from the unrestricted host mobility and the disconnection of the communication between mobile hosts and mobile support station. In this situation, the strategy to retain efficiently cache consistency is required. In this paper, we propose a strategy using updatable message for retaining the cache consistency, in the mobile computing environment, with replicated database supporting 2 phase commit protocol. This strategy makes use of a updatable message to resolve the cache consistency problem, since mobile host crosses the boundary of cell. In using of this updatable, it find out and cache only the update data of missing invalidation message. As a result, the proposed strategy utilizes network bandwidth efficiently because it is not need to delete all the cached datum with any datum change.

  • PDF

Study on Effective 5G Network Deployment Method for 5G Mobile Communication Services (5G 이동통신 서비스를 위한 효율적인 5G 망구축 방안에 관한 연구)

  • CHUNG, Woo-Ghee
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.5
    • /
    • pp.353-358
    • /
    • 2018
  • We herein analyze the service traffic characteristics and spectrum of the 5G mobile communication and suggest the effective 5G network deployment method for 5G mobile communication services. The data rates of the 5G mobile communication are from several kbps (voice and IoT) up to 1 Gbps (hologram, among others). The 5G mobile communication services show the diverse cell coverage environments owing to the use of diverse service data rates and multiple spectrum bands. To effectively support the 5G mobile communication services, the network deployment requires the optimization of the service coverages for new service environments and multiple spectrum bands. Considering the 5G spectrum bandwidth debated at present, if the 5G services of 100 Mbps can be supported in the 200 m cell edge using the 3.5 GHz spectrum bands, the 5G services of the 1 Gbps hologram and 500-Mbps 4k UHD can be supported in the cell edges of 50 m and 100 m using the 28 GHz spectrum bands. Therefore, the 5G services can be supported effectively by the 5G network deployment using spectrum portfolio configurations to match the diverse 5G services and multiple bands.

A Study on Mobile Wireless Communication Network Optimization Using Global Search Algorithm (전역 탐색 알고리듬을 이용한 이동 무선통신 네트워크의 최적화에 대한 연구)

  • 김성곤
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2004
  • In the design of mobile wireless communication network, BSC(Base Station Location), BSC(Base Station Controller) and MSC(Mobile Switching Center) are the most important parameters. Designing base station location, the cost must be minimized by combining various, complex parameters. We can solve this Problem by combining optimization algorithm, such as Simulated Annealing, Tabu Search, Genetic Algorithm, Random Walk Algorithm that have been used extensively for global optimization. This paper shows the 4 kinds of algorithm to be applied to the optimization of base station location for communication system and then compares, analyzes the results and shows optimization process of algorithm.

  • PDF

An Efficient Data Transmission to Cloud Storage using USB Hijacking (USB 하이재킹을 이용한 클라우드 스토리지로의 효율적인 데이터 전송 기법)

  • Eom, Hyun-Chul;No, Jae-Chun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.47-55
    • /
    • 2011
  • The performance of data transmission from mobile devices to cloud storages is limited by the amount of data being transferred, communication speed and battery consumption of mobile devices. Especially, when the large-scale data communication takes place using mobile devices, such as smart phones, the performance turbulence and power consumption become an obstacle to establish the reliable communication environment. In this paper, we present an efficient data transmission method using USB Hijacking. In our approach, the synchronization to transfer a large amount of data between mobile devices and user PC is executed by using USB Hijacking. Also, there is no need to concern about data capacity and battery consumption in the data communication. We presented several experimental results to verify the effectiveness and suitability of our approach.