• Title/Summary/Keyword: Mobile telecommunication Services

Search Result 190, Processing Time 0.031 seconds

An Analysis on the Change of Usage Behavior for Bundle Services in Korean Telecommunication Market (방송통신 결합상품서비스 이용행태 변화 분석 연구)

  • Yu, Jieun;Lee, Seong-Jun;Cho, Chanwoo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.204-215
    • /
    • 2020
  • We analyze changes of consumption behavior for bundle services for the latest three years focusing on comparing the detailed service types and service providers to understand competition structure in the market. Our major findings and implications are as follows. First, the mobile telecommunication service is certainly deemed to be a major selection criteria for bundling service provider, therefore the leading company in the mobile telecommunication has become more significant market power. Second, IPTV has an important influence for slection of bundling service provider, lately in some cases, rather than broadband Internet. Third, the individual services affecting the selection of bundling service providers clearly showed differentiation among three operators as a mobile telecommunication service of SK Group, a broadband Internet of KT, and an IPTV of LGU+. In addition, the importance of individual services in securing subscribers has been increased as the preference factors to switch a service provider were synchronized with the decision of major bundling service provider. Finally, although it is difficult to find customers' lock-In due to the latest change of their intentions to switch a provider, we find it is continuously necessary to monitor customers' lock-in as there are more long-term customers with re-contracts. Our results provide the policy implications based on the change of competition structure and usage behavior in the bundle market which is not evaluated the competiton situation.

Transmission of Map Data of Location-Based Services in Mobile Environment

  • Han, Eun-Young;Choi, Hae-Ock
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.676-678
    • /
    • 2003
  • Recently, in according as rapid improvement of telecommunication markets and wireless internet technology, Location- Based Services (LBS) have been discussed as new 'Killer' application. The purpose of LBS is to determine location of user through mobile handset and to offer location information service to end-user. This paper has suggested an efficient transmission scheme of maps data as one of the important content services relating to data transmission of LBS in mobile environment. The basic system consists of three parts : (1) GIS (Geographic Information System) Server for storing, processing and handling map data, (2) Middleware Server for transmitting of map data by request of client, and (3) Client for requesting map data to Server and displaying them on handset. Also, in order to transmit map data, we are to expand WKB (Well Known Binary) in conformance to Simple Feature Specification of OGC (Open GIS Consortium), and increase efficiency of data transmission by developing trans mission data format to be able to transmit lightweight data and considering data compression technology.

  • PDF

Design of Secure Protocol based on trust model and trust values for Ubiquitous Sensor Networks (Ubiquitous Sensor Network에서 안전성 증가를 위한 신뢰모델과 신뢰값에 관한 프로토콜 설계)

  • Jang, Kun Won;Suh, Jang Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Mobile devices do not need the fixed network infrastructure in ad-hoc network, these devices communicate each other through the distributed control. Accordingly, mobile devices can discover several services using dynamic searching method and provide safely public ownership of these services. Ad-hoc network needs the distributed control and topology of dynamic network because the limited power for processing and network communication. This paper is devoted to provide the secure protocol that provides efficient services discovery using SDP(Service Discovery Protocol) and considers the security requirements. Proposed protocol provides the distributed control based on PKI without central server, the discovery of trusted service, secure telecommunication, the identification among mobile devices, and service access control by user authority.

Pedestrian Network Models for Mobile Smart Tour Guide Services

  • Jwa, Jeong-Woo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.27-32
    • /
    • 2016
  • The global positioning system (GPS)-enabled mobile phones provide location-based applications such as car and pedestrian navigation services. The pedestrian navigation services provide safe and comfortable route and path guidance for pedestrians and handicapped or elderly people. One of the essential components for a navigation system is a spatial database used to perform navigation and routing functions. In this paper, we develop modeling and categorization of pedestrian path components for smart tour guide services using the mobile pedestrian navigation application. We create pedestrian networks using 2D base map and sky view map in urban area. We also construct pedestrian networks and attributes of node, link, and POI using on-site GPS data and photos for smart pedestrian tour guide in the major walking tourist spots in Jeju.

A Quantitative Analysis of the Effects of a Handset Subsidy on Consumer Welfare

  • Han, Sung-Soo;Choi, Sung-Ho;Kim, Byeong-Kwan;Chung, Hyun
    • ETRI Journal
    • /
    • v.28 no.5
    • /
    • pp.621-630
    • /
    • 2006
  • Observation of the effects of a handset subsidy on the mobile telecommunication industry has revealed two different aspects. The activation of various mobile services and the handset market, has led to the rapid acceleration of the related technological development, which is a desirable result, while rising prices and the overspending of related resources are undesirable. A great deal of research has been conducted to assess both desirable and undesirable factors using qualitative methods. However, quantitative studies into the effects of a handset subsidy are rare. In this study, we consider the positive and negative effects on consumer welfare of a change in demand and prices brought about by a handset subsidy. Then, we quantitatively compare the positive and negative effects and analyze their direct effects on consumer welfare.

  • PDF

An Architecture for Key Management in Hierarchical Mobile Ad-hoc Networks

  • Rhee, Kyung-Hyune;Park, Young-Ho;Gene Tsudik
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.156-162
    • /
    • 2004
  • In recent years, mobile ad-hoc networks have received a great deal of attention in both academia and industry to provide anytime-anywhere networking services. As wireless networks are rapidly deployed, the security of wireless environment will be mandatory. In this paper, we describe a group key management architecture and key agreement protocols for secure communication in mobile ad-hoc wireless networks (MANETs) overseen by unmanned aerial vehicles (UAVs). We use implicitly certified public keys method, which alleviates the certificate overhead and improves computational efficiency. The architecture uses a two-layered key management approach where the group of nodes is divided into: 1) Cell groups consisting of ground nodes and 2) control groups consisting of cell group managers. The chief benefit of this approach is that the effects of a membership change are restricted to the single cell group.

An Approach for Designing a UMTS and CDMA2000 Dual Standard Compatible Baseband ASIC

  • Kumar Amit;Bansal Munish;Kumar Ratnam V. Raja
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.1
    • /
    • pp.88-101
    • /
    • 2004
  • The Third Generation (3G) cellular mobile communication systems aim at providing higher data rates, improved quality of service, support for multimedia applications and global roaming. Cdma2000 and Universal Mobile Telecommunication System (UMTS) have emerged as two leading 3G standards in USA and European countries, respectively. Both the standards are capable of delivering high bandwidth data, voice and multimedia services to users of mobile equipment, but are not directly interoperableand are not available across different geographic areas, due to which global roaming is not possible in true sense of using single mobile equipment. However, both UMTS and cdma2000 are based on wideband code division multiple access (WCDMA) as the access method. Due to this, there exist some inherent commonalities between them. In this paper we will try to exploit the commonalities between the two standards in order to design an ASIC, which can provide dual standard capability. This paper discusses the physical layer aspects of the two standards and proposes an approach to design an ASIC which can be mapped to baseband processing part of the physical layer and is capable of delivering for either of the two aforementioned standards.

  • PDF

Analysis of Security Threats from Increased Usage of Mobile App Services (모바일 앱 서비스 이용 증가로 인한 보안 위협 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.45-55
    • /
    • 2018
  • Recently, because the arrival of the fourth industrial revolution era, many information and telecommunication services have grown rapidly in the mobile business market. So, companies are based Mobile Apps on user customized services and expanding their services. From the standpoint of the business, to generate revenue, the company needs to maintain the existing current computer environment and develop Mobile Apps to offer convenience in various areas such as finance, admiration, e-commerce and sales support. However, as the number of users increase due to expansion of various Mobile services, security threats that are related to Mobile Apps are increasing and its damage is also increasing. Due to the rapid technological transformation of Mobile devices using the Internet, the level of security threats to Smartphones are rising and getting more advance, so this thesis is structured as follows. In Chapter 2, it will look at the overall trends of Mobile Apps as related research. In Chapter 3, it will discuss various security concerns that related to the latest Mobile Apps and learn about the threatening factors. In Chapter 4, it will compare and analyze the threatening factors. Then it will find and suggest the possible plan. In Chapter 5, it will end with conclusion. Finally, to protect mobile devices from security threats, the environment of operating system which manages the resources and data of Apps needs to be protected. Also, it is important that users to have awareness and check activation FinTech technology security in the process of simple payment with fingerprint or IC card.

The CDMA Mobile System Architecture

  • Shin, Sung-Moon;Lee, Hun;Han, Ki-Chul
    • ETRI Journal
    • /
    • v.19 no.3
    • /
    • pp.98-115
    • /
    • 1997
  • The architecture of the CDMA mobile system (CMS) is developed based on three function groups - service resource, service control, and service management groups. In this paper, the CMS architecture is discussed from the point of view of implementing these functions. The variable length packets are used for transmission. The synchronization clock signals are derived form the GPS receiver. The open loop and closed loop techniques are used for the power control. The internationally accepted signaling and network protocols are employed. The call control for the primary services in designed to provide efficient mobile telecommunication services. The softer handoff is implemented in one card. The mobile assisted handoff and the network assisted handoff are employed in the soft and hard handoffs. The authentication is based on the secret data which includes random numbers. The management functions, which include the location management, resource management, cell boundary management and OAM management, are implemented to warrant the system efficiency, maximum capacity and high reliability. The architecture ensures that the CMS is flexible and expandable to provide subscribers with economic and efficient system configuration. The dynamic power control, adaptive channel allocation. and dynamic cell boundary management are recommended for future work.

  • PDF

Digital Speech Coding Technologies for Wire and Wireless Communication (유무선망에서 사용되는 디지털 음성 부호화 기술 동향)

  • Yoon, Byungsik;Choi, Songin;Kang, Sangwon
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.261-269
    • /
    • 2005
  • Throughout the history of digital communication, the digital speech coder is used as speech compression tool. Nowadays, the speech coder has been rapidly developed in the area of mobile communication system to overcome severe channel error and limitation of radio frequency resources. Due to the development of high performance communication system, high quality of speech coder is needed. This kind of speech coder can be used not only in communication services but also in digital multimedia services. In this paper, we describe the technologies of digital speech coder which are used in wire and wireless communication. We also present a summary of recent speech coding standards for narrowband and wideband applications. Finally we introduce the technical trends of next generation speech coder.