• Title/Summary/Keyword: Unlicensed wireless device

Search Result 8, Processing Time 0.025 seconds

Analysis on Coexistence between Unlicensed Wireless Device based on 802.11ah and LTE User Equipment (802.11ah 기반 비면허 무선기기와 LTE 단말기 간 공존 분석)

  • Lee, Il-Kyoo;Park, Yeon-Gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2015-2021
    • /
    • 2017
  • Recently, a lot of attention is fallen to IoT(Internet of Things) for hyper-connected society and the number of unlicensed wireless device has been increasing. Thus, this paper analyzed the impact of unlicensed wireless device on the basis of 802.11ah on licensed LTE user equipment in 900 MHz frequency band for efficient frequency use. As the interference analysis method, Minimum Coupling Loss (MCL) method and Monte Carlo (MC) method were used. In case of one interferer, minimum separation distance between interferer and victim was calculated as about 22 m through the MCL method under the assumption of the worst case. The maximum number of interferer to meet the interference probability of 5% below within a cell radius of the victim was computed as about 3000 by using MC method based on statistical technique. The analysis method and results in this paper are expected to be used for the coexistence between unlicensed wireless device and licensed wireless device.

The Proposed UMA Mode in DMB CAS Authentication Process (비인가 무선접속 모드를 이용한 디지털 멀티미디어 방송의 제한 수신시스템의 인증 제안)

  • Oh, Se-Kab;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.239-244
    • /
    • 2008
  • In this paper refer to the digital multimedia mobile phone with the combination of broadcasting and the communication the unity of wire and wireless solution that can provide the UMA(Unlicensed Mobile Access) function is added. In UNC(Universal Naming Convention) in the case of CAS(Conditional Access System) is supported, the device(mobile phone) is authenticated through AP and then following the method of broadcasting signal the user can view the wanted contents as long as they want and for this matter the service charge system are proposed.

  • PDF

MAC Scheduling Algorithm in IEEE 802.15.3 HR-WPAN (고속 무선 개인화 네트워크를 위한 MAC 스케줄링 알고리즘)

  • Joo Sung-Don;Lee Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.6 s.336
    • /
    • pp.41-52
    • /
    • 2005
  • In wireless networks there are various errors, caused by multi-path fading and interference between devices which lower the network Performance. Especially, performance of IEEE 802.IS.3 High-Rate WPAN (Wireless Personal Area Network) which is operated in ISM unlicensed frequency band is easily affected by channel errors. In this paper, we propose a scheduling algorithm which takes channel errors into consideration in scheduling asynchronous data traffic. The proposed scheduling algorithm can allocate CTA(Channel Time Allocation) proportionally in accordance with the requested channel time of each device. It also prevents waste of channel time by allocating CTA of the channel-error devices to other channel-error free devices. After recovering from the channel error, the devices are compensated as much as they conceded during channel error status. Simulation results show that the proposed scheduling algorithm is superior to the existing SRPT(Shortest Remain Processing Time) and RR(Round Robin) in throughput and fairness aspects.

Design of a bluetooth-based interactive control network

  • Kwak, Jae-Hyuk;Lim, Joon-Hong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.922-925
    • /
    • 2004
  • Bluetooth technology is essentially a method for wireless connection of a diverse set of devices ranging from PDAs, mobile phone, notebook computers, to another equipments. The bluetooth system supports both point-to-point connection and point-to-multipoint connections. In point-to-multipoint connection, the channel is shared among several bluetooth devices. Two or more devices sharing the same channel form a piconet. There is one master device and up to seven active slave devices in a piconet. The radio operates in the unlicensed 2.45GHz ISM band. This allows users who travel world-wide to use bluetooth equipments anywhere. Since the link is based on frequency-hop spread spectrum, multiple channels can exist at the same time. The Bluetooth standard has been suggested that Bluetooth equipments can be used in the short-range, maximum 100 meters . It has been defined that the time takes to setup and establish a bluetooth connection among devices is 10 seconds. It is a long time and may be a cause to lose a chance of finding other non-fixed devices. We propose a routing protocols for scatternets which can be used to control a mobile units(MUs) in this network. The proposed routing protocol is composed of two kinds of bluetooth information, access point(AP) and MU.

  • PDF

Bluetooth Network for Mobile System Control (이동 시스템 제어를 위한 블루투스 네트워크)

  • 임준홍;곽재혁
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.11
    • /
    • pp.1052-1057
    • /
    • 2004
  • Bluetooth technology is essentially a method for wireless connectivity of a diverse set of devices ranging from PDAs, mobile phone, notebook computers, to another equipments, The bluetooth system both point-to point connection and point-to multipoint connection. In point-to multipoint connection, the channel is shared among several bluetooth devices. Two or more devices sharing the same channel form a piconet. There one master device and up to seven active slave devices in a piconet. The radio operates in the unlicensed 2.45GHz ISM band. This allows users who travel world-wide to use bluetooth equipments anywhere. Since the link is based on frequency-hop spread spectrum, multiple channels can exist at the same time. The bluetooth standard ha s been suggested that bluetooth equipments can be used in the short-range, maximum 100 meters. It has been defined that the time takes to setup and establish a bluetooth connection among devices is 10 seconds. It is a long time and may be a cause to lose a chance of finding other non-fixed devices. We propose a routing protocols for scatternets which can be used to control a mobile units(MUs) in this network. The proposed routing protocol is composed of two kinds of bluetooth information, access point(AP) and MU.

A method to build competitive strategy based on the ubiquitous business model repository (유비쿼터스 비즈니스 모델 저장소를 이용한 경쟁 전략 수립 방법)

  • Song, Hee-Seok;Han, Kwan-Hee;Yeo, Jae-Hyun;Park, Gwang-Man;Lee, Kwang-Hee
    • IE interfaces
    • /
    • v.21 no.3
    • /
    • pp.283-293
    • /
    • 2008
  • It is important to choose and develop right business model in the process of implementing the ubiquitous service concept. In particular, it is also required to build a method which can assist in establishing a business model in a competitive perspective to differentiate business strategy. However, we could not find the existing studies which tried to develop business model including methods on how to differentiate business strategy in a competitive environment. In this study, we propose an ontology for repository of ubiquitous business model and address on how to apply the proposed business model repository to real ubiquitous industry. We also built a repository of unlicensed wireless device industry to check the applicability of proposed ubiquitous business model ontology and to show the various examples. We expect that building the business model repository contributes to reduce the redundancy and inefficiency for industry as well as to increase likelihood of business success for an individual company.

An Implementation of an Intelligent Access Point System Based on a Feed Forward Neural Network for Internet of Things (사물인터넷을 위한 신경망 기반의 지능형 액세스 포인트 시스템의 구현)

  • Lee, Youngchan;Lee, SoYeon;Kim, Dae-Young
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.95-104
    • /
    • 2019
  • Various kinds of devices are used for the Internet of Things (IoT) service, and IoT devices mainly use communication technology that uses the frequency of the unlicensed band. There are several types of communication technology in the unlicensed band, but WiFi is most commonly used. Devices used for IoT services vary in computing resources from devices with limited capabilities to smartphones and provide services over wireless networks such as WiFi. Most IoT devices can't perform complex operations for network control, thus they choose a WiFi access point (AP) based on signal strength. This causes a decrease in IoT service efficiency. In this paper, an intelligent AP system that can efficiently control the WiFi connection of the IoT devices is implemented. Based on the network information measured by the IoT device, the access point learns using a feed forward neural network algorithm, and predicts a network connection state to control the WiFi connection. By controlling the WiFi connection at the AP, the service efficiency of the IoT device can be improved.

Policy-based Dynamic Channel Selection Architecture for Cognitive Radio Network (무선인지 기술 기반의 정책에 따른 동적 채널 선택 구조)

  • Na, Do-Hyun;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6B
    • /
    • pp.358-366
    • /
    • 2007
  • Recently, FCC(Federal Communications Commission) has considered for that unlicensed device leases licensed devices' channel to overcome shortage of communication channels. Therefore, IEEE 802.22 WRAN(Wireless Regional Area Networks) working group progresses CR (Cognitive Radio) technique that is able to sense and adopt void channels that are not being occupied by the licensed devices. Channel selection is of the utmost importance because it can affect the whole system performance in CR network. Thus, we propose a policy-based dynamic channel selection architecture for cognitive radio network to achieve an efficient communication. We propose three kinds of method for channel selection; the first one is weighted channel selection, the second one is sequential channel selection, and the last one is combined channel selection. We can obtain the optimum channel list and allocates channels dynamically using the proposed protocol.