• Title/Summary/Keyword: Voice Network

Search Result 759, Processing Time 0.026 seconds

Implementation plan of eMBMS in the case of LTE-R (철도통합무선망(LTE-R) 환경에서의 eMBMS 구현방안)

  • Park, Min-ju;Won, Hong-sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.903-909
    • /
    • 2018
  • In December 2017, the world's first LTE-R for 250km/h high-speed railway was commercialized with the opening of Wonju-Gangneung high-speed railway. LTE-R has many advantages such as voice and video call, high-speed data transmission, coverage redundancy and DU redundancy. But it requires efficient use of radio resources because of a limited bandwidth of 10MHz for UL and DL, respectively. The existing unicast scheme has limited high frequency efficiency so when the number of users increases, service is limited due to the network load, which could be a problem for LTE-R in terms of stability and reliability. On the other hand, the multicast scheme via eMBMS can provide stable service even if the number of video users is high. This paper derives the number of unicast scheme users considering the LTE-R network with LAB test and calculation result, and proposes implementation plans and considerations for eMBMS commercialization on LTE-R.

A Performance Comparison of On-Demand Routing Protocols for Application Services in MANET (MANET에서 응용 서비스 데이터 유형에 따른 요구기반 라우팅 프로토콜의 성능비교)

  • Jang Jun-Young;Lee Kil-Sup;Lee Sung Jong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.871-878
    • /
    • 2004
  • Recenty, there has been great interest in MANET from various areas. In this paper we focus on performance analysis of on demand routing protocols surf as DSR, AODV, and TORA in MANET. We have conducted several simulations concerned with application service data such as sensor, text. voice, and video data. And then, we have evaluated the performance of three protocols in a pre-designed ad hoc network, which is consisted of 20 nodes. As a result, we have obtained quantitative data for packet delivery fraction, average end to-end delay, routing load, channel utilization from upper layer and supportable routing protocol for application service data. The results can be used for designing specific-purposed ad-hoc networks.

Supporting Service Continuity in Ubiquitous Network Environment with IMS Extension (IMS 확장을 통한 유비쿼터스 네트워크 환경에서의 서비스 연속성 지원)

  • Yim, Jong-Choul;Bae, Hyun-Joo;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1148-1159
    • /
    • 2012
  • It is of great significance in the NGN - which supports a ubiquitous network environment in which users can use multiple devices and all the devices are connected to networks - to support the terminal mobility as well as service continuity. The IMS architecture, which is considered as session control layer in the NGN, exists to support a wide range of advanced new services in addition to the traditional voice and data connectivity offerings of "old" telecommunications. The recent IMS specification also defines IUT (Inter UE Session Transfer) functionality in order to support service continuity in the NGN. However, service continuity in IMS has a limitation that two terminals involved in session transfer should belong to the same user. In this paper, we proposed a new device discovery mechanism for IMS and extended UEs with a few capabilities to overcome some of IMS's limitations. We also analysed how much overhead of the proposed method in terms of signaling cost will be.

The Character Recognition System of Mobile Camera Based Image (모바일 이미지 기반의 문자인식 시스템)

  • Park, Young-Hyun;Lee, Hyung-Jin;Baek, Joong-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1677-1684
    • /
    • 2010
  • Recently, due to the development of mobile phone and supply of smart phone, many contents have been developed. Especially, since the small-sized cameras are equiped in mobile devices, people are interested in the image based contents development, and it also becomes important part in their practical use. Among them, the character recognition system can be widely used in the applications such as blind people guidance systems, automatic robot navigation systems, automatic video retrieval and indexing systems, automatic text translation systems. Therefore, this paper proposes a system that is able to extract text area from the natural images captured by smart phone camera. The individual characters are recognized and result is output in voice. Text areas are extracted using Adaboost algorithm and individual characters are recognized using error back propagated neural network.

An asymmetric WDM-EPON structure for the convergence of broadcast and communication (방송통신 통합을 위한 비대칭 WDM-EPON 구조에 관한 연구)

  • Hur Jung;Koo Bon-Jeong;Park Youngil
    • Journal of Broadcast Engineering
    • /
    • v.10 no.2
    • /
    • pp.182-189
    • /
    • 2005
  • In this paper, an asymmetric WDM-EPON transmission scheme is proposed to be used in a high speed access network system, which is required to implement the convergence of broadcast and communication. WDM is used for downstream transmission from OLT to access nodes, satisfying wide bandwidth requirement for broadcasting and various multimedia services. And an EPON scheme, which is cheaper than WDM, is applied to upstream transmission where less bandwidth is required. A transmission test in physical layer was performed successfully and the results are provided. If ONUs are to be used in a home gateway, its protocol should be appropriate to its traffic pattern. Voice is sensitive to a time delay while data is not. A new dynamic bandwidth assignment protocol for PON system, which can cope with various types of data in access network is proposed and its performance is analysed. A maximum cycle time is specified to achieve the QoS of signals sensitive to time delay. And a minimum window is specified to prevent the downstream control signals from uprising. It is shown by simulation that the proposed EPON protocol can provide a better performance than previous ones.

Efficient Resource Allocation Technique for LTE-Advanced based Interference Avoidance of Heterogeneous Network (LTE-Advanced 기반 이기종 네트워크 시스템의 간섭회피를 위한 효율적인 자원할당 기법)

  • Jang, Sung-Won;Seong, Hyeon-Kyeong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.46-52
    • /
    • 2016
  • LTE-Advanced system consisting of the number of cells in the cellular environment because it is built to allow efficient use of limited frequency resources of adjacent cell interference avoidance should be considered. Transition services in accordance with the development of the mobile communication technology, wireless multimedia content from voice-centric mobile communications services and causing a lot of mobile data traffic, such as smart phones and tablet terminals spread of a data-driven surge in mobile data traffic base stations in urban areas by increasing became a reality that can not be prevented. In this paper, we propose a new Hybrid resource allocation technique for improving the performance of the cell boundary and analyzed the performance of the proposed new techniques to perform the simulation using LTE-Advanced system level simulator based on 19cell of cellular system model.

A Design of Encryption Method for Strong Security about Tapping/Interception of VoIP Media Information between Different Private Networks (이종 사설망간에 VoIP 미디어의 도.감청 보안 강화를 위한 암호화 기법 설계)

  • Oh, Hyung-Jun;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.113-120
    • /
    • 2012
  • VoIP provides voice data service using existing IP networks and has received much attention recently. VoIP service has a variety of security vulnerabilities. Types of main attacks on VoIP service are tapping/interception, DoS attacks, spam, misuse of service attacks and the like. Of these, confidential information leak because of tapping/interception has been considered as a critical problem. Encryption techniques, such as SRTP and ZRTP, are mostly used to prevent tap and intercept on VoIP media information. In general, VoIP service has two service scenarios. First, VoIP service operates within a single private network. Second, VoIP service operates between different private networks. Both SRTP and ZRTP for VoIP media information within a single private network can perform encryption. But they can not perform encryption between different private networks. In order to solve this problem, in this paper, we modify SRTP protocol. And then, we propose an encryption method that can perform encryption of VoIP media information between the different private networks.

A Study on the State Policy for the Development of National Information Infrastructure (국가정보화 추진정책에 관한연구 - 초고속정보통신망기반의 구축을 중심으로 -)

  • 정충식
    • Journal of the Korea Society of Computer and Information
    • /
    • v.1 no.1
    • /
    • pp.7-24
    • /
    • 1996
  • In the emerging information society. a well-established national Information network plays a crucial role In enhancing economic efficiency and creating national wealth. Most of the advanced nations In the world are putting forward government-driven projects for the construction of their national Information Infrastructures. strategically focusing on the development of key technologies and Industrial essential for their Infrastructures. Development of the NII (National Infrastructure) can help unleash an Information revolution that will change forever the way people 1ive, work. and interact with each other. Nonetheless. the present Information Infrastructure In Korea loaves a lot to be Improved In order to realize the vision of Information society. The establishment of the KII (korea Information Infrastructure) does not merely mean the construction of physical network that enables the transmission of various modes of information such as voice, data, and image. It further implies the creation of a new kind of social overhead capital, ranging from the establishment of social and cultural which are conductive to seamless flow of information. For the successful implementation of the KII, it is critical to build the public consensus on the importance and necessity of informatization. At the same time, careful consideration should be given to the institutional factors such as timely and adequate supply of specialized personnel, the updating of policy and regulations, and the strengthening of interntional cooperation.

  • PDF

Improvement and Verification of TMFT Power Circuit Design (전술다기능단말기(TMFT)의 전원회로 설계 개선 및 검증)

  • Kim, Jin-Sung;Kim, Byung-Jun;Kim, Byung-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.2
    • /
    • pp.357-362
    • /
    • 2020
  • The TMFT, a sub-system of TINC, provides voice calls, data transmission and reception, and multimedia services to individual users. At the time of development in 2011, the power circuit of the TMFT was designed to electrical power supply to each device via a charger IC. However, the newly improved power supply circuit allows power to be supplied to each device through the PMIC without configuring the charger IC separately. In this paper, the power circuit design structure of TMFT applied in the development stage and the improved power circuit design structure were compared. And we verified through experiments whether the improved power circuit can be applied to TMFT. The experimental method was verified by directly comparing the current consumption test, charge time comparison test, and rising temperature test during charging each of before and after improvement terminals.

Transmission Performance of MANET with Intermittent Blackhole Attacks (간헐적 블랙홀 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1037-1040
    • /
    • 2013
  • Based on easy construction and operation compared with infra-structure communication netowrks, and rapid spreading of smart phone having high powered calculation ability and Wi/Fi function, usage of MANET(Mobile Ad-Hoc Network), which is configured with simply several terminals, is increased in applications of emergency communications, leisure, explorations. However, because of supporting difficulty of communication infra-structure makes some defects of malicious information intrusion like as hacking. In this paper, effects of transmission performance caused by information intrusion is analyzed. The results of published studies is based on environment of continuous intrusions, but this paper assumed intermittent attacking condition. In this paper, blackhole attack is used for intrusion type to MANET, voice traffic is used as a application traffic. Compuer simulation, based on NS-2, is used for measuring of performance parameters, and the analysis for the simulation results is shown as considerations of this paper.

  • PDF