• Title/Summary/Keyword: cellular networking

Search Result 48, Processing Time 0.027 seconds

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility

  • Li, Zhigang;Shi, Yan;Chen, Shanzhi;Zhao, Jingwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.872-885
    • /
    • 2015
  • The rapid increase of smart mobile devices and mobile applications has led to explosive growth of data traffic in cellular network. Offloading data traffic becomes one of the most urgent technical problems. Recent work has proposed to exploit opportunistic communications to offload cellular traffic for mobile data dissemination services, especially for accepting large delayed data. The basic idea is to deliver the data to only part of subscribers (called target-nodes) via the cellular network, and allow target-nodes to disseminate the data through opportunistic communications. Human mobility shows temporal and spatial characteristics and predictability, which can be used as effective guidance efficient opportunistic communication. Therefore, based on the regularity of human mobility we propose NodeRank algorithm which uses the encounter characteristics between nodes to choose target nodes. Different from the existing work which only using encounter frequency, NodeRank algorithm combined the contact time and inter-contact time meanwhile to ensure integrity and availability of message delivery. The simulation results based on real-world mobility traces show the performance advantages of NodeRank in offloading efficiency and network redundant copies.

Content-Aware D2D Caching for Reducing Visiting Latency in Virtualized Cellular Networks

  • Sun, Guolin;Al-Ward, Hisham;Boateng, Gordon Owusu;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.514-535
    • /
    • 2019
  • Information-centric networks operate under the assumption that all network components have built-in caching capabilities. Integrating the caching strategies of information centric networking (ICN) with wireless virtualization improves the gain of virtual infrastructure content caching. In this paper, we propose a framework for software-defined information centric virtualized wireless device-to-device (D2D) networks. Enabling D2D communications in virtualized ICN increases the spectral efficiency due to reuse and proximity gains while the software-defined network (SDN) as a platform also simplifies the computational overhead. In this framework, we propose a joint virtual resource and cache allocation solution for latency-sensitive applications in the next-generation cellular networks. As the formulated problem is NP-hard, we design low-complexity heuristic algorithms which are intuitive and efficient. In our proposed framework, different services can share a pool of infrastructure items. We evaluate our proposed framework and algorithm through extensive simulations. The results demonstrate significant improvements in terms of visiting latency, end user QoE, InP resource utilization and MVNO utility gain.

Dynamic ID randomization for user privacy in mobile network

  • Arijet Sarker;SangHyun Byun;Manohar Raavi;Jinoh Kim;Jonghyun Kim;Sang-Yoon Chang
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.903-914
    • /
    • 2022
  • Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.

A D2D communication architecture under full control using SDN

  • Ngo, Thanh-Hai;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3435-3454
    • /
    • 2016
  • Device-to-device (D2D) communication is a potential solution to the incessant increase in data traffic on cellular networks. The greatest problem is how to control the interference between D2D users and cellular mobile users, and between D2D users themselves. This paper proposes a solution for this issue by putting the full control privilege in cellular network using the software-defined networking (SDN) concept. A software virtual switch called Open vSwitch and several components are integrated into mobile devices for data forwarding and radio resource mapping, whereas the control functions are executed in the cellular network via a SDN controller. This allows the network to assign radio resources for D2D communication directly, thus reducing interference. This solution also brings out many benefits, including resource efficiency, energy saving, topology flexibility, etc. The advantages and disadvantages of this architecture are analyzed by both a mathematical method and a simple implementation. The result shows that implementation of this solution in the next generation of cellular networks is feasible.

Adaptive Mode Switching in Correlated Multiple Antenna Cellular Networks

  • Lee, Chul-Han;Chae, Chan-Byoung;Vishwanath, Sriram;Heath, Jr., Robert W.
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.279-286
    • /
    • 2009
  • This paper proposes an adaptive mode switching algorithm between two strategies in multiple antenna cellular networks:A single-user mode and a multi-user mode for the broadcast channel. If full channel state information is available at the base station, it is known that a multi user transmission strategy would outperform all single-user transmission strategies. In the absence of full side information, it is unclear what the capacity achieving method is, and thus there are few criteria to decide which of the myriad possible methods performs best given a system configuration. We compare a single user transmission and a multi user transmission with linear receivers in this paper where the transmitter and the receivers have multiple antennas, and find that neither strategy dom inates the other. There is instead a transition point between the two strategies. Then, the mode switching point is determined both ana lytically and numerically for a multiple antenna cellular downlink with correlation between transmit antennas.

Low-Complexity Energy Efficient Base Station Cooperation Mechanism in LTE Networks

  • Yu, Peng;Feng, Lei;Li, Zifan;Li, Wenjing;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3921-3944
    • /
    • 2015
  • Currently Energy-Saving (ES) methods in cellular networks could be improved, as compensation method for irregular Base Station (BS) deployment is not effective, most regional ES algorithm is complex, and performance decline caused by ES action is not evaluated well. To resolve above issues, a low-complexity energy efficient BS cooperation mechanism for Long Time Evolution (LTE) networks is proposed. The mechanism firstly models the ES optimization problem with coverage, resource, power and Quality of Service (QoS) constraints. To resolve the problem with low complexity, it is decomposed into two sub-problems: BS Mode Determination (BMD) problem and User Association Optimization (UAO) problem. To resolve BMD, regional dynamic multi-stage algorithms with BS cooperation pair taking account of load and geographic topology is analyzed. And then a distributed heuristic algorithm guaranteeing user QoS is adopted to resolve UAO. The mechanism is simulated under four LTE scenarios. Comparing to other algorithms, results show that the mechanism can obtain better energy efficiency with acceptable coverage, throughput, and QoS performance.

The Development of Mobile USB Home Control System

  • Kim, Hee-Sun;Kim, Yong-Seok;Lee, Chang-Goo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2155-2158
    • /
    • 2003
  • A term of home automation that was in fashion only a few years ago has not been used any more. Nowadays, We have been used a term of home network or digital home than home automation much. While internet infra is diffused at home, data network corp., communication corp., electric appliance corp. and home automation control system corp. which we did not mind each other particularly constructed consortium, and they have designs on home network market. Also, cellular phone's growth tried home networking by using not only wired internet but also broadband wireless communication. Regardless, many solutions are coming out it is few to be applied to real life because the standard is not determined with the protocol each other. Therefore, we developed home network system using USB(Universal Serial Bus) that has the possibility most in home networking standard. The mobile USB home control system is excellent at expansibility and portability. Also we can complete low cost and stable system using an embedded system.

  • PDF

Cooperation Method for Cellular Communication Systems

  • Kim, Eung-Sun;Kim, Young-Doo;Park, Sang-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1251-1259
    • /
    • 2007
  • A scheme for selecting the mode with the maximum system capacity is proposed for cooperative relaying. Three possible modes are presented based on decode-and-forward relaying, and the time required by each mode is evaluated. Based on these results, a method is then developed for selecting the optimal mode with the minimum time duration (or maximum channel capacity). Computer simulations confirm that the optimal mode outperforms the other modes.

Performance Analysis of Call Admission Control Utilizing WLAN to Mitigate Congestion of Cellular Networks (WLAN을 이용한 셀룰러망 혼잡도 완화를 위한 호수락제어 성능 분석)

  • Seok, Woo-Jin;Hwang, Young-Ha;Noh, Sung-Kee;Kim, Sang-Ha
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.425-436
    • /
    • 2008
  • In this paper, we propose a resource effective call admission control(CAC) in integrated WLAN and cellular network. The proposed CAC mitigates the congestion of cellular network by handing over non-realtime traffic to WLAN. We analyze the proposed CAC in numerical and simulation method. The simulation results show that the proposed CAC achieves better performance than normal CAC. Especially, the proposed CAC can sustain desired QoS more robustly against high incoming non-realtime traffic load than againt realtime traffic load.

Design and Implementation of Bluetooth Module using 2.4 GHz ISM band (2.4 GHz ISM band용 bluetooth 모듈의 설계기술 연구)

  • 원광호;김재호;송병철;조위덕;손병일
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.45-48
    • /
    • 2000
  • In this paper, we designed bluetooth module using 2.4 GHz ISM band. Bluetooth is wireless networking solution that connects PDA, cellular phone, printer, PC, etc each other. We integrated digital and RF part in one module. As a result, we can make low power consumption module that enables long battery life. In addition, we enlarged maximum available range of our module from 10m to l00m. This module satisfies bluetooth specification 1.0.

  • PDF