• Title/Summary/Keyword: mobile communications

Search Result 2,629, Processing Time 0.029 seconds

Classification and Analysis of Next Generation Mobile Communications Services (차세대 이동통신 서비스 분류 및 분석)

  • Kim, Seung-Mok;Park, Tae-Keun
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.4
    • /
    • pp.470-482
    • /
    • 2007
  • In this paper, we classify next generation mobile communications services into service categories and develop service evolution scenarios for developing the next generation mobile communications service roadmap in NGMC Forum. Firstly, Service categories are defined based on the purpose of service usage. Secondly, the services are classified into the categories and their relationship is analyzed. The candidates of services to be classified and analyzed include all kinds of services discussed in a conceptual level as well as current mobile/Internet services. Finally, we develop a service evolution scenario in each service category. When the next generation service road map is developed based on the results of this paper, it is expected to secure the initiative and enhance the competitive edge in the field of the next generation mobile communications.

  • PDF

On the Performance of the Block-Based Selective OFDM Decode-and-Forward Relaying Scheme for 4G Mobile Communication Systems

  • Yang, Wendong;Cai, Yueming
    • Journal of Communications and Networks
    • /
    • v.13 no.1
    • /
    • pp.56-62
    • /
    • 2011
  • In this paper, we propose a block-based selective orthogonal frequency division multiplexing (OFDM) decode-and-forward relaying scheme for 4G mobile communication systems. In the scheme, an OFDM symbol is divided into blocks and one relay is selected for each block. Theoretical outage performance and error performance are analyzed and evaluated. A unified outage expression is given for our scheme and the other two schemes and the lower bound of the bit error rate of the three schemes is also obtained. The effect of the coherence bandwidth on the proposed scheme is also investigated. Monte Carlo simulations are carried out to validate our analysis. The scheme can obtain a good tradeoff between complexity and performance and can be used in future 4G mobile communication systems.

Efficient Macro Mobility Management for GPRS IP Networks

  • Choi, Seong-Gon;Mukhtar, Rami;Choi, Jun-Kyun;Zukerman, Moshe
    • Journal of Communications and Networks
    • /
    • v.5 no.1
    • /
    • pp.55-64
    • /
    • 2003
  • Mobile IP has several inefficiencies, and was not originally designed for situations where both peers are highly mobile. We present a mobility management solution that retains compatibility with existing Internet protocols, whilst increasing the efficiency of communications between two GPRS mobile hosts. Our proposal eradicates triangle routing and minimizes handover latency. We show by numerical analysis that the routing optimization improves the performance of TCP controlled data flows, reducing buffering requirements and minimizing the recovery time after a handover occurs.

Model for the Connection-Time of Vehicle-to-Mobile RSU (V2MR) Communications Near a Bus Station (버스 정류소 주변에서 자동차-이동기지국 (V2MR) 통신의 연결시간에 대한 성능분석모형)

  • Jeong, Han-You;Purnaningtyas, Magdalena Trie;Nguyen, Hoa-Hung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1969-1977
    • /
    • 2016
  • We study the connection time of vehicle-to-mobile roadside unit (V2MR) communications which can reduce the significant cost of the fixed RSU by installing a gateway of mobile network into a transit bus called the mobile RSU. In the V2MR communications, the connectivity of a commute vehicle can be improved via ad-hoc connection to a nearby mobile RSU. In this paper, we present a new analysis model to estimate the connection time between a commute vehicle and a mobile RSU, when there is a bus station in the overlapping route. Since the connection time between two vehicles is highly dynamic and unpredictable, our analysis will provide a fundamental basis of connection-time estimation of V2MR communications. Numerical results obtained from VEINS simulation show that our analysis can estimate the connection time of V2MR communications with the average error below 1.0 percent. Moreover, we show that the average connection time of V2MR communications can be extended to approximately 3.85 times of that of V2R communications.

An Architecture Supporting Adaptation and Evolution in Fourth Generation Mobile Communication Systems

  • Prehofer, Christian;Kellerer, Wolfgang;Hirschfeld, Robert;Berndt, Hendrik;Kawamura, Katsuya
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.336-343
    • /
    • 2002
  • A major challenge for next generation mobile communication is capturing the system architecture’s complexity with all its internal and external dependencies. Seamless integration of heterogeneous environments in all system parts is a key requirement. Moreover, future systems have to consider the different evolution cycles of individual system parts. Among those, services are expected to change the fastest. With respect to these considerations, we propose an overall architecture for next generation mobile communication systems. It covers all system parts from wireless transmission to applications including network and middleware platform. Our approach focuses on adaptability in terms of recon- figurability and programmability to support unanticipated system evolution. Therefore, we consider abstraction layers which consist of adaptable cooperating components grouped by open platforms rather than rigid system layers. In addition to that, we introduce cross-layer cooperation allowing an efficient use of the available resources. Specific scenarios illustrate the feasibility of our approach.

Implementation of HTML5-based Hybrid Mobile Office System (HTML5 기반의 하이브리드 모바일 오피스 시스템 구현)

  • Choi, Yong-Kyu;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.725-729
    • /
    • 2012
  • In this paper, the standardization of the Web technology of HTML5/CSS3 and JQuery Mobile, using a variety of mobile platforms, run independently within an environment as possible to implement the Mobile Office System. In addition, user friendly Web interface and dynamic web design through a mobile device in a Mobile Office system provides convenience to the user when a hybrid Web application based mobile office system implement.

  • PDF

A Study on Security Architecture for F-MIPv6 (F-HMIPv6 지원을 위한 보안 아키텍처)

  • Son, Sang-Woo;Kim, Mun-Ki;Rhee, Byung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.7-8
    • /
    • 2006
  • F-HMIPv6 is protocol that supports fast handovers for Hierarchical Mobile IPv6. Unlike HMIPv6 (Hierarchical Mobile IPv6), it sends FBU(Fast Binding Update) by predicted Router's Information for a potential handover. But, The current version of this protocol doesn't ensure impeccably between mobile node and router. To make up for the weak points of the security, we propose the architecture for F-HMIPv6 protocol to structurally reinforce the security and improve weak security of among mobile node, MAP(Mobility Anchor Point), and routers for binding update when mobile node conducts handovers.

  • PDF

Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications

  • He, Debiao
    • ETRI Journal
    • /
    • v.34 no.3
    • /
    • pp.482-484
    • /
    • 2012
  • With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However, in this letter, we point out that Lo and others' protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure.