• Title/Summary/Keyword: mobile terminal.

Search Result 752, Processing Time 0.027 seconds

Design of Adaptive DCF algorithm for TCP Performance Enhancement in IEEE 802.11 based Mobile Ad-hoc Networks (IEEE 802.11 기반 이동 ad-hoc 망에서 TCP 성능 향상을 위한 적응적 DCF 알고리즘 설계)

  • Kim, Han-Jib;Lee, Gi-Ra;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.79-89
    • /
    • 2006
  • TCP is the most widely used transport protocol in Internet applications that guarantees a reliable data transfer. But, in the wireless multi-hop networks, TCP performance is degraded because it is designed for wired networks. The main reasons of TCP performance degradation are contention for wireless medium at the MAC layer, hidden terminal problem, exposed terminal problem, packet losses in the link layer, unfairness problem, reordering problem caused by path disconnection, bandwidth waste caused by exponential backoff of retransmission timer due to node's mobility and so on. Specially, in the mobile ad-hoc networks, discrepancy between a station's transmission range and interference range produces hidden terminal problem that decreases TCP performance greatly by limiting simultaneous transmission at a time. In this paper, we propose a new MAC algorithm for mobile ad-hoc networks to solve the problem that a node can not transmit and just increase CW by hidden terminal. In the IEEE 802.11 MAC DCF, a node increases CW exponentially when it fails to transmit, but the proposed algorithm, changes CW adaptively according to the reason of failure so we get a TCP performance enhancement. We show by ns-2 simulation that the proposed algorithm enhances the TCP performance by fairly distributing the transmission opportunity to the failed nodes by hidden terminal problems.

Design and Implementation of Embedded Linux-based Mobile Teller which supports CDMA and WiBro networks (듀얼모드 통신 지원 임베디드 리눅스 기반의 모바일 이야기꾼 설계 및 구현)

  • Kim, Do-Hyung;Yun, Min-Hong;Lee, Kyung-Hee;Lee, Cheol-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.131-138
    • /
    • 2008
  • This paper describes the implementations of the first application service based on embedded Linux; Mobile Teller which uses WiBro network for data communications and CDMA network for voice communications. Currently, with the appearance of WiBro service, dual-mode terminals which support two heterogeneous networks are available. But, the development of applications which effectively use these networks for providing better service to user is rarely prepared. At Mobile Teller, when a sender on a dual-mode terminal types texts, the texts are transmitted to a TTS server located in the Internet through WiBro network. Subsequently, the TTS server converts the texts into voices and transmits the voice data to the dual-mode terminal. At last the dual-mode terminal sends the voice to the receiver through the CDMA network. In case of noisy environment or when a user has difficulty in speaking, Mobile Teller makes voice communication possible

A Mobile IPTV Authentication Protocol using Session Key in Wireless LAN (무선랜 환경에서 세션키를 이용한 모바일 IPTV 인증 프로토콜)

  • Baek, Jong-Gyu;Sohn, Kyu-Seek;Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1474-1480
    • /
    • 2011
  • Recently the mobile IPTV service has been spread through the wireless LAN(WLAN). In order to provide the commercial mobile IPTV service through the WLAN, re-authentication for the mobile IPTV terminal is required whenever the mobile terminal roams between APs(Access Points). The most popular one of the authentication protocol standards for the wired and/or wireless LAN is IEEE 802.1X. However IEEE 802.1X takes much time to authenticate the terminal and is not adequate for the seamless mobile IPTV service. We introduce the session key and separate the user authentication and the hardware authentication. And we strengthen the device authentication by the initial registration. By these, the proposed authentication protocol reduces the authentication time and can protect the authentication key securely.

Optimal Neighbor Scope-Based Location Registration Scheme in Mobile IP Networks (이동 IP 망에서의 최적 이웃 스코프 값 기반의 위치 등록 방법)

  • Suh, Bong-Sue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.139-144
    • /
    • 2007
  • The mobile terminal's frequent changes to the access point introduce significant network overhead in mobile IP networks. To solve this problem, we introduce a hierarchical structure with consideration given to the dynamic value of neighbor scope in IP regional registration[1]. When a mobile terminal moves within the neighbor given by the scope value, it makes registration locally without registration with its home agent. We analyze the algorithm mathematically and show the numerical results. As a result, optimization of the scope value for the localized registration under the hierarchical structure makes the proposed scheme outperform the standard mobile IP protocol[2]. This can be explained from the fact that there is only local registration for terminal's movement within the scope region. Moreover, as the signaling cost for home agent increases, the proposed scheme becomes more advantageous.

  • PDF

Implementation of Route Selection System via Public WiFi Zone (공공 WiFi 지역을 경유하는 경로 찾기 시스템 구현)

  • Shin, Sang-Won;Lee, Youngchan;Kim, Dae-Young
    • Journal of Platform Technology
    • /
    • v.8 no.2
    • /
    • pp.10-21
    • /
    • 2020
  • The use of WiFi is gradually increasing through the spread of mobile terminals and the development of data communication. Mobile Internet usage has been steadily increasing from the 2000s to the present. Almost all households in Korea have smart devices, and 90% of the population uses mobile Internet. Due to this trend, the government is currently constructing public WiFi zones in dense urban areas as a way to reduce communication costs. The WiFi usage in the public WiFi zone is increasing every year. Therefore, in this paper, we propose a method for using such public WiFi efficiently. A mobile terminal collects WiFi information and constructs a WiFi zone in a map using a concave hull algorithm. In the map, the mobile terminal provides a route through many public WiFi areas. As a result, the WiFi usage of the mobile terminal is increased through more WiFi regions.

  • PDF

Study on the Standardizations Technology of Mobiloud (모빌라우드 표준화 연구)

  • Choi, Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1344-1347
    • /
    • 2012
  • Mobile Cloud Computing services anywhere, anytime access to the Internet via a mobile terminal means to provide services, speakers are called Mobiloud. Computing processing power limitations of mobile devices, storage, due to space constraints, the tasks handled by mobile devices and data processing services to move to cloud environments. In recent years, smartphone, tablet PC and mobile device companies and individuals to spread and spread, and the content of the accelerating cloud painters, mobile cloud that can communicate with each other requires a standard service.

The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader (안전한 모바일 RFID 리더를 위한 개방형 임베디드 소프트웨어 플랫폼 구현 방안)

  • Park, Nam-Je
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.785-793
    • /
    • 2010
  • The current excessive limitations to mobile RFID tags and readers make it impossible to apply present codes and protocols. The technology for information and privacy protection should be developed in terms of general interconnection among elements and their characteristics of mobile RFID in order to such technology that meets the RFID circumstances. In this paper, transplanting and extending security library for protecting mobile RFID information in secure mobile RFID terminal S/W platform system to support security application on the path of all data from RFID reader to application server.

A Study on the Dual-band VCO for Mobile Communication Terminal using Oscillation Part Switching Circuit (발진부 귀환 스위칭회로를 이용한 이동통신 단말기용 듀얼대역 전압제어 발진기 특성에 관한 연구)

  • 오태성;이영훈
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.1
    • /
    • pp.60-67
    • /
    • 2002
  • In this paper, the dual band VCO of mobile communication terminal using oscillation part switching circuit is proposed. In order to model the VCO accurately, the resonator is converted the equivalent circuit which is analyzed to use numerical method and designed optimal the dual band VCO operating GSM and DCS band. In order to demonstrate the objective theory of the proposed VCO, the dual band VCO is designed and experimented. The results of experiment, it is conformed that the VCO can be used mobile communication hand phone and components of three generation mobile communication systems.

Design and Evaluation of an Adaptive Distributed Dynamic Location Management Algorithm for Wireless Mobile Networks (무선 이동망을 위한 적응적 분산 동적 위치 관리 알고리즘의 설계 및 평가)

  • Chun, Sung-Kwang;Bae, Ihn-Han
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.911-918
    • /
    • 2002
  • An important issue in the design of future Personal Communication Service (PCS) networks is the efficient management of location information. In this paper, we propose an adaptive distributed dynamic location management algorithm that stores the position of the mobile terminal in k of the n location information databases (LIDs). The proposed algorithm chooses adaptively k. replication factor according to both the space locality of LIDs in wireless mobile networks and the location query popularity to local mobile terminal from remote mobile terminals. The performance of proposed algorithm is evaluated by both an analytical model and a simulation. Based on the results of performance evaluation, we know that the performance of the proposed algorithm is better than that of Krishnamurthi's algorithm regardless of call-mobility ratio.

An Efficient Renewal Mechanism of Group Key Employing the Fiat-Shamir Method on Mobile Communications

  • Tak, Dong-Gil;Lee, Yeo-Jin;Lee, Jae-Hoon;Chung, Il-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1649-1656
    • /
    • 2006
  • Renewal of the group key on the mobile communication needs it can be not re-shared by all members of the group with the exception of excluded members but also prevented from making a fraudulent use of group key due to leakage of security information for terminal. In this paper, we propose an efficient renewal mechanism of group key in order for all members of the group to be able to get digital information and to perform the renewal of group key employing the Fiat-Shamir method. It can guarantee the security of a group key since a terminal renews a group key by using security information of an excluded terminal and the previous group key.

  • PDF