• Title/Summary/Keyword: next generation information system

Search Result 900, Processing Time 0.03 seconds

Interference Analysis based on System Level Simulation in LTE Networks (LTE 네트워크에서 시스템 레벨 시뮬레이션 기반 인접 대역간 간섭 분석)

  • Ban, Tae Won;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2411-2417
    • /
    • 2012
  • Globally, the emergence of smart phones vitalized the ecosystem of mobile data service industry. Consequentially, mobile data traffic has been explosively growing and the speed of growth will be more steep. New spectrum will be required in order to properly accommodate the explosively growing mobile data traffic. However, it will be difficult to acquire a sufficient guard band between different frequency bands because the range of frequency which is suitable for wireless communications is limited. Thus, the performance degradation caused by inter-band interference will be one of challenging problems in the next generation mobile communication systems. In this paper, we analyze the performance degradation caused by inter-band interference by computer simulations in various environments. Our results show that the impact of the inter-band interference is more critical when own signal is poor or its own interference from neighboring cells is low.

Hybrid Detection Algorithm for Spatial Multiplexing MIMO-OFDM System (공간 다중화 MIMO-OFDM 시스템을 위한 Hybrid 검출 기법)

  • Won, Tae-Yoon;Kim, Seung-Hwan;Lee, Jin-Yong;Kim, Young-Lok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6C
    • /
    • pp.539-546
    • /
    • 2010
  • In next generation wireless communication systems based on OFDM, multiple-input multiple-output (MIMO) technique is adopted in order to achieve high data throughput with limited bandwidth. As one of MIMO techniques, spatial multiplexing scheme needs high performance data detection algorithm that can be performed with low computational complexity. In this paper, we propose an algorithm that can compute QRM-MLD with reduced complexity. Also, hybrid detection technique is proposed, which can reduce the complexity by selecting between MMSE and QRM-MLD according to the channel condition. The proposed algorithm provides the trade-off between performance and complexity. The computer simulations for downlink transmission in 3GPP LTE system show that less than 0.1dB performance degradation can be achieved at 0.1% BER with 59% reduction on computational complexity compared with the conventional QRM-MLD algorithm.

A Cooperative Energy-efficient Scheduling Scheme for Heterogeneous Wireless Networks (이기종 무선망에서 에너지 효율 개선을 위한 망간 협력 기반 스케쥴링 기법)

  • Kim, Hoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.3-8
    • /
    • 2016
  • Wireless networks have evolved to the appearance of heterogeneous wireless networks(HetNet), where various networks provide data services with various data rates and coverage. One of technical issues for HetNet is efficient utilization of radio resources for system performance enhancement. For the next generation wireless networks, energy saving has become one of key performance indices, so energy-efficient resource management schemes for HetNet need to be developed. This paper addresses an energy-efficient scheduling for HetNet in order to improve the energy efficiency while maintaining similar system throughput as existing scheme, for which an energy-efficient scheduling that energy efficiency factor is included. Simulation results show that the proposed scheme achieves the reduction of energy consumption while admitting limited ragne of throughput degradation in comparison with the conventional proportional fair scheduling.

Design and Implementation of Workflow-based User Environment on Computational Grid (계산 그리드에서 워크플로우 기반의 사용자 환경 설계 및 구현)

  • Hwang, Sun-Tae;Sim, Gyu-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.165-171
    • /
    • 2005
  • High speed computer, large scale storage device and high speed computer network are computing infrastructure which we can easily access to in these days. However, many computer simulations in natural or applied science such as molecular simulation require more computing power as well as larger scale of storage. Grid computing which is a next generation of distributed computing environment, is one of solution for the new requirements. Even though many researches have been going on Grid computing, those are oriented to communication interface and protocols, and middleware like globus tool kits[2, 3]. Therefore research on application level platform or application itself is yet premature and it makes real users be difficult to utilize Grid system for their research. In this paper, we suggest a new user environment and an abstract job model for simulation experiments on MGrid(Molecular Simulation Grid). It will make users be able to utilize Grid resources efficiently and reliably.

  • PDF

Adaptive Partitioning based Downlink Call Admission Control in 3G LTE (3G LTE의 Adaptive Partitioning 기반 다운링크 호 수락제어 방식)

  • Jun, Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.565-572
    • /
    • 2007
  • 3G Long Term Evolution (3G LTE) is a next generation cellular networks system capable or providing various mobile multimedia services by using OFDMA and MIMO based radio access technology. Among many differences from existing WCDMA based systems, the facts that 3G LTE uses Physical Resource Block (PRB) as its radio resources and provides all services through the PS domain make the development of new resource management schemes necessary. This paper proposes an adaptive partitioning based downlink call admission control scheme. It separates realtime call requests from non-realtime ones, specifies maximum allowable resource amounts for each type, but if the maximum is exceeded, call requests are accepted with probability proportional to remaining resource amounts. Despite the fact that such adaptive concept has been already adopted by other call admission schemes, the contributions of our paper, which are that we are able to find an efficient way to apply the proposed scheme exploiting PRB characteristics and measure the resource usage of base stations by PRB utilization and payload ratio, are still valid. When judging from simulation results in comparison with others, our scheme is able to prioritize realtime call requests over non-realtime ones, and at the same time, overall system performance is superior.

A Study on a Ranging Protocol for the ATM-PON Based ell ITU-T G.983.1 (G.983.1 기반의 ATM-PON을 위한 Ranging 프로토콜에 관한 연구)

  • Chung, Hae;Kim, Jin-Hee;Kwun, Sun-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.17-25
    • /
    • 2000
  • ATM PON system is regarded as a solution of the next generation access network because it can cover various types of subscribers in a single platform. In this paper, we describe the merit of the ATM PON and the key protocols for its operation. Above all, the ranging is the most important protocol providing a mean of the time-division multiple access in the system. A problem in the protocol is that the window size, the time interval that ranging cell arrives, is too long. During the interval, user traffics cannot be send to the upstream, which makes the quality of service degraded. In this paper, we suggest a method to minimize the window size when the length of the optic fiber is known with some deviation. The window size can be reduced as 7 % of the conventional method when the deviation of the length is 1 Km.

  • PDF

The Privacy Protection Mechanism Applicable to Private Zone of Mobile RFID Systems (모바일 RFID 시스템의 Private Zone에 적용 가능한 프라이버시 보호 기법)

  • Kim, Dong-Chul;Chun, Ji-Young;Choi, Eun-Young;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.189-198
    • /
    • 2009
  • Mobile RFID system is a next generation technology which combines the existing RFID systems with mobile systems. It is newly expected to provide additional services and will be broadly used in everyday life; however, it sometimes causes the privacy or security problems generated by existing RFID systems and the additional privacy or security problems. Moreover, even if many methods have been proposed to solve those problems, it is still difficult to adapt to reality or to guarantee the security perfectly. Therefore, in this paper, we propose the secure and practicable privacy protection mechanism suitable to mobile RFID systems. proposing mechanism is applicable the mechanism to Private Zone of mobile RFID systems which require to protect the privacy. This mechanism suggests that own tagging-products needed to protect privacy using mobile reader of personal don't provide any information to other readers except their own reader. In addition to, proposing mechanism is the efficient mechanism which largely reduces the process to maintain the synchronization when happen to the DoS attack or system error.

An Establishment of Super Wi-Fi Environment in Ships Based on UHF System of TMS

  • Kim, Jungwoo;Son, Jooyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2103-2123
    • /
    • 2018
  • Ships built today are larger in scale and feature more complex structures. The ever-evolving systems used on board a ship require vast amounts of data processing. In the future, with the advent of smart ships, unmanned ships and other next-generation ships, the volumes of data to be processed will continue to increase. Yet, to date, ship data has been processed using wired networks. Placed at fixed locations, the nodes on wired networks often fail to process data from mobile devices. Despite many attempts made to use Wi-Fi on ships just as on land to create wireless networks, Wi-Fi has hardly been available due to the complex metal structures of ships. Therefore, Wi-Fi on ships has been patchy as the ship-wide total Wi-Fi coverage has not properly implemented. A new ship-wide wireless network environment is part of the technology conducive to the shipbuilding industry. The wireless network environment should not only serve the purpose of communication but also be able to manage and control multiple features in real-time: fault diagnostics, tracking, accident prevention and safety management. To better understand the characteristics of wireless frequencies for ships, this paper tests the widely used TETRA, UHF and Wi-Fi and sheds light on the features, advantages and disadvantages of each technology in ship settings. The proposed deployment of a Super Wi-Fi network leveraging the legacy UHF system of TMS generates a ship-wide wireless network environment. The experimental findings corroborate the feasibility of the proposed ship-wide Super Wi-Fi network environment.

FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN

  • Lian, Weichen;Li, Zhaobin;Guo, Chao;Wei, Zhanzhen;Peng, Xingyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.264-284
    • /
    • 2021
  • As the next-generation network architecture, software-defined networking (SDN) has great potential. But how to forward data packets safely is a big challenge today. In SDN, packets are transferred according to flow rules which are made and delivered by the controller. Once flow rules are modified, the packets might be redirected or dropped. According to related research, we believe that the key to forward data flows safely is keeping the consistency of flow rules. However, existing solutions place little emphasis on the safety of flow rules. After summarizing the shortcomings of the existing solutions, we propose FRChain to ensure the security of SDN data forwarding. FRChain is a novel scheme that uses blockchain to secure flow rules in SDN and to detect compromised nodes in the network when the proportion of malicious nodes is less than one-third. The scheme places the flow strategies into blockchain in form of transactions. Once an unmatched flow rule is detected, the system will issue the problem by initiating a vote and possible attacks will be deduced based on the results. To simulate the scheme, we utilize BigchainDB, which has good performance in data processing, to handle transactions. The experimental results show that the scheme is feasible, and the additional overhead for network performance and system performance is less than similar solutions. Overall, FRChain can detect suspicious behaviors and deduce malicious nodes to keep the consistency of flow rules in SDN.

Study on Effect of Exercise Performance using Non-face-to-face Fitness MR Platform Development (비대면 휘트니스 MR 플랫폼 개발을 활용한 운동 수행 효과에 관한 연구)

  • Kim, Jun-woo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.571-576
    • /
    • 2021
  • This study was carried out to overcome the problems of the existing fitness business and to build a fitness system that can meet the increased demand in the Corona situation. As a platform technology for non-face-to-face fitness edutainment service, it is a next-generation fitness exercise device that can use various body parts and synchronize network-type information. By synchronizing the exercise information of the fitness equipment, it was composed of learning contents through MR-based avatars. A quantified result was derived from examining the applicability of the customized evaluation system through momentum analysis with A.I analysis applying the LSTM-based algorithm according to the cumulative exercise effect of the user. It is a motion capture and 3D visualization fitness program for the application of systematic exercise techniques through academic experts, and it is judged that it will contribute to the improvement of the user's fitness knowledge and exercise ability.