• Title/Summary/Keyword: subscribers network

Search Result 184, Processing Time 0.022 seconds

Integration of Proximity-based Services with Vehicular Ad-hoc Networks (교통 기관 애드혹 네트워크 와 Proximity기반 서비스의 통합)

  • Diouf, Elhadji Makhtar
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.126-129
    • /
    • 2015
  • Device-to-device (D2D) communications, a subset of Proximity-based Services that enables direct communication between LTE network subscribers, is gaining popularity. It is well underway to be adopted in cellular communication systems for pedestrian and connected-vehicles alike. In this paper, we briefly present our model of an Evolved Packet Core Network-assisted device discovery simulator and show the applicability of Proximity-based Services for Vehicular Ad-hoc Networks. Through the performance evaluation based on the developed simulation environment, it is shown that in case when users gather in the same vicinity, as in public transportation, LTE network data can be efficiently offloaded and multicasted through Wi-Fi for e.g. delivering traffic-related information and for the benefit of infotainment service consumers.

  • PDF

Design and Performance Evaluation of The ONU and OLT Supporting VPN Function over ATM-PON (ATM-PON에서 VPN 기능 지원을 위한 ONU와 OLT의 설계와 성능분석)

  • 장종욱;박미리;전형구;남재현
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.57-64
    • /
    • 2004
  • Passive optical network that use passive component is economical network, and can provide service of high speed to subscribers. The function of VPN which is operated like private network is needed to many companies. There are two methods to implement VPN over ATM-PON. One is located at ONU and OLT system and another is located at core network. In this paper, we implemented to SCB and P2P adding VPN function to ONU and OLT of ATM-PON system. We knew that the proposed method has more fast transmission and more small traffic than other method in the field of the performance.

A Study on Influencer Food-Content Sentiment Keyword Analysis using Semantic Network based on Social Network

  • Ryu, Gi-Hwan;Yu, Chaelin;Lee, Jun Young;Moon, Seok-Jae
    • International journal of advanced smart convergence
    • /
    • v.11 no.2
    • /
    • pp.95-101
    • /
    • 2022
  • The development of the 4th industry has increased social media, and the rise of COVID-19 has stimulated non-face-to-face services. People's consumption patterns are also changing a lot due to non-face-to-face services. In this paper, food content keywords are derived through social network-based semantic network analysis, emotions are analyzed, and keywords applied to food recommendation platforms are input. We collected food, influencer, and corona keyword analysis data through Textom. A lot of research has been done through online reviews of existing influencer content. However, there is a lack of research on keyword sentiment analysis provided by influencers rather than consumers and research perspectives. This paper uploads language and topics derived through online reviews of existing publications and subscribers, and goes beyond the limits used in marketing methods. By analyzing keywords that influencers suggest when uploading content, you can apply data that applies them to food recommendation platforms and applications.

Design and Analysis of Tech-Economic for Optimized Access Network over Information Super Highway (초고속정보통신망에서의 최적 가입자망을 위한 경제성 분석 및 설계)

  • Jang, Jong-Wook;Lee, Kae-Sang;Lee, Jung-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1589-1600
    • /
    • 1997
  • The construction of optical access network costs upper 40% in total installation cost of total optical network. Optimization of access network therefore is core in optical network. Advanced countries include EU, Japan and USA already have researched access network. This paper presents analysis of three broad-band fiber-optics subscriber loop architectures(HFC, ATM-PON, Super PON). The analyses focus on the specific demonstrated architectures and use component cost projections to estimate future network costs on a per-subscriber basis. We use TITAN(Tool for Introduction Scenarios and Techno-Economic Evaluation of The Access Network) model. We find that ATM-PON can deliver voice and ISDN data at installed first costs than the other architectures. This is due to the sharing bandwidth among a cluster of subscribers within Curb. This work intends to support establishing guidelines for strategic decisions regarding the development of the access network alternatives of different operators.

  • PDF

Mobile IPv6 Session Key Distribution Method At Radius-based AAAv6 System

  • Lee Hae Dong;Choi Doo Ho;Kim Hyun Gon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.581-584
    • /
    • 2004
  • Currently, there are many subscriber access networks: PSTN, ADSL, Cellular Network, IMT200 and so on. To these service providers that provide above network service, it is important that they authenticate and authorize legal subscribers and account for their usage. At present, There exist the several protocols that Support AAA(Authentication, Authorization and Accounting) service : RADIUS, Diameter, TACACS+. Nowadays, RADIUS has used for AAA service widely. It has been extended to support other access network environment. So, we extend RADIUS to support environment of Mobile IPv6. Mobile IPv6 uses IPsec as a security mechanism, basically. But, IPsec is a heavy security technology for small, portable, mobile device. Especially, it is serious at IKE, the subset of IPsec. IKE is a key distribution protocol that distributes the key to the endpoints of IPsec. In t:lis paper, we extend RADIUS to support environment of Mobile IPv6 and simplify the IKE phase of IPsec by AAA system distributing the keys by using its security communication channel. Namely, we propose the key distribution method for IPsec SA establishment between mobile node and home agent. The suggested method was anticipated to be effective at low-power, low computing deyice. Finally, end users feel the faster authentication.

  • PDF

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility

  • Li, Zhigang;Shi, Yan;Chen, Shanzhi;Zhao, Jingwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.872-885
    • /
    • 2015
  • The rapid increase of smart mobile devices and mobile applications has led to explosive growth of data traffic in cellular network. Offloading data traffic becomes one of the most urgent technical problems. Recent work has proposed to exploit opportunistic communications to offload cellular traffic for mobile data dissemination services, especially for accepting large delayed data. The basic idea is to deliver the data to only part of subscribers (called target-nodes) via the cellular network, and allow target-nodes to disseminate the data through opportunistic communications. Human mobility shows temporal and spatial characteristics and predictability, which can be used as effective guidance efficient opportunistic communication. Therefore, based on the regularity of human mobility we propose NodeRank algorithm which uses the encounter characteristics between nodes to choose target nodes. Different from the existing work which only using encounter frequency, NodeRank algorithm combined the contact time and inter-contact time meanwhile to ensure integrity and availability of message delivery. The simulation results based on real-world mobility traces show the performance advantages of NodeRank in offloading efficiency and network redundant copies.

Proposal of optical subscriber access network to eliminate multiple access interference using 2 dimensional optical frequency and time domain CDMA method (동시 사용자의 간섭을 제거한 광 주파수 및 시간 영역 광 CDMA를 이용한 광 가입자 망의 제안)

  • Park Sang-Jo;Kim Bong-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.161-166
    • /
    • 2006
  • In this paper, we propose optical subscriber access network to eliminate multiple access interference using 2 dimensional(D) optical frequency and time domain CDMA method. We have numerically analyzed the characteristics of proposed system. It is seen that the excess intensity noise is the major limiting factor to the system. Also it is seen that the number of simultaneous subscribers is four times as large as the conventional ID optical system under the same bit error ratio.

A Study on the Implementation of Point-to-Point Relay System for Digital LMDS System (디지털 LMDS 시스템을 위한 점대점 중계망 시스템 구현에 관한 연구)

  • 장태화;방효창;정철종;김원후
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9B
    • /
    • pp.1601-1607
    • /
    • 1999
  • LMDS(Local Multipoint Distribution Service) is a broadband wireless transmission system in millimeter wave frequency. LMDS system is consisted with relay system to connect between head-end and hub and distribution system to connect between hub and subscribers. In this study, we develop point-to-point relay system to use back-bone system n LMDS network. We develop STM-1 transceiver over 27GHz and analyze the system performance. We can get the similar measurement results comparing the theoretical results and then prove that this system can fit LMDS back-bone network requirement. This is the first system in Korea and we expect this system can apply the various network.

  • PDF

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

  • Abdelkader, Ghazli;Naima, Hadj Said;Adda, Ali Pacha
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.152-173
    • /
    • 2017
  • Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process where the customer is verified by the system, yet the system is not confirmed by the customer. This creates numerous security issues, including powerlessness against man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. In this paper, we propose a secure authentication mechanism based new mobility management method to improve the location management in the GSM network, which suffers from a lot off drawbacks, such as transmission cost and database overload. Numerical analysis is done for both conventional and modified versions and compared together. The numerical results show that our protocol scheme is more secure and that it reduces mobility management costs the most in the GSM network.

Structural Design of Optical Access Network for IPOW Service (IPOW 서비스를 위한 광액세스망 구조 설계)

  • Lee, Sang-Wha
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.5140-5147
    • /
    • 2013
  • This paper presents a new idea of structural design of the optical access network for IPOW(IP over WDM) services. More efficient network can be constructed, because the IP packets are transmitted directly to the WDM without going through an intermediate layer of networks. The wavelength Routing is based on a label switching technology. The ability to transmission of high volume traffics and QoS capability of the optical label switching directly to the end user of the IPOW optical internet networks is provided. As in AON(Active Optical Network) flexible bandwidth on demand subscribers is allocated. By the Simulation of the proposed optical access networks to measure the BER(Bits Error Ratio) at the end of the nodes the network characteristics are analyzed. These results are based on the design of efficient optical network.