Strategies of Mobile Carriers for the Evolution of Mobile Networks in Korea

2012 ◽  
Vol 263-266 ◽  
pp. 1208-1213
Author(s):  
Junseok Oh ◽  
Taisiya Kim ◽  
Soo Kyung Park ◽  
Bong Gyou Lee

The mobile network has been developed from 2nd Generation (2G) to Long Term Evolution (LTE) network in Korea. The purpose of this paper is to examine the key factors which affect network development, and to recognize how the mobile carriers and users perceive the rapid change of mobile technology. This study focuses on a pretest to confirm the important factors from the Focus Group Interview (FGI) to Korean Telco representatives and mobile device users. The results show that mobile device users consider devices and contents as more important factors while Korean Telco representatives pursue various strategies and priorities for network evolution. The study will contribute to recognize the differences between providers and users for introducing the new mobile network. Since this paper only describes the pretest results, further research will be conducted with in-depth interview data and statistical approaches.

2003 ◽  
Vol 02 (04) ◽  
pp. 531-555 ◽  
Author(s):  
KLAUS D. HACKBARTH ◽  
J. ANTONIO PORTILLA

Strategic Planning for mobile networks has to consider the evolution from the existing 2nd Generation GSM architecture to a long term 3rd Generation UMTS architecture over various intermediate steps in the form of hybrid networks. The study of this evolution requires a corresponding Strategic Planning tool. This article deals with Strategic Network Planning and develops the corresponding models considering aspects like radio propagation, multi-service traffic and user mobility. The article presents a corresponding strategic planning tool which allows to study the evolution of a mobile network under the corresponding input data in the form of a service and topographic scenarios. The application of the tool to a specific network region is shown and costing perspectives for the different services are discussed.


Author(s):  
Battulga Davaasambuu

The rapidly-growing number of mobile subscribers has led to the creation of a large number of signalling messages. This makes it difficult to efficiently handle the mobility of subscribers in mobile cellular networks. The long-term evolution (LTE) architecture provides software-defined networking (SDN) to meet the requirements of 5G networks and to forward massive mobile data traffic. The SDN solution proposes separation of the control and data planes of a network. Centralized mobility management (CMM) is widely used in current mobile network technologies, such as 4G networks. One of the problems related to CMM is a single point of failure. To solve the problems of CMM and in order to provide for efficient mobility management, IETF has developed a solution called distributed mobility management (DMM), in which mobility is handled via the nearest mobility anchor. In this paper, we propose a DMM solution with handover operations for SDN-enabled mobile networks. The advantage of the proposed solution is that intra and inter handover procedures are defined with the data buffering and forwarding processes between base stations and mobility anchors. We adopt a simulation model to evaluate and compare the proposed solution with the existing solution in terms of handover latency, packet loss and handover failures.


2021 ◽  
Vol 15 (3-4) ◽  
pp. 29-38
Author(s):  
Aleksandra Krajnović ◽  
Jurica Bosna ◽  
Sara Grubišić

In this modern world characterized by rapid change, the role of marketing is increasingly important. Developing a brand is one way in which a competitive advantage can be achieved. The work defines the concept of luxury through the prism of marketing, shows the specifics of marketing in the luxury products market and the key factors that influence the demand for luxury products. The paper found that the key to success is to effectively create a market strategy whose main goal is to create a strong and emotional long-term relationship between the brand and the consumer. Also, the new trend of "abundant rarity" has led companies in the luxury goods sector to strive to strike an optimal balance between exclusivity and affordability.


2009 ◽  
Vol 2009 ◽  
pp. 1-14 ◽  
Author(s):  
Alf Inge Wang ◽  
Martin Jarrett ◽  
Eivind Sorteberg

This paper describes results and experiences from designing, implementing, and testing a multiplayer real-time game over mobile networks with high latency. The paper reports on network latency and bandwidth measurements from playing the game live over GPRS, EDGE, UMTS, and WLAN using the TCP and the UDP protocols. These measurements describe the practical constraints of various wireless networks and protocols when used for mobile multiplayer game purposes. Further, the paper reports on experiences from implementing various approaches to minimize issues related to high latency. Specifically, the paper focuses on a discussion about how much of the game should run locally on the client versus on the server to minimize the load on the mobile device and obtain sufficient consistency in the game. The game was designed to reveal all kinds of implementation issues of mobile network multiplayer games. The goal of the game is for a player to push other players around and into traps where they loose their lives. The game relies heavily on collision detection between the players and game objects. The paper presents experiences from experimenting with various approaches that can be used to handle such collisions, and highlights the advantages and disadvantages of the various approaches.


Author(s):  
Debashis De ◽  
Anwesha Mukherjee ◽  
Srimoyee Bhattacherjee ◽  
Payel Gupta

Authentication procedures are conducted in order to control and stop illegitimate access of such valuable data. This chapter discusses the biometric authentication inside the cloud. The authors describe how biometric information of a user can be securely transmitted and then stored inside the user database maintained in the trusted cloud. Femtocell, a recent development in mobile network using which secures biometric data transmission from the mobile device to the cloud, is discussed in this chapter.


2019 ◽  
pp. 859-875
Author(s):  
Debashis De ◽  
Anwesha Mukherjee ◽  
Srimoyee Bhattacherjee ◽  
Payel Gupta

Authentication procedures are conducted in order to control and stop illegitimate access of such valuable data. This chapter discusses the biometric authentication inside the cloud. The authors describe how biometric information of a user can be securely transmitted and then stored inside the user database maintained in the trusted cloud. Femtocell, a recent development in mobile network using which secures biometric data transmission from the mobile device to the cloud, is discussed in this chapter.


Author(s):  
Battulga Davaasambuu

The rapidly-growing number of mobile subscribers has led to the creation of a large number of signalling messages. This makes it difficult to efficiently handle the mobility of subscribers in mobile cellular networks. The long-term evolution (LTE) architecture provides software-defined networking (SDN) to meet the requirements of 5G networks and to forward massive mobile data traffic. The SDN solution proposes separation of the control and data planes of a network. Centralized mobility management (CMM) is widely used in current mobile network technologies, such as 4G networks. One of the problems related to CMM is a single point of failure. To solve the problems of CMM and in order to provide for efficient mobility management, IETF has developed a solution called distributed mobility management (DMM), in which mobility is handled via the nearest mobility anchor. In this paper, we propose a DMM solution with handover operations for SDN-enabled mobile networks. The advantage of the proposed solution is that intra and inter handover procedures are defined with the data buffering and forwarding processes between base stations and mobility anchors. We adopt a simulation model to evaluate and compare the proposed solution with the existing solution in terms of handover latency, packet loss and handover failures.


Author(s):  
V. Suma ◽  
Wang Haoxiang

The 3GPP long term Evolution or System Architecture Evolution (LTE/SAE) was designed for the dispositioning of the mobile networks towards 4G. The significant hurdle of 4G is about cementing the privacy and security gap. Due to the disclosures in the connectivity of public networks, a single malicious device could jeopardize the operation of a whole network of devices. The key deliverance handling within the 3GPP LTE/SAE is developed to unauthorize the keys that are being attacked and, in result, to alienate the miscreant keys off the chain of network. The proposed article recognizes the attacks that jeopardize the safe connectivity among the stops in the network chain and details the vulnerability of the key deliverance administration to desynchronization attacks. Even though the periodic upgrade of the root could prove to be a fundamental part of the system, the work proposed brings an emphasis on reducing the impact of desynchronization attacks which currently are unable to be prevented efficiently. The main focus of the design is to shed light on the ways the network operators work to confirm the optimal intervals for the periodic updates to reduce the signal weightage while providing secure user mobility. The analysis and model simulations intend to disclose the influence of the period of root key upgrade on integral operational levels such as constellation and user experience.


2018 ◽  
pp. 125-141 ◽  
Author(s):  
S. M. Drobyshevsky ◽  
P. V. Trunin ◽  
A. V. Bozhechkova

The paper studies the factors of secular stagnation. Key factors of long-term slowdown in economic growth include the slowdown of technological development, aging population, human capital accumulation limits, high public debt, creative destruction process violation etc. The authors analyze key theoretical aspects of long-term stagnation and study the impact of these factors on Japanies economy. The authors conclude that most of the factors have significant influence on the Japanese economy for recent decades, but they cannot explain all dynamics. For Russia, on the contrary, we do not see any grounds for considering the decline in the economy since 2013 as an episode of secular stagnation.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Sign in / Sign up

Export Citation Format

Share Document