• Title/Summary/Keyword: 무선랜 네트워크

Search Result 335, Processing Time 0.026 seconds

A Scalable Video Coding (SVC)-Aware Retransmission Scheme for Multimedia Streaming in IEEE 802.11 WLANs (IEEE 802.11 무선랜에서의 멀티미디어 전송을 위한 스케일러블 비디오 코딩 인지형 재전송 기법)

  • Kim, Namyeong;Song, Taewon;Kim, Wonjung;Pack, Sangheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.2
    • /
    • pp.95-101
    • /
    • 2014
  • Scalable video coding (SVC) encodes multimedia data into a base layer and enhancement layers to cope with variable network conditions in an adaptive manner. In SVC, enhancement layers can be decoded only when the base layer is successively received. However, existing works on SVC transmissions in IEEE 802.11 WLANs do not fully investigate this characteristic and thus their performance can be degraded. In this paper, we propose a SVC-aware retransmission (SAR) scheme in IEEE 802.11 WLANs. The SAR scheme applies different retransmission policies for base and enhancement layers by obtaining the optimal number of frames to be retransmitted. As a result, the SAR scheme can reduce unnecessary retransmissions and minimize the transmission latency. Simulation results demonstrate that the SAR scheme can reduce unnecessary data transmission by 12.6% and the transmission latency by 6.6~19.1% compared to conventional retransmission schemes.

A Study of Development for High-speed Cloud Video Service using SDN based Multi Radio Access Technology Control Methods (초고속 클라우드 비디오 서비스 실현을 위한 SDN 기반의 다중 무선접속 기술 제어에 관한 연구)

  • Kim, Dongha;Lee, Sungwon
    • Journal of Broadcast Engineering
    • /
    • v.19 no.1
    • /
    • pp.14-23
    • /
    • 2014
  • This paper proposed controlling methods for SDN(Software Defined Network) based multiple radio access technology as the solutions of following two issues which were mainly occurred by explosive increasing of video traffic. The first one is a requirement for traffic off-loading caused by 3rd-party video service providers from the mobile network operator's viewpoint. The other one is a provision of high-speed video contents transmission services with low price. Furthermore, the performance evaluation was also conducted on the real test-bed which is composed of OpenStack cloud and SDN technology such as OpenFlow and Open vSwitch. A virtual machine running on the OpenStack provide a video service and the terminal which is able to use multiple radio access technology supports two 2.4GHz WLANs(Wireless Local Area Network) and three 5GHz WLANs, concurrently. Finally, we can get 820Mbps of the maximum transmission speed by using that five WLAN links for the single service at the same time.

Authenticated Handoff with Low Latency and Traffic Management in WLAN (무선랜에서 낮은 지연 특성을 가지는 인증유지 핸드오프 기법과 트래픽 관리 기법)

  • Choi Jae-woo;Nyang Dae-hun;Kang Jeon-il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.81-94
    • /
    • 2005
  • Recently, wireless LAN circumstance is being widely deployed in Public spots. Many People use Portable equipments such as PDA and laptop computer for multimedia applications, and also demand of mobility support is increasing. However, handoff latency is inevitably occurred between both APs when clients move from one AP to another. To reduce handoff latency. in this paper, we suggest WFH(Weighted Frequent Handoff) using effective data structure. WFH improves cache hit ratio using a new cache replacement algorithm considering the movement pattern of users. It also reduces unessential duplicate traffics. Our algorithm uses FHR(Frequent Handoff Region) that can change pre-authentication lesion according to QoS based user level, movement Pattern and Neighbor Graph that dynamically captures network movement topology.

Modeling End-to-End Throughput of Multiple Flows and Efficient Route Selection in Wireless Mesh Networks (무선 메쉬 네트워크에서의 다중 트래픽 흐름을 위한 종단간 처리량 모델링 및 효율적인 라우팅 경로 선택 기법)

  • Wang, Xiaofei;Kwon, Ted Tae-Kyoung;Choi, Yang-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.4
    • /
    • pp.272-283
    • /
    • 2010
  • Wireless Mesh Networks (WMNs) have gained a lot of attention recently. Based on the characteristic of WMNs as a highly connected wireless infrastructure, many efforts from research organizations are made in order to improve the performance of the flow throughput in WMNs. Therefore, it is very critical issue to establish efficient routing paths for multiple concurrent ongoing flows. In this paper, we propose a general modeling methodology to analyze the end-to-end throughput of multiple concurrent flows by analytical calculation taking into account the carrier sensing behaviors, interference and the IEEE 802.11 Distributed Coordination Function mechanism. After the comparison of the average service time for each successful transmission at each node, we analyze the bottlenecks of flows, and hence obtain the maximum end-to-end throughput of them. By using our proposed model, it is possible to predicate the throughput of several candidate routing paths for multiple concurrent ongoing data flows, so we can select the most efficient route that can achieve the highest throughput. We carry out simulations with various traffic patterns of multiple flows in WMNs to validate our modeling and our efficient route selection mechanism.

A Study on Evaluation Method of IDC in the Wire/Wireless Integrated Environment (유.무선 통합환경에서의 IDC 평가방법에 관한 연구)

  • Lee, Jea-Pyuing;Park, Jin-Seok;Lee, Man-Woo;Kim, Sun-Gohn
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.599-603
    • /
    • 2006
  • Korea Information Security Agency has executed the certification system for the information security management since 2002 and examines the conformance of the IDCs'total management system including the technical and the physical protection measure. However, this certification system has the standard only for the IDC in the wire/wireless segregated and the evaluation method for the wire/wireless integrated has not been suggested yet. This paper is on the basis of "Accumulation Information Communication Facility Secure Principle", guidelines of Wireless LAN security operation, the existing principles and recommendations of the information security and the data on IDC environment. And the paper suggests the IDC network model in the wire/wireless integrated and the IDC evaluation method.

  • PDF

Detecting and Isolating a Cloned Access Point IEEE 802.11 (IEEE 802.11에서의 복제된 AP 탐지 및 차단 기법)

  • Go, Yun-Mi;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.45-51
    • /
    • 2010
  • Appearance of a cloned AP(Access Point) causes MS(Mobile Station) to break an association with a normal AP(Access Point). If signal power of the cloned AP is stronger than that of the normal AP, MS associates with the cloned AP. Therefore, MS is easily exposed to attackers who installed the cloned AP. In this paper, we distinguish cloned AP from normal AP by using the association time and frame sequence number between normal AP and MS, then isolates the cloned AP. The simulation by NS-2 shows that our mechanism isolates efficiently a cloned AP and builds safer wireless LAN environment.

A Study on the New Vulnerability of Inducing Service Charge Doctoring SSID of Smartphone Based on Android (안드로이드폰 SSID 변조를 통한 새로운 과금 유발 취약점에 관한 연구)

  • Heo, Geon-Il;Yoo, Hong-Ryul;Park, Chan-Uk;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.21-30
    • /
    • 2010
  • Wireless network is one of the 2010's most important security issues. As smartphone is popularize, the number of Wireless Internet users is really growing and wireless AP spring up everywhere. But most wireless AP haven't being managed properly in terms of security, Wireless Internet users also don't recognize important of security. This situation causes grave security threats. This paper design and analyze a new cyber attack whose it circulates malware via QR code and activates Mobile AP to induce service charge. The new vulnerability we suggest forces to activate Mobile AP of smartphone based on Android and responds to all Probe Request are generated around, and brings induction of service charge and communication problems in its train.

Fast Handoff based on Radio Resource Measurement in Home Network System (무선자원 측정 정보를 이용한 홈 네트워크 AP간 빠른 핸드오프 방식)

  • Kwon, Soo-Kun;Jeong, Yeon-Joon;Paik, Eei-Hyun;Park, Kang-Roh
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.943-946
    • /
    • 2005
  • As a proposed standard for radio resource measurement, 802.11k aims to provide key client feedback to WLAN access points and switches. The proposed standard defines a series of measurement requests and reports that detail Layer 1 and Layer 2 client statistics. In this paper, we analyze handoff processing time, radio specrum usage and handoff coverage using this scheme in home-network inter APs handoff.

  • PDF

Research of Real Time Mutual Authentication System in Wireless Network (무선 네트워크상에서 실시간 상호인증시스템에 관한 연구)

  • Jung, Don-Chul;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.1996-2001
    • /
    • 2006
  • Open System Authentication Method, Shared Key Method, Mac Based Authentication Method are very hard to use in wireless network that needs security. So now, many researches have been performed about 802.1x and user authentication method applying PKI. but certificate verification protocol has been used abolished list called CRL since it's first usage of PKI, there were still has a problem about distribution point. This paper applied CVS to use CA direct not to use CRL and OSCP server in order to improve this problems. Also It suggested the system that can make authentication steps more shorter using authentication server and Mutual authentication system by public certificate(small size/low speed wireless terminal can access to wireless network fast and safely)

Maximizing the capacity of the IoT-based WSNs by employing the MIM capability (MIM 적용을 통한 IoT 기반 무선 센서 네트워크 성능 최대화 방안)

  • Kang, Young-myoung
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.9-15
    • /
    • 2020
  • Wireless sensor nodes adopting the advanced preamble detection function, Message-In-Mesage (MIM), maximize the concurrent transmission opportunities due to the capture effect, result in improving the system performance significantly compared to the legacy IEEE 802.15.4 based sensor devices. In this paper, we propose an MIM capture probability model to analyze the performance gains by applying the MIM function to the wireless sensor nodes. We implemented the IEEE 802.15.4 and MIM by Python and performed extensive simulations to verify the performance gains through MIM capture effects. The evaluation results show that the MIM sensors achieve 34% system throughput gains and 31% transmission delay gains over the legacy IEEE 802.15.4-based sensors, which confirm that it was consistent with the analysis result of the proposed MIM capture probability model.