• Title/Summary/Keyword: 액세스

Search Result 1,044, Processing Time 0.026 seconds

A User Detection Technique Based on Parallel Orthogonal Matching Pursuit for Large-Scale Random Access Networks (대규모 랜덤 액세스 네트워크에서 병렬 직교매칭퍼슛 기술을 이용한 사용자 검출 기법)

  • Park, Jeonghong;Jung, Bang Chul;Kim, Jinwoo;Kim, Jeong-Pil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1313-1320
    • /
    • 2015
  • In this paper, we propose a user detection technique based on parallel orthogonal matching pursuit (POMP) for uplink multi-user random access networks (RANs) with a number of users and receiver antennas. In general RANs, it is difficult to estimate the number of users simultaneously transmitting packets at the receiver because users with data send the data without grant of BS. In this paper, therefore, we modify the original POMP for the RAN and evaluate its performances through extensive computer simulations. Simulation results show that the proposed POMP can effectively detect activated users more than about 2%~8% compared with the conventional OMP in RANs.

An Implementation of Internet Real-Time Protocol for Satellite Multimedia Access Networks (위성 멀티미디어 액세스망에서 인터넷 실시간 전달 프로토콜 구현)

  • 이계상;진광자;안재영;오덕길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.216-219
    • /
    • 2000
  • Recently, with the advent of satellite communication technologies, network access services through satellites have emerged as an alternaive to existing access network services. Of satellite access services including multimedia services, the high speed internet access service will be one of the important services. Particularly, the efficient transportation of real time internet traffic seems very essential. The aim of this research is to examine the applicability of the IETF RTP protocol in the satellite access network. The RTP has been developed for the QoS-met tranportation protocol of real time traffic over the existing best-effort internet. This paper summmarizes the RW protocol, and desciribes the architecture and the data structure of the implementation of the RTP.

  • PDF

A Study on the Roles of Academic Libraries for Open Access Journal Publishing: Focusing on the Academic Libraries Participated in COPE (오픈액세스 학술지 출판에서 대학도서관의 역할에 대한 고찰 - COPE 참가 대학도서관을 중심으로 -)

  • Joung, Kyoung-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.4
    • /
    • pp.45-69
    • /
    • 2012
  • This paper examined the roles of academic libraries in open access journal publishing in terms of monetary supports for publication. As a result, many academic libraries have participated in the cooperative programs such as COPE(Compact for Open-Access Publishing Equity) and $SCOAP^3$(The Sponsoring Consortium for Open Access Publishing in Particle Physics) for authors to publish their research in open access journals. Also, 13 academic libraries in North America have set up the campus-based open access author funds individually. Most of academic libraries in participating COPE did not fund for research that have been published in the hybrid open access journals. In addition to publication funds, academic libraries provided authors or scholarly societies with such services as copyright negotiation, technological supports of the publication process, and the dissemination of open access publications.

Performance Analysis of CDMA Reservation ALOHA for Multi-traffic Services (다중 트랙픽 지원을 위한 CDMA 예약 ALOHA 방안의 성능 분석)

  • Jo, Chun Geun;Heo, Gyeong Mu;Lee, Yeon U;Cha, Gyun Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12A
    • /
    • pp.1852-1861
    • /
    • 1999
  • In this paper, CDMA Reservation ALOHA scheme which can reduce multiple access interference and packet collision is proposed to support multi-traffic such as voice and random data with and without priority. In this scheme, the time slot is divided into two stage, access and transmission stage. Only packets with spreading codes assigned from base station in access stage can transmit their packets in transmission stage, so MAI can be reduced. To reduce packer collision in access stage, the code reservation and access permission probability are used. Code reservation is allowed for voice traffic and continuous traffic with priority using piggyback and access permission probability based on the estimation of the number of contending users in the steady-state is adaptively applied to each traffic terminal. Also, we analyzed and simulated the numerical performances required for each traffic using Markov chain modeling in a single cell environment.

  • PDF

Perceptions of Researchers on Cooperative Utilization of Research Outcomes (R&D 성과물 공동활용에 대한 연구자들의 인식에 관한 연구)

  • Chang, Durk-Hyun;Roh, Ryu-Ha;Lee, Soo-Sang
    • Journal of Information Management
    • /
    • v.39 no.4
    • /
    • pp.1-20
    • /
    • 2008
  • The purpose of this study is to scrutinize the copyright issue under Open Access environment. A survey has been carried out to investigate researchers' awareness and recognitions about such issues. For this, bioinformatics researchers were selected and surveyed. Descriptive statistics method is employed for analysis of collected data. The findings of this study summarized as follow. (1) Although the researchers regarded the Open Access a positive initiative, the perceptions about open access were very low. (2) The researchers demanded possession of copyright depending on type of research information. (3) Many agencies did not required the transfer of copyright to the researcher. Thus, there is a possibility of dispute regarding copyright issues between researchers and agencies. (4) The researchers are willing to participate in open access activity on the assumption that their study is used in legitimate objective. On the basis of these findings, suggestions are added in as an impetus to lower the barrier against a copyright and higher the approach to information seekers and information providers.

Application of Korean Alphabet Domain-Names for Convenient Information Access in a Ubiquitous Information Network (유비쿼터스 정보네트워크에서의 편리한 정보액세스를 위한 한글 자음모음 도메인명의 응용)

  • Kim, Yung-Bok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1067-1074
    • /
    • 2005
  • The mobile user interface becomes important to access information fast and conveniently, especially in the ubiquitous computing environment. Among many new services in the mobile computing environment, ubiquitous information networking service was studied using korean alphabet (consonant or vowel) domain-names including Korean single-character domain-names. Instead of handling long English/Korean URL-strings, as convenient user interface for information access, the Korean single-character/alphabet domain names are more convenient than long URL strings to retrieve information and to send information in the wired Internet as well as in the mobile Internet. We studied the convenience of Korean alphabet domain names with PCs as well as with mobile phones. We introduce the Implementation and the application of ubiquitous information portal, which has the functionality of Text to Speech (TTS) and is accessible with Korean single - character/alphabet domain - names.

A Study on the Intellectual Structure of Domestic Open Access Area (국내 오픈액세스 분야의 지적구조 분석에 관한 연구)

  • Shin, Jueun;Kim, Seonghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.2
    • /
    • pp.147-178
    • /
    • 2021
  • In this study, co-word analysis was conducted to investigate the intellectual structure of the domestic open access area. Through KCI and RISS, 124 research articles related to open access in Korea were selected for analysis, and a total of 1,157 keywords were extracted from the title and abstract. Network analysis was performed on the selected keywords. As a result, 3 domains and 20 clusters were extracted, and intellectual relations among keywords from open access area were visualized through PFnet. The centrality analysis of weighted networks was used to identify the core keywords in this area. Finally, 5 clusters from cluster analysis were displayed on a multidimensional scaling map, and the intellectual structure was proposed based on the correlation between keywords. The results of this study can visually identify and can be used as basic data for predicting the future direction of open access research in Korea.

A Tabu Search Algorithm for Network Design Problem in Wireless Mesh Networks (무선 메쉬 네트워크에서 네트워크 설계 문제를 위한 타부 서치 알고리즘)

  • Jang, Kil-woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.778-785
    • /
    • 2020
  • Wireless mesh networks consist of mesh clients, mesh routers and mesh access points. The mesh router connects wireless network services to the mesh client, and the mesh access point connects to the backbone network using a wired link and provides Internet access to the mesh client. In this paper, a limited number of mesh routers and mesh access points are used to propose optimization algorithms for network design for wireless mesh networks. The optimization algorithm in this paper has been applied with a sub-subscription algorithm, which is one of the meta-heuristic methods, and is designed to minimize the transmission delay for the placement of mesh routers and mesh access points, and produce optimal results within a reasonable time. The proposed algorithm was evaluated in terms of transmission delay and time to perform the algorithm for the placement of mesh routers and mesh access points, and the performance evaluation results showed superior performance compared to the previous meta-heuristic methods.

Performance Evaluation of the Probability based MAC Protocol for Fair Transmission in WDM Metro Ring (WDM 메트로 링에서 공정한 전송을 위한 확률기반 MAC 프로토콜에 대한 성능 평가)

  • So Won-Ho;Kim Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.323-332
    • /
    • 2006
  • In this paper, we consider a WDM based metro ring connecting broadband access networks by using FT-TR (Fixed Transmitter-Tunable Receiver) type access nodes and a new MAC protocol for fair transmission is proposed. The basic channel access scheme is CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) and the transferred optical slot is changed to be empty slot by SS(Source-Stripping) which drops a packet from ring-rotated slot. This empty slot can be either used to send head-of-line packet in buffer or transmitted to next access node. In former cases, there is the improvement of network throughput, but latter case leads unfairness problem of transmission. Thus the proposed MAC protocol exploits the advantages form tow cases. It gives downstream access nodes chance to use empty slots and limits the unconditional usage of empty slots at upstream access nodes with probability as called p-Persistent MAC protocol. We use a numerical analysis to evaluate bandwidth efficiency and maximum node throughput and compares simulation results in terms of node throughput, fairness factor, transfer delay depending on probability. Under two different FT-TR type architectures for metro ring network the proposed MAC protocol is evaluated and compared.

Performance of an Authentication Proxy for Port Based Security Systems (포트레벨 보안을 위한 인증 프록시 시스템의 성능분석)

  • 이동현;이현우;정해원;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8B
    • /
    • pp.730-737
    • /
    • 2003
  • In this paper, we present an efficient authentication proxy for IEEE 802.1x systems based on the port-based access control mechanism. An IEEE 802.1x system consists of PC supplicants, a bridge with authentication client functions, and an authentication server. For the network security and user authentication purposes, a supplicant who wants to access Internet should be authorized to access the bridge port using the Extended Authentication Protocol (EAP) over LAN. The frame of EAP over LAN is then relayed to the authentication server by the bridge. After several transactions between the supplicant and the server via the bridge, the supplicant may be either authorized or not. Noting that the transactions between the relaying bridge and the server will be increased as the number of supplicants grows in public networks, we propose a scheme for reducing the transactions by employing an authentication proxy function at the bridge. The proxy is allowed to cache the supplicant's user ID and password during his first transaction with the server. For the next authentication procedure of the same supplicant, the proxy function of the bridge handles the authentication transactions using its cache on behalf of the authentication server. Since the main authentication server handles only the first authentication transaction of each supplicant, the processing load of the server can be reduced. Also, the authentication transaction delay experienced by a supplicant can be decreased compared with the conventional 802.1x system.