• Title/Summary/Keyword: Access 2

Search Result 5,536, Processing Time 0.032 seconds

Wireless Internet-IMT-2000/Wireless LAN Interworking

  • Roman pichna;Tero Ojanpera;Harro Posti;Jouni Karppinen
    • Journal of Communications and Networks
    • /
    • v.2 no.1
    • /
    • pp.46-57
    • /
    • 2000
  • Ongoing standardization effort on 3G cellular system in 3GPP (UNTS) is based on GPRS core network and promises a global standard for systems capable of offering ubiquitous access to internet for mobile users. Considered radio access systems(FDD CDMA, TDD CDMA, and EDGE) are optimized for robust mobile use. However, there are alternative relatively high-rate radio interfaces being standardized for WLAN (IEEE802.11 and HIPER-LAN/2) which are capable of delivering significantly higher data rates to static or semi-static terminals with much less overhead. Also WPANs(BLUETOOTH, IEEE802.15), which will be present in virtually every mobile handset in the near future, are offering low cast and considerable access data rate and thus are very attractive for interworking scenarios. The prospect of using these interfaces as alternative RANs inthe modular UMTS architecture is very promising. Additionally, the recent inclusion of M-IP in the UMTS R99 standard opens the way for IP-level interfacing to the core network. This article offers an overview into WLAN-Cellular interworking. A brief overview of GPRS, UMTS cellular architectures and relevant WLAN standards is given. Possible interworking architectures are presented.

  • PDF

Key Generation and Management Scheme for Efficient Interoperability among Different Downloadable Conditional Access Systems (서로 다른 DCAS 간 효율적 상호운용을 위한 키 생성 및 관리 기법)

  • Lee, Hoonjung;Eun, Hasoo;Oh, Heekuck
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.75-82
    • /
    • 2013
  • CAS (Conditional Access System) is a content protection solution that restricts access to the system according to user's standing and only authorized users can access the content in a pay-TV system. DCAS (Downloadable Conditional Access System) can download CAS client which is a software implemented via network. In recent years, research and development has been carried out on DCAS to solve the problems of compatibility among heterogeneous devices and internetworking with other services. In this paper, we propose key generation and management scheme for efficient interoperability among different DCASs based on PBC (Pairing Based Cryptography).

Estimation Modelling of Energy Consumption and Anti-greening Impacts in Large-Scale Wired Access Networks (대규모 유선 액세스 네트워크 환경에서 에너지 소모량과 안티그리닝 영향도 추정 모델링 기법)

  • Suh, Yuhwa;Kim, Kiyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.8
    • /
    • pp.928-941
    • /
    • 2016
  • Energy consumption of today's wired data networks is driven by access networks. Today, green networking has become a issue to reduce energy wastes and $CO_2$ emission by adding energy managing mechanism to wired data networks. However, energy consumption and environmental impacts of wired access networks are largely unknown. In addition, there is a lack of general and quantitative valuation basis of energy use of large-scale access networks and $CO_2$ emissions from them. This paper compared and analyzed limits of existing models estimating energy consumption of access networks and it proposed a model to estimate energy consumption of large-scale access networks by top-down approach. In addition, this work presented models that assess environmental(anti-greening) impacts of access networks using results from our models. The performance evaluation of the proposed models are achieved by comparing with previous models based on existing investigated materials and actual measured values in accordance with real cases.

Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic

  • Sui, Nannan;Wang, Cong;Xie, Wei;Xu, Youyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.687-708
    • /
    • 2017
  • The machine-to-machine (M2M) communication is featured by tremendous number of devices, small data transmission, and large uplink to downlink traffic ratio. The massive access requests generated by M2M devices would result in the current medium access control (MAC) protocol in LTE/LTE-A networks suffering from physical random access channel (PRACH) overload, high signaling overhead, and resource underutilization. As such, fairness should be carefully considered when M2M traffic coexists with human-to-human (H2H) traffic. To tackle these problems, we propose an adaptive Slotted ALOHA (S-ALOHA) and time division multiple access (TDMA) hybrid protocol. In particular, the proposed hybrid protocol divides the reserved uplink resource blocks (RBs) in a transmission cycle into the S-ALOHA part for M2M traffic with small-size packets and the TDMA part for H2H traffic with large-size packets. Adaptive resource allocation and access class barring (ACB) are exploited and optimized to maximize the channel utility with fairness constraint. Moreover, an upper performance bound for the proposed hybrid protocol is provided by performing the system equilibrium analysis. Simulation results demonstrate that, compared with pure S-ALOHA and pure TDMA protocol under a target fairness constraint of 0.9, our proposed hybrid protocol can improve the capacity by at least 9.44% when ${\lambda}_1:{\lambda}_2=1:1$and by at least 20.53% when ${\lambda}_1:{\lambda}_2=10:1$, where ${\lambda}_1,{\lambda}_2$ are traffic arrival rates of M2M and H2H traffic, respectively.

Delay Analysis of the ISDN D-channel Access Protocol (ISDN D-채널 Access Protocol의 Delay 분석)

  • 이구연;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.2
    • /
    • pp.98-111
    • /
    • 1990
  • In this paper a queneing model for the D channel access protocal recommeded by CCITT is developed, and delays of the signalling and packet messages are analyzed using the model, Behaviors of packet and signalling messages in the D-channel access system are also investigated. The analytical results have been verified by simulation.

  • PDF

Evaluating the Information Access Skills of Students of a College of Education in Ghana

  • Yebowaah, Franklina Adjoa;Owusu-Ansah, Christopher M.
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.2
    • /
    • pp.45-54
    • /
    • 2020
  • Access to relevant information determines the quality of life of an individual in society and the academe. Academic institutions have established information literacy programmes to enhance students' access to information. With the elevation of colleges of education to tertiary status in Ghana, pre-service teachers are now required to conduct research to improve their reflective thinking in order to be certified. However, the information access skills of students in colleges of education in Ghana are uncertain. This study draws empirical evidence from students in the Nusrat Jahan Ahmadiyya College of Education, Wa, Ghana on their information access skills. Primary data were collected from 303 respondents from the college using a stratified sampling procedure. The data were collected using a questionnaire and analysed using descriptive statistics. The results indicate that information is available to students through different sources such as the Internet, libraries, and contact with friends and authorities. However, students were limited in respect to access to relevant online resources for their academic activities due to inadequate information access skills. Potential solutions are discussed.

Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황 충돌)

  • Nam Seung-Jwa;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.37-52
    • /
    • 2005
  • Traditional access control models like role-based access control model are insufficient in security needs in ubiquitous computing environment because they take no thought of access control based on user's context or environment condition. In these days, although researches on context-aware access control using user's context or environment conditions based on role-based access control are emerged, they are on the primary stage. We present context definitions md an access control model to provide more flexible and dynamic context-aware access control based on role-based access control. Specially, we describe the conflict problems occurred in the middle of making an access decision. After classifying the conflict problems, we show some resolutions to solve them. In conclusion, we will lay the foundations of the development of security policy and model assuring right user of right object(or resource) and application service through pre-defined context and context classification in ubiquitous computing environments. Beyond the simplicity of access to objects by authorized users, we assure that user can access to the object, resource, or service anywhere and anytime according to right context.

The implementation of Access Control System using Biometric System (생체인식 시스템을 이용한 Access Control System 구현에 관한 연구)

  • 김광환;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.494-498
    • /
    • 2004
  • In this paper, a system that implementation of Access Control System Using Biometric System. Biometries is science which deals with verifying or recognizing using physiological or behavioral characteristic Access Control System uses Bionietric system to make an access control system. Biometrics goes under the study of bio-recognition or bio-measurement. It is a technology or study that identifies individuals using one's Biometric character. Access control system is a system used to identify one's entrance and exit, personal management, and security. Access control system can be joined with Biometric system to produce easier use and more sufficient effects. Access control system using Weigand (Data format) signal output, can replace earlier RF Card systems and make an access control (security) system. It uses RS-232, Rs-422 or TCP/IP type communication with the computer so an embedded system can be controlled using the software.

A Study on the Elements for Open Access Policies of Universities (대학의 오픈액세스 정책 수립시 구성요소에 관한 연구)

  • Joung, Kyoung-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.2
    • /
    • pp.229-250
    • /
    • 2010
  • Open access policies are very important for the successful open access projects in any institutions. This study aims to propose elements to consider for establishing open access policies of universities. The 3 university institutional repositories' open access policies in Korea and foreign universities' policies registered in the ROARMAP are analyzed. The major categories proposed in the study are materials, time of deposition, depositors, copyright, level of requirement, exemption, usage, options for open access, and support.

  • PDF

Improvement of the access channel algorithm in the CDMA2000 system (CDMA2000시스템에 있어서 액세스채널 알고리즘 개선)

  • Lee Kwang jai;Chun Jong hun;Park Jong an
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3B
    • /
    • pp.138-143
    • /
    • 2005
  • This paper aims to optimize an access probe algorithm for the CDMA 2000 system. The incremental value of PWR_STEP increases as NUM_STEP as 1dBm±0.2 for access probe of the area with good receiving sensitivity when the mobile station transmits via access channel and does not receive any ACK message. However, for the area with weak receiving sensitivity, according to the algorithm of open-loop power control, the transmitting power amplifier becomes saturated and PWR_STEP incremental value keeps performing access probe to 0dBm±0.2. Therefore interference and battery consumption increases according to the transmission of the mobile station. We have optimized the access probe algorithm according to the receiving sensitivity. We transmit the incremental value of access probe power, with delaying as much RT slot value as indicated by IS-95C standard in case of good receiving sensitivity and with delaying RT+l slot value in case of weak receiving sensitivity. Simulation results showed that the proposed algorithm contributes to decrease of the interference and battery consumption according to the transmitting power of the mobile station and improves the call duration.