• Title/Summary/Keyword: Access Network

Search Result 3,705, Processing Time 0.036 seconds

ISDN Experimental Experiences on User-Network Interfaces (ISDN 가입자 - 망 접속에서의 실험적 경험에 대한 고찰)

  • Jeong, Il-Yeong;Jeong, Hui-Chang;Jo, Gyu-Seop;Im, Ju-Hwan
    • ETRI Journal
    • /
    • v.10 no.1
    • /
    • pp.3-13
    • /
    • 1988
  • With the contunuing trends towards an information based society, telecommunications services are becoming an integral part of social activities. So, emphasis on ISDN is growing rapidly and placed on supporting integrated services delivery of different levels to the end user. The end user’s perception of an integraged services delivery(in particular, ISDN services) should reflect three interrelated capabilities, ISDN access capabilities and ISDN network capabilities. For turning the ISDN concept of above capabilities into reality, we have implemented the experimental system on user-network interfaces, which are three kinds of implementations in user access arrangements, namely basic access, intermediate rate multiplexed access and primary rate multiplexed access. Through these implementations, NTE(Network Terminating Equipment) is used for single basic access [2B+D], IMUX (Intermediate rate Multiplexer) for 4 basic accesses [4X(2B+D)] and PMUX(Primary rate Multiplexer) for [10/12 X (2B+D)]. This paper describes the outlines of system features on user access equipments, system architectures of testbed and experiment result of each access arrangements.

  • PDF

An Implementation of Ranging Simulator Based on ITU-T G.983.1 (G.983.1 기반의 Ranging 시뮬레이터의 구현)

  • Hong, Jae-Geun;Woo, Man-Sik;Chung, Woo;Kim, Jin-Hee;Koh, Sang-Ho;Yoo, Gun-Il
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.248-251
    • /
    • 2000
  • The ATM-PON is regarded as an effective access network because the system transmits the various user's information through the passive optical splitter in a single platform. The ranging technology is to place all ONUs at the same distance virtually in order to form ATM-PON based on the Time Division Multiplexing (TDM). In This paper, We show the steps about ranging protocol based on ITU-T G.983.1 and ranging procedure modeling. Also, We implement the simulator that considers various environments to verify the time specifications of G.983.1. By using the simulator, We find out the wasted bandwidth which influences active ONUs during the ranging procedure.

  • PDF

Development of a Bluetooth Access Point on Embedded System for One - Phone Service (임베디드 시스템에서 원-폰 서비스를 위한 블루투스 액세스 포인트 개발)

  • Min Byungjo;Hwang June;Park Jongkyu;Kim Hagbae
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.433-438
    • /
    • 2004
  • In this paper, we describes the development of Bluetooth network Access Point(AP) for the access network connection of Bluetooth devices at home. Unlike headset, mouse, and keyboard, the AP should have capability to support multiple connection and stabilized network throughput. Our AP allows various kinds of Bluetooth terminals to access the access network like xDSL and PSTN(Public Swithced Telephone Network) stably. Especially, users can access the PSTN at home instead of expensive CDMA network through the AP by using the one-phone which is the cellular phone with the Bluetooth module.

Modeling of Access Networks and Applications for the Economics of New Access Network Technology (신규 가입자망 기술의 경제성 평가를 위한 망 구조모형과 그 응용)

  • 류태규;이정동;김태유
    • Journal of Korea Technology Innovation Society
    • /
    • v.4 no.2
    • /
    • pp.157-171
    • /
    • 2001
  • This paper discusses the economics of local loop architecture focusing on existing technologies, ADSL, HFC, and new one, PLC, and suggests a new modeling approach of access network system and the numerical equations. To modelize access network system and drive the numerical equations, we consider the double star and the tree & branch architecture and made block diagram of each access system. In addition, we introduce the density of subscriber as a variable and the equation of seeking the optimal number of cell in a service area. The economics of local loop architecture is analyzed in two ways, i.e. with and without consideration of the cost of cable and infrastructure. From the numerical analysis, we find that in case of not including the cost of cable and infrastructure, there is no much difference in the cost per one subscriber, while, in case of including it, there is remarkable difference among technologies. Therefore we conclude that the economics of local loop architecture is depend on the density of subscriber and existing network infrastructures.

  • PDF

Various Techniques for Improving of the Reliability of the Wireless Network Design/Optimization Simulation Tool (무선망 설계/최적화 시뮬레이션 툴 의 다양한 신뢰도 향상 기법)

  • Jeon Hyun-Cheol;Ryu Jae-Hyun;Park Sang-Jin;Park Joo-Yeoul;Kim Jung-Chul
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.39-42
    • /
    • 2006
  • There are various analysis functions(including prediction of path loss, analyzing of capacity and coverage, etc.) of simulation tool to design and optimize the mobile communication network. Its reliability absolutely effects the performance of mobile communication network. Especially as the wireless network highly advancing focused on data service, it more needs to research and develop on the standard establishment of reliability of the simulation tool. Also it is important the systematic research how to improve the reliability of simulation tool. In this paper, to give the concrete process and skill about how to improve reliability, we define the kinds of reliability at first. And then we explain the comparison results between real field measurement data and theoretic simulation data.

  • PDF

Performance of Bipolar Optical Spectral Encoding CDMA with Modified PN Codes

  • Chang, Sun-Hyok;Kim, Bong-Kyu;Park, Heuk;Lee, Won-Kyoung;Kim, Kwang-Joon
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.513-516
    • /
    • 2006
  • Experimental demonstration of bipolar spectral encoding code-division multiple-access with modified pseudorandom noise codes is presented. Bipolar spectral encoding is achieved with an erbium-doped fiber amplifier amplified spontaneous emission source and arrayed waveguide gratings. The bit-error rate performance of 1.25 Gbps signal transmission over 80 km single mode fiber is measured in a multiple-user environment.

  • PDF

The case study to verify of a network based on router applying an ACL(: Access List) (ACL(: Access list)이 적용된 라우터 기반 네트워크의 검증 사례연구)

  • Kim, No-Whan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.491-498
    • /
    • 2016
  • An ACL(: Access List), a list that determines network access, is used for the security of the network. An ACL if applied to a interface of router can filter particular packets. Also it can block or allow the access of certain unauthorized IPs or ports, based on the source address, destination address, and TCP/UDP port. This paper presents a simulation case to verify the effect of a router-based network applying Standard ACL or Extended ACL. The network was created through designing topology and then making a common virtual network using a Packet Tracer.

The Power Saving Strategy of Dual Mode Access Terminal in WiBro and WLAN Hierarchical Network (WiBro/WLAN Hierarchical 네트워크에서 듀얼모드 단말기의 Power Saving 전략)

  • Moon, Tae-Wook;Ko, Bong-Jin;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.4
    • /
    • pp.306-311
    • /
    • 2006
  • When the WiBro/WLAN hierarchical network is structured, a dual mode access terminal should keep WLAN module with power on state for operating in WiBro network outside of WLAN hotspot zone. Power consumption of user's access terminal can be increased to maintain WLAN module power on state of dual mode access terminal in WiBro network outside of the hotspot zone. This paper focuses on power saving strategy for a dual mode access terminal in WiBro/WLAN Hierarchical network to overcome problems regarding power. We will apply information about hotspot in WiBro network to establish the efficient power saving strategy for dual mode access terminal.

  • PDF

Development of a Bluetooth Access Point for One-Phone System

  • Min, Byung-Jo;Hwang, June;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.778-781
    • /
    • 2005
  • In this paper, we describe a development of a Bluetooth Access Point for the WAN connection of home network devices. Especially, users can access the PSTN at home instead of expensive digital cellular network through the AP, using the 'one-phone', which is the Bluetooth enabled cellular phone. The simultaneous benchmark test about telephone service and LAN access service shows the perfect compatibility and reasonable performance of the access point. The one-phone service can become a convergence of wired and wireless communication through the AP.

  • PDF

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.