• Title/Summary/Keyword: Access Point Control

Search Result 280, Processing Time 0.034 seconds

A Study on the Description of Personal Name Access Point Control Ontology Using Axiom Definition (공리정의를 이용한 인명접근점제어 온톨로지 기술에 관한 연구)

  • Kang, Hyen-Min
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.157-174
    • /
    • 2012
  • This study tries to describe personal name access point control ontology for the American novelist Mark Twain using RDF/OWL axiom to control access point based on the ontology. The Axiom used in this study are disjoint with class, domain and range, property cardinality, inverse functional property, individual and literal data property. As a result, in the ontology environment we can accept various access points as equal access points exclusive of authority heading and heading concept. It can successfully describe Mark Twain's personal name access point control ontology and display using the OntoGraf.

A Study on Developing and Applying Access Point Control System Using SRU Protocol (SRU 프로토콜을 이용한 접근점제어 시스템의 구축과 활용에 관한 연구)

  • Lee, Ji-Won;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.1 s.55
    • /
    • pp.229-248
    • /
    • 2005
  • This study proposes a national cooperative model of access point control, that enables local systems to utilize national access point control record, without creating their own authority records. In order to applying this model, a client/server system is developed using SRU (Search and Retrieve URL Service) protocol. The suggested access point control system will be a cost-effective and time-saving model for the local system, and will be more flexible and extensible with concept of access point control, XML record format and SRU protocol.

Integrated Wireless Network Control System using a Cloud-based AP Controller (클라우드 기반의 AP Controller를 이용한 무선 네트워크 통합 관리 시스템)

  • Min, Kyung-Su;Yoon, Kwon-Jin;Park, Min-Ho;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.720-722
    • /
    • 2015
  • In this paper, we propose a new type of integrated wireless control system using a cloud-based AP Controller. With this system, network administrator can control wireless network in head office and branch hierarchically. In head office, they have an AP Controller Manager, it can control all Access Points, Access point Controllers in their networks. In addition, if we need to install new Access point Controller because of the increasing number of Access Point, the process of making virtual Access point Controller can be automated. This paper presents an architecture of the integrated wireless control system, as well as describes its components and protocols.

Assessing Efficiency of Handoff Techniques for Acquiring Maximum Throughput into WLAN

  • Mohsin Shaikha;Irfan Tunio;Baqir Zardari;Abdul Aziz;Ahmed Ali;Muhammad Abrar Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.172-178
    • /
    • 2023
  • When the mobile device moves from the coverage of one access point to the radio coverage of another access point it needs to maintain its connection with the current access point before it successfully discovers the new access point, this process is known as handoff. During handoff the acceptable delay a voice over IP application can bear is of 50ms whereas the delay on medium access control layer is high enough that goes up to 350-500ms. This research provides a suitable methodology on medium access control layer of the IEEE 802.11 network. The medium access control layer comprises of three phases, namely discovery, reauthentication and re-association. The discovery phase on medium access control layer takes up to 90% of the total handoff latency. The objective is to effectively reduce the delay for discovery phase to ensure a seamless handoff. The research proposes a scheme that reduces the handoff latency effectively by scanning channels prior to the actual handoff process starts and scans only the neighboring access points. Further, the proposed scheme enables the mobile device to scan first the channel on which it is currently operating so that the mobile device has to perform minimum number of channel switches. The results show that the mobile device finds out the new potential access point prior to the handoff execution hence the delay during discovery of a new access point is minimized effectively.

Requirements Analysis for Access Control Model on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 접근제어 모델을 위한 요구사항 분석)

  • Oh Sejong;Park Jeho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.563-570
    • /
    • 2004
  • Ubiquitous computing environment requires strong security and privacy. Access control is one of security areas. Access control on Ubiquitous computing is different from it on traditional information systems so that traditional access control models are not suitable for Ubiquitous comput-ing environment. This research defines Ubiquitous computing environment as an access control point of view, and shows requirements to consid-er for developing access control model for Ubiquitous computing environment. It also brings up three implementing types of access control on Ubiquitous computing environment.

Access Control of Wireless LAN Access Point Based on IEEE 802.1X (IEEE 802.1X에 따른 무선랜 Access Point 접속 인증 시스템 개발)

  • 오경희;양대헌;강유성;함영환;정병호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.157-160
    • /
    • 2002
  • IEEE 802.11 규격에 따른 무선랜은 사설망에서 사용됨은 물론, 공중망 사업자들에 의한 핫스팟 서비스까지 제공되면서 수요가 더욱 늘어나고 있다. 사용자가 늘어남에 따라, 이에 대한 보안의 중요성 또한 늘어났다. IEEE 802.1X는 랜 접속 서비스를 받고자 하는 시스템이 인증을 거쳐 랜을 사용할 수 있도록 함으로써, 허가 받지 않은 사용자가 무단으로 사용하거나 도청하는 것을 어렵게 한다. 기존의 Linux 용 access point 디바이스드라이버에 802.1X 가상 포트를 추가하고, 이를 제어하는 가상 포트 제어기를 통하여, 사용자 인증 기능이 추가된 access point를 설계, 개발하였다. 개발된 시스템은 embedded Linux 형태의 access point고 사용되어 질 수 있다.

  • PDF

Development of a Bluetooth Access Point for One-Phone System

  • Min, Byung-Jo;Hwang, June;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.778-781
    • /
    • 2005
  • In this paper, we describe a development of a Bluetooth Access Point for the WAN connection of home network devices. Especially, users can access the PSTN at home instead of expensive digital cellular network through the AP, using the 'one-phone', which is the Bluetooth enabled cellular phone. The simultaneous benchmark test about telephone service and LAN access service shows the perfect compatibility and reasonable performance of the access point. The one-phone service can become a convergence of wired and wireless communication through the AP.

  • PDF

Analysis and Application of Access Control Technologies based on XML (XML기반 Access Control 기술의 분석과 적용)

  • 이형석;성백호;차석일;김현희;신동일;신동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.466-468
    • /
    • 2002
  • 웹서비스의 등장으로 XML이 기반기술로서 자리 매김하고 있는 현재, XML을 이용하여 여러 표준기술을 제정하려는 움직임이 많아지고 있다. XACML은 접근제어 리스트(access control list)를 통해 보안이 요구되는 자원에 대해 미세한 접근 제어 서비스를 제공할 수 있는 XML 기반의 언어이다. XACML은 SAML PDP(Policy Decision Point)의 일부로서 역할을 수행 할 수 있으며 각 정의에 따라 각각의 사용자 별 XML 문서 접근 정책을 수립하고 적용 할 수 있다. 본 논문에서는 XML기반의 Access Control 표준인 XACML에 대하여 분석하고 적용방법에 대하여 연구하였다.

  • PDF

Extended PCF(EPCF) Mechanism for Wireless LAN MAC (Wireless LAN MAC을 위한 Extended PCF(EPCF) 방법)

  • Lee, Ho-Seok;Suh, Byung-Suhl
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.31-34
    • /
    • 2002
  • There are two kinds of network architectures in the IEEE 802.11:[1] distributed (ad-hoc) or centralized (infrastructure) wireless network. Centralized networks have an access point (base station) that can control the wireless medium access of stations in these networks. The 802.11 MAC protocol of an access point is the same as those of other stations in the contention period. This paper propose a novel MAC protocol of an access point to solve these problems. This MAC protocol adds a new contention-free period called EPCF (Extended PCF) to resolve accumulated data in the queue of an access point. Simulation results show that the new protocol performs better throughput than the 802.11 standard MAC with the less queue memory site requirement.

  • PDF

A Study on Developing a Name Access Point Control System to Improve the Performance of Information Retrieval from Institutional Repositories (기관 리포지터리의 검색기능 향상을 위한 인명 접근점제어 시스템 구축 연구)

  • Kim, Mi-Hyang;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.3
    • /
    • pp.125-146
    • /
    • 2010
  • This study developed a name access point control system for better performance of information retrieval from institutional repositories, which are equipped with authorgenerated metadata processes for self-archiving. In developing name access point control data for the system, the primary data were created from the existing authority. However, unlike the existing authority data, the primary data did not use any authority forms. Instead, the data utilized all the forms provided by the resources as access points. Specifically, field of activity(subject) and title information on authorship were used to distinguish between persons who have the same name. The result showed that the system improved the performance of the information retrieval. The system has been also expected to be utilized over other metadata provided by libraries, in addition to the institutional repositories, in order to provide better quality information.