• Title/Summary/Keyword: Access Point Control

Search Result 280, Processing Time 0.028 seconds

A Study on XACML based Resource Access Control System (XACML기반 자원 접근제어 시스템 모델 연구)

  • Song, Jun-Hong;Lee, Hyoung-Suk;Kim, Dong-Soo;Shin, Dong-Kyoo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.11a
    • /
    • pp.355-359
    • /
    • 2002
  • 웹 서비스의 등장으로 XML이 기반 기술로서 자리 매김하고 있는 현재, XML을 이용하여 여러 표준기술을 제정하려는 움직임이 많아지고 있다. XACML은 접근제어 리스트 (access control list)를 통해 보안이 요구되는 자원에 대해 미세한 접근 제어 서비스를 제공 할 수 있는 XML 기반의 언어이다. XACML은 SAML PDP(Policy Decision Point)의 일부로서 역할을 수행 할 수 있으며 각 정의에 따라 각각의 사용자 별 XML 문서 접근 정책을 수립하고 적용 할 수 있다. 본 논문에서는 XML기반의 Access Control 표준인 XACML에 대하여 분석하고 적용 방법에 대하여 연구하였다.

  • PDF

Design and Evaluation of a Contention-Based High Throughput MAC with Delay Guarantee for Infrastructured IEEE 802.11WLANs

  • Kuo, Yaw-Wen;Tsai, Tung-Lin
    • Journal of Communications and Networks
    • /
    • v.15 no.6
    • /
    • pp.606-613
    • /
    • 2013
  • This paper proposes a complete solution of a contention-based medium access control in wireless local networks to provide station level quality of service guarantees in both downstream and upstream directions. The solution, based on the mature distributed coordination function protocol, includes a new fixed contention window backoff scheme, a tuning procedure to derive the optimal parameters, a super mode to mitigate the downstream bottleneck at the access point, and a simple admission control algorithm. The proposed system guarantees that the probability of the delay bound violation is below a predefined threshold. In addition, high channel utilization can be achieved at the same time. The numerical results show that the system has advantages over the traditional binary exponential backoff scheme, including efficiency and easy configuration.

Performance Analysis on DCF Considering the Number of Consecutive Successful Transmission in Wireless LAN (무선랜에서 연속적인 전송성공 횟수를 고려한 DCF 성능분석)

  • Lim, Seog-Ku
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.388-394
    • /
    • 2008
  • In this paper, MAC(Medium Access Control) algorithm for the IEEE 802.11 DCF(Distributed Coordination Function) improving the performance is proposed and analyzed by simulation. The MAC of IEEE 802.11 WLAN to control data transmission uses two control methods called DCF and PCF(Point Coordination function). The DCF controls the transmission based on CSMA/CA(Carrier Sense Multiple Access With Collision Avoidance). The DCF shows excellent performance relatively in situation that competition station is less but has a problem that performance is fallen from throughput and delay viewpoint in situation that competition station is increased. This paper proposes an enhanced DCF algorithm that increases the CW to maximal CW after collision and decreases the CW smoothly after successful transmission in order to reduce the collision probability by utilizing the current status information of WLAN. To prove efficiency of proposed algorithm, a lots of simulations are conducted and analyzed.

Optical Wireless Access Point Agent Networks

  • Lee, Tae-Gyu
    • Journal of the Optical Society of Korea
    • /
    • v.13 no.1
    • /
    • pp.98-106
    • /
    • 2009
  • This paper proposes an optical wireless transfer agent method which realizes the continuous and swift data transfer of optical wireless terminals in optical wireless networks. The unguided wireless channel generally shows frequent link disconnections and propagation delays due to weak wireless links. Specially speaking, optical wireless channels have more vulnerable links and roaming propagation delays relative to the weakness of the previous RF channels due to their low signal connectivity and small geographic coverage. Conventional optical wireless network protocols did not consider any fault models about physical link faults. Consequently, they have shown data transfer inefficiency for both data link control and physical wireless link control. To overcome these optical wireless environmental problems, this paper suggests a new wireless access point (or base station) agent system, which provides wireless or mobile clients with previous link layer protocols compensated.

A Ticket-based Authentication Mechanism Suitable for Fast 802.11 Handoff which use CAPWAP Architecture (고속의 802.11 핸드오프를 지원하는 CAPWAP 아키텍처를 이용한 티켓 기반의 인증 메커니즘)

  • Park, Chang-Seop;Woo, Byung-Duk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.93-103
    • /
    • 2009
  • Recently, there is an increase in demand of real-time multimedia service in the WLAN environment, with a commercialization of IEEE 802.11n standard. However, the 802.1x authentication protocol is too slow to provide seamless real-time multimedia service, which defined in an IEEE 802.11i security standard. In this paper, a Ticket-based authentication mechanism in the CAPWAP(Control And Provisioning Wireless Access Point) architecture is introduced to support for the fast handoff.

A Study on the Construction of Work and Expression Authority Records (저작 및 표현형 전거레코드 구축방안에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.71-94
    • /
    • 2016
  • This study was to suggest the construction of work and expression authority records for FRBRization. ICP, FRBR/FRAD and RDA as the content rules were referred as the framework for the construction of work and expression authority records. LC RDA authority records examples, JSC of RDA authority examples, and VIAF work and expression authority records were analyzed as case studies. 5 findings were suggested. First, authority records consist of name, work, and expression authority records which are inter-related. Second, the construction of authorized access points was suggested according to 5 work types. Third, the consideration in describing work attributes as separate element and as part of an authorized access point, and other distinguishing characteristic of the work were suggested. Fourth, the consideration in describing expression attributes as separate element and as part of an authorized access point, and other distinguishing characteristic of the expression were suggested. Fifth, 5XX was suggested for linking between work and expression. This study would contribute to revise KCR4.

Variable RCH Channel Assignment Scheme in HiperLAN/2 System (HiperLAN/2 시스템에서 가변적인 RCH 채널 할당방안)

  • Jang, soon-gun;Jang, jae-hwan;Lim, seog-ku
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.83-87
    • /
    • 2009
  • The MAC protocol of HiperLAN/2 is based on TDMA/TDD. Mobile terminal acquires a data transmission opportunity as successfulness in channel competition through RCH (Random CHannel) phase. Therefore, AP (Access Point) be able to dynamically assign optimum RCH at next frame according to the number of success and collision. In this paper, we suggest scheme that fluctuate RCH (Random CHannel) number as fixed value considering success and collision for improvement of performance in HiperLAN/2. To prove efficiency of proposed scheme, a lots of simulations are conducted and analyzed in view of throughput and access delay.

  • PDF

Efficient Access Control Labeling for Secure Query Processing on Dynamic XML Data Streams (동적 XML 데이타 스트링의 안전한 질의 처리를 위한 효율적인 접근제어 레이블링)

  • An, Dong-Chan;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.180-188
    • /
    • 2009
  • Recently, the needs for an efficient and secure access control method of dynamic XML data in a ubiquitous data streams environment have become an active research area. In this paper, we proposed an improved role-based prime number labeling scheme for an efficient and secure access control labeling method in dynamic XML data streams. And we point out the limitations of existing access control and labeling schemes for XML data assuming that documents are frequently updated. The improved labeling method where labels are encoded ancestor-descendant and sibling relationships between nodes but need not to be regenerated when the document is updated. Our improved role-based prime number labeling scheme supports an infinite number of updates and guarantees the arbitrary nodes insertion at arbitrary position of the XML tree without label collisions. Also we implemented an efficient access control using a role-based prime number labeling. Finally, we have shown that our approach is an efficient and secure through experiments.

Implementation of Wireless Communication Module with Point-to-multipoint Media Access Control (점대다중점 매체다중접속을 지원하는 무선통신모듈의 구현)

  • Kim, June-Hwan;Jung, Jin-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.267-273
    • /
    • 2012
  • The short-range communication module was developed in this paper which is suitable for the point-to-multipoint circumstances of 40 terminals communicating frequently in about 50 meters. The media access control layer of this communication module using asynchronous time-division multiplexing provides a fast and robust performance even in the worst case of simultaneous transmission events, and low packet error rate was measured a in LOS (Line-of-sight) circumstance by adding the function of acknowledge response to media access control layer. The difference test was carried out in order to measure the performance of point-to-multipoint communication. Two communication modules are respectively measured and graphed in 10 branches to 40 branches. The communication module developed in this paper showed a faster performance than the commercial Zigbee module in the specific case presented in this paper. Especially, in over 20 branches showed wide differences of the transmission speed. This results is caused by more network overhead of Zigbee whose wider applications needs the network layer and applicaiton layer besides media access control layer. Also, the asynchronous time-division multiplexing proposed in this paper are more suitable than CSMA-CA of Zigbee module when a lot of module ought to be frequently communicated in small area.

Implementation of Home-Network Sewer using UPnP based on the Embedded Linux (Embedded Linux 기반의 UPnP를 사용한 홈-네트워크 서버 구현)

  • 정진규;진선일;이희정;황인영;홍석교
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.9
    • /
    • pp.638-643
    • /
    • 2004
  • Middleware enables different networking devices and protocols to inter-operate in ubiquitous home network environments. The UPnP(Universal Plug and Play) middleware, which runs on a PC and is based on the IPv4 protocol, has attracted much interest in the field of home network research since it has versatility The UPnP, however, cannot be easily accessed via the public Internet since the UPnP devices that provide services and the Control Points that control the devices are configured with non-routable local private or Auto IP networks. The critical question is how to access UPnP network via the public Internet. The purpose of this paper is to deal with the non-routability problem in local private and Auto IP networks by improving the conventional Control Point used in UPnP middleware-based home networks. For this purpose, this paper proposes an improved Control Point for accessing and controlling the home network from remote sites via the public Internet, by adding a web server to the conventional Control Point. The improved Control Point is implemented in an embedded GNU/Linux system running on an ARM9 platform. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.