• Title/Summary/Keyword: Access Terminal

Search Result 351, Processing Time 0.022 seconds

Method to Support Handover for Service Continuity based on IMS in Wireless LAN (무선랜 환경에서 서비스 연속성 지원을 위한 IMS 기반 핸드오버 지원 방안)

  • Kim, Kam-Yong;Kim, Hwa-Suk;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.79-87
    • /
    • 2010
  • This paper proposes a L3 handover method to minimize packet loss for supporting service continuity to IMS Terminal which has a single WLAN interface. The existing IMS based handover solution is able to support handover between different access networks in case that a terminal has multiple interfaces. That is, WLAN terminals need multiple interfaces to connect with one or more access networks. This proposed method configures IP address for the terminal in target WLAN previously by using Candidate Access Router Discovery(CARD) mechanism. Also, in the proposed method, service continuity server performs L3 connection establishment in target WLAN and registration to IMS server instead of the terminal. And then session control mechanism based on SIP is performed to support service continuity. We analyzed handover latency and signaling cost in the proposed method and existing method to show the improved performance by the proposed method.

A Study on the Implementation of the Multi-Process Structured ISDN Terminal Adaptor for Sending the Ultra Sound Medical Images (다중처리 구조를 갖는 초음파 의료영상 전송용 ISDN(Integrated Services Digital Network) TA(Terminal Adaptor) 구현에 관한 연구)

  • 남상규;이영후
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.3
    • /
    • pp.317-324
    • /
    • 1994
  • This paper proposed a new method in the implementation of ISDN (integrated services digital network) LAPD (link access procedure on the D-channel) and LAPB (link access procedure on the B-channel) protocols. The proposed method in this paper implement ISDW LAPD protocol through multi-tasking operating system and adopt a kernel part that is changed operating system to target board. The features of implemented system are (1) the para.llel processing of the events generated at each layer, as follows (2) the supporting necessary timers for the implementation of ISDW LAPD protocol from the kernel part by using software, (3) the recommanded SAP (Service Access Point) from CCITT was composed by using port function in the operating system. With the proposed method, the protocols of ISDH layerl, layer2 and layer3 (call control) were implemented by using the kernel part and related tests were carried out by connecting the ISDH terminal simulator to ISDN S-interface system using the ISDN LAPD protocol The results showed that ISDW S-interface terminals could be discriminated by TEI (Terminal Equipment Identifier) assignment in layer 2 (LAPD) and the message transmission of layer 3 was verified by establishing the multi-frame transmission and then through the path established by the LAPD protocol, a user data was tranfered and received on B-channel with LAPB protocol Thererfore, as new efficient ISDN S-interface environment was implemented in the thesis, it was verified that the implemented system can be utilized by connecting ISDW in the future to transfer a medical image data.

  • PDF

Reservation and Status Sensing Multiple Access Protocol in Slotted CDMA Systems

  • Lim, In-Taek;Ryu, Young-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.513-518
    • /
    • 2010
  • This paper proposes a medium access control protocol for integrated voice and data services in slotted CDMA systems. The proposed protocol, which is named as RCSSMA (Reservation Code and Status Sensing Multiple Access), adopts a code reservation and status sensing schemes. RCSSMA protocol gives higher access priority to the voice traffic than data traffic for reducing the packet dropping probability. The voice terminal reserves an available spreading code to transmit voice packets during a talkspurt, whereas the data terminal transmits a packet over one of the available spreading codes that are not reserved by the voice terminals. In this protocol, the voice packets never contend with the data packets. Packet dropping probability and average data packet transmission delay are analyzed using a Markov chain model.

Access Control for Efficient Query Processing on Limited Resource Mobile Terminal (자원제약적인 모바일 단말기에서 효율적인 질의처리를 위한 접근제어)

  • An, Dong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.19-27
    • /
    • 2011
  • Access control that has been previously performed mainly on safety, and thus not much effort has been done to consider access control in terms of efficiency. This paper proposes a method for an efficient and secure query processing of XML data streams, such as a personal digital assistant and a portable terminal, at the client side with limited resources. Specifically, this paper proposes an access control processing that possesses a small overhead for attaining a secure result with limited memory and a method to enhance the performance, finding the parts capable of optimizing each processing step for offsetting the overhead caused by the addition of access control processing. The superiority of the new method is analyzed through an experiments.

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

Implementation of HSDPA-to-WiFi Access Point -HSDPA CPE (HSDPA-to-WiFi Access Point 구현 -HSDPA CPE)

  • Park, Chun-Kwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.167-172
    • /
    • 2010
  • This paper is to implement HSDPA-CPE that can provides WiFi terminal with wireless Internet service through the connection to HSDPA wireless network. This system aims to support HSDPA interface in upstream, and WiFi and 100Mbps Ethernet interface in downstream. So, this system can provide multiple Internet customers with wireless Internet service by using WiFi terminal in subway, car, ship, and so on, and WiFi terminals that be registered in HSDPA service can be connected to Internet.

Transmit Power Control for Multi-Access Points Environment (다수 개의 엑세스 포인트 환경에서 전송전력 제어)

  • Oh, Changyoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.2
    • /
    • pp.49-56
    • /
    • 2020
  • We investigate the transmit power control algorithm for multi-access points environment. Each terminal may transmit a signal to one of these access points. Each access point may receive a signal from desired terminals as well as interference from neighbor terminals. In this paper, a transmit power control algorithm is developed such that the total transmit power is minimized, while each terminal meets the target signal to interference ratio (SIR) requirement. In particular, the effect of increasing the number of access-points on the total transmit power consumption is analyzed. Based on this analysis, we propose a convergence guaranteed power control algorithm. We prove that the proposed iterative algorithm always converges to the target SIR. In addition, we show that the proposed algorithm optimizes the transmit power level. Simulation results show that the proposed algorithm guarantees convergence regardless of the number of access points. We also observed that increasing the number of access points reduces the total transmit power consumption.

The Design of IAPP Server for Secure Handoff of wireless LAN Terminal (무선랜 단말의 안전한 핸드오프를 위한 Diameter IAPP서버의 설계)

  • 함영환;정병호;정교일;서창호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12C
    • /
    • pp.1258-1267
    • /
    • 2003
  • As the need for stable and high speed wireless Internet service Brows, the wireless LAN service provider hurries to preempt wireless LAN service market. IAPP(InterAccess Point protocol) is defined to be able to provide a secure handoff mechanism of wireless LAN terminal information between AP(Access Point)s, and the related IEEE standard is IEEE 802.11f. For the secure handoff of wireless LAN terminal, it is necessary to transfer terminal's authentication & accounting information securely from old AP to new AP IEEE 802.11f recommends RADIUS server as IAPP server which authenticates AP and provides information for secure channel between APs. This paper proposes IAPP server using Diameter protocol to overcome the limit of RADIUS sewer, and describes about the interaction between server components and integration method with the current IAPP client system.

A Design and Implementation of Home Network Access Agent and its Testbed (홈 네트워크 액세스 에이전트 및 테스트베드 설계 구현)

  • Kim, Dong-Kyun;Lee, Myoung-Kun;Jeon, Byung-Chan;Lee, Sang-Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.167-176
    • /
    • 2006
  • In this paper, a home network access agent, which controls and monitors networked appliances at home using various terminals regardless of user's location, is designed and implemented. The proposed access agent integrates wire and wireless network on a home gateway (or home server) and is accessed with consistent messages using various terminals such as a web terminal, a PDA and a cellular phone. Also, in order to verify the operation and availability of the agent, a user interface for the various terminals is designed and a home network testbed which is accessed and controlled by the terminals is implemented.

  • PDF

Bandwidth Allocation and Performance Analysis of MAC Protocol for Ethernet PON (Ethernet PON의 MAC프로토콜의 대역폭 할당 및 성능 분석)

  • 엄종훈;장용석;김성호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.7
    • /
    • pp.261-272
    • /
    • 2003
  • An Ethernet PON(Passive Optical Network) is an economical and efficient access network that has received significant research attention in recent years. A MAC(Media Access Control) protocol of PON , the next generation access network, is based on TDMA(Time Division Multiple Access) basically and can classify this protocol into a fixed length slot assignment method suitable for leased line supporting QoS(Quality of Service) and a variable length slot assignment method suitable for LAN/MAN with the best effort. For analyzing the performance of these protocols, we design an Ethernet PON model using OPNET tool. To establish the maximum efficiency of a network, we verify a MAC protocol and determine the optimal number of ONUs(Optical Network Unit) that can be accepted by one OLT(Optical Line Terminal) and propose the suitable buffer size of ONU based on analyzing the end-to-end Ethernet delay, queuing delay, throughput, and utilization.