• Title/Summary/Keyword: Access Terminal

Search Result 350, Processing Time 0.032 seconds

A Study of the Use of Online Public Access Catalogs (온라인목록(Online Public Access Catalog : OPAC) 이용의 편이도에 관한 연구)

  • Ro Moon Ja
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.19
    • /
    • pp.151-188
    • /
    • 1990
  • The aims of automation efforts in libraries are the rationalization of interval work and improvement of user services. After a period of exclusive internal computer utilization, later voluntary contact with the computer (e.g., circulation control with self services), patrons of American libraries now have to go to a computer terminal if they want certain information. Online public access catalogs(OPAC) have been used in American libraries since the end of the seventies. But OP AC are accepted by patron only if they have a useful and flexible user interface. This paper briefly describes the use of online catalogs in different type of libraries, categories of user (user, non-user), aspect of catalog use in context with computer experience etc. The disscussion then focuses on the characteristics of the final report of online catalog use study of Council on Library Resources and user problems in searching, as reported in many other catalog use studies.

  • PDF

Development of WiBro Access Point for Offering WiBro Service with Enhanced Quality in Indoor Environment (옥내 WiBro 서비스 품질 향상을 위한 WiBro AP 개발)

  • Kwak, Do-Young;Lee, Jong-Sik;Park, Se-Jun;Lee, Seong-Choon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.269-272
    • /
    • 2007
  • In order to expand cell coverage, increase system capacity, and offer various multimedia service with high throughput in indoor environment, WiBro Access Point(AP) is developed. Home AP is IFA/Omni type and has stack-up structure of channel card and RF board. SOHO AP is designed to support up to 2FA and has remote RF(RRF) structure using UTP method. Inter-operational test with mobile terminal were completed for 3 terminals using web browsing service simultaneously. The performance test results of WiBro AP are as follows: RCE(EVM) value is -34.431 dB for 64-QAM and throughput is up to 6.79 Mbps(DL) and 1.1 Mbps(UL) with 2.5m Line-of-Sight(LOS) condition.

  • PDF

A Study on the Design of the Security Gateway for Role-based Dynamic Security Rule-Set (역할 기반 변동 보안 룰셋 적용을 위한 네트워크 보안 게이트웨이 설계에 관한 연구)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.719-726
    • /
    • 2008
  • In this thesis investigate the security gateway that manage authorization for user access dynamically by recognizing automatically and comparison & distinction between database and User-information while a terminal unit(PC) trying to access to the network of subnet. Also, it present User-interfaced authorization allowance role model, so administrator can assign united access control between network level(L2) and application level(L7) in relation to system construction.

Implementation of a B-Link Interface Logic for a SCI Interconnect (SCI 연결망의 B-Link 인터페이스 회로 구현)

  • 한종석;모상만;기안도;한우종
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.412-415
    • /
    • 1999
  • In this paper, we describe an implementation of the B-Link bus interface logic for a directory controller and a remote access cash controller in the SCI-based CC-NUMA multimedia server developed by ETRI . The CC-NUMA multimedia server is composed of a number of Pentium III SHV nodes and a SCI interconnection network. To communicate with remote nodes, each node has a CC-Agent which consists of a processor bus interface(PIF). a directory controller(DC), a remote access cash controller(RC), and two SCI 1ink controllers(LCs). The B-Link bus interface logic is developed for a directory controller and a remote access cash controller in order to communicate with a SCI link controller on a B-Link bus. It consists of a sending master controller a receiving slave controller, and asynchronous data buffers. And It performs a self-arbitration, a data packet transmission, a queue allocation, an early terminal ion. and a cut-through data path.

  • PDF

Analysis of Radio Wave of Location Estimation of Wireless Access Point (무선 AP 위치 예측을 위한 전파특성 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.6
    • /
    • pp.1653-1658
    • /
    • 2008
  • In this paper, it is analyzed propagation distribution characteristics of radio wave, which is radiated on all sides from Access Point device for estimating scheme of wireless AP without GPS receiver environment. To tracking AP device is traced from wireless terminals and wireless terminal is traced from fixed AP devices, above all it is important to analysis the characteristics of receiving power in according to distance. Therefore in this paper, radio propagation characteristics of 2.4GHz wave is analyzed effect extent and quality in according to distance in doors and out doors, and utilized to location estimation.

Variable RCH Channel Assignment Scheme in HiperLAN/2 System (HiperLAN/2 시스템에서 가변적인 RCH 채널 할당방안)

  • Jang, soon-gun;Jang, jae-hwan;Lim, seog-ku
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.83-87
    • /
    • 2009
  • The MAC protocol of HiperLAN/2 is based on TDMA/TDD. Mobile terminal acquires a data transmission opportunity as successfulness in channel competition through RCH (Random CHannel) phase. Therefore, AP (Access Point) be able to dynamically assign optimum RCH at next frame according to the number of success and collision. In this paper, we suggest scheme that fluctuate RCH (Random CHannel) number as fixed value considering success and collision for improvement of performance in HiperLAN/2. To prove efficiency of proposed scheme, a lots of simulations are conducted and analyzed in view of throughput and access delay.

  • PDF

A Mobile IPTV Authentication Protocol using Session Key in Wireless LAN (무선랜 환경에서 세션키를 이용한 모바일 IPTV 인증 프로토콜)

  • Baek, Jong-Gyu;Sohn, Kyu-Seek;Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1474-1480
    • /
    • 2011
  • Recently the mobile IPTV service has been spread through the wireless LAN(WLAN). In order to provide the commercial mobile IPTV service through the WLAN, re-authentication for the mobile IPTV terminal is required whenever the mobile terminal roams between APs(Access Points). The most popular one of the authentication protocol standards for the wired and/or wireless LAN is IEEE 802.1X. However IEEE 802.1X takes much time to authenticate the terminal and is not adequate for the seamless mobile IPTV service. We introduce the session key and separate the user authentication and the hardware authentication. And we strengthen the device authentication by the initial registration. By these, the proposed authentication protocol reduces the authentication time and can protect the authentication key securely.

IP Paging for Data-receiving Service in HPi Network (HPi망에서의 착신서비스를 위한 IP페이징 기법)

  • Jeong Tae Eui;Na Jee Hyeon;Kim Yeong Jin;Song Byung Kwon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.235-242
    • /
    • 2005
  • As the demands in a wireless network are recently increasing, it is necessary to promote the power efficiency of a wireless terminal, and to reduce the overhead of a network. To resolve such problems, we propose the paging technology and the structure of paging area with the joint access point in HPi (High-speed Portable Internet) network, which is being studied as the domestic next-generation IP packet data network. The application of the paging technology to the HPi network possesses the advantage of reducing the registration cost while a terminal in dormant state moves around, and the reporting cost of the terminal's location by the joint access point. The technology suggested in this paper causes the advantages that it promotes the power efficiency in user's point of view while it reduces the network overhead and makes the easy rearrangement of joint APs according to the changes of users' moving pattern in the network manager's point of view.

Integrated Management Middleware for the Servers supporting the terminal-independent (단말기 독립형 서버 통합 관리 미들웨어)

  • Kim Jeong-Hee;Kwak Ho-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1106-1118
    • /
    • 2006
  • The Internet has become an important instrument for providing many pieces of information to us. And server systems offer the various services after processing a volume of information, it's network topology also has been complex for providing information. Therefore this expansion means the importance of fast and sustained management of server systems. But most of server systems are located in fire-walls to allow only restricted access. Moreover, due to the difference of management based on the different operating system of each server system, management of server system is not to efficiency. That is, sever administrators have to manage by themselves many kinds of servers by using local-based or socket-based single access applications. Therefore, we design and implement a middleware system which allows to manage many kinds of severs integrally ruling XML-based Web Services which have distributed object technology such as CORBA, Java RMI and DCOM, but are free from platforms or development languages. System also provides location transparency and terminal independence and calls a server system management command to manage systems.

A Study on the Design and the Performance Improvement of TCP User Authentication ECC Algorithm Protocol for Mobile terminal (이동단말을 위한 TCP 사용자 인증 타원곡선 알고리즘 프로토콜의 설계 및 성능 개선에 관한 연구)

  • 임승린;박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.7-17
    • /
    • 2004
  • It requires that user have to verify and conform with user authentication Protocol on non-meet face to face internet services offered by mobile terminal which user make known user's own intention, and user be using the normal. It is more operation time authentication protocol than Access control Protocol. That is what need to be user authentication protocol have verified security. non-reputation, and improved high-performance in operation time for mobile terminal. In order to solve the above demand, in this paper, we would design for mobile terminal of TCP User Authentication ECC Algorithm Protocol with a performance test. Algorithm has 160 bit key and designed IPv4 & IPv6 frame architecture. We should conclude that the proposed protocol have more verified security, non-reputation, confidentiality, and improved high-performance in operation time of mobile terminal from 1 to 17 times than before.

  • PDF