• Title/Summary/Keyword: Access Time

Search Result 3,935, Processing Time 0.032 seconds

A Study on the Design and the Performance Improvement of IP Access Control Protocol for External Mobile terminal (외부 이동단말의 접근제어를 위한 IP 프로토콜 설계 및 성능 개선에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2004
  • Access control protocol have verified security of external mobile terminal that access to inner information sever at Ubiquitous ages. In this paper, I would design for If Access Control Protocol of considering operation time when make cipher digital signature. Public key are used Individual identification number that issued from certify communication company, and cipher algorithm are used ECDSA definition factor for generation and verification of digital signature and it used Elliptic Curve with over 160 bit Key. Also, Access control operate on If level that designed IPv6 frame architecture. I would conclude that IP Access Control Protocol have verified security and improved performance in operation time more 4 times than before protocols when through the communication of use cipher digital signature for authentication and verification.

  • PDF

A Study on the Elements for Open Access Policies of Universities (대학의 오픈액세스 정책 수립시 구성요소에 관한 연구)

  • Joung, Kyoung-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.2
    • /
    • pp.229-250
    • /
    • 2010
  • Open access policies are very important for the successful open access projects in any institutions. This study aims to propose elements to consider for establishing open access policies of universities. The 3 university institutional repositories' open access policies in Korea and foreign universities' policies registered in the ROARMAP are analyzed. The major categories proposed in the study are materials, time of deposition, depositors, copyright, level of requirement, exemption, usage, options for open access, and support.

  • PDF

The Design of STDMA(Self-Organized Time Division Multiple Access) Protocol Simulation Program (항공 감시용 다중접속방식 프로토콜 시뮬레이션 프로그램 설계)

  • Kim, In-Kyu;Ohn, Kyoung-Ryoon;Song, Jae-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.554-558
    • /
    • 2008
  • In this paper, we show that the SIDMA(Self-organized Time Division Multiple Access) protocol using aviation surveillance data link now, designs to the ICAO DO 9816 documentation sequence. This protocol makes use of the VDL(VHF Data Link) Mode 4 and UAT(Universal Access Transceiver) system's MAC(Media Access Control) layer. We make sure of the simulation result and implementation of STDMA protocol program in accompany with the ICAO documentation sequence. This program operates the slot allocation and reservation with report rate when protocol transmits data and calculates slot address.

  • PDF

Grant-Free Random Access in Multicell Massive MIMO Systems with Mixed-Type Devices: Backoff Mechanism Optimizations under Delay Constraints

  • Yingying, Fang;Qi, Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.185-201
    • /
    • 2023
  • Grant-free random access (GFRA) can reduce the access delay and signaling cost, and satisfy the short transmission packet and strict delay constraints requirement in internet of things (IoT). IoT is a major trend in the future, which is characterized by the variety of applications and devices. However, most existing studies on GFRA only consider a single type of device and omit the effect of access delay. In this paper, we study GFRA in multicell massive multipleinput multiple-output (MIMO) systems where different types of devices with various configurations and requirements co-exist. By introducing the backoff mechanism, each device is randomly activated according to the backoff parameter, and active devices randomly select an orthogonal pilot sequence from a predefined pilot pool. An analytical approximation of the average spectral efficiency for each type of device is derived. Based on it, we obtain the optimal backoff parameter for each type of devices under their delay constraints. It is found that the optimal backoff parameters are closely related to the device number and delay constraint. In general, devices that have larger quantity should have more backoff time before they are allowed to access. However, as the delay constraint become stricter, the required backoff time reduces gradually, and the device with larger quantity may have less backoff time than that with smaller quantity when its delay constraint is extremely strict. When the pilot length is short, the effect of delay constraints mentioned above works more obviously.

An Implementation of Internet Real-Time Protocol for Satellite Multimedia Access Networks (위성 멀티미디어 액세스망에서 인터넷 실시간 전달 프로토콜 구현)

  • 이계상;진광자;안재영;오덕길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.216-219
    • /
    • 2000
  • Recently, with the advent of satellite communication technologies, network access services through satellites have emerged as an alternaive to existing access network services. Of satellite access services including multimedia services, the high speed internet access service will be one of the important services. Particularly, the efficient transportation of real time internet traffic seems very essential. The aim of this research is to examine the applicability of the IETF RTP protocol in the satellite access network. The RTP has been developed for the QoS-met tranportation protocol of real time traffic over the existing best-effort internet. This paper summmarizes the RW protocol, and desciribes the architecture and the data structure of the implementation of the RTP.

  • PDF

A Priority Scheme for IEEE 802.11 Wireless LAN

  • Jang, Yeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.12B
    • /
    • pp.1996-2002
    • /
    • 2000
  • This paper investigates a priority scheme for IEEE 802.11 Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) protocol in order to provide short access times for priority frames (e.g. time-deadline traffic) even when the overall traffic on the wireless channel is heavy. Under the compatibility constraint for the IEEE 802.11 wireless LANs, two priority systems are simulated: no priority (current IEEE 802.11 standard) for time-deadline traffics and dynamic time-deadline priority. We evaluate algorithms to improve the time-deadline traffic performance using discrete event simulation (DES)

  • PDF

FlexRay: Protocol, Time Hierarchy, Message Frame, Communication Controller, and Conformance Test (FlexRay: 프로토콜, 시간 계층, 메시지 프레임, 커뮤니케이션 컨트롤러, 적합성 시험)

  • Seokjun Hahn;Sua Shin;Naeun Park;Chan Park;Daegi Lee;Seongsoo Lee
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.668-678
    • /
    • 2023
  • FlexRay is an in-vehicle network with maximum two channels and maximum transmission speed of 10Mbps per channel. FlexRay exploits TDMA (Time Division Multiple Access) and FTDMA (Flexible Time division Multiple Access) to ensure real-time communication with efficient transmission, so it is used for real-time electronic control of safety-critical vehicular modules such as powertrain. This paper explains FlexRay protocol, time hierarchy, message frame, communication controller, and conformance test in detail based on ISO 17458 standard and FlexRay consortium documents.

A transmit function implementation of wireless LAN MAC with QoS using single transmit FIFO (단일 송신 피포를 이용한 QoS 기능의 무선랜 MAC의 송신 기능 구현)

  • Park, Chan-Won;Kim, Jung-Sik;Kim, Bo-Kwan
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.237-239
    • /
    • 2004
  • Wireless LAN Voice over IP(VoIP) equipment needs Quality-of-Service(QoS) with priority for processing real-time traffic. This paper shows transmit function implementation of wireless LAN(WLANs) media access control(MAC) support VoIP, and it has an advantage of guarantee of QoS and is adaptable to VoIP or mobile wireless equipment. The IEEE 802.11e standard in progress has four queues according to four access categories(AC) for transmit and the MAC transmits the data based on EDCA. The value of AC is from AC0 to AC3 and AC3 has the highest priority. The transmit method implemented at this paper ensure QoS using one transmit FIFO in hardware since real-time traffic data and non real-time traffic data has the different priority. The device driver classifies real-time data and non real-time data and transmit data to hardware with information about data type. The hardware conducts shorter backoff and selects faster AIFS slot for real-time data than it for non real-time data. Therefor It make give the real-time traffic data faster channel access chance than non real-time data and enhances QoS.

  • PDF

LED-QR Authentication Technology for Access Control and Security

  • Chung, Youngseek;Jung, Soonho;Kim, Junwoo;Lee, Junghoon;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.69-75
    • /
    • 2015
  • There are several possible places which are accessible in many buildings and facilities, various types of systems have been utilized such as access control or surveillance depending on the purpose. Especially if security is important, it must go through the various authentication procedures when people can access. Until now many access control systems have been proposed and developed, they are applied and utilized to companies which security is needed. However, as time passes the problems with existing access control systems occur or the vulnerabilities related to access control are reported, as technology advances. The solution to this, we propose authentication technology related to access control using LED-QR tag.

Study on Performance Enhancement for a Cyclic Code Shift Keying Frequency Hopping Spread Spectrum/Time Division Multiple Access System (순환천이변조 주파수도약대역확산/시분할다중접속 시스템의 성능 개선에 관한 연구)

  • Kim, Eun-Cheol;Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.16 no.1
    • /
    • pp.51-55
    • /
    • 2012
  • In this paper, we propose to employ a ternary sequence as a cyclic code shift keying (CCSK) modulation sequence. And we simulate the performance in a frequency hopping spread spectrum/time division multiple access (FHSS/TDMA) system with CCSK. Wireless channel is modeled as Rayleigh fading channel. From the simulation results, it is demonstrated that the system adopting the ternary sequence as a CCSK sequence has higher performance than that with a random sequence.