• Title/Summary/Keyword: Access node

Search Result 672, Processing Time 0.022 seconds

ATM Interface Technologies for an ATM Switching System

  • Park, Hong-Shik;Kwon, Yool;Kim, Young-Sup;Kang, Seok-Youl
    • ETRI Journal
    • /
    • v.18 no.4
    • /
    • pp.229-244
    • /
    • 1997
  • Realization of the economical, reliable, and efficient ATM interface block becomes an important key to development of the ATM switching system when we consider new issues raised recently. In this paper, we summarize requirements for the ATM interface block and present the UNI (User Network Interface)/NNI (Network Node Interface) architecture to meet these requirements. We also evaluate the performance of the multiplexer adopting the various multiplexing schemes and service disciplines. For ATM UNI/NNI interface technologies, we have developed a new policing device using the priority encoding scheme. It can reduce the decision time for policing significantly. We have also designed a new spacer that can space out the clumped cell stream almost perfectly. This algorithm guarantees more than 99 % conformance to the negotiated peak cell rate. Finally, we propose the interface architecture for accommodation of the ABR (Available Bit Rate) transfer capability. The proposed structure that performs virtual source and virtual destination functions as well as a switch algorithm can efficiently accommodate the ABR service.

  • PDF

An Authorization Technique for an XML Document (XML 문서를 위한 권한 부여 기법)

  • Kang, Jung-Mo;Lee, Heon-Gil
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.181-188
    • /
    • 2001
  • An XML is an markup language which has been focused on the next generation Web programming language. It easily represents the complex structure of a document, and it is possible to provide the access control over each component of an XML document. An implicit authorization technique means that granting an authorization to a node has effect on granting the same implicit authorization to its all descendants. Therefore, it enhances the time for the authorization grant and reduces the memory required for the authorization information. An authorization technique using an intention type and a authorization replacement solves a redundancy problem and decides whether the access is possible or the authorization conflict occurs at the first attempt.

  • PDF

Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks (WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석)

  • Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.

Study on the Job Execution Time of Mobile Cloud Computing (모바일 클라우드 컴퓨팅의 작업 실행 시간에 대한 연구)

  • Jung, Sung Min;Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.99-105
    • /
    • 2012
  • Given the numbers of smartphones, tablets and other mobile devices shipped every day, more and more users are relying on the cloud as the main driver for satisfying their computing needs, whether it is data storage, applications or infrastructure. Mobile cloud computing is simply cloud computing in which at least some of the devices involved are mobile. Each node is owned by a different user and is likely to be mobile. Using mobile hardware for cloud computing has advantages over using traditional hardware. These advantage include computational access to multimedia and sensor data without the need for large network transfer, more efficient access to data stored on other mobile devices and distributed ownership and maintenance of hardware. It is important to predict job execution time in mobile cloud computing because there are many mobile nodes with different capabilities. This paper analyzes the job execution time for mobile cloud computing in terms of network environment and heterogeneous mobile nodes using a mathematical model.

A Study on GIS Metwork Security (지리공간 유통망 보안 방안에 관한 연구)

  • Kim, Ji-Hong;Lim, Gi-Uk
    • Journal of Korea Spatial Information System Society
    • /
    • v.3 no.2 s.6
    • /
    • pp.53-61
    • /
    • 2001
  • The GIS Network consists of the Clearinghouse Network Gateway and Clearinghouse Node and Geo-spatial Data Server. Recently with the development of Information and Network technologies, GIS Network should be needed to be more secure than ever. In this paper, we proposed the effective access control method for the distributed GIS network. PKI (Public Key Infrastructure) Technologies are used for access control and security for transmission on Geo-spatial data

  • PDF

Coverage Control for Fast Consensus in Distributed Wireless Networks (분산 무선 네트워크에서 빠른 컨센서스를 위한 커버리지 제어)

  • Choi, Hyun-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.323-325
    • /
    • 2014
  • The consensus algorithm has a faster convergence speed as the number of cooperating neighbors increases, but the information sharing delay in the wireless network increases due to access collisions as the number of cooperating neighbors increases. Therefore, there exists a tradeoff between these two performances according to node's coverage. In this paper, we present a method of coverage control that minimizes consensus time according to network scale.

On the Comparison of Call Overload Control Methodologies in ATM Networks (ATM 통신망에서의 호 과부하 제어방식 비교)

  • Song, Ki-Sang;Lee, Jean
    • IE interfaces
    • /
    • v.9 no.3
    • /
    • pp.168-179
    • /
    • 1996
  • Automatic repeated recalling from individual computing equipments such as PC and workstations, to access ATM networks may result in call overload to networks. Call overload causes to waste network resources and fail to meet user call processing QoS requirements. We evaluate two call connection request methods: the back-off recall method(BRM) which makes recall with random waiting time after rejection, and the direct recall method(DRM) which repeats call connection request whenever call request is rejected. We evaluate their performances by simulation and it shows that as the total number of attached terminals to each access node increases, BRM performs better than DRM in terms of the call acceptance level and effective network bandwidth utilization.

  • PDF

SN-Protected Network Entry Process for IEEE 802.16 Mesh Network (IEEE 802.16 메쉬 네트워크에서의 SN-Protected 네트워크 엔트리 프로세스)

  • Lixiang, Lin;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.875-887
    • /
    • 2010
  • The workgroup of IEEE 802 proposed the IEEE 802.16 standard, also known as WiMAX, to provide broadband wireless access (BWA). The standard specifies two operational modes, one is popular PMP mode, and the other is optional mesh mode. In the mesh mode, the network entry process-NetEntry is the pivotal procedure for mesh network topology formulation and thus, influences the accessibility of whole mesh network. Unfortunately, the NetEntry process suffers from the hidden neighbor problem, in which new neighborship emerges after a new node comes in and results in possible collisions. In this paper, we propose a new SN-protected NetEntry process to address the problem. Simulation results show that the new proposed NetEntry process is more stable compared with the standard-based NetEntry process.

A delay analysis of multi-access protocol under wireless network (무선환경하에서 Slotted ALOHA 방식의 다중채널 경쟁에 대한 지연시간분석)

  • Hur Sun;Kim Jeong-Kee;Nam Jin-Gyu
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.1
    • /
    • pp.129-133
    • /
    • 2005
  • Slotted ALOHA(S-ALOHA) is widely used in local wireless network. We analyze the performance of contention-based model in wireless LAN using S-ALOHA protocol. We analyze the performance of binary exponential backoff (BEB) algorithm under the slotted ALOHA protocol: whenever a node's message which tries to reserve a channel is involved in a collision for the ith time, it chooses one of the next $2^i$ frames with equal probability and attempts the reservation again. We derive the expected access delay and throughput which is defined as the expected number of messages that reserve a channel in a frame. A simulation study is performed to verify our method.

An Efficient Micro Mobility Support Scheme using PIM-SM in IPv6 Network (IPv6망에서의 PIM-SM을 이용한 마이크로 이동성 제공 방안)

  • 유연주;우미애
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.275-278
    • /
    • 2002
  • This paper proposes an efficient micro mobility scheme to support user mobility inside an access network which employs Ipv6. The proposed scheme, namely SMM(Sparse-mode Multicast for mobility), utilizes a class of multicast protocol, PIM-SM, in the visited access network to reduce signaling to the home agent as well as to the correspondent node and to minimize packet loss during the handoff when mobile user changes its point of attachment frequently. Through the simulation, the performance of the proposed SMM is analyzed and compared with those of Mobile nv6 and for the case which adpots PIM-DM. The result shows that SMM provides significantly better performance in terms of packet loss that is invariant to transmission rate and packet size.

  • PDF