• Title/Summary/Keyword: Access point

Search Result 1,259, Processing Time 0.032 seconds

Efficient Channel Assignment Scheme in HiperLAN/2 WLAN (HiperLAN/2 무선랜에서 효율적인 채널할당방안)

  • Lim, Seog-Ku
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.8
    • /
    • pp.3654-3659
    • /
    • 2011
  • The MAC protocol of HiperLAN/2 is based on TDMA/TDD. The radio channels are assigned by AP(Access Point) that is centrally operated. Mobile terminal that data transmission is necessary to uplink requests radio resource to AP through RCH channels. The changing number of RCHs in each MAC frame is important because too many RCHs may result in a waste of radio resources and too few RCHs may result in many access collisions and prolong time that connect to AP. Therefore, number of RCH should be allocated properly according to traffic. From these viewpoints, this paper proposes an advanced scheme that dynamically changed the number of RCH which is based on the number of success and collision of RR message in previous MAC frame. To prove efficiency of proposed scheme, lots of simulations are conducted and analyzed.

A Log Analysis Study of an Online Catalog User Interface (온라인목록 사용자 인터페이스에 관한 연구 : 탐색실패요인을 중심으로)

  • 유재옥
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.2
    • /
    • pp.139-153
    • /
    • 2000
  • This article focuses on a transaction log analysis of the DISCOVER online catalog user interface at Duksung Women's University Library. The results show that the most preferred access point is the title field with rate of 59.2%. The least used access point is the author field with rate of 11.6%. Keyword searching covers only about 16% of all access points used. General failure rate of searching is 13.9% with the highest failure rate of 19.8% in the subject field and the lowest failure rate of 10.9% in author field.

  • PDF

Dynamic Channel Assignment Scheme Considering Number of Success and Collision in HiperLNA/2 WLAN (HiperLAN/2 무선랜에서 성공과 충돌수를 고려한 동적채널할당 방안)

  • Lim, seog-ku
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.682-686
    • /
    • 2009
  • The MAC protocol of HiperLAN/2 is based on TDMA/TDD. The radio channels are assigned by AP(Access Point) that is centrally operated. Mobile terminal that data transmission is necessary to uplink requests radio resource to AP through RCH channel. The changing number of RCHs in each MAC frame is important because too many RCHs may result in a waste of radio resources and too few RCHs may result in many access collisions and prolong time that connect to AP. Therefore, number of RCH should be allocated properly according to traffic. From these viewpoint, this paper proposes an advanced scheme that dynamically changed the number of RCH which is based on the number of success and collision of RR message in previous MAC frame. To prove efficiency of proposed scheme, a lots of simulations are conducted and analyzed.

  • PDF

Dynamic Channel Assignment Scheme Using Graph Coloring in Femtocell Networks (펨토셀 네트워크에서 그래프 컬러링을 이용한 동적채널할당 방법)

  • Kim, Se-Jin;Cho, IlKwon;Kim, Yi-Kang;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.257-265
    • /
    • 2013
  • In this paper, we proposed a Dynamic Channel Assignment (DCA) scheme called Graph Coloring based DCA (GC-DCA) to improve system performance for downlink femtocell networks with high density femto Access Point (AP) deployments. The proposed scheme consists of two steps: one is a femto AP grouping step considering interference and the other is a DCA step considering Signal to Interference plus Noise Ratio (SINR) for femto User Equipments (UEs). Simulation results show that the proposed GC-DCA outperforms other schemes in terms of the mean femto UE capacity and probability of femto UEs which have capacities less than a given transmit rate.

Scheduling Methods for Multi-User Optical Wireless Asymmetrically-Clipped OFDM

  • Wilson, Sarah Kate;Holliday, Joanne
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.655-663
    • /
    • 2011
  • Diffuse optical wireless (DOW) systems have the advantage that they do not require point-to-point siting so one transmitter can communicate with several receivers. In this paper, we investigate multiple access scheduling methods for downlink orthogonal frequency division multiplexing (OFDM) in diffuse optical wireless networks. Unlike the radio frequency (RF) channel, the DOW channel has low-pass filter characteristics and so requires different scheduling methods than those developed for the RF channel. Multi-user diversity orthogonal frequency division multiple access (OFDMA) systems nominate a cluster of subcarriers with the largest signal-to-noise-ratio for transmission. However, in a DOW channel, most users would choose the lowest frequency clusters of subcarriers. To remedy this problem, we make two proposals. The first is to use a variable cluster size across the subcarriers; the lower frequency clusters will have fewer subcarriers while the higher frequency clusters will have more subcarriers. This will equalize the capacity of the clusters. The second proposal is to randomize a user's cluster selection from a group of clusters satisfying a minimum threshold. Through simulation it is shown that combining these strategies can increase the throughput while ensuring a fair distribution of the available spectrum.

Power Control in RF Energy Harvesting Networks (무선 에너지 하비스팅 네트워크에서의 전력 제어 기법)

  • Hwang, Yu Min;Shin, Dong Soo;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.2
    • /
    • pp.51-55
    • /
    • 2017
  • This paper aims to maximize the energy harvesting rate and channel capacity in RF-energy harvesting networks (RF-EHNs) under the constraints of maximum transmit power and minimum quality of service (QoS) in terms of rate capacity for each user. We study a multi-user RF-EHN with frequency division multiple access (FDMA) in a Rayleigh channel. An access point (AP) simultaneously transmitting wireless information and power in the RF-EHN serves a subset of active users which have a power-splitting antenna. To gauge the network performance, we define energy efficiency (EE) and propose an optimization solution for maximizing EE with Lagrangian dual decomposition theory. In simulation results, we confirm that the EE is effectively maximized by the proposed solution with satisfying the given constraints.

Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning

  • Seo, Jeonghoon;Cho, Chaeho;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.541-556
    • /
    • 2020
  • Wireless networks have become integral to society as they provide mobility and scalability advantages. However, their disadvantage is that they cannot control the media, which makes them vulnerable to various types of attacks. One example of such attacks is the evil twin access point (AP) attack, in which an authorized AP is impersonated by mimicking its service set identifier (SSID) and media access control (MAC) address. Evil twin APs are a major source of deception in wireless networks, facilitating message forgery and eavesdropping. Hence, it is necessary to detect them rapidly. To this end, numerous methods using clock skew have been proposed for evil twin AP detection. However, clock skew is difficult to calculate precisely because wireless networks are vulnerable to noise. This paper proposes an evil twin AP detection method that uses a multiple-feature-based machine learning classification algorithm. The features used in the proposed method are clock skew, channel, received signal strength, and duration. The results of experiments conducted indicate that the proposed method has an evil twin AP detection accuracy of 100% using the random forest algorithm.

Efficient RCH Assignment Scheme in HiperLNA/2 WLAN (HiperLAN/2 무선랜에서 효율적인 RCH 할당방안)

  • Lim, Seog-ku
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.987-990
    • /
    • 2009
  • The MAC protocol of HiperLAN/2 is based on TDMA/TDD. The radio channels are assigned by AP(Access Point) that is centrally operated. Mobile terminal that data transmission is necessary to uplink requests radio resource to AP through RCH channel. The changing number of RCHs in each MAC frame is important because too many RCHs may result in a waste of radio resources and too few RCHs may result in many access collisions and prolong time that connect to AP. Therefore, number of RCH should be allocated properly according to traffic. From these viewpoint, this paper proposes an advanced scheme that dynamically changed the number of RCH which is based on the number of success and collision of RR message in previous MAC frame. To prove efficiency of proposed scheme, a lots of simulations are conducted and analyzed.

  • PDF

Secure Handover Using Inter-Access Point Protocol in Wireless LAN (무선 LAN에서 Inter-Access Point Protocol을 이용한 안전한 핸드오버)

  • DaeHun Nyang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.107-112
    • /
    • 2003
  • Handover in IEEE 802.11 requires repeated authentication and key exchange procedures, which are an obstacle to seamless services of wireless LAM. We propose a fast authentication and key exchange mechanism using IEEE 802.11f. Especially, by proposing a modified version of the 4-way handshake of IEEE 802.11i, we solve the perfect forward secrecy problem that arises when the pre-authentication is adopted. The scheme can be implemented only using the Context Block of IEEE 802.11f and the 4-way handshake of IEEE 802.11i without involving authentications server's interaction or non-standard behavior between access points. Our scheme is applicable to devices not supporting the us-authentication of IEEE 802.11i and also, it can substitute the pre-authentication when the pre-authentication is failed.

A Study on Access Authorization Inference Modes for Information Security of Specialized Private Networks (특성화 사설 네트워크 정보보호를 위한 접근권한 추론모드에 관한 연구)

  • Seo, Woo Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.99-106
    • /
    • 2014
  • The most significant change and trend in the information security market in the year of 2014 is in relation to the issue and incidents of personal information security, which leads the area of information security to a new phase. With the year of 2011 as the turning point, the security technology advanced based on the policies and conditions that combine personal information and information security in the same category. Such technical changes in information security involve various types of information, rapidly changing security policies in response to emerging illegal techniques, and embracing consistent changes in the network configuration accordingly. This study presents the result of standardization and quantification of external access inference by utilizing the measurements to fathom the access authorization performance in advance for information security in specialized networks designed to carry out certain tasks for a group of clients in the easiest and most simple manner. The findings will provide the realistic data available with the access authorization inference modes to control illegal access to the edge of a client network.