• Title/Summary/Keyword: Access point

Search Result 1,260, Processing Time 0.021 seconds

A Tabu Search Algorithm for Network Design Problem in Wireless Mesh Networks (무선 메쉬 네트워크에서 네트워크 설계 문제를 위한 타부 서치 알고리즘)

  • Jang, Kil-woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.778-785
    • /
    • 2020
  • Wireless mesh networks consist of mesh clients, mesh routers and mesh access points. The mesh router connects wireless network services to the mesh client, and the mesh access point connects to the backbone network using a wired link and provides Internet access to the mesh client. In this paper, a limited number of mesh routers and mesh access points are used to propose optimization algorithms for network design for wireless mesh networks. The optimization algorithm in this paper has been applied with a sub-subscription algorithm, which is one of the meta-heuristic methods, and is designed to minimize the transmission delay for the placement of mesh routers and mesh access points, and produce optimal results within a reasonable time. The proposed algorithm was evaluated in terms of transmission delay and time to perform the algorithm for the placement of mesh routers and mesh access points, and the performance evaluation results showed superior performance compared to the previous meta-heuristic methods.

Analysis of abnormal traffic controller based on prediction to improve network service survivability (네트워크 서비스의 생존성을 높이기 위한 예측기반 이상 트래픽 제어 방식 분석)

  • Kim Kwang sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4C
    • /
    • pp.296-304
    • /
    • 2005
  • ATCoP(Abnormal traffic controller based on prediction) is presented to securely support reliable Internet service and to guarantee network survivability, which is deployed in Internet access point. ATCoP is a method to control abnormal traffic that is entering into the network When unknown attack generates excessive traffic, service survivability is guaranteed by giving the priority to normal traffic than abnormal traffic, that is reserving some channels for normal traffic. If the reserved channel number increases, abnormal traffic has lower quality service by ATCoP system and then its service survivability becomes worse. As an analytic result, the proposed scheme maintains the blocking probability of normal traffic on the predefined level in the specific interval of input traffic.

The VoIP Capacity Analysis of 802.11 WLANS with Propagation Errors (전파 오류가 빈번한 802.11 무선 랜에서의 VoIP 용량 분석)

  • Jung, Nak-Cheon;Ahn, Jong-Suk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.101-105
    • /
    • 2008
  • This paper proposes an analytical model to calculate VoIP (Voice of IP) capacity over wireless LANs with frequent bit errors. Since the traditional analytical models for VoIP capacity have not included the effect of bit errors, simulations ould only evaluate VoIP capacity over erroneous channels. For analytically accurate estimation of VoIP capacity over noisy channels, we extend the conventional model to include the effect of propagation errors, end-to-end delay, voice quality, the waiting time in AP(Access Point). The experiments show that our model predicts the VoIP capacity of a given network within the range from 3% to 9% difference comparing with the simulation results.

Implementation of WiFi-to-WiBro Access Point -WiMAX CPE (WiFi-to-WiBro Access Point 구현 -WiMAX CPE)

  • Park, Chun-Kwan;Song, Han-Young;Jeon, Byung-Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.53-63
    • /
    • 2009
  • This paper is to develop WiMAX CPE(wireless AP) that can provides Wi-Fi terminal with wireless Internet service by connecting to Wibro wireless network. This AP aims to support WiBro in upstream interface basically, and Wi-Fi and 100M Ethernet interface in downstream. So, we has developed the equipment for business that wireless ISP can provide many Internet customers with wireless Internet service by using Wi-Fi terminal in subway, car, ship, and so on, and the equipment for users that a user can purchase and then install in person. For the latter, multiple Wi-Fi terminals that be registered in WiBro service can be connected to Internet simultaneously.

  • PDF

Novel Synchronization Scheme for Ubiquitous Home Network Systems (유비쿼터스 홈 네트워크 시스템을 위한 동기화 기법)

  • Kim, Yoon Hyun;Lee, Sung Hun;Hwang, Yu Min;Shin, Dong Soo;Rho, Jung Kyu;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.3
    • /
    • pp.80-85
    • /
    • 2014
  • In this paper, we propose and analyze a novel synchronization scheme for ubiquitous home network system. In ubiquitous home network system, synchronization method is very important because many consumer electronic devices send the data simultaneously to each other through infrastructure such as access point. We employ digital watermarking sequence to improve synchronization performance without system overhead. The performance of proposed scheme is analyzed in terms of correlation performance. The results of the paper can be applied to design of various applications for ubiquitous home network systems.

On Development of the GIS Application Based on Satellite Images (위성영상을 기반으로 한 GIS 응용 시스템 개발)

  • 양인태;최영재
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.1
    • /
    • pp.1-9
    • /
    • 2004
  • Until comparatively lately the use of vector data is the main current in GIS fields. Vector data have many advantages such as easy of scale change, small data volume and so on. But it also has some weak point that can't apply real world. The other hand the satellite images have strong point that can apply real world actually. Recently rapid progress of computer capacity and processing velocity is the current trend of the times. Therefore in this study I intend to develop GIS application based on satellite images with vector data and raster data altogether. This system is developed by using Visual C++ in the personal computer and MS Access's MDB far database management. The LANDSAT, KOMPSAT and IKONOS satellite image database were used in this study. Also, we are studied to set up scale for screen display according to spatial resolution.

Development of WLAN AP based on IBM 405GP (IBM PowerPC 405GP를 이용한 Wireless LAN Access Point 개발에 관한 연구)

  • Kim Do-Gyu
    • The Journal of Information Technology
    • /
    • v.6 no.3
    • /
    • pp.65-73
    • /
    • 2003
  • The evaluation AP embedded Linux board is implemented. The board is made of IBM 405 GP processor, PPCBoot-1.2.1 boot loader, Linux-2.4.21 kernel and root file system. The evaluation board has two flash memories, boot flash and application flash of size 512Kbyte and 16Mbyte, respectively. And it supports IEEE 802.11a which provide the maximum throughput of 54Mbps in the 5.2GHz frequency band. MTD(Memory Technology Device) and JFFS2(Journalling Flash File System version 2) technologies are adopted to optimally package the system software, boot loader, kernel and root file system. And in order to optimize root file system, busybox package and tiny login are used. Linux kernel and root file system is combined together with mkimage utility.

  • PDF

Fast and Secure 2-Way Handshake Mechanism using Sequence Number in Wireless LAN (순번을 이용한 고속의 안전한 무선 랜 2-Way 핸드쉐이크 기법)

  • Lim, Jeong-Mi
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1323-1332
    • /
    • 2009
  • In this paper, we analyze security weakness of 4-Way Handshake in IEEE 802.11i and propose fast and secure 2-Way Handshake mechanism. Compute PTK(Pairwise Transient Key) using sequence number instead of random numbers in order to protect Replay attack and DoS attack. Also, proposed 2-Way Handshake mechanism can mutual authenticate between mobile station and access point and derive PTK using modified Re-association Request and Re-association Response frames. And, compare with others which are fast and secure Handoff mechanisms.

  • PDF

Performance Improvement of the Smart Antenna Placed in Wi-Fi Access Point (와이파이AP 용 FFT 전단 스마트안테나의 성능 개선)

  • Hong, Young-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.5
    • /
    • pp.2437-2442
    • /
    • 2013
  • OFDM Wi-Fi AP is susceptible to the co-channel interference. As a countermeasure, the insertion of a smart has been addressed. Despite of the guaranteed efficiency, the complexity of the post-FFT algorithm often keeps itself from being selected as the countermeasure. Instead, simply constructed pre-FFT smart antenna of which the algorithm is based on the received signal covariance matrix is commonly used and the mathematical modeling of it has been deployed. Computer simulations evaluating the improved BER characteristics of the proposed pre-FFT using the covariance matrix of channel estimator output have been carried out. It has been demonstrated that channel matrix output based smart antenna is superior to that using received signal covariance matrix.

Distribution Method of BLE Fingerprinting for Large Scale Indoor Envirement (광범위 분산처리 기반 BLE 핑거프린팅 실내 측위 기법)

  • Lee, Dohee;Son, Bong-Ki;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.373-378
    • /
    • 2016
  • Recently, IPS(Indoor Positioning System) Technology has been progressing study and research, It has been studied in the fingerprinting and trilateration continuously. however because Fingerprinting and Trilateration Technology use AP(Access Point) for Positioning Calculation, Fingerprinting and Trilateration are not never had a credit positioning accuracy by using unstable RSSI in large scale. in this paper, to improve the problem about precise positioning in wide area, we introduced a concept of Sector including Cell. Sectors are not involved in each other and only fingerprinting calculation is proceed in a sector. we suggest this fingerprinting system considering efficiency and accuracy and compared to conventional fingerprinting, we demonstrated our system efficiency by mathematical techniques.