• Title/Summary/Keyword: Access point

Search Result 1,251, Processing Time 0.037 seconds

Implementation of HSDPA-to-WiFi Access Point -HSDPA CPE (HSDPA-to-WiFi Access Point 구현 -HSDPA CPE)

  • Park, Chun-Kwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.167-172
    • /
    • 2010
  • This paper is to implement HSDPA-CPE that can provides WiFi terminal with wireless Internet service through the connection to HSDPA wireless network. This system aims to support HSDPA interface in upstream, and WiFi and 100Mbps Ethernet interface in downstream. So, this system can provide multiple Internet customers with wireless Internet service by using WiFi terminal in subway, car, ship, and so on, and WiFi terminals that be registered in HSDPA service can be connected to Internet.

Dual Band Dipole Antenna with Tapered Microstrip Balun for WLAN Access Point (무선랜 AP(Access Point)용 테이퍼형 마이크로스립 발룬 구조 이중대역 다이폴 안테나)

  • Kim, Joung-Myoun;Kim, Jeong-Li;Yun, Je-Hoon;Kim, Nam
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.219-220
    • /
    • 2006
  • In this paper, we designed and implemented the Dual Band Dipole Antenna with Tapered Microstrip Balun for WLAN Access Point. Two dipole antennas with different resonant frequency and the antenna structure combined additional line were implemented for dual band performance. In order to feed the balun current, the tapered microstrip balun was used. Produced the Dual Band Antenna shows a special quality. The quality is that all VSWR is less than 1.5 in the 2.4GHz and 5GHz frequency bands in 802.11 standards, and it profits not less than 1.7dBi having typical Dipole Antenna pattern the very "a form of 8"pattern and Omni-directional pattern.

  • PDF

Analysis of Radio Wave of Location Estimation of Wireless Access Point (무선 AP 위치 예측을 위한 전파특성 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.6
    • /
    • pp.1653-1658
    • /
    • 2008
  • In this paper, it is analyzed propagation distribution characteristics of radio wave, which is radiated on all sides from Access Point device for estimating scheme of wireless AP without GPS receiver environment. To tracking AP device is traced from wireless terminals and wireless terminal is traced from fixed AP devices, above all it is important to analysis the characteristics of receiving power in according to distance. Therefore in this paper, radio propagation characteristics of 2.4GHz wave is analyzed effect extent and quality in according to distance in doors and out doors, and utilized to location estimation.

Design and Implementation of Image Segmentation Tx/Rx Technology Based On BLE(Bluetooth Low Energy) Multiple Access Technology for Image Block Devices (이미지 블록 디바이스를 위한 BLE 다중 접속기술 기반 이미지 분할 송수신 기술의 설계 및 구현)

  • Kwak, Chang-Sub;Lee, Young-Soon
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.825-837
    • /
    • 2021
  • The Bluetooth Low Energy profile has the advantage of continuing wireless communication with very little power consumption compared to the existing Bluetooth, so it is widely applied to smart devices. Most of them are applied to Point-to-Point (1:1) communication between Central (Master) and Peripheral (Slave), but can be applied to Point-to-Multiple (1:N) wireless communication through the use of multiple threads and timers. Therefore, in this paper, a precise timer was designed in the BLE profile to devise an image segmentation transmission/reception structure based on multiple access, and a smart image block device applied to it was designed and verified.

Defense Tactics Against the Attack of Cloned Access Point in IEEE 802.11 Networks (IEEE 802.11 네트워크에서의 복제된 AP 탐지 공격으로 부터의 방어 대책)

  • Go, Yun Mi;Kim, Jin-Hui;Kwon, Kyuug-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.427-428
    • /
    • 2009
  • 무선 네트워크 환경에서 합법적인 AP(Access Point)의 MAC 주소, SSID(Service Set Identifier), 채널등의 정보를 이용하여 복제된 AP(Cloned Access Point)를 만들 수 있다. 복제된 AP는 합법적인 AP와 연결되어 있는 무선 스테이션들의 연결 설정을 끊고 자신과 연결 설정을 하게 한다. 무선 스테이션들이 복제된 AP와 통신을 하게 되면서 많은 공격으로부터 노출되게 된다. 본 연구에서는 복제된 AP가 설치되었을 때 무선 스테이션들이 합법적이 AP의 비콘 프레임과 복제된 AP 비콘 프레임의 시퀀스 번호를 이용하여 복제된 AP을 판별하였다. 시뮬레이터 NS-2를 이용하여 실험한 결과 본 논문에서 제안하는 메커니즘을 통해 무선 스테이션들이 복제된 AP의 등장을 판별할 수 있게 되어 보다 안전한 무선랜 환경을 구축할 수 있게 되었다.

Access Point Scanning Mechanism using Accelerometer Sensor and RSSI(Received Signal Strength Indication) (가속도센서와 신호세기를 이용한 Access Point 스캐닝 메커니즘)

  • Lee, Kenwhui;Kim, Kangseok;Hong, Manpyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.581-583
    • /
    • 2011
  • 최근에 급격히 증가한 스마트폰의 사용자들이 이동중에도 안정적인 무선 네트워크를 이용하기 위해서는 핸드오프는 반드시 필요하다. 핸드오프를 위하여 기존에 연결되어 있는 AP(Access Point)와의 연결을 끊고 주변의 AP 를 스캐닝한 후 새로운 AP 로 재연결을 하는 과정을 거치게 된다. 이러한 과정 중에 본 논문에서는 스캐닝 단계에서 발생하는 문제점을 분석하고 이에 대한 개선방안으로 AP 의 신호세기와 스마트폰의 센서를 이용하여 사용자의 이동성을 고려하는 스캐닝 방식을 제안한다.

A Study on Developing a Name Access Point Control System to Improve the Performance of Information Retrieval from Institutional Repositories (기관 리포지터리의 검색기능 향상을 위한 인명 접근점제어 시스템 구축 연구)

  • Kim, Mi-Hyang;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.3
    • /
    • pp.125-146
    • /
    • 2010
  • This study developed a name access point control system for better performance of information retrieval from institutional repositories, which are equipped with authorgenerated metadata processes for self-archiving. In developing name access point control data for the system, the primary data were created from the existing authority. However, unlike the existing authority data, the primary data did not use any authority forms. Instead, the data utilized all the forms provided by the resources as access points. Specifically, field of activity(subject) and title information on authorship were used to distinguish between persons who have the same name. The result showed that the system improved the performance of the information retrieval. The system has been also expected to be utilized over other metadata provided by libraries, in addition to the institutional repositories, in order to provide better quality information.

A Study on the Construction of Work and Expression Authority Records (저작 및 표현형 전거레코드 구축방안에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.71-94
    • /
    • 2016
  • This study was to suggest the construction of work and expression authority records for FRBRization. ICP, FRBR/FRAD and RDA as the content rules were referred as the framework for the construction of work and expression authority records. LC RDA authority records examples, JSC of RDA authority examples, and VIAF work and expression authority records were analyzed as case studies. 5 findings were suggested. First, authority records consist of name, work, and expression authority records which are inter-related. Second, the construction of authorized access points was suggested according to 5 work types. Third, the consideration in describing work attributes as separate element and as part of an authorized access point, and other distinguishing characteristic of the work were suggested. Fourth, the consideration in describing expression attributes as separate element and as part of an authorized access point, and other distinguishing characteristic of the expression were suggested. Fifth, 5XX was suggested for linking between work and expression. This study would contribute to revise KCR4.

Secure Host Mobility in the Mobile IPv6 Network (MIPv6망에서 안전한 호스트 이동성 지원 방안)

  • Kim, Jung-Ju;Hong, Sug-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.82-85
    • /
    • 2005
  • In the MIPv6 network, when mobile nodes move into new newtwork, they need to find the new access router and points(AR/AP) for the newtwork. Unless they are not connected to authorized AR/APs, they can be exposed to a lot of attacks. In this paper we propose a protocol to authenticate AR/AR and MN each other. This protocol is based on the public key scheme which is used in the SEcure Neighbor Discovery(SEND) protocol.

  • PDF

PON : technical trends and prospects (PON 기술동향 및 발전전망)

  • Park Hyung-Jin;Kim Jin-Gwon;Kim Jin-Hee;Yoo Gun-Il
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2002.08a
    • /
    • pp.105-109
    • /
    • 2002
  • 초고속 인터넷 서비스가 널리 보급된 상황에서 서비스 품질과 콘텐츠의 사용 대역 증가 현상이 날로 가속화되고 있다. 이에 따라 전송속도가 거리에 제한받지 않는 광통신 기술이 품질과 대역 조건을 만족시키는 가입자 액세스망 기술로 각광 받고 있다. 현재는 점대점(point-to-Point) 광통신 기술을 이용한 광 대역서비스가 제공되고 있으나, 밀집 지역과 분산 지역 그리고 음영 지역의 각 가입자 단까지 고가의 광선로를 포설해야 하는 경제적 부담을 주고 있다. PON(Passive Optical Network) 기술은 점대점 광통신 기술에서 제기되는 경제적 비효율성을 극복하고, 더 나아가 FTTC, FTTB에서 FTTH로의 진화를 용이하게 하는 점대다점(point-to-multipoint) 광통신 기술이다. PON 기술은 ATM 기반의 B-PON(Broadband-PON) 방식과, Ethernet 기반의 E-PON(Ethernet-PON) 방식이 현재 상용화 단계에 있으며, 이 방식들은 상하향 데이터 전송을 위해 단일 파장을 사용하고 있다. 본 논문에서는 PON 기술동향 및 발전전망에 대해 알아보고, B-PON 및 E-PON 기술 분석한 뒤, 국내 환경에 가장 적합한 서비스 제공 방안을 제안하고자 한다.

  • PDF