• Title/Summary/Keyword: Access point

Search Result 1,252, Processing Time 0.033 seconds

Variable RCH Channel Assignment Scheme in HiperLAN/2 System (HiperLAN/2 시스템에서 가변적인 RCH 채널 할당방안)

  • Jang, soon-gun;Jang, jae-hwan;Lim, seog-ku
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.83-87
    • /
    • 2009
  • The MAC protocol of HiperLAN/2 is based on TDMA/TDD. Mobile terminal acquires a data transmission opportunity as successfulness in channel competition through RCH (Random CHannel) phase. Therefore, AP (Access Point) be able to dynamically assign optimum RCH at next frame according to the number of success and collision. In this paper, we suggest scheme that fluctuate RCH (Random CHannel) number as fixed value considering success and collision for improvement of performance in HiperLAN/2. To prove efficiency of proposed scheme, a lots of simulations are conducted and analyzed in view of throughput and access delay.

  • PDF

Requirements Analysis for Access Control Model on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 접근제어 모델을 위한 요구사항 분석)

  • Oh Sejong;Park Jeho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.563-570
    • /
    • 2004
  • Ubiquitous computing environment requires strong security and privacy. Access control is one of security areas. Access control on Ubiquitous computing is different from it on traditional information systems so that traditional access control models are not suitable for Ubiquitous comput-ing environment. This research defines Ubiquitous computing environment as an access control point of view, and shows requirements to consid-er for developing access control model for Ubiquitous computing environment. It also brings up three implementing types of access control on Ubiquitous computing environment.

On the Interference of Ultra Wide Band Systems on Point to Point Links and Fixed Wireless Access Systems

  • Giuliano, Romeo;Guidoni, Gianluca;Mazzenga, Franco
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.163-172
    • /
    • 2004
  • Ultra Wide Bandwidth (UWB) spread-spectrum techniques will playa key role in short range wireless connectivity supporting high bit rates availability and low power consumption. UWB can be used in the design of wireless local and personal area networks providing advanced integrated multimedia services to nomadic users within hot-spot areas. Thus the assessment of the possible interference caused by UWB devices on already existing narrowband and wideband systems is fundamental to ensure nonconflicting coexistence and, therefore, to guarantee acceptance of UWB technology worldwide. In this paper, we study the coexistence issues between an indoor UWB-based system (hot-spot) and outdoor point to point (PP) links and Fixed Wireless Access (FWA) systems operating in the 3.5 - 5.0 GHz frequency range. We consider a realistic UWB master/slave system architecture and we show through computer simulation, that in all practical cases UWB system can coexist with PP and FWA without causing any dangerous interference.

Transmit Power Control for Multi-Access Points Environment (다수 개의 엑세스 포인트 환경에서 전송전력 제어)

  • Oh, Changyoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.2
    • /
    • pp.49-56
    • /
    • 2020
  • We investigate the transmit power control algorithm for multi-access points environment. Each terminal may transmit a signal to one of these access points. Each access point may receive a signal from desired terminals as well as interference from neighbor terminals. In this paper, a transmit power control algorithm is developed such that the total transmit power is minimized, while each terminal meets the target signal to interference ratio (SIR) requirement. In particular, the effect of increasing the number of access-points on the total transmit power consumption is analyzed. Based on this analysis, we propose a convergence guaranteed power control algorithm. We prove that the proposed iterative algorithm always converges to the target SIR. In addition, we show that the proposed algorithm optimizes the transmit power level. Simulation results show that the proposed algorithm guarantees convergence regardless of the number of access points. We also observed that increasing the number of access points reduces the total transmit power consumption.

The Access Point Placement Optimization of Wireless LAN in Indoor Environment (실내 환경에서 무선 LAN Access Point의 위치 설정 최적화)

  • Lim, Guk-Chan;Kang, Hun;Choi, Sung-Hoon;Lee, Hyon-Soo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.9
    • /
    • pp.1-11
    • /
    • 2002
  • The optimal AP placement for wireless LAN is important factor for improving service quality and reducing cost. Decision of AP placement is depend on radio signal strength, environment factor and logical area property, which is user's frequently posed place. This paper proposes optimal multiple AP placement method based on radio prediction tool. The proposed method can get flexibility in multiple AP placement using user defined parameter and the optimization design uses Hopfield network algorithm. And path-loss model is used for one of radion prediction model. The result of simulation shows that it is efficiently reduces the process to find optimal AP placement. And the proposed optimization design of multiple AP placement can improve service quality for wireless LAN.

Design and Implementation of 2.4/5 GHz Dual-Band Plate Type Antenna for Access Point of Wireless LAN (2.4/5 GHz 무선 LAN 액세스 포민트용 이중 공진 판형 안테나 설계 및 구현)

  • Lee Won-Kew;Son Ji-Myoung;Han Jun-Hee;Yang Woon-Geun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.5 s.108
    • /
    • pp.401-407
    • /
    • 2006
  • In this paper, we present a small-sized and light weighted dual-band antenna for an access point of 2.4/5 GHz dual-band WLAN(Wireless Local Area Network). The antenna for WLAN should show the characteristic of omni-directional radiation pattern. First, to obtain the omni-directional radiation pattern the proposed dual-band antenna has an orthogonal inverted triangular type element at the center and locates four resonating elements symmetrically around it. Also, for the purpose of easy manufacturing and miniaturization of the antenna, we changed the central element which had the orthogonal inverted triangular type structure into the plate type. Measured $S_{11}$ for the proposed dual-band plate type antenna showed characteristic which was less then -12.8 dB for WLAN frequency bands. Measured results for the maximum gain showed 3.17 dBi at 2.44 GHz, 5.38 dBi at 5.77 GHz with omni-directional radiation pattern. The implemented antennas showed applicable performances for the access point of WLAN.

Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment (무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안)

  • Song, Il-Gyu;Hong, Choong-Seon;Lee, Dae-Young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.219-228
    • /
    • 2004
  • Wireless LAN(wireless Local Area Network) is constructed network environment by radio in indoors or outdoors environment and that to use electric wave or light instead of wire to client such as PC(Personal Computer), notebook, PDA in hub(Hub) in technological side. Now, among IEEE 802.11 WG(Working Group), there is TGf(Task Group F) that develop standard protocol between AP's(Access Point). In this group, proposed IAPP(Inter Access Point Protocol) to secure interoperability between AP producing in different manufacturer, this offers seamless connectivity between STA by sharing Security Context information or Layer 2 forwarding information between AP without passing through re-authentication process when STAs(Station) move by protocol to secure mobility between AP that differ in equal serve network. In this paper, I wish to suggest method that change avenue of communication of message to block information leakage that can occur at security message or WEP Key transmission between above AP, and uses public key to offer wireless area security little more.

Development of Bluetooth Protocol Stack on Embedded System (임베디드 시스템 상에서 블루투스 프로토콜 스택 개발)

  • Lee, Sang-Hak;Chung, Tae-Choong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.2
    • /
    • pp.123-128
    • /
    • 2004
  • Recent advancement in RF technology and wireless communications has enabled the development of noble networks. Bluetooth that can be used in various application field is a kind of WPAN(Wireless Personal Area Network) standard that is widely known. Bluetooth enables voice and data applications to operate simultaneously. Various applications have been implemented based on standard Profiles. In this paper, we describes the development of Biuetooth network AP(Access Point) system for network connection of Bluetooth devices. Unlike headset, mouse, and keyboard, the access point should have capability to support multiple connection and stabilized network throughput. We have designed and developed the hardware system, core stack and profiles on embedded system to comply with standard specification. Our system showed compatibility and good protocol performance through testing with lots of products that is available in market.

Access Point Selection Algorithm for Densely Deployed IEEE 802.11 WLANs (IEEE 802.11 무선랜 환경에서의 AP 선택 알고리즘)

  • Kim, Gyul;Lee, SuKyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.707-713
    • /
    • 2016
  • In the IEEE 802.11 Wireless LAN environment, the common Access Point (AP) selection of the existing terminal is based on signal strength. However, the signal strength-based AP selection method does not ensure an optimal data rate. Recently, several AP selection methods to solve this problem have been suggested. However, when we select AP, these have a latency problem and don't consider dense environments of AP. In this paper, we confirm the problem of the conventional AP selection about the signal strength and the throughput through the actual measurement, and propose algorithm that selects AP by scoring link speed and wireless round trip time to compensate the problem. Furthermore, the proposed AP selection algorithm through the actual experiment proves the improved performance as compared with the existing methods.

Mobile Malicious AP Detection and Cut-off Mechanism based in Authentication Network (인증 네트워크 상의 비 인가된 모바일 AP 탐지 및 차단 기법)

  • Lim, Jae-Wan;Jang, Jong-Deok;Yoon, Chang-Pyo;Ryu, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.55-61
    • /
    • 2012
  • Owing to the development of wireless infrastructure and mobile communication technology, There is growing interest in smart phone using it. The resulting popularity of smart phone has increased the Mobile Malicious AP-related security threat and the access to the wireless AP(Access Point) using Wi-Fi. mobile AP mechanism is the use of a mobile device with Internet access such as 3G cellular service to serve as an Internet gateway or access point for other devices. Within the enterprise, the use of mobile AP mechanism made corporate information management difficult owing to use wireless system that is impossible to wire packet monitoring. In this thesis, we propose mobile AP mechanism-based mobile malicious AP detection and prevention mechanism in radius authentication server network. Detection approach detects mobile AP mechanism-based mobile malicious AP by sniffing the beacon frame and analyzing the difference between an authorized AP and a mobile AP mechanism-based mobile malicious AP detection.