• Title/Summary/Keyword: Device Network

Search Result 2,401, Processing Time 0.034 seconds

Packet Delay and Loss Analysis of Traffic with Delay Priority in a DBA Scheme of an EPON (EPON의 DBA방안에서 지연 우선순위를 갖는 트래픽의 재킷 손실률과 지연 성능 분석)

  • Park Chul-Geun;Shim Se-Yong;Jung Ho-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8B
    • /
    • pp.507-513
    • /
    • 2005
  • As the rapid increasement of the number of internet users has occured recently, many multimedia application services have been emerging. To improve quality of service, traffic can be suggested to be classified with priority in EPON(Ethernet Passive Optical Network), which is supporting the multimedia application services. In this paper, multimedia application services treat bandwidth classifying device in serving both delay sensitive traffic for real-time audio, video and voice data such as Von(Voice over Internet Protocol), and for real-time traffic such as BE(Best Effort). With looking through existing mechanisms, new mechanism to improve the quality will be suggested. The delay performances and packet losses of traffic achieved by supporting bandwidth allocation of upstream traffic in suggested mechanism will be analized with simulations.

An Optical Fiber Perimeter Guard System Using OTDRs (OTDR을 이용한 광섬유 외곽경비시스템에 관한 연구)

  • Chang, Jin-Hyeon;Lee, Yong-Cheol;Shin, Dong-Ho;Oh, Sang-Gun;Lee, Jong-Youn;Jung, Jin-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1236-1243
    • /
    • 2010
  • The perimeter defense system was created and its characteristics were evaluated. It was designed to utilize the fiber sensing device, namely OTDR(Optical Time Domain Reflectometer) which has been used for the maintenance of the optical communication network. An OTDR was constituted by a pulse laser with the nature of 1310nm, +15dBm for the observation of 400 meter optical fence. The high-speed 32-bit processor(S3C2440) has applied to MPU(Main Processor Unit) which helps to improve the performance of OTDR algorithms. Consequently, the maximum error was 0.84 meter on the performance test of the 10km monitoring and the pass criteria of ${\pm}1m$ satisfied in all the sections. The alarm delay time was under 3 sec after detecting the disorder. For the case of secondary trespassing after primary trespassing, the optical switch was installed in OTDR to monitor the secondary trespassing and to measure the multi-point detection. Therefore, this paper shows that the detections of secondary trespassing and multi-point is possible by means of optical switch.

A Study on the 4-bit Microwave Phase Shiftter with PIN Diode (PIN 다이오드를 이용한 초고주파 4-비트 위상기에 관한 연구)

  • Cho, Young-Song;Kweon, Heag-Joong;Lee, Young-Chul;Shin, Chull-Chai
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.27 no.2
    • /
    • pp.47-54
    • /
    • 1990
  • In this paper, we design the 4-bit phase shifter which have $22.5^{\circ},45^{\circ},90^{\circ}$ and $180^{\circ}$ phase shift by applying the loaded line and switched network phase shifter. Its phase shift is variable with changing of the stub and passive device parameters. The experiments show the 6.5 dB average insertion loss and $10^{\circ}$ average phase error at center frequency, 6GHz. The results of experiment agree well with the theories except $180^{\circ}$ phase shifter.

  • PDF

A study on prioritizing the application areas for business development of IoT(Internet of Things) (사물 인터넷의 사업화 영역에 대한 우선순위 선정에 관한 연구)

  • Moon, Tae Hee;Kim, Taehoon;Ahn, Hyunchul
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.183-195
    • /
    • 2014
  • This study aims at identifying and prioritizing the application areas for business development of IoT(Internet of Things). In specific, we collected the opinions of the experts on IoT in Korea through the survey based on pairwise comparison, and then we analyzed them using AHP(analytic hierarchy process). As a result, we found that 'Public Safety & Security', 'Automotive & Transportation', and 'Utility & Energy' are the most promising area in realizing IoT-related businesses. Also, we found that the experts had different views according to the positions of their industry in IoT value chain. The analysis showed that the device industry prioritizes 'Public Safety & Security', whereas the network industry does 'Automotive & Transportation'. The experts from the service industry were found to regard 'Utility and Energy' as the most promising commercialization area of IoT.

A Method to Manage Local Storage Capacity Using Data Locality Mechanism (데이터 지역성 메커니즘을 이용한 지역 스토리지 용량 관리 방법)

  • Kim, Baul;Ku, Mino;Min, Dugki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.324-327
    • /
    • 2013
  • Recently, due to evolving cloud computing technology, we can easily and transparently utilize both local computing resource and remote computing resource in real life. Especially, enhancing smart device technologies and network infrastructures promote an increase of needs to share files between local smart devices and cloud storages. However, since smart devices have a limited storage space, storing files on cloud storage causes a starvation problem of local storage. It means that users can face a storage-lack problem even a cloud storage service provide a huge file storing space. In this research, we propose a method to manage files between smart devices and cloud storages. Our approach calculate file usage pattern based on recently used date, and then this approach determines local files being migrated. As a result, our approach is sufficient for handling data synchronization between big data storage farm and local thin client which contains limited storage space.

  • PDF

Performance Enhancement Technique in Visible Light Communication System for Smart Building (스마트 빌딩을 위한 가시광 통신 시스템의 성능 향상 기법)

  • Seo, Sung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.39-43
    • /
    • 2020
  • In this paper, we propose the multi-channel interference cancellation algorithm for visible light communication (VLC) in smart building. The VLC system is communication technology using visible rays that come out in Light Emitting Diode (LED) device. It has energy curtailment effect and possible to use in ubiquitous network service applications. When a large number of users communicate indoors, the performance can be reduced due to channel interference. To remove interference, at the first, the minimum mean square error (MMSE) scheme as interference cancellation methods used, and then the successive interference cancellation (SIC) is applied to obtain additional diversity gain and improve interference cancellation performance. Indoor VLC channel model is employed. The performance is evaluated in terms of bit error rate (BER). From the simulation results, it is confirmed that the proposed scheme has better BER performance compared to the previous systems. As a result, the proposed interference cancellation improves the signal quality of VLC systems by effectively removing the channel noise. The results of the paper can be applied to VLC for smart building and general communication systems.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

High Efficiency Magnetic Resonance Wireless Power Transfer System and Battery Charging Chip (자기 공진 방식의 고효율 무선 전력 전송 시스템 및 배터리 충전 칩)

  • Youn, Jin Hwan;Park, Seong Yeol;Choi, Jun Rim
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.6
    • /
    • pp.43-49
    • /
    • 2015
  • In this paper, we propose enhanced wireless power transfer system based on magnetic resonance for portable electronic device charging. Resonators were designed and fabricated for efficiency improvement and miniaturization through electromagnetism simulation using HFSS(High Frequency Structure Simulator). Impedance matching network is employed to minimize reflections that is caused by difference between input impedance and output impedance. Receiver IC that consist of rectifier and Low Drop Out(LDO) regulator were designed and fabricated to reduce power loss. This chip is implemented in $0.35{\mu}m$ BCD technology. A maximum overall efficiency of 73.8% is determined for the system through experimental verification.

WIVA : WSN Monitoring Framework based on 3D Visualization and Augmented Reality in Mobile Devices (모바일 기기의 3차원 시각화와 증강현실에 기반한 센서네트워크 모니터링 프레임워크)

  • Koo, Bon-Hyun;Choi, Hyo-Hyun;Shon, Tae-Shik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.106-113
    • /
    • 2009
  • Recently, due to many industrial accidents at construction sites, a variety of researches for structural health monitoring (SHM) of buildings are progressing. For real site application of SHM, one of the advanced technologies has blown as wireless sensor networks (WSN). In this paper, we proposed WIVA(WSN Monitoring framework based on 3D Visualization and Augmented Reality in Mobile Devices) system that applies 3D visualization and AR technology to mobile devices with camera based on WSN in order to expand the extent of information can observe. Moreover, we performed experiments to validate effectiveness in 3D and AR mode that utilize WSN data based on IEEE 802.15.4. In real implementation scenario, we demonstrated a fire occurrence test in 3-story building miniature.

The Design and Implementation of a Chatting System Sharing Paths (경로 공유 채팅 시스템의 설계 및 구현)

  • Kim, Dong-Hyun;Lee, Han-Bin;Ban, Chae-Hoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.281-286
    • /
    • 2017
  • SNS is a platformwhere users build a social relationship and share opinions and informations. To do these, it supports a text, an image and a video data. As it is possible to exploit the location data of a smart device, SNS tries to use the location data. However,since SNS does not support the coordinate data, it provides the restricted function sharing the image map instead of the vector map. In this paper, we propose a chatting systemsharing pathsto support the coordinate data on a classical SNS. On the proposed system, it is possible for usersjoined in a roomto watch a vector map of same area and exchange texts. If a user builds a path on the map, the system propagates the coordinate data of the generated path and the other users joined in the room watch the path immediately. The implemented chatting systemhasthe benefit to share the information related a map between users using coordinate data.