• Title/Summary/Keyword: FI

Search Result 1,581, Processing Time 0.03 seconds

Dynamic Power Management Method Considering VBR Video Traffic in Wi-Fi Direct (Wi-Fi Direct에서 VBR 비디오 트래픽을 고려한 동적 에너지 관리 기법)

  • Jin, Mei-Hua;Jung, Ji-Young;Lee, Jung-Ryun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2218-2229
    • /
    • 2015
  • Recently Wi-Fi Alliance defined Wi-Fi direct, which can communicate through a direct connection between the mobile device anytime, anywhere. In Wi-Fi direct, all devices are categorized by group of owner (GO) and client. Since portability is emphasized in Wi-Fi direct devices, it is essential to control the energy consumption of a device very efficiently. In order to avoid unnecessary power consumed by GO, Wi-Fi direct standard defines two power management schemes: Opportunistic power saving scheme and Notice Of Absence (NOA) scheme. But, these two schemes do not consider the traffic pattern, so we cannot expect high energy efficiency. In this paper, we suggest an algorithm to enhance the energy efficiency of Wi-Fi direct power saving, considering the characteristics of multimedia video traffic. Proposed algorithm utilizes the statistical distribution for the size of video frames and adjusts the length of awake interval dynamically. Also, considering the inter-dependency among video frames, the proposed algorithm assigns priorities to video frames and ensures that a video frame with high priority is transmitted with higher probability than other frames with low priority. Simulation results shows that the proposed method outperforms the traditional NOA in terms with average delay and energy efficiency.

A Porting Technique of WiFi Device on Android Platform (안드로이드 플랫폼에 WiFi 디바이스 탑재 기법)

  • Jeong, Uyeong;Ju, Youngkwan;Jeon, Joongnam
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2012
  • Android platform is a powerful operating system developed on Linux 2.6 Kernel, and provides many features such as comprehensive libraries, a multimedia environment, and powerful interface for phone applications. Since Android is an open operating system, which can be installed in any vendors's equipments. Current smartphones as well as netbooks, navigations, car PCs, tablet PCs, Industrial PCs are used in various fields. It is difficult a lot that to mount to other devices on the Android platform or new devices. In this Paper, The process that data that occurred from a hardware was passed to the highest application and Android platform system for managing hardware devices were analyzed. Building Android & driver compilation environment, How to support the protocol for the use of WiFi in the kernel, How to Mount a WiFi device in the kernel, Device driver registration for the Android platform, WiFi Management Service Daemon (wpa_supplicant) and IP allocation services daemon (dhcpcd) registration, How to create a socket for communication between the daemon (wpa_supplicant) and HAL have been presented. In the experiment using the proposed method, WiFi devices were mounted on the Android platform in the X-86 & ARM family. Understanding the whole process of control flow in Android hierarchy is very important to porting a new device on it. The process included in this paper can help technicians who might encounter the obstacles in their porting works.

  • PDF

Channel Searching Method of IEEE 802.15.4 Nodes for Avoiding WiFi Traffic Interference (WiFi 트래픽 간섭을 피하기 위한 IEEE 802.15.4 노드의 채널탐색방법)

  • Song, Myong Lyol
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.19-31
    • /
    • 2014
  • In this paper, a parallel backoff delay procedure on multiple IEEE 802.15.4 channels and a channel searching method considering the frequency spectrum of WiFi traffic are studied for IEEE 802.15.4 nodes to avoid the interference from WiFi traffic. In order to search the channels being occupied by WiFi traffic, we analyzed the methods measuring the powers of adjacent channels simultaneously, checking the duration of measured power levels greater than a threshold, and finding the same periodicity of sampled RSSI data as the beacon frame by signal processing. In an wireless channel overlapped with IEEE 802.11 network, the operation of CSMA-CA algorithm for IEEE 802.15.4 nodes is explained. A method to execute a parallel backoff procedure on multiples IEEE 802.15.4 channels by an IEEE 802.15.4 device is proposed with the description of its algorithm. When we analyze the data measured by the experimental system implemented with the proposed method, it is observed that medium access delay times increase at the same time in the associated IEEE 802.15.4 channels that are adjacent each other during the generation of WiFi traffic. A channel evaluation function to decide the interference from other traffic on an IEEE 802.15.4 channel is defined. A channel searching method considering the channel evaluations on the adjacent channels together is proposed in order to search the IEEE 802.15.4 channels interfered by WiFi, and the experimental results show that it correctly finds the channels interfered by WiFi traffic.

IoT-based Indoor Localization Scheme (IoT 기반의 실내 위치 추정 기법)

  • Kim, Tae-Kook
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.4
    • /
    • pp.35-39
    • /
    • 2016
  • This paper is about IoT(Internet of Things)-based indoor localization scheme. GPS and WiFi are widely used to estimate the location of things. However, GPS has drawback of poor reception and radio disturbance in doors. To estimate the location in WiFi-based method, the user collects the information by scanning nearby WiFi(s) and transferring the information to WiFi database server. This is a fingerprint method with disadvantage of having an additional DB server. IoT is the internetworking of things, and this is on rapid rise. I propose the IoT-based indoor localization scheme. Under the proposed method, a device internetworking with another device with its own location information like GPS coordinate can estimate its own location through RSSI. With more devices localizing its own, the localization accuracy goes high. The proposed method allows the user to estimate the location without GPS and WiFi DB server.

Throughput of Wi-Fi network based on Range-aware Transmission Coverage (가변 전송 커버리지 기반의 Wi-Fi 네트워크에서의 데이터 전송률)

  • Zhang, Jie;Lee, Goo Yeon;Kim, Hwa Jong
    • Journal of Digital Contents Society
    • /
    • v.14 no.3
    • /
    • pp.349-356
    • /
    • 2013
  • Products of Wi-Fi devices in recent years offer higher throughput and have longer signal coverage which also bring unnecessary signal interference to neighboring wireless networks, and result in decrease of network throughput. Signal interference is an inevitable problem because of the broadcast nature of wireless transmissions. However it could be optimized by reducing signal coverage of wireless devices. On the other hand, smaller signal coverage also means lower transmission power and lower data throughput. Therefore, in this paper, we analyze the relationship among signal strength, coverage and interference of Wi-Fi networks, and as a tradeoff between transmission power and data throughput, we propose a range-aware Wi-Fi network scheme which controls transmission power according to positions and RSSI(Received Signal Strength Indication) of Wi-Fi devices and analyze the efficiency of the proposed scheme by simulation.

Amino Acid-Based Formula in Premature Infants with Feeding Intolerance: Comparison of Fecal Calprotectin Level

  • Jang, Hyo-Jeong;Park, Jae Hyun;Kim, Chun Soo;Lee, Sang Lak;Lee, Won Mok
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.21 no.3
    • /
    • pp.189-195
    • /
    • 2018
  • Purpose: We investigated fecal calprotectin (FC) levels in preterm infants with and without feeding intolerance (FI), and compared the FC levels according to the type of feeding. Methods: The medical records of 67 premature infants were reviewed retrospectively. The fully enteral-fed infants were classified into two groups; the FI group (29 infants) and the control group (31 infants). Seven infants with necrotizing enterocolitis, sepsis, and perinatal asphyxia were excluded. If breast milk (BM) or preterm formula (PF) could not be tolerated by infants with FI, amino acid-based formula (AAF) was tried temporarily. Once FI improved, AAF was discontinued, and BM or PF was resumed. We investigated the FC levels according to the type of feeding. Results: Significant differences were found in gestational age, birth weight, age when full enteral feeding was achieved, and hospital stay between the FI and control group (p<0.05). The FC levels in the FI group were significantly higher than those in the control group (p<0.05). The FC levels in the AAF-fed infants with FI were significantly lower than those in the BM- or PF-fed infants (p<0.05). The growth velocities (g/d) and z scores were not significantly different between the FI and control group (p>0.05). Conclusion: The FC levels in AAF-fed infants with FI showed significantly lower than those in the BM- or PF-fed infants with FI. The mitigation of gut inflammation through the decrease of FC levels in AAF-fed infants with FI could be presumed.

A Multi-Channel Scheduling MAC (MCS-MAC) Protocol for Wi-Fi Mesh Networks (Wi-Fi 메쉬 네트워크를 위한 다중 채널 스케줄링 MAC (MCS-MAC) 프로토콜)

  • Wu, Ledan;Yang, Jae-Young;Zhou, Yafeng;Jeong, Han-You
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.54-62
    • /
    • 2012
  • A Wi-Fi mesh network providing multi-hop wireless connections based on IEEE 802.11 PHY/MAC technology has recently received a significant attention as a network infrastructure that interconnects RFID systems and wireless sensor networks (WSNs). However, the current IEEE 802.11 contention-based MAC protocol cannot fully utilize the network capacity due to eithor frame collisions or unused network resources. In this paper, we propose a novel multi-channel scheduling MAC (MCS-MAC) protocol for Wi-Fi mesh networks. Under the secondary interference model of Wi-Fi mesh networks, the MCS-MAC protocol can maximize the network throughput via activation of collision-free links that has a maximal link weight. Through the simulations, we show that the throughput of the MCS-MAC protocol is at least three times higher than that of existing MAC protocols in Wi-Fi mesh networks.

Study of Efficient Device Discovery Method for Fast Connection in Wi-Fi Direct (Wi-Fi Direct 환경에서 Fast Connection을 위한 효과적인 Device Discovery 기법 연구)

  • Lee, Jaeho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.631-639
    • /
    • 2016
  • Wi-Fi Direct standard technology has been widely deployed on the recently manufactured products such as smart phone, smart monitor, TV, set-top box, and gaming console, and it was published from Wi-Fi Alliance with the name of Wi-Fi Peer-to-Peer Technical Specifications (v1.4, 2014) for direct connection on the wireless communication environment. However, the connection process of this standard needs 5 to 10 seconds so it can lead to user's inconvenience as well as long delay for connection. From the focus of that this problem was derived from long discovery process composed of Scan and Find, as a result, the proposed scheme on this paper modified and adapted Scan and Find processes with reassembling steps of them for reducing the connection delay. In addition, the analysis and experiments were progressed for the evaluations of the proposed scheme.

A Study of Registration Hijacking Attack Analysis for Wi-Fi AP and FMC (Wi-Fi AP와 FMC에 대한 무선 호 가로채기 공격 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.261-264
    • /
    • 2011
  • Corded telephone to the phone using a wireless phone as the trend to switch, free Wi-Fi-enabled mobile phones, netbooks, and mobile devices, are spreading rapidly. But wireless Internet phone calls using your existing Internet network to deliver Internet services because it has a vulnerability that will occur. Government agencies are using Voice over Internet Protocol(VoIP) calls from the current wired and wireless connection and usage is increasing. In this paper, we have discovered that the vulnerability of wireless internet Wi-Fi AP and the FMC administrative agencies, such as VoIP on your wireless device to study the vulnerability. Wi-Fi AP and the FMC is to analyze the vulnerability. VoIP call interception, attack, attack on the base of the experiment is the analysis. Security-enhanced VoIP call for a Wi-Fi AP and the FMC's defense against man-in-the-middle attacks and is the study of security measures.

  • PDF

Implementation of portable WiFi extender using Raspberry Pi (라즈베리파이를 이용한 이동형 와이파이 확장기 구현)

  • Jung, Bokrae
    • Journal of Industrial Convergence
    • /
    • v.20 no.1
    • /
    • pp.63-68
    • /
    • 2022
  • In schools and corporate buildings, public WiFi Access Points are installed on the ceilings of hallways. In the case of an architectural structure in which a WiFi signal enters through a steel door made of a material with high signal attenuation, Internet connection is frequently cut off or fails when the door is closed. To solve this problem, our research implements an economical and portable WiFi extender using a Raspberry Pi and an auxiliary battery. Commercially available WiFi extenders have limitations in the location where the power plug is located, and WiFi extension using the WiFi hotspot function of an Android smartphone is possible only in some high-end models. However, because the proposed device can be installed at the position where the Wi-Fi reception signal is the best inside the door, the WiFi range can be extended while minimizing the possibility of damage to the original signal. Experimental results show that it is possible to eliminate the shadows of radio waves and to provide Internet services in the office when the door is closed, to the extent that web browsing and real-time video streaming for 720p are possible.