• Title/Summary/Keyword: IEEE 802.x

Search Result 95, Processing Time 0.035 seconds

Performance of Inter Vehicle Communication System for Cooperative Driving Service (협력주행 서비스를 위한 차량통신시스템 성능 분석)

  • Song, Yoo-Seung;Oh, Hyun-Seo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.5
    • /
    • pp.293-297
    • /
    • 2014
  • ITS services are quickly evolving due to the convergence of ICT technologies. WAVE technology based on IEEE802.11p specification has been introduced for the high speed vehicle communication and applied into the transportation system for driving safety and convenience. Recently, WAVE technology as a inter vehicle communication is used for cooperative driving application. In this paper, the implemented inter vehicle communication system is introduced and suggested as a solution for V2X communication. The performance of the implemented inter vehicle communication system is tested and analyzed under various conditions.

u-Manufacturing needs M2M (Machine to Machine) for Ubiquitous Computing World

  • Cha, Suk-Keun;Song, Jun-Yeob;Choi, Jin-Seok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1112-1114
    • /
    • 2005
  • Core position of the M2M (Machine to Machine) is device integration fusion using an emerging wireless and next internet technologies as well as IEEE 802.x, Bluetooth, Zigbee, DMB, Wibro etc. for ubiquitous environment that is complementary with IT839 strategy from Ministry of Information & Communication. This paper define and deploy about major functional requirements of M2M devices and middleware for how to it works, worldwide M2M technology trend & activities with its current & future application in manufacturing area that is called u-Manufacturing (Ubiquitous Manufacturing).

  • PDF

Performance of MAC frame Fragmentation and Efficient Flow Control Schemes for Synchronous Ethernet Systems (동기식 이더넷 시스템용 MAC 프레임 분할 방식과 효율적인 흐름제어 방식의 성능 분석)

  • Choi Hee-Kyoung;Yoon Chong-Ho;Cho Jae-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12B
    • /
    • pp.838-846
    • /
    • 2005
  • In this paper, we consider the following two issues for implementing the synchronous Ethernet systems. First, a synchronous Ethernet system employs a fixed size superframe which is divided into a synchronous period and an asynchronous one. We note that the starting point of a superframe is not deterministic when an ordinary data frame's transmission is overlapped the superframe boundary. This overlap may be a fatal drawback for strict jitter bounded applications. Circumventing the problem, we propose a frame fragmentation scheme to provide a zero jitter, and compare its delay performance with the hold scheme which also provides the zero jitter. We next concern that IEEE 802.3x pause frames cannot be promptly transmitted in a synchronous period, and thus asynchronous traffics may be dramatically get dropped at the input buffer of a switch. To handle the problem, we propose an efficient flow control by allowing the transmission of the pause frame in a synchronous period, and investigate the blocking probability of the asynchronous traffics by the simulation.

Adaptive PCIe system for TI C66x DSPs (TI C66x DSP를 위한 적응형 PCIe 시스템)

  • Kim, Minjae;Jin, Hwajong;Ahn, Heungseop;Choi, seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.31-40
    • /
    • 2019
  • This paper proposes an adaptive PCIe system for TI C66x DSPs. Conventionally, the PCIe system provided by the C66x is a system dependent on the structure in which the primary core writes an application to the DSP memory through the PCIe interface, then activate the secondary core. Due to the dependency between the cores, when developing a project using a PCIe interface, the remaining cores have to be programmed with a concern of the primary core used as the PCIe interface. Therefore, in order to de-couple the connections among the cores, an adaptive PCIe system is proposed, in the paper, in which the cores operate independently compared to the conventional system. Since the core used as the PCIe interface only runs PCIe related operations in the new system, the remaining cores can be fully utilized without concerning the connections with the core for PCIe interface. In order to verify the feasibility of the proposed adaptive PCIe system, the implementations of LTE-A down link, and IEEE 802.11ac are carried out using the evaluation board which includes a TMS320C6670 chip. Altogether, these results support that we demonstrated that the digital signal processing systems with the PCIe Interface can be developed more rapidly by applying the proposed system.

ODPM Channel Estimation Method using Multiple MRC and New Reliability Test in IEEE 802.11p Systems with Receive Diversity

  • Lim, Sungmook;Ryu, Gihoon;Ko, Kyunbyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4584-4599
    • /
    • 2021
  • In IEEE 802.11p-based wireless access in vehicular environments (WAVE) communication systems, channel estimation (CE) is one of the important issues to provide stable communication service. It is hard to apply conventional CE schemes based on data pilot to real systems, because error propagation occurs in high mobility and modulation order environments, resulting in degrading the CE performance. In this paper, we propose one data pilot using multiple receive antennas (ODPM) CE scheme based on the weighted sum using update matrix (WSUM) with time-domain averaging (TDA) to overcome this problem. Within the process of WSUM-TDA in the proposed scheme, the maximum ratio combining (MRC) technique is applied so as to create more accurate one data pilot. Moreover, a new reliability test criterion is proposed as the fashion of utilizing MRC, which makes it possible to apply selective TDA that guarantees performance improvement. In simulation results, the packet error rate (PER) performance of the proposed ODPM is compared with that of conventional CE methods and its superiority is demonstrated.

A Group-aware Multicast Scheme in 60GHz WLANs

  • Park, Hyun-Hee;Kang, Chul-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.1028-1048
    • /
    • 2011
  • The relation of multicast transmission and directional antennas is an open problem that has been debated for a long period of time. In this paper, we propose a group-aware multicast scheme of efficient multicast communication using the directional antennas for 60GHz millimeter wave wireless networks. For this purpose, we first derive the relation among beamwidth, distance between devices and most suitable data rate in the 60GHz frequency-based wireless network. In addition, for the dynamic beamforming of multicast communication, the x and y coordinates of any point with sender device at the center is generated, and a best-chosen group is deduced based on the Euclidean distance. Then the most suitable data rate for the group is obtained using the law of cosine. Using the Standard IEEE 802.11ad MAC protocol as an example, extensive simulation results demonstrate that the proposed scheme outperforms the existing multicast communication schemes with directional antennas under different situations.

A Method of Authenticating WLAN APs for Smartphones (스마트폰을 위한 무선 AP 인증 방법)

  • Shin, DongOh;Kang, Jeonil;Nyang, DaeHun;Lee, Sokjoon;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.17-28
    • /
    • 2014
  • The increase of smartphone users have made mobile carriers offload increasingly congested traffic of 3/4G by providing Wi-Fi hot-spots in the public places such as coffee shops and subway stations. In the traditional authentication in WLAN, the users should convince the service providers that they are valid customers before they use WLAN services. Since the authentication protocol is designed for service providers. Even with the mutual authentication based on the IEEE 802.1X, which is supported by IEEE 802.11 standard, it is difficult to be convinced of that the service providers really have installed the WLAN APs, which users are confronted with. An attacker can install rogue APs that masquerade as legitimate APs by copying the SSID, MAC address, etc. in order to obtain users' private information. In this paper, we introduce a method of authenticating legitimate APs for smartphone users. And we show our proposal can be well utilized for the current Wi-Fi hot-spots as a security plug-in and prove it through our experiments.

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).

Research of Real Time Mutual Authentication System in Wireless Network (무선 네트워크상에서 실시간 상호인증시스템에 관한 연구)

  • Jung, Don-Chul;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.1996-2001
    • /
    • 2006
  • Open System Authentication Method, Shared Key Method, Mac Based Authentication Method are very hard to use in wireless network that needs security. So now, many researches have been performed about 802.1x and user authentication method applying PKI. but certificate verification protocol has been used abolished list called CRL since it's first usage of PKI, there were still has a problem about distribution point. This paper applied CVS to use CA direct not to use CRL and OSCP server in order to improve this problems. Also It suggested the system that can make authentication steps more shorter using authentication server and Mutual authentication system by public certificate(small size/low speed wireless terminal can access to wireless network fast and safely)

Wearable System for Real-time Monitoring of Multiple Vital Signs (인체 착용형 다중 생체신호 실시간 모니터링 시스템)

  • Lee, Young-Dong;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.249-252
    • /
    • 2008
  • A wearable ubiquitous health care monitoring system using integrated ECG and accelerometersensors based on WSN is designed and developed. Wireless sensor network technology is applied for non intrusive healthcare in some wide area coverage with small battery support for RF transmission. We developed wearable devices which are wearable USN node, sensor board and base-station. Low power operating ECG and accelerometer sensor board was integrated to wearable USN node for user's health monitoring. The wearable ubiquitous healthcare monitoring system allows physiological data to be transmitted in wireless sensor network from on body wearable sensor devices to a base-station connected to server PC using IEEE 802.15.4. Physiological data displays and stores on server PC continuously.

  • PDF