• 제목/요약/키워드: Internet access networks

검색결과 548건 처리시간 0.027초

High-Availability Virtual Communication for Cloud Access

  • Sirisutthidecha, Suthee;Maichalernnukul, Kiattisak
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3455-3473
    • /
    • 2016
  • Cloud computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients. Virtual private network (VPN) is the most widely used technology for secure cloud access. Unfortunately, VPN-based cloud services become unavailable when a VPN failure occurs. In this paper, we propose a new scheme to improve the availability of VPN connections against such failures, called high-availability virtual communication (HAVC). Unlike most of the multipath transmission schemes in the literature, the proposed scheme is implemented by using a virtualization technique, and its protocol functions are independent of existing networks - potential clients are not required to modify their applications or operating systems. Simulation results show that the HAVC can not only tolerate VPN failures but also achieve high transmission performance.

A Survey of Self-optimization Approaches for HetNets

  • Chai, Xiaomeng;Xu, Xu;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권6호
    • /
    • pp.1979-1995
    • /
    • 2015
  • Network convergence is regarded as the development tendency of the future wireless networks, for which self-organization paradigms provide a promising solution to alleviate the upgrading capital expenditures (CAPEX) and operating expenditures (OPEX). Self-optimization, as a critical functionality of self-organization, employs a decentralized paradigm to dynamically adapt the varying environmental circumstances while without relying on centralized control or human intervention. In this paper, we present comprehensive surveys of heterogeneous networks (HetNets) and investigate the enhanced self-optimization models. Self-optimization approaches such as dynamic mobile access network selection, spectrum resource allocation and power control for HetNets, etc., are surveyed and compared, with possible methodologies to achieve self-optimization summarized. We hope this survey paper can provide the insight and the roadmap for future research efforts in the self-optimization of convergence networks.

Throughput Maximization for a Primary User with Cognitive Radio and Energy Harvesting Functions

  • Nguyen, Thanh-Tung;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3075-3093
    • /
    • 2014
  • In this paper, we consider an advanced wireless user, called primary-secondary user (PSU) who is capable of harvesting renewable energy and connecting to both the primary network and cognitive radio networks simultaneously. Recently, energy harvesting has received a great deal of attention from the research community and is a promising approach for maintaining long lifetime of users. On the other hand, the cognitive radio function allows the wireless user to access other primary networks in an opportunistic manner as secondary users in order to receive more throughput in the current time slot. Subsequently, in the paper we propose the channel access policy for a PSU with consideration of the energy harvesting, based on a Partially Observable Markov decision process (POMDP) in which the optimal action from the action set will be selected to maximize expected long-term throughput. The simulation results show that the proposed POMDP-based channel access scheme improves the throughput of PSU, but it requires more computations to make an action decision regarding channel access.

iBeacon을 이용한 AP 자동접속 방안 (An Automatic AP Connections Scheme using iBeacon)

  • 남춘성;신동렬
    • 인터넷정보학회논문지
    • /
    • 제18권2호
    • /
    • pp.1-11
    • /
    • 2017
  • 스마트 디바이스를 이용하여 특정 공간에서 미리 설정된 무선랜에 접속하는 방법은 개방형 방식과 사용자 인증 방식으로 나뉠 수 있다. 개방형 방식은 무선랜 접속을 위한 인증이 없이 접속하는 방법이다. 스마트 디바이스 사용자가 자신이 사용하려는 무선랜에 대한 정보를 SSID(Service Set IDentifier)를 통해 공공 무선랜 표기 형식에 따라 제공받아야 하지만, 모든 개방형 무선랜이 이러한 방식을 수동으로 입력하는 방식에는 무리가 있다. 반면에 사용자 인증 방식은 SSID와 PW(PassWord) 설정을 통해 사용자에게 무선랜 접속을 제공하는 방식이다. 따라서 SSID를 통해 공공 무선랜 표기 형식을 따를 수는 있지만, AP 접속을 위해서는 일일이 사용자가 수동으로 패스워드 입력을 통해 AP에 접속해야만 한다. 따라서 본 논문에서는 사용자 인증방식과 공공 무선랜 표기형식을 iBeacon 메시지 수신을 통해 자동적으로 AP에 접속할 수 있는 방안을 제안한다.

광대역 무선 엑세스 망에서 WiFi 액세스 사용자 인증 (WiFi Access User Authentication in Broadband Wireless Access Network)

  • 이용;이구연
    • 산업기술연구
    • /
    • 제28권B호
    • /
    • pp.33-37
    • /
    • 2008
  • Recently, there have been intensive researches on the wireless Internet access through WiFi WLAN using WiRro network as backhaul link in the Internet service providing business area. However, in the wireless Internet access method, we need to solve the compatibility problem for different user authentications between licensed WiBro network and unlicensed WiFi network for billing and user management. In this paper, we propose an authentication method for WiFi users by BWAN operators through WiNNERs which is RS connecting the two networks, and discuss the effectiveness of the method.

  • PDF

Providing Efficient Secured Mobile IPv6 by SAG and Robust Header Compression

  • Wu, Tin-Yu;Chao, Han-Chieh;Lo, Chi-Hsiang
    • Journal of Information Processing Systems
    • /
    • 제5권3호
    • /
    • pp.117-130
    • /
    • 2009
  • By providing ubiquitous Internet connectivity, wireless networks offer more convenient ways for users to surf the Internet. However, wireless networks encounter more technological challenges than wired networks, such as bandwidth, security problems, and handoff latency. Thus, this paper proposes new technologies to solve these problems. First, a Security Access Gateway (SAG) is proposed to solve the security issue. Originally, mobile terminals were unable to process high security calculations because of their low calculating power. SAG not only offers high calculating power to encrypt the encryption demand of SAG's domain, but also helps mobile terminals to establish a multiple safety tunnel to maintain a secure domain. Second, Robust Header Compression (RoHC) technology is adopted to increase the utilization of bandwidth. Instead of Access Point (AP), Access Gateway (AG) is used to deal with the packet header compression and de-compression from the wireless end. AG's high calculating power is able to reduce the load on AP. In the original architecture, AP has to deal with a large number of demands by header compression/de-compression from mobile terminals. Eventually, wireless networks must offer users "Mobility" and "Roaming". For wireless networks to achieve "Mobility" and "Roaming," we can use Mobile IPv6 (MIPv6) technology. Nevertheless, such technology might cause latency. Furthermore, how the security tunnel and header compression established before the handoff can be used by mobile terminals handoff will be another great challenge. Thus, this paper proposes to solve the problem by using Early Binding Updates (EBU) and Security Access Gateway (SAG) to offer a complete mechanism with low latency, low handoff mechanism calculation, and high security.

초소형 기지국에서 타이밍 품질 향상을 위한 PDV 제어 방안 (The study on effective PDV control for IEE1588)

  • 김현수;신준효;김정훈;정석종
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2009년도 정보통신설비 학술대회
    • /
    • pp.275-280
    • /
    • 2009
  • Femtocells are viewed as a promising option for mobile operators to improve coverage and provide high-data-rate services in a cost-effective manner Femtocells can be used to serve indoor users, resulting in a powerful solution for ubiquitous indoor and outdoor coverage. TThe frequency accuracy and phase alignment is necessary for ensuring the quality of service (QoS) forapplications such as voice, real-time video, wireless hand-off, and data over a converged access medium at the femtocell. But, the GPS has some problem to be used at the femtocell, because it is difficult to set-up, depends on the satellite condition, and very expensive. The IEEE 1588 specification provides a low-cost means for clock synchronisation over a broadband Internet connection. The Time of Packet (ToP) specified in IEEE 1588 is able to synchronize distributed clocks with an accuracy of less than one microsecond in packet networks. However, the timing synchronization over packet switched networks is a difficult task because packet networks introduce large and highly variable packet delays. This paper proposes an enhanced filter algorithm to reduce ths packet delay variation effects and maintain ToP slave clock synchronization performance. The results are presented to demonstrate in the intra-networks and show the improved performance case when the efficient ToP filter algorithm is applied.

  • PDF

An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks

  • Liu, Kai;Zhang, Yupeng;Liu, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.778-798
    • /
    • 2014
  • This paper proposes a novel exposed-terminal-eliminated medium access control (ETE-MAC) protocol by combining channel reservation, collision avoidance and concurrent transmissions to improve multi-access performance of the multihop wireless networks. Based on the proposed slot scheduling scheme, each node senses the control channel (CCH) or the data channel (DCH) to accurately determine whether it can send or receive the corresponding packets without collisions. Slot reservation on the CCH can be simultaneously executed with data packet transmissions on the DCH. Therefore, it resolves the hidden-terminal type and the exposed-terminal type problems efficiently, and obtains more spatial reuse of channel resources. Concurrent packet transmissions without extra network overheads are maximized. An analytical model combining Markov model and M/G/1 queuing theory is proposed to analyze its performance. The performance comparison between analysis and simulation shows that the analytical model is highly accurate. Finally, simulation results show that, the proposed protocol obviously outperforms the link-directionality-based dual-channel MAC protocol (DCP) and WiFlex in terms of the network throughput and the average packet delay.

Greedy Heuristic Resource Allocation Algorithm for Device-to-Device Aided Cellular Systems with System Level Simulations

  • Wang, Xianxian;Lv, Shaobo;Wang, Xing;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1415-1435
    • /
    • 2018
  • Resource allocation in device-to-device (D2D) aided cellular systems, in which the proximity users are allowed to communicate directly with each other without relying on the intervention of base stations (BSs), is investigated in this paper. A new uplink resource allocation policy is proposed by exploiting the relationship between D2D-access probability and channel gain among variant devices, such as cellular user equipments (CUEs), D2D user equipments (DUEs) and BSs, etc., under the constraints of their minimum signal to interference-plus-noise ratio (SINR) requirements. Furthermore, the proposed resource-allocation problem can be formulated as the cost function of "maximizing the number of simultaneously activated D2D pairs subject to the SINR constraints at both CUEs and DUEs". Numerical results relying on system-level simulations show that the proposed scheme is capable of substantially improving both the D2D-access probability and the network throughput without sacrificing the performance of conventional CUEs.

이기종 네트워크를 구성하는 무선접속 기술간 주파수 이격 분석 (On Frequency Separation among Radio Access Technologies in Heterogeneous Networks)

  • 이경재;조한신
    • 인터넷정보학회논문지
    • /
    • 제16권6호
    • /
    • pp.1-9
    • /
    • 2015
  • 본 논문에서는 이기종 네트워크를 구성하는 대표 무선접속 기술인 WiMAX, CDMA, 무선랜 간의 주파수 공유 분석을 수행하였다. 3가지 접속기술은 각기 다른 주파수 대역을 사용하지만 대역외 방사특성으로 인해 타 무선접속 기술에 간섭을 일으킬 수 있다. 따라서 간섭 허용기준을 만족하기 위한 최소 인접채널 간섭률을 산출하고 이를 바탕으로 간섭/피간섭 시스템간의 최소 주파수 이격(보호대역)을 산출하였다. 분석 결과 WiMAX와 무선랜 간에는 적어도 20 MHz의 보호대역, WiMAX와 CDMA시스템 간에는 적어도 15 MHz의 보호대역이 필요함을 확인하였다.