• Title/Summary/Keyword: Internet access networks

Search Result 549, Processing Time 0.027 seconds

IP Implementation on ATM (ATM에서 IP 수용방안)

  • 강선무;전병천;이유경
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.162-167
    • /
    • 1999
  • ATM technology is well developed. Small-scale access node and edge switches are introduced in the network. Large scale ATM core switches are prepared for backbone application. Currently, Internet traffic is increasing so rapidly and we need to consider effective way of accommodating the volume of traffic. In the other hand, QoS and traffic engineering concept is required in the Internet services. Here, in this paper, two technologies are explained and suggested for integration of networks for future ATM based IP network.

  • PDF

Implementation of IPv6 based Virtual Storage System for Mobile Devices and Its Application (IPv6 기반의 모바일용 가상 저장장치 드라이버 구현 및 응용)

  • Lim, Hyo-Taek;Choi, Sae-Bom;Singh, Vinay;Cha, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.1
    • /
    • pp.74-82
    • /
    • 2007
  • IPv6 is the internet protocol for next generation which can solve the problem of IPv4 protocol. Mobile IPv6 efficiently provides the mobility for mobile devices holding the properties of IPv6. iSCSI(Internet Small Computer System Interface) is a block-oriented storage access protocol that enables a user to recognize a remote storage as their own local block device through general TCP/IP networks. Since iSCSI uses a standard Ethernet switch and router for this kind of access, it can not only be applized to Ethernet technologies, but can also be used to create a storage networking system without any distance restrictions that can equally be applied to a wireless network environment. Accordingly, this paper presents an alternative approach to overcome the limited storage space of mobile devices based on the IPv6 iSCSI initiator driver which was originally designed for wired networks. Also, this paper describes about the implementation and performance analysis of mobile education service system using virtual storage devices in IPv6 wireless networks.

  • PDF

Utility Bounds of Joint Congestion and Medium Access Control for CSMA based Wireless Networks

  • Wang, Tao;Yao, Zheng;Zhang, Baoxian;Li, Cheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.193-214
    • /
    • 2017
  • In this paper, we study the problem of network utility maximization in a CSMA based multi-hop wireless network. Existing work in this aspect typically adopted continuous time Markov model for performance modelling, which fails to consider the channel conflict impact in actual CSMA networks. To maximize the utility of a CSMA based wireless network with channel conflict, in this paper, we first model its weighted network capacity (i.e., network capacity weighted by link queue length) and then propose a distributed link scheduling algorithm, called CSMA based Maximal-Weight Scheduling (C-MWS), to maximize the weighted network capacity. We derive the upper and lower bounds of network utility based on C-MWS. The derived bounds can help us to tune the C-MWS parameters for C-MWS to work in a distributed wireless network. Simulation results show that the joint optimization based on C-MWS can achieve near-optimal network utility when appropriate algorithm parameters are chosen and also show that the derived utility upper bound is very tight.

A Survey on Spectrum Sharing in Cognitive Radio Networks

  • Xu, Tangwen;Li, Zhenshuang;Ge, Jianhua;Ding, Haiyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3751-3774
    • /
    • 2014
  • With the rapid development of wireless communication, the confliction between the scarce frequency resources and the low spectral efficiency caused by the stationary spectrum sharing strategies seriously restricts the evolution of the future mobile communication. For this purpose, cognitive radio (CR) emerges as one of the most promising inventions which can overcome the spectrum shortage. As the key technology and main objective of CR, spectrum sharing can make full use of the limited spectrum, alleviate the scarcity of frequency resources and improve the system utilities, playing thereby an important role in improving the system performance of cognitive radio networks (CRNs). In this survey, the spectrum sharing in CRNs is discussed in terms of the sharing process, mainstream sharing technologies and spectrum sharing models. In particular, comparisons of different spectrum sharing strategies are concluded, as well as that of different spectrum sensing schemes in sharing procedure. Moreover, some application examples of the spectrum sharing in CRNs, such as smart grid, public safety, cellular network and medical body area networks are also introduced. In addition, our previous related works are presented and the open research issues in the field of spectrum sharing are stated as well.

A New Cross-Layer QoS-Provisioning Architecture in Wireless Multimedia Sensor Networks

  • Sohn, Kyungho;Kim, Young Yong;Saxena, Navrati
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5286-5306
    • /
    • 2016
  • Emerging applications in automation, medical imaging, traffic monitoring and surveillance need real-time data transmission over Wireless Sensor Networks (WSNs). Guaranteeing Quality of Service (QoS) for real-time traffic over WSNs creates new challenges. Rapid penetration of smart devices, standardization of Machine Type Communications (MTC) in next generation 5G wireless networks have added new dimensions in these challenges. In order to satisfy such precise QoS constraints, in this paper, we propose a new cross-layer QoS-provisioning strategy in Wireless Multimedia Sensor Networks (WMSNs). The network layer performs statistical estimation of sensory QoS parameters. Identifying QoS-routing problem with multiple objectives as NP-complete, it discovers near-optimal QoS-routes by using evolutionary genetic algorithms. Subsequently, the Medium Access Control (MAC) layer classifies the packets, automatically adapts the contention window, based on QoS requirements and transmits the data by using routing information obtained by the network layer. Performance analysis is carried out to get an estimate of the overall system. Through the simulation results, it is manifested that the proposed strategy is able to achieve better throughput and significant lower delay, at the expense of negligible energy consumption, in comparison to existing WMSN QoS protocols.

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

Methods of WAP Gateway Capacity Dimensioning and Traffic Forecasting (WAP 게이트웨이 용량 산출과 트래픽 예측 기법)

  • Park, Chul-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.576-583
    • /
    • 2010
  • Wireless Internet is the network which provides wireless access in order to serve the Internet connections and data communication through the mobile handsets. To get efficient wireless access to the Internet, we need the WAP (Wireless Application Protocol) gateway that performs protocol translation and contents conversion between two different networks. We need the capacity dimensioning of the WAP gateway system in order to provide the wireless Internet service stably and cost-effectively. We also need the traffic engineering methods including traffic modelling and forecasting for the economical facility investment. The existing method of WAP gateway capacity dimensioning was intuitive and qualitative. But in this paper, we deal with the capacity dimensioning analytically and quantitatively on the basis of WAP traffic description parameters and traffic forecasting method.

Load Balancing Metric for a Mobile Router with Heterogeneous Network Interfaces (이기종 네트워크 인터페이스를 갖는 이동 라우터의 부하 균등 메트릭)

  • Na, TaeHeum;Park, PyungKoo;Ryu, HoYong;Park, Jaehyung;Hwang, Buhyun
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.983-987
    • /
    • 2017
  • Multi-homing mobile router separates network for user connection and network for internet access using various interfaces for internet access. This paper proposes a load balancing metric in order that multi-network mobile router distributes its traffic to one of several heterogeneous network interfaces. To evaluate the performance of the load balancing metric, experiments on traffic balancing is performed on real commercial networks were used in Korea and Hong Kong.

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF

An Authentication Mechanism Based on Clustering Architecture in Mobile Ad Hoc Networks (이동 Ad Hoc 네트워크 환경에서 클러스터링 구조에 기반한 인증 메커니즘)

  • Lee, Tao;Shin, Young-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1461-1464
    • /
    • 2005
  • In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories, but those are not well-suited for securing ad hoc networks. Moreover, a fundamental issue of securing mobile ad hoc networks is to ensure mobile nodes can authenticate each other. Because of its strength and efficiency, public key and digital signature is an ideal mechanism to construct the authentication service. Although this is already mature in the internet application, providing public key based authentication is still very challenging in mobile ad hoc networks. In this paper I propose a secure public key authentication service based on clustering model and trust model to protect nodes from getting false public keys of the others efficiently when there are malicious nodes in the network.

  • PDF