• Title/Summary/Keyword: MAC address

Search Result 115, Processing Time 0.019 seconds

Performance of Cellular Ethernet System with Fast Handovers for WiBro Networks (고속 핸드오버를 지원하는 휴대 인터넷용 셀룰라 이더넷 시스템의 성능 분석)

  • Jung, Han-Gyun;Yoon, Chong-Ho;Cho, Jae-Hun;Oh, Yun-Je;Hwang, Seong-Taek
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.25-34
    • /
    • 2006
  • In this paper, we propose the new Cellular Ethernet System that supports faster handovers than IP layer handover scheme for WiBro Networks and analyze the performance of the proposed scheme. In WiBro Networks, it is very important for service providers that supports fast handovers for mobile users who want superior service. But in case of Mobile IPv6, which supports IP layer handovers, there exists very long latency for detecting movement and duplicated IP address. And besides, handovers in wired area must be carried out after completing handovers in wireless area. So, Mobile IPv6 cannot provide superior service to mobile users. To remedy these problems, we here propose the new Cellular Ethernet System that consists of MAC layer bridges for WiBro Networks and analyze the performance of Cellular Ethernet System handover scheme and show that it has better performance than Mobile IPv6.

A WSN Routing Algorithm for Improving the Reliability of Directed Diffusion (Directed Diffusion 기반의 신뢰성 향상을 위한무선 센서 네트워크 라우팅 알고리즘)

  • Kim, Yong-Pyo;Jung, Eui-Hyun;Park, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.2
    • /
    • pp.39-47
    • /
    • 2010
  • In Wireless Sensor Network, transmission errors are frequently occurred due to the node failure, battery discharge, and interference by objects. Although Directed Diffusion has been considered as a prominent Data-centric routing algorithm, it revealed some weaknesses at this kind of unexpected network errors. In order to address the problem, we proposed a radio-aware routing algorithm for improving reliability of Directed Diffusion in Wireless Sensor Networks. The proposed algorithm is aware of the network status based on the radio information of MAC and PHY layers using a cross-layer approach. The link quality and the node failure information from the acquired network status were used to decide an alternative path to provide a reliable data transmission in error-prone sensor networks. The proposed algorithm showed its effectiveness of the data delivery rate and data ratio with several simulations consisting of various error rates and the number of nodes.

An Assessment of the Multiple Challenges Associated with Student's Access to Electronic Resources at a Public University Library in Ghana

  • Armah, Nesba Yaa Anima Adzobu;Cobblah, Mac-Anthony
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.1
    • /
    • pp.65-84
    • /
    • 2021
  • Our understanding of how barriers to access systematically varies with the compositional and contextual characteristics of users is incomplete. Using a public university library in Ghana, this study assessed the heterogeneous barriers or constraints students encounter in accessing electronic resources based on their demographic and contextual attributes. A descriptive survey design was adopted and structured questionnaires were administered randomly to 558 students in the four constituent colleges of the University of Cape Coast, Ghana. Data were collected and analysed using SPSS and descriptive statistics were generated. The results revealed that students faced six key challenges in accessing electronic information resources in the library namely delays in download of information, poor internet connectivity, and limited accessibility of university portal, inadequate computers in the library, poor lighting and limited ancillary services (on the spot printing facilities), with differences based on gender, academic level, and college affiliation. Only 24% males and 26% females had no challenges or problems with delays in download of electronic information. About three-fourth of all users had poor internet connectivity and complained about inadequate computers associated with accessing electronic resources. 40% percent of undergraduate students in the Colleges of Education Studies, Agriculture and Natural Sciences, and Humanities and Legal Studies each encountered four to six simultaneous challenges. Irrespective of gender, first year undergraduate students in all the four colleges were the least likely to report multiple challenges. This suggests the need for targeted and context-specific interventions to address the identified challenges.

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

Developing educational videos to inform rightly about school foodservice from kindergarten to high school: a case study

  • Gyoungok Gang;Chaewon Park;Haejin Kang;Wan Soo Hong;Yoo Kyoung Park;Sook Hee Choi;Seung Hye Kim;Jieun Choi;Jihyun Park;Hyeja Chang
    • Korean Journal of Community Nutrition
    • /
    • v.29 no.2
    • /
    • pp.97-113
    • /
    • 2024
  • Objectives: Since the enactment of the School Nutrition Act in 1981, school lunch programs in South Korea have grown quantitatively and qualitatively with a current student participation rate of 99.8%. Nonetheless, educational materials are needed to reduce misunderstanding and ignorance about school lunch programs. This study aimed to develop 3 educational videos that help students of various ages (kindergarteners/lower-grade elementary, upper-grade elementary, and secondary school, respectively), understand the school lunch program. Methods: A scenario was created, was made, and the opinions on the scenario from experts in foodservice sectors were collected. A survey was conducted to students and parents to determine topics they wanted to know about school foodservice. The final videos were produced using this information and the expert opinions. The data were analyzed using SPSS 27.0 for Mac (IBM Corp., Armonk, NY, USA); a P-value of < 0.05 was considered significant. Results: Three videos on school foodservice were developed for various age levels of students: kindergarten/lower-grade elementary, upper-grade elementary, and secondary school. Additionally, English subtitles were included for the multicultural student population. These videos, each lasting about 7 minutes, cover topics such as nutrition, hygiene, and the cultural significance of the school lunch program. The survey results showed that parents and students wanted to know the following topics about the school lunch program: "nutritionally balanced diet" (11.9%), "purchasing safe food ingredients" (10.9%), and "healthy eating habits" (9.9%). Conclusions: The developed videos will serve as valuable educational resources on school foodservice, foster a deeper understanding of the school lunch program in parents and students, and potentially address their inquiries regarding production processes, nutrition, hygiene, cultural heritage, and health.