• Title/Summary/Keyword: Mobile Server

Search Result 1,302, Processing Time 0.267 seconds

CDMA Band Dual-fed ICS Repeater Antenna with High Isolation (CDMA 대역 고격리 이중급전 ICS 중계기 안테나)

  • Kim, GunKyun;Lee, Jong-Ig;Ko, Jin-hyun;Rhee, Seung-Yeop
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.75-76
    • /
    • 2016
  • Even if ICS(Interference Cancellation System) repeater is used in wireless communication system, it has the disadvantage that it must have enough distance between Donor and Service antenna to be isolated. In this paper, new ICS repeater integrated antenna with high insolation characteristics is designed. The proposed antenna is fabricated for 800MHz and measured. Bandwidth and gain are optimized by changing the stub lengths near main patch and power divider, and also by changing the size of parasitic patch. This antenna has a return loss less than -13 dB, a gain over 3 dBi, and an isolation between the donor and the server antennas less than -56 dB from 824~894 MHz for CDMA mobile communication. Therefore, the proposed antenna structure can be applied to eliminate the shadow area and to expand the coverage area for any other wireless communication bands.

  • PDF

Active Security Management on Active Networks (능동 네트워크 기반의 능동 보안 관리 시스템)

  • 이영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.559-569
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as a pattern of attack becomes various and complex. And, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture make possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service) using active packet technology including a mobile sensor on active network. Active Security Management System based on proposed security architecture consists of active security node and active security server in a security zone, and is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of Active Security Management System. The experimentation results are analyzed.

Design and Implementation of IEEE 802.11 Wireless LAN-based Identification and Location Tracking Techniques for Vehicle Information Terminals (IEEE 802.11 무선랜 기술 기반 차량용 정보 단말을 위한 식별과 위치 추적 기능의 설계와 구현)

  • Oh, Doo-Hwan;Yoon, Mi-Kyung;Han, Seung-Ho;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.107-118
    • /
    • 2009
  • In this paper, we present design and implementation for identification and location tracking techniques for vehicle information terminals in high-speed mobile environment using IEEE 802.11 wireless LAN technology. RSU be installed at a specific point. RSU recognizes it and then aware identification and location tracking for target vehicle when target vehicle that is equipped with information terminals pass near point. Issue of quick recognition using IEEE 802.11 access management frame, issue of weak wireless LAN security and tracking a range of restrictions be raised and we present solutions. Vehicle information terminal, RSU and a server-side GUI-based management program be implemented based on proposed solution. Implementation system be performed experiment at actual road environment and effectiveness be verified.

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

A Study on Measurement Error Reduction of Indoor and Outdoor Location Determination in Fingerprint Method (실내외 위치측위를 위한 Fingerprint 기반 측정오차 감소 방안 연구)

  • Kwon, Dae-Woo;Lee, Doo-Yong;Song, Young-Keun;Jang, Jung-Hwan;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.1
    • /
    • pp.107-114
    • /
    • 2011
  • Location-Based Service(LBS) is a service that provides a variety of convenience in life using location information that can be obtained by mobile communication network or satellite signal. In order to provide LBS precisely and efficiently, we need the location determination technology, platform technology and server technology. In this study, we studied on how we can reduce the error on location determination of objects such people and things. Fingerprint location determination method was applied to this study because it can be used at current wireless communication infrastructure and less influenced by a variety of noisy environment than other location determination methods. We converted the probability value to logarithmic scale value because using the sum of k probability values is not suitable to be applied to weight determination. In order to confirm the performance of suggested method, we developed location determination test program with Visual Basic 6.0 and performed the test. According to indoor and outdoor test results, the suggested stochastic method reduced the distance error by 17%, 18% and 9% respectively at indoor environment and 25%, 11% and 4% at outdoor environment compared with deterministic NN, kNN and kWNN fingerprint methods.

A Study on Development based on ToA Method of Location Determination System in Indoor (ToA 기반 실내 위치측위 시스템 개발에 관한 연구)

  • Lee, Doo-Yong;Piao, Xue-Hua;Song, Young-Keun;Jang, Jung-Hwan;Jho, Yong-Chul;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.1
    • /
    • pp.99-105
    • /
    • 2011
  • Location-Based Service(LBS) is a service that provides a variety of convenience in life using location information that can be obtained by mobile communication network or satellite signal. In order to provide LBS precisely and efficiently, we have to need technologies such as location determination technology, platform technology and server technology first. In this study, we studied on how we can reduce the error on location determination of objects such people and things. Fingerprint location determination method was applied to this study because it can be used at current wireless communication infrastructure and less influenced by a variety of noisy environment than other location determination methods. We used the time of arrival(ToA) method in fingerprint location determination method. In order to confirm the performance of suggested method, we developed location determination test program with LAbVIEW 2010 and performed the test. According to indoor test results, the suggested method reduced the distance error by 24%, 34% and 19% respectively at indoor environment compared with deterministic kWNN and Rice Gaussian fingerprint methods.

The Push Framework for UMPC Tactical Data Link(TDL) Based on The Legacy Radio (레거시 라디오 기반의 UMPC 전술 데이터 링크 Push 프레임워크)

  • Sim, Dong-Sub;Shin, Ung-Hee;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.397-404
    • /
    • 2010
  • Recently, there is on-going research about tactical data link system based on the legacy radio. Tactical data link based on legacy radio is operated mostly in narrow bandwidth under 25khz. Communicating traffics in nodes participated at network need to be minimized for distributing tactical data in narrow bandwidth. In addition, the data distributing structure is necessary for distributing tactical informations such as a situation awareness and so on to war fighters. However, conventional server-client system wastes a lot of time to obtain information for war fighters as user uses pull system to gather necessary information by seeking it one by one. Especially, the fighter pilot is supposed to dedicate into a situation awareness and fight mission in every seconds but seeking information of a user terminal while aircraft maneuvering affects as obstacle to concentrate engaging hostiles. therefore, push technology, the tactical data distributing system, is necessary for war fighters to receive fixed tactical data automatically without putting attention to it. This paper propose the UMPC tactical data link push framework. the UMPC tactical data link is a tactical data link system based on the legacy radio. Proposed push framework is verified by composing experiment environment and testing.

An Analysis on Building Steps of LFS Linux System (LFS 리눅스 시스템 구축 과정 분석)

  • Lee, Kyesang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.316-321
    • /
    • 2017
  • With the recent wide adoption of Linux in the fields of IoT, embedded, mobile, desktop and server industries, the importances of understanding the Linux system architecture as well as customizing the Linux system are increasing very steeply. Accordingly, the capabilities of building every component of Linux system from source code files have been important. The LFS (Linux From Scratch) site[1] guides the steps of building the basic Linux system from source files. The steps consist of build host preparation step, temporary system building step, final system building step, and system configuration and boot preparation step. However, the underlying concepts behind the steps used in building LFS are difficult to understand, particularly to the beginner. This paper analyzes the LFS build steps and reveal the core build concepts and principles used in each step. Additionally, this paper shows the measured package build times obtained from our build experience.

Group Synchronization Method Using Adaptive Synchronization Delay Time for Media Streaming (미디어 스트리밍을 위한 적응적 동기 지연시간을 이용한 그룹 동기화 기법)

  • Kwon, Dongwoo;Ok, Kisu;Kim, Hyeonwoo;Ju, Hongtaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.506-515
    • /
    • 2015
  • In this paper, we propose a group playback synchronization method using adaptive synchronization delay time by the bit rate of media to synchronize a play position of streaming media between mobile smart devices. This method consists of streaming server-side and client-side synchronization algorithms based on synchronization delay time which includes connection time, control packet transmission time, streaming data buffering time, and synchronization processing time. We implement the Android media player application with synchronization support using the proposed algorithms and present the result of performance evaluation.

An Efficient and Secure Group Key Distribution Protocol for IP-based Pay-TV Systems (IP기반의 Pay-TV 시스템을 위한 안전하고 효율적인 그룹 키 분배 프로토콜)

  • Kim, Jung-Yoon;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.199-208
    • /
    • 2009
  • Recently,IP-based broadcasting systems,such as Mobile-TV and IP-TV, have been widely deployed. These systems require a security system to allow only authorized subscribers access to broadcasting services. We analyzed the Conditional Access System, which is a security system used in the IP-based Pay-TV systems. A weakness of the system is that it does not scale well when the system experiences frequent membership changes. In this paper, we propose a group key distribution protocol which overcomes the scalability problem by reducing communication and computation overheads without loss of security strength. Our experimental results show that computation delay of the proposed protocol is smaller than one of the Conditional Access System. This is attributed to the fact that the proposed protocol replaces expensive encryption and decryption with relatively inexpensive arithmetic operations. In addition, the proposed protocol can help to set up a secure channel between a server and a client with the minimum additional overhead.