• Title/Summary/Keyword: Network Centric

Search Result 443, Processing Time 0.028 seconds

Power Re-Allocation for Low-Performance User in Cell-free MIMO Network (셀프리 다중안테나 네트워크에서 하위 성능 사용자를 위한 전력 재할당 기법)

  • Ryu, Jong Yeol;Ban, Tae-Won;Lee, Woongsup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1367-1373
    • /
    • 2022
  • In this paper, we consider a power re-allocation technique in order to enhance the frequency efficiency of the low performance user in a cell-free multiple input multiple output (MIMO) network. The AP first allocates transmit power to the user to be proportional to the large-scale fading coefficients of the connected users. Then, the AP reduces the power of the users who were allocated power greater than the threshold ratio of total allocated power to be equal to the threshold ratio of the allocated power. Finally, the AP re-allocates the reduced power from the strong channel user to the user who has the worst channel condition, and thus, the frequency efficiency of the low performance user can be enhanced. In the simulation results, we verify the performance of the power re-allocation technique in terms of the spectral efficiency of the low performance user.

PS-Net : Personalized Secure Wi-Fi Networks (PS-Net : 개인별 보안 Wi-Fi 네트워크)

  • Lee, Nam-Seh;Lee, Ju-Ho;Jeong, Choong-Kyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.497-505
    • /
    • 2015
  • Existing Wi-Fi networks require users to follow network settings of the AP (Access Point), resulting in inconveniences for users, and the password of the AP is shared by all users connected to the AP, causing security information leaks as time goes by. We propose, in this work, a personalized secure Wi-Fi network, in which each user is assigned her own virtual Wi-Fi network. One virtual Wi-Fi per user makes the user-centric network configuration possible. A user sets a pair of her own SSID and password on her device a priori, and the AP publishes its public key in a suitable way. The AP also maintains an open Wi-Fi channel, to which users can connect anytime. On user's request, the user device sends a connection request message containing a pair of SSID and password encrypted with the AP's public key. Receiving the connection request message, the AP instantiates a new virtual AP secured with the pair of SSID and password, which is dedicated to that single user device. This virtual network is securer because the password is not shared among users. It is more convenient because the network adapts itself to the user device. Experiments show that these advantages are obtained with negligible degradation in the throughput performance.

The Influence of High-Speed Railroad Construction on Territorial Organization : A Case Study of the French TGV Transportation Network (국토 공간조직에 미친 고속철도망 건설의 영향 : 프랑스 TGV 교통망의 사례를 중심으로)

  • Lee, Hyeon-Joo
    • Journal of the Korean association of regional geographers
    • /
    • v.10 no.2
    • /
    • pp.252-266
    • /
    • 2004
  • This study analyzes the influence of the construction of a high-speed railroad on territorial organization in France. After development of a new transportation network, the French territorial organization has been largely modified. Many economic urban areas are modified by their position in the territorial hierarchy according to their condition of connection with the TGV network. At first, spatial convergence is the most important effect of the TGV network construction. Second, the development of a transportation network concentrated in the Paris area has influence as an intensified factor on metropolitan areas and as a weakening factor on middle- and small-sized cities. Thus, this system has risk in increasing territorial imbalance in France. Third, to implant an economic activity zone around new TGV stations, a new town or a new economic center starts to develop. This is going to grow into a second core outside of the old city center so that regional spatial organization is transformed from a mono-polarized(mono-centric) organization to a multi-polarized(polycentric) one. Lastly, the integration of the EU railroad system enhances the concentration of economic activity in European metropolitan areas as each metropolitan area tries to develop more competitive space for its rising position in the global urban hierarchical system.

  • PDF

A Resource Scheduling Based on Iterative Sorting for Long-Distance Airborne Tactical Communication in Hub Network (허브 네트워크에서의 장거리 공중 전술 통신을 위한 반복 정렬 기반의 자원 스케줄링 기법)

  • Lee, Kyunghoon;Lee, Dong Hun;Lee, Dae-Hong;Jung, Sung-Jin;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1250-1260
    • /
    • 2014
  • In this paper, a novel resource scheduling, which is used for hub network based long distance airborne tactical communication, is proposed. Recently, some countries of the world has concentrated on developing data rate and networking performance of CDL, striving to keep pace with modern warfare, which is changed into NCW. And our government has also developed the next generation high capacity CDL. In hub network, a typical communication structure of CDL, hybrid FDMA/TDMA can be considered to exchange high rate data among multiple UAVs simultaneously, within limited bandwidth. However, due to different RTT and traffic size of UAV, idle time resource and unnecessary packet transmission delay can occur. And these losses can reduce entire efficiency of hub network in long distance communication. Therefore, in this paper, we propose RTT and data traffic size based UAV scheduling, which selects time/frequency resource of UAVs by using iterative sorting algorithm. The simulation results verified that the proposed scheme improves data rate and packet delay performance in low complexity.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Attribute-based Naming Support for Wireless Sensor Network (무선 센서 네트워크를 위한 속성 기반 네이밍 지원)

  • Seo Hanbae;Jung Euihyun;Kim Yongpyo;Park Yongjin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.478-480
    • /
    • 2005
  • 센서 네트워크는 다수의 센서 노드들이 센싱된 데이터를 보고하는 형태의 네트워크로 기존 데이터 중심(Data-centric) 통신 모델은 오버헤드와 응답 속도의 저하와 관련된 문제점을 노출하고 있으며, 이를 해결하기 위한 방안으로 속성 기반 네이밍(Attribute-based naming)이 새로운 라우팅 구조로 주목받고 있다. 본 연구에서는 가상 대응체 (Virtual Counterpart) 개념을 센서 네트워크에 적용하여 속성 기반 네이밍을 싱크 노드내의 가상 센서 노드에서 처리해주는 구조를 제안하였다. 기존의 다른 속성 기반 네이밍 연구들과 달리 리얼센서에 대응되는 가상 센서 노드를 싱크 노드에서 운용하고, 리얼 센서의 데이터를 주기적으로 업데이트한 후, 속성 기반 쿼리를 가상 센서 노드가 리얼 센서를 대행하여 처리하는 구조를 설계하였다. 이런 구조를 취함으로써 효율적인 응답 처리와 하부 네트워크에 비종속적인 속성 기반 네이밍이 가능하며, 쿼리의 확장성과 센서들의 결합을 통한 부가적인 기능을 제공할 수 있게 된다.

  • PDF

A Study on the Development of Evaluation Model for Selecting a Standard for DITA using AHP (AHP를 이용한 국방정보기술표준 선정 평가 모델 개발에 관한 연구)

  • Kim, Ja-Hee;Kim, Woo-Je;Cho, Hyun-Ki;Lee, Eun-Young;Seo, Min-Woo
    • IE interfaces
    • /
    • v.25 no.1
    • /
    • pp.96-105
    • /
    • 2012
  • Recently, the interoperability has become more important to enhance the net-centric capabilities of the warfighter. DITA (Defense Information Technical stAndard) is the set of IT standards for improving interoperability, scalability, effectiveness, and efficiency. In this paper, we analyzed the standardizing process to derive the selection criteria and structurized the derived selection criteria using the KJ (Kawakita Jiro) method. Finally, we developed an evaluation model for selecting a standard for DITA using AHP (Analytic Hierarchy Process). As a result, we present eight selection criteria (maintainability, trend, stability, portability, effect of other standard, constraint of the network, and applicability to the systems). We also applied some examples that several IT standards to our selection model for validating the model. We expect our model to help to decide objectively whether the new standard can be listed in DITA.

Evaluation of Facilitating Factors for Cloud Service by Delphi Method (델파이 기법을 이용한 클라우드 서비스의 개념 정의와 활성화 요인 분석)

  • Suh, Jung-Han;Chang, Suk-Gwon
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.107-118
    • /
    • 2012
  • Recently, as the clouding computing begins to receive a great attention from people all over the world, it became the most popular buzz word in recent IT magazines or journal and heard it in many different services or different fields. However, a notion of the cloud service is defined vaguely compared to increasing attentions from others. Generally the cloud service could be understood as a specific service model base on the clouding computing, but the cloud, the cloud computing, the cloud computing service and cloud service, these four all terms are often used without any distinction of its notions and characteristics so that it's difficult to define the exact nature of the cloud service. To explore and analyze the cloud service systematically, an accurate conception and scope have to be preceded. Therefore this study is to firstly clarify its definition by Delpi method using expert group and then tries to provide the foundation needed to enable relative research such as establishing business model or value chain and policies for its activation to set off. For the Delpi, 16 experts participated in several surveys from different fields such industry, academy and research sector. As a result of the research, Characteristics of the Cloud Service are followings : Pay per use, Scalability, Internet centric Virtualization. And the scope as defined including Grid Computing, Utility Computing, Server Based Computing, Network Computing.

Performance Analysis of Unmanned Robot System based on LOS/NLOS channel (LOS/NLOS 채널에 따른 무인로봇체계의 시스템 성능분석)

  • Song, Yuchan;Cha, Gyeong Hyeon;Hwang, Yu Min;Lee, Jae-Seang;Han, Myoung-hun;Kim, Jin Young;Shin, Yoan
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.4
    • /
    • pp.12-16
    • /
    • 2015
  • Unmanned robot system has become a significant part of network centric warfare. Unnlike the commercial wireless system, however, it is tricky to provide reliable communication in the harsh environment: tactical and military communication. Therefore, it needs to be considered when the base station and mobile has poor communication channel. In this paper, we proposed an efficient operating algorithm for unammned robot system with ensuring communication survivability in the harsh environment. From the simulation, we adopted the SUI channel suitable for domestic mountainous area and open terrain with Rician factor K.