• Title/Summary/Keyword: PCS network

Search Result 218, Processing Time 0.023 seconds

Performance Analysis of Hybrid Location Update Strategy in Wireless Communication System (이동 통신망에서의 혼합형 위치 갱신 방법의 성능분석)

  • Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.26 no.B
    • /
    • pp.191-198
    • /
    • 2006
  • In this paper, we focus on a question. Which is better between time-based location update method and movement-based location update method? Or, does any other method combining the two methods show better performance? For the question, we propose a hybrid location update scheme, which integrates the time-based and the movement-based methods. In the proposed scheme, a mobile terminal updates its location after n cell boundary crossing and a time interval of T, or the inverse. We derive an analytical solution for the performance of the hybrid scheme with exponential cell resident time. From the numerical analysis, we conclude that the movement-based method seems to have better performance than the time-based and hybrid methods, that is the optimal costs occur at T=0.

  • PDF

Microcell Sectorization for Channel Management in a PCS Network by Tabu Search (광마이크로셀 이동통신망에서의 채널관리를 위한 동적 섹터결정)

  • Lee, Cha-Young;Yoon, Jung-Hoon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.26 no.2
    • /
    • pp.155-164
    • /
    • 2000
  • Recently Fiber-optic Micro-cellular Wireless Network is considered to solve frequent handoffs and local traffic unbalance in microcellular systems. In this system, central station which is connected to several microcells by optical fiber manages the channels. We propose an efficient sectorization algorithm which dynamically clusters the microcells to minimize the blocked and handoff calls and to balance the traffic loads in each cell. The problem is formulated as an integer linear programming. The objective is to minimize the blocked and handoff calls. To solve this real time sectorization problem the Tabu Search is considered. In the tabu search intensification by Swap and Delete-then-Add (DTA) moves is implemented by short-term memory embodied by two tabu lists. Diversification is considered to investigate proper microcells to change their sectors. Computational results show that the proposed algorithm is highly effective. The solution is almost near the optimal solution and the computation time of the search is considerably reduced compared to the optimal procedure.

  • PDF

The Study of the Automation Systems using Satellite Communications (위성통신을 이용한 자동화 감시 시스템 구축 연구)

  • Kim, Myong-Soo;Hyun, Duck-Hwa;Cho, Seon-Ku;Kim, Choong-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2540-2542
    • /
    • 2002
  • In recent years, it is a worldwide trend that many power utilities focus their attention to employ up-to-date communication technology to the automation of their power plants and distribution systems. Automation Systems in Korea was installed using twisted pair cable(TPC), power line carrier(PLC), coaxial cable(CA), wireless network(wireless data, TRS and PCS). Among the communication media only Satellite Communication guarantees the reliable communication in case of emergency such as a flood, a heavy snow and an earthquake. It can integrate two-way satellite systems to existent nationwide SCADA controlling points of electric power transmission & distribution system that enables real time remote monitoring and controlling automatically. This paper presents some of design efforts for the satellite communication network as the media of Automation Systems.

  • PDF

Distributed Structural Analysis Method on Network of PCs using Substructuring Techniques (부구조기법을 이용한 PC level 분산구조해석법)

  • 박효선;박성무;성창원;김재홍
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1998.10a
    • /
    • pp.53-60
    • /
    • 1998
  • Efficiency of design process for large scale structures highly depends on the development of efficient structural analysis and structural response control algorithms because a successful design involves a number of structural analysis based on iterative structural response control process. In this paper, distributed structural analysis model on multiple personal computers connected by ethernet network is presented. To reduce communication cost required in the process of analysis, substructuring techniques are adopted to evenly distribute computational loads on each processor. With its applications on structural analysis of plane frame structures, performance of the proposed computational model are presented in detail.

  • PDF

Performance Evaluation of Distributed MAC Protocol Algorithm for Efficient Multimedia Transmission (효율적인 멀티미디어 전송을 위한 분산방식 MAC 프로토콜 성능분석)

  • Kim, Jin Woo;Lee, Seong Ro
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.5
    • /
    • pp.573-581
    • /
    • 2014
  • The salient features of UWB(Ultra WideBand) networks such as high-rate communications, low interference with other radio systems, and low power consumption bring many benefits to users, thus enabling several new applications such as wireless universal serial bus (WUSB) for connecting personal computers (PCs) to their peripherals and the consumer-electronics (CE) in people's living rooms. Because the size of multimedia data frame, WiMedia device must transmit the fragment of MSDU. However, when the fragment of MSDU is lost, WiMedia device maintains active mode for the time to complete the transmission MSDU, and there is a problem that unnecessary power consumption occurs. Therefore we propose new power management scheme to reduce unnecessary power consumption of WiMedia devices in the case that the fragment is lost.

Underwater Acoustic Mavlink Communication for Swarming AUVS

  • Muller, Yukiko;Oshiro, Shiho;Motohara, Takuma;Kinjo, Atsushi;Suzuki, Taisaku;Wada, Tomohisa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.277-283
    • /
    • 2021
  • The objective of this project is to conduct an underwater survey. The primary goal is to develop a device that can achieve the desired output under test conditions. For this reason, certain practical considerations must be taken into account, and the implementation is then developed to be carried out to obtain stable performance with the available hardware based on that experiment. The experiment was performed via BlueROV2 (Remotely Operated Vehicle) using RaspberryPi and softwares such as QGC (QGroundControl) and ArduPilot. This paper explains the work, the results with the collected data and how we implemented the work is presented in the end. The intention of this experiment is to connect two PCs using RaspberryPi with MAVLink communication using a Commercial-Off-The-Shelf device.

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

A Design of Network Management System for Efficiently Isolating Devices Infected with ARP Spoofing Virus (ARP spoofing 바이러스에 감염된 단말을 효율적으로 분리하기 위한 네트워크 관리시스템의 설계)

  • Ko, Bong-Koo;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.641-648
    • /
    • 2013
  • ARP spoofing is a typical Internet attack, in which an attacker sends data by changing his's MAC address with the other's one. Currently, this attack is usually dealt with separating the attacking PCs infected with ARP spoofing virus, by keeping network devices investigating by the network manager. However, this manual process has some limitations in time and accuracy. This paper proposes a new network management system to replace the effort of network manager who has to keep on inspecting the network. Along with designing an ARP analyzer and a disconnection notifier and adding them into the existing network management system, the proposed system provides a basement to identify and notify the PC infected by an ARP spoofing virus with fast and high accuracy. As a result, it is expected to minimize the network break off and to make easy the network management.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

Implementation of 500BASE-T with 2 Pairs UTP (2조 UTP를 이용한 500BASE-T의 구현)

  • Chung, Hae;Jeon, Seong-Bae;Kim, Jin-Hee;Park, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1150-1158
    • /
    • 2011
  • More than 100 Mbps rate is needed in the UBcN for a subscriber to receive broadband traffics with multi-channel like UDTV or 3DTV. Although the optical fiber is recently deployed for the FTTH, the UTP is the most widely used medium and will be used in UBcN age. Network providers may consider the 1000BASE-T or the vectorized VDSL if they adopts the UTP in the place where does not have optical fibers. But UTP should be expanded because 1000BASE-T and vectorized UTP needs 4 and 3 pairs cable, respectively while residential region has not exceeding 2 pair UTP cable. To solve the problem, we propose a 500BASE-T technology using 2 pairs UTP in this paper. The technology introduces a rate adaptation sublayer and a SERDES sublayer above and under the PCS, respectively. The rate adaptation sublayer is compatible for the GMII. Also, if we modify the SERDES sublayer, the technology can easily obtain 250BASE-T with 2 pairs UTP. We implement such functions with FPGA and analog board and verify the function of rate adaptation and symbol vector synchronization, and effective transmission rate by experiments. In particular, we show that link efficiency is increased by enable control in the rate adaptation sublayer.