• Title/Summary/Keyword: Ubiquitous access

Search Result 406, Processing Time 0.035 seconds

Mobile Computing Algorithm on IEEE 802.11b for Ubiquitous Computing

  • Kim, Wu-Woan
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.1
    • /
    • pp.11-24
    • /
    • 2008
  • In this paper, the patterns of movement used in the mobile communication systems are adopted in the mobile computing environment to reduce handover delay and to support seamless handover for MIPv6 based on IEEE 802.11 networks. That is, RtSolPr message and PrRtAdv message can be treated before handover. As the result, it is possible to assign NCoA to MN and Next Access Router(NAR) before handover starts. This can minimize handover delay and reduce the total handover delay.

  • PDF

Data Processing Framework Design based on Smart Phon by Bluetooth (스마트폰 기반 블루투스 데이터 처리 프레임워크 설계)

  • Nam, Yong-Su;Kim, Tae-Yong;Lee, Hoon-Jae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.235-236
    • /
    • 2010
  • 본 논문에서는 블루투스 노드와 블루투스 AP(Access Point)를 이용하여 영화관, 기차역, 은행, 관공서 등의 다양한 장소의 키오스크 서버(Kiosk Server)에 모바일 기기로 원격으로 접속한다. 이때 모바일 단말기기는 사용자의 입력과 출력만을 담당하고 키오스크 서버는 전달된 데이터를 처리하여 사용자에게 전달하는 Profile의 프레임워크를 설계 한다.

  • PDF

A study of network mobility for internet service in railway system (철도에서 무선 네트워크 이동성 적용기술 연구)

  • Cho B. K.
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1223-1228
    • /
    • 2004
  • The study for ubiquitous computing infra is proceeding actively, it make possible to use service and access network anywhere, anytime because of wire/wireless communication technology and progress of hardware. Domestically, study for the network mobility support technology which is the key technology for future ubiquitous computing realization have progressed, but that is insufficient. Especially, there is no study for independent mobility support study about railway wireless network. So, this study propose network mobility management technology for mobile network infra in railway and proper network model in train.

  • PDF

A study of network mobility for internet service in railway system (열차에서 이동네트워크 적용 방안)

  • Cho, Bong-Kwan;Jung, Jae-Il
    • Proceedings of the KIEE Conference
    • /
    • 2005.04a
    • /
    • pp.241-243
    • /
    • 2005
  • The study for ubiquitous computing infra is proceeding actively, it make possible to use service and access network anywhere, anytime because of wire/wireless communication technology and progress of hardware. Domestically, study for the network mobility support technology which is the key technology for future ubiquitous computing realization have progressed, but that is insufficient. Especially, there is no study for independent mobility support study about railway wireless network. So, this study propose network mobility management technology for mobile network infra in railway and proper network model in train.

  • PDF

Analyses of Security Design for Home Gateway in Ubiquitous Surroundings (유비쿼터스 환경하에서의 홈게이트웨어를 위한 보안 설계 분석)

  • Kim Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.761-764
    • /
    • 2006
  • We have developed a new remote-configurable firewall system that provides secure and easy-to-use access to home-network appliances such as network cameras, PVRs, and home file servers, through the internet. With a simple web browser operation, remote users can dynamically open and close the firewall of the home gateway. The firewall rule creation is based on an authentication of the remote client, and thus only packets from the authorized client can pass through the firewall, we analyses the sorority design for home gateway in ubiquitous surroundings.

  • PDF

Defending Against Today's Advanced Persistent Threats (최신 APT 해킹공격에 대한 방어)

  • Marpaung, Jonathan A.P.;Lee, HoonJae
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.954-957
    • /
    • 2012
  • Recent high profile attacks have brought the attention of governments, corporations, and the general public towards the dangers posed by Advanced Persistent Threats. This paper provides an analysis of the attack vectors employed by these actors by studying several recent attacks. We present recommendations on how to best defend against these threats by better classification of critical information infrastructure and assets, people protection, penetration tests, access control, security monitoring, and patch management.

Development of a Bluetooth Access Point for One-Phone System

  • Min, Byung-Jo;Hwang, June;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.778-781
    • /
    • 2005
  • In this paper, we describe a development of a Bluetooth Access Point for the WAN connection of home network devices. Especially, users can access the PSTN at home instead of expensive digital cellular network through the AP, using the 'one-phone', which is the Bluetooth enabled cellular phone. The simultaneous benchmark test about telephone service and LAN access service shows the perfect compatibility and reasonable performance of the access point. The one-phone service can become a convergence of wired and wireless communication through the AP.

  • PDF

Constant Amplitude Multiple Access Channel Coding for Impulse Radio UWB Networks (임펄스 UWB 네트워크에서의 일정진폭 다중접속 채널코팅)

  • Kim, Tong-Sok;Kim, Yong-Cheol
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.6
    • /
    • pp.42-47
    • /
    • 2008
  • In this article a novel constant amplitude precoding for impulse UWB system is proposed. According to IEEE 802.15.4a, impulse UWB can be used in indoor localization and sensor data transmission. Most USN(ubiquitous sensor networks) needs multiple access. However impulse UWB system has a limited capability to detect superpositioned signal induced by multiple access. To overcome this problem we have adopted the concept of CAMC(Constant Amplitude Multi-Code) deviced by Wada and Kim. The proposed system consists of systematic constant amplitude precoding and LDPC decoding. And this system shows a good BER performance in computer simulation.

Adaptive Security Management Model based on Fuzzy Algorithm and MAUT in the Heterogeneous Networks (이 기종 네트워크에서 퍼지 알고리즘과 MAUT에 기반을 둔 적응적 보안 관리 모델)

  • Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.104-115
    • /
    • 2010
  • Development of the system which provides services using diverse sensors is expanding due to the widespread use of ubiquitous technology, and the research on the security technologies gaining attention to solve the vulnerability of ubiquitous environment's security. However, there are many instances in which flexible security services should be considered instead of strong only security function depending on the context. This paper used Fuzzy algorithm and MAUT to be aware of the diverse contexts and to propose context-aware security service which provides flexible security function according to the context.

Transport Performance Analysis of the SDR-based Interworking Networks Using DEVS Methodology (SDR을 포함하는 다종 네트워크의 전달성능 분석을 위한 DEVS 모델링 및 시뮬레이션 연구)

  • Song, Sang-Bok;Lee, Kyou-Ho;Jang, Won-Ick
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.153-158
    • /
    • 2008
  • The technology of Software Defined Radio (SDR) is a possible solution to interwork flexibly between various wireless transport protocols. Ubiquitous network, like u-health service network, includes sensor devices or nodes which do not facilitate all the same transport protocols to access network. As such this may be in such unreachable situations as poverty of all required AP (Access Point)’s, faults or contention in a path of particular protocol communication, etc. This paper presents research results of modeling and simulation to analyze transport performance of multi-protocol ubiquitous network which includes SDR-based interwork nodes and congestion-controlled AP’s. Focusing mainly on dynamics of overall transport performance rather than protocol execution procedures, this paper employs the Zeigler’s DEVS (Discrete Event Systems Specification) methodology and DEVSim++simulation environment to experiment.

  • PDF