• Title/Summary/Keyword: WiMAX CPE

Search Result 2, Processing Time 0.019 seconds

Implementation of WiFi-to-WiBro Access Point -WiMAX CPE (WiFi-to-WiBro Access Point 구현 -WiMAX CPE)

  • Park, Chun-Kwan;Song, Han-Young;Jeon, Byung-Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.53-63
    • /
    • 2009
  • This paper is to develop WiMAX CPE(wireless AP) that can provides Wi-Fi terminal with wireless Internet service by connecting to Wibro wireless network. This AP aims to support WiBro in upstream interface basically, and Wi-Fi and 100M Ethernet interface in downstream. So, we has developed the equipment for business that wireless ISP can provide many Internet customers with wireless Internet service by using Wi-Fi terminal in subway, car, ship, and so on, and the equipment for users that a user can purchase and then install in person. For the latter, multiple Wi-Fi terminals that be registered in WiBro service can be connected to Internet simultaneously.

  • PDF

A Study on Similarity Analysis of SNMP MIB File (SNMP MIB 파일의 유사도 분석에 관한 연구)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2019
  • Many similarity analysis methods, one of the dispute resolution methods for computer programs, have been studied. This paper is about quantitative similarity analysis of MIB (Management Information Base) file. Quantitative similarity means that the source codes of two computers are analyzed and the results are compared with a certain standard. The source code to analyze is a program that provides network device management functions such as configuration management, fault management, and performance management using SNMP protocol for WiMAX CPE devices. Here, WiMAX refers to the IEEE 802.16 wireless network standard protocol and can be classified into fixed WiMAX and mobile WiMAX. WiMAX CPE is a wireless Internet terminal that is fixedly used in a customer's home or office. In this paper, we analyze the similarity between MIB file of company A and company B. We will analyze whether the MIB file leaked from the damaged company is not just a list to describe the product specifications, but whether the property value can be recognized.