• Title/Summary/Keyword: Wire. Wireless Internet

Search Result 135, Processing Time 0.023 seconds

Wireless Sensor Network based Remote Power Monitoring System for Anti Islanding application in Smart-Grid (스마트 그리드 내 독립전원의 단독운전 방지를 위한 무선 센서 네트워크 기반의 원격 전력 감시 시스템)

  • Kim, Kee-Min;Lee, Kyung-Jung;Moon, Chan-Woo;Ahn, Hyun-Sik;Jeong, Gu-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.57-62
    • /
    • 2010
  • Renewable energy and smart grid become the focus of attention of industry. The smart grid is an intelligent system which maximizes the efficiency of energy and it needs to monitor the amount of power generation and power consumption continuously. Remote Monitoring System(RMS) is very useful for monitoring the power generation and consumption, but mostly they are implemented on the wire communication. In this paper, we propose a wireless sensor network based remote power monitoring system. And as an application, a new anti-islanding method with the proposed RMS is presented. An experimental micro grid system is implemented to verify the proposed RMS and anti-islanding method.

Mail Extraction Engine in Mobile Using Markup Language Converter based on XML (XML 기반 마크업 언어 변환기를 이용한 Mobile용 Mail 추출엔진)

  • 박영삼;최병철;정영지
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.8
    • /
    • pp.1187-1193
    • /
    • 2002
  • There are POP3(Post Office Progocol 3) and IMAP4(Internet Message Access Protocol 4) for E-Mail service of wire Internet For mobile e-mail service that use wireless Internet, must use exclusive use mobile e-mail server in the case of POP3 e-mail or flow e-mail conversion and because e-mail is kept in sever side with remote file server in case of IMAP4 mail that is used by Web-Mail, utilization of mobile e-mail service is difficult by mobile client who there is no IMAP4 rules. This thesis embodying e-mail extraction engine for mobile that do to design markup language converter of XML base, and use Web-Mail of recently been generalizing IMAP4 base in mobile, presented mobile e-mail service method to do so that can use Web-Mail that is based on IMAP4 as well as POP3 mail service in mobile environment.

A Secure Protocol for Contents Service in IMT-2000 (IMT-2000 기반 컨텐츠 서비스를 위한 보안 프로토콜)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.241-252
    • /
    • 2003
  • IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information. However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 Project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and certification issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 certification method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.

Development of 2W-Level Wireless Powered Energy Harvesting Receiver using 60Hz power line in Electricity Cable Tunnel (전력구 내 지중선을 이용한 2W급 상용주파수 무선전력 수신장치 개발)

  • Jang, Gi-Chan;Choi, Bo-Hwan;Rim, Chun-Taek
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.21 no.4
    • /
    • pp.296-301
    • /
    • 2016
  • Using high magnetic flux from a 60 Hz high-current cable, a 2 W wireless-powered energy harvesting receiver for sensor operation, internet of things (IoT) devices, and LED lights inside electrical cable tunnels is proposed. The proposed receiver comprises a copper coil with a high number of turns, a ring-shaped ferromagnetic core, a capacitor for compensating for the impedance of the coil in series, and a rectifier with various types of loads, such as sensors, IoT devices, and LEDs. To achieve safe and easy installation around the power cable, the proposed ring-shaped receiver is designed to easily open or close using a clothespin-shaped handle, which is made of highly-insulated plastic. Laminated silicon steel plates are assembled and used as the core because of their mechanical robustness and high saturation flux density characteristic, in which the thickness of each isolated plate is 0.3 mm. The series-connected resonant capacitor, which is appropriate for low-voltage applications, is used together with the proposed receiver coil. The concept of the figure of merit, which is the product weight and cost of both the silicon steel plate and the copper wire, is used for an optimized design; therefore, the weight of the fabricated receiver and the price of raw material is 750 gf and USD $2 each, respectively. The 2.2 W powering capability of the fabricated receiver was experimentally verified with a power cable current of $100A_{rms}$ at 60Hz.

A Study on the High Performance TCP over Various Communication Links (다양한 통신 링크에서 고성능 TCP에 관한 연구)

  • Kim, Sang-Mi;Choe, Seon-Wan;Han, Seon-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.197-212
    • /
    • 2002
  • Transmission Control Protocol (TCP) [1] has been tuned as a reliable transfer protocol for traditional networks comprising wired links and stationary hosts with same link characteristics. TCP assumes that congestion in the network be a primary cause for packet losses and unusual delays. TCP performs welt over such networks adapting to end-to-end delays and congestion losses, by standard congestion control mechanisms, such as slow-start, congestion avoidance, fast retransmit and recovery. However, networks with wireless and other lossy links suffer from significant losses due to bit errors and handoffs. An asymmetry network such as ADSL has different bandwidth for both directions. As a result, TCP's standard mechanisms incur end-to-end performance degradation in various links. In this paper, we analyze the TCP problems in wireless, satellite, and asymmetry links, and measure the new TCP mechanisms that are recommended by IETF Performance Implications of Link Characteristics (PILC) WG[2], by using Network Simulator 2 (NS-2).

DEVELOPMENT OF iRTK (iNVERTED REAL-TIME KINEMATIC) SYSTEM BASED ON THE INTERNET (인터넷 기반 iRTK 시스템 개발)

  • Joh, Jeong-Ho;Park, Jong-Uk;Choi, Byung-Kyu;Park, Pil-Ho
    • Journal of Astronomy and Space Sciences
    • /
    • v.20 no.3
    • /
    • pp.197-204
    • /
    • 2003
  • We demonstrated positioning accuracy of iRTK system, which has been developed by Korea Astronomy Observatory, using a low-price GPS receiver. Each four different baseline positioning tests using the iRTK system, we certified 1-3 meters level positioning accuracy of the iRTK system. While the iRTK is similar to conventional RTK at coverage and accuracy, the iRTK positioning carried out from data processing center. And also, the iRTK system has no limit of data communication coverage because of using wire/wireless Internet. But the iRTK system has a weakness of short available coverage within 5km. Therefore we discussed a plan to adopt VRS (Virtual Reference System) as completion of the iRTK system preparing nation-wide iRTK service in near future.

Implementation and Performance Evaluation of Self-Similar Traffic Generator Using OPNET (OPNET을 이용한 자기유사성 트래픽 발생기 설계 및 성능 평가)

  • Han Kyeong-Eun;Jung Kwang-Bon;Lee Seung-Hyun;Kim Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5A
    • /
    • pp.441-450
    • /
    • 2006
  • Recently, with the exponential growth of the number of Internet users, IP traffic which occupies more than 90 percent of the entire Internet traffic affects significantly to the performance of networks. Therefore, the design of the self-similar traffic generator reflected the feature of IP traffic is very important to design the networks efficiently and evaluate the performance of it correctly. In this paper, we design the self-similar traffic generator using OPNET. In order to implement the self-similar characteristics, ON-OFF sources with Pateto distribution are employed and aggregated. The designed self-similarity traffic generator is evaluated and verified with R/S plot, variance time(VT) plot under the various offered loads and the number of sources. It is expected that the designed self-similar traffic generator can be put to practical use when wire or wireless networks is designed and verified as well as it can be useful to decide the specific parameter value for Internet traffic modeling.

Implementation of Performance Measurement and Power Monitoring System for Mobile Processor on Windows CE Environment (Windows CE 환경에서 모바일 프로세서의 성능 측정 및 전력 모니터링 시스템 구현)

  • Jeon, Byung-Chan;Choe, Gyu-Seok;Hong, You-Sik;Lee, Sang-Jeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.137-147
    • /
    • 2008
  • Recently, Power and thermal management are becoming major concerns in computer system design. The energy efficiency is an important attribute of the mobile and embedded systems. Today's powerful mobile processors needs more energy and longer battery life. Many research has been focused to reduce energy consumption for the mobile processors.In this paper, performance monitoring system for the Power-management techniques is implemented for Intel's XScale microarchitecture-based Marvell PXA320 processor on Windows CE platform. It also provides software interface for changing DVFS configuration. Performance and power consumption are measured for benchmark programs through performance counter value and voltage/current measurements on LabVIEW platform. By using the developed monitoring system, it is possible for dynamic power management to track processor's workload and to determine the actual power consumption.

  • PDF

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.