• Title/Summary/Keyword: Wireless Network technology

Search Result 2,287, Processing Time 0.028 seconds

The Implementation of UWB and 60GHz Band Wireless Communication Technology for Wireless Home Network and Their Market Prospect (무선 홈네트워크 구현을 위한 UWB와 60GHz 대역 무선 통신 기술의 활용방안과 시장전망)

  • Hong, Seok-Soo;Park, Jong-Hun;Lee, Dong-Joo;Lee, Jae-Sup;Hong, Jung-Wan;Lie, Chang-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.195-212
    • /
    • 2008
  • The demand of wireless communication system is increasing due to the development of computers and other digital media appliances. In particular, new wireless communication technology is necessary for implementation of home network since a lot of data transmission is occurred. Recently, two wireless communication technologies, Ultra Wide Band(UWB) and 60GHz band wireless communication technology, have being developed for high-speed data transmission and Wireless Personal Area Network(WPAN). In this paper, we study the present development condition of these two technologies and a role of them in home network. We also suggest the method to implement the home network using all wireless communication technologies. At the end, we outlook the market of WPAN and High Definition Multimedia Interface(HDMI).

  • PDF

Push-Pull Distributed Movement Algorithm toy An Optimized Coverage of Mobile Base Station in Topology-less Wireless Networks

  • Unhawiwat, Mallika;Wipusitwarakun, Komwut
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1936-1939
    • /
    • 2002
  • Much recent attention on wireless technologies s put on topology-less wireless network, in which all nodes an be mobile and can communicate over wireless links, due to its ease of deployment, high flexibility and low expenses. One key in topology-less wireless network is mobile base stations (MBSs), which provides access points or mobile terminals (MTs) to wireless backbone network. MBSs can move to anywhere in accordance with changes in geographical distribution of MTs. They serve as dynamic odes. However, in order to utilize network resources and take full advantage of this topology-less network, MBSs must move to suitable position according to the current tate of network use. Moreover, MBSs have to consider the distance among them to avoid the crash and gap area of MBSs. Therefore, this paper proposes MBS movement algorithm by implementing push-pull method to fulfill the corporation of MBSs and considering the center of covered MTs or centroid to satisfy the MT coverage. From the simulation results, the proposed algorithm increases the performance of system when comparing with the centroid-based algoriom〔7〕, such as coverage area, MT coverage and call drops rate.

  • PDF

The Sensor Network based Home Control System: Supporting the Next Generation Home Gateway System for a Ubiquitous Home Environments

  • Park, Young-Choong;Ahn, Yang-Keun;Choi, Kwang-Soon;Jung, Kwang-Mo;Kim, Seong-Dong
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.1 no.1
    • /
    • pp.23-27
    • /
    • 2007
  • Fruition for a diverse uIT(Ubiquitous Information Technology) service is currently required through the convergence of what is known as ubiquitous computing technology. In recent years, with the rapid growth of the need for information services, heavier demands have been made upon the supply of high-quality multimedia services that require a high bandwidth. Today, various home network solutions have been proposed to manage these service smoothly and a system able to deal with various types of network traffic without delays. In addition, in established home network environments that mix wired and wireless networks, along with the steady evolution of wireless network technology and the earnest development of ubiquitous computing technology, sensor-based wireless networks have emerged as a core solution for home networks. In this paper, a sensor network-based home control system supporting the next generation home gateway system for ubiquitous home environments is designed and implemented.

  • PDF

A study of network mobility for internet service in railway system (철도에서 네트워크 이동성 적용 방안)

  • Cho, B.K.
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.255-257
    • /
    • 2004
  • The study for ubiquitous computing infra is proceeding actively, it make possible to use service and access network anywhere, anytime because of wire/wireless communication technology and progress of hardware. Domestically, study for the network mobility support technology which is the key technology for future ubiquitous computing realization have progressed, but that is insufficient. Especially, there is no study for independent mobility support study about railway wireless network. So, this study propose network mobility management technology for mobile network infra in railway and proper network model in train.

  • PDF

Development of a Multiple SMPS System Controlling Variable Load Based on Wireless Network

  • Ko, Junho;Park, Chul-Won;Kim, Yoon Sang
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1221-1226
    • /
    • 2015
  • This paper proposes a multiple switch mode power supply (SMPS) system based on the wireless network which controls variable load. The system enables power supply of up to 600W using 200W SMPS as a unit module and provides a controlling function of output power based on variable load and a monitoring function based on wireless network. The controlling function for output power measures the variation of output power and facilitates efficient power supply by controlling output power based on the measured variation value. The monitoring function guarantees a stable power supply by observing the multiple SMPS system in real time via wireless network. The performance of the proposed system was examined by various experiments. In addition, it was verified through standardized test of Korea Testing Certification. The results were given and discussed.

Tunnel Inspection and Monitoring System by Wireless Sensor Network (무선센서네트워크를 이용한 터널 모니터링 시스템)

  • Kim Hyung-Woo;Han Jin-Woo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.91-94
    • /
    • 2006
  • In this paper, we deployed the tunnel inspection and monitoring system by wireless sensor network. It is shown that the wireless sensor network which is composed of sensor, wireless communication module, and gateway system can be applied to tunnel monitoring system. Sensors included herein are acceleration transducers, fire-alarm sensors, water-level sensors, and magnetic contact sensors. It is also found that the wireless sensor network can deliver sensing data reliably by ad-hoc networking technology. The gateway system that can send the sensing data to server by CDMA (code division multiple access) is developed. Finally, monitoring system is constructed by web service technology, and it is observed that this system can monitor the present state of tunnel without difficulties. Furthermore, the above system provides an alternative to inspect and monitor the tunnel efficiently where the conventional wired system cannot be applied.

  • PDF

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

Social-Aware Resource Allocation Based on Cluster Formation and Matching Theory in D2D Underlaying Cellular Networks

  • Zhuang, Wenqin;Chen, Mingkai;Wei, Xin;Li, Haibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.1984-2002
    • /
    • 2020
  • With the appearance of wireless spectrum crisis in traditional cellular network, device-to-device (D2D) communication has been regarded as a promising solution to ease heavy traffic burden by enabling precise content delivery among mobile users. However, due to the channel sharing, the interference between D2D and cellular users can affect the transmission rate and narrow the throughput in the network. In this paper, we firstly present a weighted interference minimization cluster formation model involving both social attribute and physical closeness. The weighted-interference, which is evaluated under the susceptible-infected(SI) model, is utilized to gather user in social and physical proximity. Then, we address the cluster formation problem via spectrum clustering with iterative operation. Finally, we propose the stable matching theory algorithm in order to maximize rate oriented to accomplish the one-to-one resource allocation. Numerical results show that our proposed scheme acquires quite well clustering effect and increases the accumulative transmission rate compared with the other two advanced schemes.

Applying Artificial Intelligence Based on Fuzzy Logic for Improved Cognitive Wireless Data Transmission: Models and Techniques

  • Ahmad AbdulQadir AlRababah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.13-26
    • /
    • 2023
  • Recently, the development of wireless network technologies has been advancing in several directions: increasing data transmission speed, enhancing user mobility, expanding the range of services offered, improving the utilization of the radio frequency spectrum, and enhancing the intelligence of network and subscriber equipment. In this research, a series of contradictions has emerged in the field of wireless network technologies, with the most acute being the contradiction between the growing demand for wireless communication services (on operational frequencies) and natural limitations of frequency resources, in addition to the contradiction between the expansions of the spectrum of services offered by wireless networks, increased quality requirements, and the use of traditional (outdated) management technologies. One effective method for resolving these contradictions is the application of artificial intelligence elements in wireless telecommunication systems. Thus, the development of technologies for building intelligent (cognitive) radio and cognitive wireless networks is a technological imperative of our time. The functions of artificial intelligence in prospective wireless systems and networks can be implemented in various ways. One of the modern approaches to implementing artificial intelligence functions in cognitive wireless network systems is the application of fuzzy logic and fuzzy processors. In this regard, the work focused on exploring the application of fuzzy logic in prospective cognitive wireless systems is considered relevant.