• Title/Summary/Keyword: Wireless Network technology

Search Result 2,288, Processing Time 0.032 seconds

A study of network mobility for internet service in railway system (철도에서 무선 네트워크 이동성 적용기술 연구)

  • Cho B. K.
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1223-1228
    • /
    • 2004
  • The study for ubiquitous computing infra is proceeding actively, it make possible to use service and access network anywhere, anytime because of wire/wireless communication technology and progress of hardware. Domestically, study for the network mobility support technology which is the key technology for future ubiquitous computing realization have progressed, but that is insufficient. Especially, there is no study for independent mobility support study about railway wireless network. So, this study propose network mobility management technology for mobile network infra in railway and proper network model in train.

  • PDF

A study of network mobility for internet service in railway system (열차에서 이동네트워크 적용 방안)

  • Cho, Bong-Kwan;Jung, Jae-Il
    • Proceedings of the KIEE Conference
    • /
    • 2005.04a
    • /
    • pp.241-243
    • /
    • 2005
  • The study for ubiquitous computing infra is proceeding actively, it make possible to use service and access network anywhere, anytime because of wire/wireless communication technology and progress of hardware. Domestically, study for the network mobility support technology which is the key technology for future ubiquitous computing realization have progressed, but that is insufficient. Especially, there is no study for independent mobility support study about railway wireless network. So, this study propose network mobility management technology for mobile network infra in railway and proper network model in train.

  • PDF

Outage Analysis of CRNs with SC Diversity Over Nakagami-m Fading Environment

  • Zhang, Zongsheng;Wu, Qihui;Zheng, Xueqiang;Wang, Jinlong;Li, Lianbao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3003-3017
    • /
    • 2013
  • In this paper, we investigate the outage performance of a cognitive relay network. We consider mutual interference in an independent, non-identically distributed Nakagmai-m fading environment. We first derive the close-form outage probability expression, which provides an efficient means to evaluate the effects of several parameters. This allows us to study the impact of several parameters on the network's performance. We then derive the asymptotic expression and reveal that the diversity order is strictly determined by the fading severity of the cognitive system. It is not affected by the primary network. Moreover, the primary network only affects the coding gain of the cognitive system. Finally, Monte Carlo simulations are provided, which corroborate the analytical results.

Proportional-Fair Downlink Resource Allocation in OFDMA-Based Relay Networks

  • Liu, Chang;Qin, Xiaowei;Zhang, Sihai;Zhou, Wuyang
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.633-638
    • /
    • 2011
  • In this paper, we consider resource allocation with proportional fairness in the downlink orthogonal frequency division multiple access relay networks, in which relay nodes operate in decode-and-forward mode. A joint optimization problem is formulated for relay selection, subcarrier assignment and power allocation. Since the formulated primal problem is nondeterministic polynomial time-complete, we make continuous relaxation and solve the dual problem by Lagrangian dual decomposition method. A near-optimal solution is obtained using Karush-Kuhn-Tucker conditions. Simulation results show that the proposed algorithm provides superior system throughput and much better fairness among users comparing with a heuristic algorithm.

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

Wireless PACS

  • Kim, Hyeon-Cheol
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.5 no.1
    • /
    • pp.130-136
    • /
    • 2002
  • One of current trends of medical technology is analog to digital. Moreover, The Government put a premium on PACS(Picture Archiving and Communication System) for Medical Insurance in November, 1999. Therefore many hospitals are installing(or planning to install) PACS facilities on their buildings. However most of hospitals didn't consider PACS facilities in the beginning of construction. In particular, the Networking is one of the most difficult things for PACS installation. There is no space for network equipments, and no path for network lines, etc. To solve these problems, wireless network is proposed. The wireless network is divided to three parts mainly. One is the wireless communication for Local Area Network, another is the data transmission through a satellite for Tele-Radiology, and the last one is the technology using Bluetooth for each sub-system of PACS. But there are other problems in wireless systems, i.e., network bandwidth, system stability, interference with other devices. The purpose of this paper is to suggest the future and new trend of PACS including all the problems.

  • PDF

FENC: Fast and Efficient Opportunistic Network Coding in wireless networks

  • Pahlavani, Peyman;Derhami, Vali;Bidoki, Ali Mohammad Zareh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.52-67
    • /
    • 2011
  • Network coding is a newly developed technology that can cause considerable improvements in network throughput. COPE is the first network coding approach for wireless mesh networks and it is based on opportunistic Wireless Network Coding (WNC). It significantly improves throughput of multi-hop wireless networks utilizing network coding and broadcast features of wireless medium. In this paper we propose a new method, called FENC, for opportunistic WNC that improves the network throughput. In addition, its complexity is lower than other opportunistic WNC approaches. FENC utilizes division and conquer method to find an optimal network coding. The numerical results show that the proposed opportunistic algorithm improves the overall throughput as well as network coding approach.

Evolution of Wireless Technologies: Exploring the Technology Trajectory in Competitive Wireless Industry (무선통신기술의 진화: 무선통신산업 경쟁하의 기술 경로 탐색)

  • Kim, Hak-J.
    • Information Systems Review
    • /
    • v.13 no.2
    • /
    • pp.43-54
    • /
    • 2011
  • The paper presents the technology trajectory of competitive wireless technologies in wireless industry. We attempt to trace the trajectory of wireless technologies with historical data, and then analyze its pattern. As a preliminary result, we find that there exists network effect and substitution effect in the trajectory. Our result can provide insight to wireless service providers where best to focus its efforts for maximizing overall gain in their networks as well as when to establish the transition strategy towards the next generation wireless network technologies.

Optimal Price Strategy Selection for MVNOs in Spectrum Sharing: An Evolutionary Game Approach

  • Zhao, Shasha;Zhu, Qi;Zhu, Hongbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3133-3151
    • /
    • 2012
  • The optimal price strategy selection of two bounded rational cognitive mobile virtual network operators (MVNOs) in a duopoly spectrum sharing market is investigated. The bounded rational operators dynamically compete to sell the leased spectrum to secondary users in order to maximize their profits. Meanwhile, the secondary users' heterogeneous preferences to rate and price are taken into consideration. The evolutionary game theory (EGT) is employed to model the dynamic price strategy selection of the MVNOs taking into account the response of the secondary users. The behavior dynamics and the evolutionary stable strategy (ESS) of the operators are derived via replicated dynamics. Furthermore, a reward and punishment mechanism is developed to optimize the performance of the operators. Numerical results show that the proposed evolutionary algorithm is convergent to the ESS, and the incentive mechanism increases the profits of the operators. It may provide some insight about the optimal price strategy selection for MVNOs in the next generation cognitive wireless networks.

Study of the Wireless Ad-hoc Networks with Robust Route Maintenance Scheme

  • Hong, Geun-Bin;Yun, Ji-Hun;Kim, Kwan-Woong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.2
    • /
    • pp.46-49
    • /
    • 2010
  • This paper has proposedfor wireless Ad-hoc networks with robust route maintenance schemes. The device feature Bluetooth and/or IEEE 802.11 network interfaces and communicate in a decentralized manner. The nodes have the responsibility of self-organizing so that the network is robust to the variations in network topology due to node mobility as well as the fluctuations of the signal quality in the wireless environment.

  • PDF