• Title/Summary/Keyword: digital wireless network

Search Result 480, Processing Time 0.025 seconds

An Implementation of High-performance Router Platform Supporting IPv6 that can High-speed Wired/wireless Interface and QoS (IPv6를 지원하는 초고속 유/무선 인터페이스와 QoS제공 가능한 고성능 라우터 플랫폼 개발)

  • Ryoo, Kwang-Seok;Seo, In-Ho;Shin, Jae-Heung
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.66 no.4
    • /
    • pp.229-235
    • /
    • 2017
  • Until now, a study on a ubiquitous sensor network has been mainly concentrated in the areas of sensor nodes, and as a results, technologies related with sensor node were greatly developed. Despite of many achievements on research and development for a sensor node, a ubiquitous sensor network may failed to establish the actual service environment because variety of restrictions. In order to provide a actual service using a ubiquitous sensor networks applied to many results on research and development for a sensor nodes, a study on a wired/wireless composite router must be carried out. However a study on a wired/wireless composite router is relatively very slow compared with the sensor node. In this study, developed a high-performance router platform supporting IPv6 that can provide high-speed wired/wireless interface and QoS, and it can provide the multimedia service Interlocking the wireless sensor network and the Internet network. To analysis a given network environment and to develop the appropriate hardware and software in accordance with this requirement.

A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment (Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

A Study on Improving TCP Performance in Wireless Network (무선 네트워크에서 TCP성능향상을 위한 연구)

  • Kim, Chang-Hee
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.279-289
    • /
    • 2009
  • As the TCP is the protocol designed for the wired network that packet loss probability is very low, because TCP transmitter takes it for granted that the packet loss by the wireless network characteristics is occurred by the network congestion and lowers the transmitter's transmission rate, the performance is degraded. In this article, we suggest the newly improved algorithm using two parameters, the local retransmission time value and the local retransmission critical value to the BS based on the Snoop. This technique adjusts the base stations local retransmission timer effectively according to the wireless link status to recover the wireless packet loss rapidly. We checked that as a result of the suggested algorithm through various simulations, A-Snoop protocol improve more the wireless TCP transmission rate by recovering the packet loss effectively in the wireless link that the continuous packet loss occur than the Snoop protocol.

  • PDF

A Review of Mobile Data Traffic Explosion according to Digital Convergence and Action Plans of Network Operator (디지털 컨버전스 활성화에 따른 모바일 데이터 트래픽 증가 현황에 대한 고찰 및 대응 방안 모색)

  • Park, Bok-Nyong;Moon, Tae-Hee;Kwack, Jun-Yeung;Kwon, June-Hyuk
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.4
    • /
    • pp.131-140
    • /
    • 2010
  • Recently, mobile wireless data traffic has been dramatically increased due to not only the popularization of digital convergence devices including smart phone, Net-book, and Tablet PC, but also the vitalization of wireless Internet related eco-systems such as AppStore. In addition, it is expected that a tremendous increase in mobile data is caused by the release of unlimited mobile data plans (flat-fee). In order to deal with such mobile data traffic explosion, it is necessary that network operators should make efforts to offload wireless data traffic. This paper reviews the condition of mobile wireless data traffic in domestic and international telecommunication industry and looks for various action plans to overcome the difficulty of network operators.

  • PDF

A Study on the Authentication Mechanism for Wireless Mesh Network (무선 메쉬 네트워크를 위한 인증 메커니즘에 관한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.117-126
    • /
    • 2009
  • Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network access for both mesh and conventional clients. The integration of WMNs with other networks such as the Internet, cellular, IEEE 802.11, IEEE 802.15, IEEE 802.16, sensor networks, etc., This paper presents a secure and efficient authentication mechanism for Wireless mesh network. The validity of proposed mechanism is provided by BAN logic and the efficiency of suggested mechanism is showed through the performance evaluation.

A Priority Time Scheduling Method for Avoiding Gateway Bottleneck in Wireless Mesh Networks (무선 메쉬 네트워크에서 게이트웨이 병목 회피를 위한 우선순위 타임 스케줄링 기법)

  • Ryu, Min Woo;Kim, Dae Young;Cha, Si Ho;Cho, Kuk Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.101-107
    • /
    • 2009
  • In existing wireless ad-hoc networks, how to distribute network resources fairly between many users to optimize data transmission is an important research subject. However, in wireless mesh networks (WMNs), it is one of the research areas to avoid gateway bottleneck more than the fair network resource sharing. It is because WMN traffic are concentrated on the gateway connected to backhaul. To solve this problem, the paper proposes Weighted Fairness Time-sharing Access (WFTA). The proposed WFTA is a priority time scheduling scheme based on Weighted Fair Queuing (WFQ).

Cluster Head Chain Routing Protocol suitable for Wireless Sensor Networks in Nuclear Power Plants (원전 무선 센서 네트워크에 적합한 클러스터 헤드 체인 라우팅 프로토콜)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.61-68
    • /
    • 2020
  • Nuclear power plants have a lower cost of power generation, and they are more eco-friendly than other power generation plants. Also, we need to prepare nuclear plant accidents because of their severe damage. In the event of a safety accident, such as a radiation leak, by applying a wireless sensor network to a nuclear power plant, many sensor nodes can be used to monitor radiation and transmit information to an external base station to appropriately respond to the accident. However, applying a wireless sensor network to nuclear power plants requires routing protocols that consider the sensor network size and bypass obstacles such as plant buildings. In general, the hierarchical-based routing protocols are efficient in energy consumption. In this study, we look into the problems that may occur if hierarchical-based routing protocols are applied to nuclear power plants and propose improved routing protocols to solve these problems. Simulation results show that the proposed routing protocol is more effective in energy consumption than the existing LEACH protocol.

A secure authentication system on wired wireless integrated network using OpenFlow (OpenFlow를 이용한 유‧무선 통합 네트워크 환경에서의 인증 시스템)

  • Moon, Jeong-Kyung;Cho, Han Jin;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.285-291
    • /
    • 2014
  • Recent, development of wireless communication devices are rapidly and these device being deployed to the user very fast. By this results, a wired network device and the new device such as wireless devices incorporate. Then a demand of new mesh network is rapidly growing. In this wired/wireless integrated network environment, the network is configured automatically, and a user or wireless communication devices must be provided for authentication services. But, these services do not in the real world. Therefore, in this paper, we propose that wired/wireless integrated network environment to automatically configure the network using OpenFlow and the authentication system using Kerberos method. Our proposed system to be able to provide authentication services, confidentiality, integrity services for user or wired/wireless communication devices. And it can be prvented as well to man-in-the-middle attacks.

Design and Implementation of facility Management System based Ubiquitous (u-기반 시설물 관리 시스템 설계 및 구현)

  • Kim, Jung Jae;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.1-8
    • /
    • 2008
  • The USN is important in technique, unmanned observation using wireless network camera, detection technique that use intrusion detection sensor. But these encrypted data transmission and processing technique through sensor network, method of the staff's location recognition and arrangement aren't serviced still as a integrated system in facility security industry. This paper proposed that improve facility management, the staff present recognition and system efficiency using RFID, USN and wireless camera.

Wireless Access Network Virtualization Based on Distributed Antenna Systems (분산 안테나 시스템에 기반한 무선 액세스망 가상화)

  • Kim, Su Min;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2085-2094
    • /
    • 2012
  • In this paper, we propose a wireless access network virtualization algorithm based on a digital unit (DU)-radio unit (RU) separated network structure in a cellular network with multiple radio access technologies (RATs). The proposed wireless access network virtualization algorithm consists of a baseline access network virtualization, RAT virtualization, and access path migration algorithms. Final wireless access network virtualization is performed by sequentially performing these procedures. Through system-level simulations which assume 3GPP LTE and WiMAX systems, the performance of the proposed wireless access network virtualization is evaluated in terms of system throughput for two scenarios according to asymmetry of network traffic load. Numerical results show that our proposed wireless access network virtualization algorithm achieves significant system throughput gain even in asymmetric traffic load and user distribution situations.