• Title/Summary/Keyword: digital wireless network

Search Result 480, Processing Time 0.029 seconds

Wireless Access Network Architecture and Virtualization Scenarios for Next-Generation Mobile Communication Networks (차세대 이동통신 네트워크를 위한 무선 액세스 망 구조 및 가상화 시나리오)

  • Kim, Myunghwan;Kim, Su Min;Jung, Bang Chul;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2150-2162
    • /
    • 2012
  • In accordance with evolution of next-generation mobile Internet, 2G, 3G, 4G, and B4G mobile communication wireless access networks will be co-existed and service providers will be merged as an integrated service provider. In addition, multiple virtual service operators will appear. In order to provide complicated unified-services, in the future Internet, wireless network virtualization where network resource is shared by various service operators is necessary. Therefore, in this paper, we investigate network architectures and virtualization scenarios for wireless access network virtualization where various wireless access technologies are flexibly operated by multiple service providers over next-generation wireless access networks. We expect that the virtualization scenario and network architecture yielded from this study can play a role as a basis for development of wireless access network virtualization algorithms.

Remote Devices Data Monitoring System based on Wireless PDA (무선 PDA 기반의 원격 장치 데이터 모니터링 시스템)

  • Seo, Jung-Hee;Kim, Kil-Young;Park, Hung-Bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.611-614
    • /
    • 2007
  • This paper suggests a TCP/IP-based remote data monitoring system, which combines PDA (Personal Digital Assistant) and WLAN (Wireless Local Area Network) technologies. Wireless PDA devices are used for remote monitoring of wireless communication by continuously collecting remote device data transmitted from servers such as temperature, humidity and device status, and displaying them on mobile devices. Therefore, remote data monitoring systems that integrate wireless and wired services provide data collection adaptive to administrators and efficient identification of device status.

  • PDF

Gateway Platform for Connecting D-TRS in Electric Power IT (전력 IT용 D-TRS 접속을 위한 게이트웨이 플랫폼)

  • Song, Byung-Kwen;Jeong, Tae-Eui
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.1
    • /
    • pp.45-54
    • /
    • 2009
  • TETRA(Terrestrial Trunked Radio) is the standard of D-TRS(Digital Trunked Radio System) developed by the ETSI(European Telecommunications Standards Institute). Currently, TETRA has been selected as Electric Power IT Wireless Backbone Network. Traditional distribution automation system has used the wireless network of Mobile Service Provider using CDMA(Code-Division Multiple Access) and WCDMA(Wideband CDMA) modem. Therefore, the development of gateway platform is indispensable according to the change to TETRA network. In this paper, we propose an embedded Linux-based Gateway platform for transmitting Industrial Electric Power IT protocol using TETRA network.

The Implementation of UWB and 60GHz Band Wireless Communication Technology for Wireless Home Network and Their Market Prospect (무선 홈네트워크 구현을 위한 UWB와 60GHz 대역 무선 통신 기술의 활용방안과 시장전망)

  • Hong, Seok-Soo;Park, Jong-Hun;Lee, Dong-Joo;Lee, Jae-Sup;Hong, Jung-Wan;Lie, Chang-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.195-212
    • /
    • 2008
  • The demand of wireless communication system is increasing due to the development of computers and other digital media appliances. In particular, new wireless communication technology is necessary for implementation of home network since a lot of data transmission is occurred. Recently, two wireless communication technologies, Ultra Wide Band(UWB) and 60GHz band wireless communication technology, have being developed for high-speed data transmission and Wireless Personal Area Network(WPAN). In this paper, we study the present development condition of these two technologies and a role of them in home network. We also suggest the method to implement the home network using all wireless communication technologies. At the end, we outlook the market of WPAN and High Definition Multimedia Interface(HDMI).

  • PDF

A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks (PCS/SCADA 센서 네트워크용 키 관리 프로토콜에 대한 보안 분석)

  • Park, DongGook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.123-131
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. Recently, Nilsson et al. proposed a key management scheme for PCS/SCADA, which was claimed to provide forward and backward secrecies. In this paper, we define four different types of adversaries or attackers in wireless sensor network environments in order to facilitate the evaluation of protocol strength. We then analyze Nilsson et al. 's protocol and show that it does not provide forward and backward secrecies against any type of adversary model.

A Study on the Virtual Reality Simulation Monitoring Verification System Available Wireless Communication Network (무선 통신망을 활용한 VR 시뮬레이션 관제상황 검증 시스템에 관한 연구)

  • Lee, Yang-Sun;Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.7 no.3
    • /
    • pp.193-197
    • /
    • 2006
  • In this paper, We proposed monitoring verification system using virtual reality simulation technology in monitoring fields for peculiar environment. Also, we analyzed the proposed system about required technology issues and operation process. The proposed monitoring verification system available wireless communication network is expected that application is possible in medical treatment field or special dangerous article processing filed as well as monitoring verification of mobile electric railcar

  • PDF

Implementation of Wireless Network Planning System for HSPA + and CCC (HSPA+와 CCC를 위한 무선망 설계 시스템의 구현)

  • Bae, Young-Ho;Kim, Byung-Woo;Lee, Seong-Choon
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.4
    • /
    • pp.158-163
    • /
    • 2010
  • KT will deploy HSPA+/CCC network in this year to handle data explosion. CCC is an evolutionary wireless network architecture which divides a node B into baseband and radio part. By collecting baseband units in a digital unit central station and installing only remote units on desired sites, the operator can reduce the total cost of ownership and $CO_2$ emission. In this paper, we describe some expected problems in deploying HSPA+/CCC network, and how to implement the wireless network planning system to solve them effectively.

  • PDF

Disconnection of Wireless LAN Attack and Countermeasure (무선 LAN 연결 해제 공격과 보안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.453-458
    • /
    • 2013
  • In a wireless LAN environment, security is the most important. Security of 802.11 standard has many vulnerabilities of the network attack. IEEE has created mechanisms to security for this vulnerability. But the vulnerabilities is characteristic of broadcast in the air in wireless LAN, it is more disclosure then other network environments. In a wireless LAN environment, it can be accessed to the wireless LAN after authentication. Authentication process is one of most important because of the first security step. However, in the authentication process is not mentioned in the method of reducing the disclosure maximum fundamental. Therefore, in this research, the vulnerability of 802.11 are presented and how to do de-authentication in 802.11.

SDH network conversion system design for wireless transmission (무선 전송을 위한 SDH 네트워크 연동장치 설계)

  • Park, Chang-Soo;Kim, Jong-Hyoun;Yoo, Ji-Ho;Yoon, Byung-Su;Kim, Su-Hwan;Byun, Hyun-Gyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.461-463
    • /
    • 2018
  • In this paper, we have studied the devices needed for long distance wireless transmission of SDH network. This devices propose wireless transmission and measurement method of STM-1(basic transmission unit of SDH method) signal and 200Mbps synchronous ethernet. The synchronous clock recovery function is provided for STM-N transmission and synchronous ethernet transmission, and spare clock switching function is designed for stable synchronization. In addition, we discussed the measurement method of STM-N and synchronous Etherent communication method in wireless transmission section.

  • PDF

An Adaptive Traffic Interference Control System for Wireless Home IoT services (무선 홈 IoT 서비스를 위한 적응형 트래픽 간섭제어 시스템)

  • Lee, Chong-Deuk
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.259-266
    • /
    • 2017
  • The massive traffic interferences in the wireless home IoT provides the reason for packet losses, and it degrades the QoS (Quality of Service) and throughput on the home network. This paper propose a new adaptive traffic interference control system, ATICS, for enhancing QoS and throughput for IoT services as detecting a traffic process and non-traffic process in the wireless home network. The proposed system control the traffic interferences as distinguishing the short-term traffic process and long-term traffic process by traffic characteristics in wireless home networks. The simulation results shows that the proposed scheme have more efficient traffic control performance than the other schemes.