• Title/Summary/Keyword: mutual networking

Search Result 43, Processing Time 0.026 seconds

Design of middleware in WSN for large scale glasshouse (대규모 유리 온실을 위한 WSN 환경에서의 미들웨어 설계)

  • Ju, Hui-Dong;Im, Hyeok-Jin;Lee, Meong-Hun;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.351-353
    • /
    • 2007
  • Recently, the research trend and developmental tendency of ubiquitous computing technology are advancing with direction which seamlessly provides the optimum service to users through context-aware, analogy and networking with various sensor nodes. There is overwhelming needs to develop the WSN middleware platforms that have the functions dealing with data, monitoring, merged communication environments, and mutual compatibility with a variety of sensor networks. The purpose of study in WSN middleware platforms is to promptly provide the response for diverse queries from application services. Therefore, the actuator is enable to do action according to evets in for large scale glasshouse.

  • PDF

Characteristics of Wireless Distributed Communication System under the Overlay Convergent Networks (중첩 융합 네트워크에서 분산 무선 통신 시스템의 특성)

  • Cheon, EunJi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.11
    • /
    • pp.986-992
    • /
    • 2012
  • In order to support quickly increasing mobile traffic and deal with various types of users of wireless mobile systems under overlay convergent cognitive networking environments, it is highly required to improve the performance and the capability of the wireless access networks. With distributed antennas and distributed processors, it is possible for mobile terminals (MTs) to monitor interference and control system effectively to minimize mutual interference among users and cells. Virtual cell changes as the MT moves or the environment changes, so no handoff is needed in connections with base station hotelling. In this paper, the characteristics of wireless distributed systems under the overlay convergent networks will be investigated.

Implementation and Verification of IMT-Advanced Simulator for 4G Evaluation (4G 기술 평가를 위한 IMT-Advanced 시뮬레이터 구현 및 검증)

  • Kim, Dae-Jung;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.466-476
    • /
    • 2010
  • This paper proposes a novel simulator which is capable of loading different modules enabling to update the simulator easily when the 4G mobile communication technologies are revised. This simulator is not only designed based on IMT-Advanced channel model but also confirmed its reliability through mutual verification with Matlab based simulator developed by Winner+. The proposed simulator was evaluated on the basis of evaluation requirements on the IMT-Advanced. By comparing with experimental results for IEEE and 3GPP, it was also proved for the simulator to have a better performance.

Loaming Agreement based Localized Authentication for Nested NEMO Environment (로밍 동의에 기반한 중첩 NEMO 환경을 위한 지역 인증 기법에 관한 연구)

  • Lim, Hyung-Jin;Chung, Tai-Myoung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.61-68
    • /
    • 2008
  • Authentication for inter-NEMO rooming is on important issue for achieving the seamless mobile networking. In this proposal, the technical challenge lies in the fact that a visited network does not initially have the authentication credentials of a roaming mobile router. This paper proposes an efficient approach for providing AAA service in NEMO environment. This approach uses localized authentication based on the roaming agreement between ISPs. A public key certificate structure is proposed, tailored to the business model of wireless internet Service Providers (ISPs). In this approach, the mutual authentication between a visited network and a roaming user can be performed locally without any control with user's home network. In conclusion, our protocol shown that communication delay can be reduced by overuse 45% overhead in communication delay than the previous AAA approach.

  • PDF

A Development on Consumer Portal System based on Advanced Metering Infrastructure (Advanced Metering Infrastructure를 이용한 Consumer Portal 개발)

  • Jin, Sung-Il;Jung, Nam-Jun;Yu, In-Hyeob;Kim, Sun-Ic;Ko, Gong-Min
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.11
    • /
    • pp.1903-1909
    • /
    • 2007
  • As the electric power industry has been revolutionarily transformed such that the distributed energy resources have been interconnected with power systems and a variety of energy service providers have been appeared, the need of Consumer Energy Portal as a core of two-way communication and service infrastructure between power suppliers and consumers has been gradually increased. Consumer Energy Portal can be thought of as a combination of hardware and software enabling two-way communication between energy service providers and equipment within the consumers' premises or a physical and logical link between consumers' in-building networks and wide-area access networks. In other words, Consumer Energy Portal can make the way the power industry has been traditionally operated the web-based way, enabling two-way interactions between energy service providers and consumers and mutual networking between end users' equipment. Thus, Consumer Energy Portal can be a kind of Service portal that provides new value-added services and efficient power operations that in the past. In this paper, for ESPs' integrated resources management, demand side management and value-added service provision, we have established the two-way access network that can gather real-time metering data using ZigBee technology and control physically networked equipment.

Security Management by Zone Combination in Active Networks (액티브 네트워크에서의 연합을 통한 보안 관리)

  • 장범환;김동수;권윤주;남택용;정태명
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.82-96
    • /
    • 2003
  • The Internet has evolved into the global computer network due to the openness of its protocol, but such evolution brings about new risks and threats. To protect computer networks safely, it is the best way that preventing an attacher from intruding beforehand. However, to provision against all attacks causes the degradation of network performance as well as to prevent unknown attacks is very hard. Secure Combination, the framework which establishes a mutual collaboration and cooperation between the trusted zones, could protect systems from the potential attacks. This frameworks can predict attacks by exchanging security information and cooperating with each zone. It is a dynamic and powerful security architecture that rapidly enables updating security policy and deploying response modules.

A Study on the Development of a Basic Electronic Virtual Lab System Using JAVA (자바를 이용한 가상 전자 회로 실험 구축에 관한 연구)

  • Park, Jun-Young;Cha, Jeong-Hun;Kim, Dong-Sik;Ho, Won
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.3242-3245
    • /
    • 1999
  • The current educational software usually has limitations of accessing and mutual communication. Networking Technology can overcome these limitations. Using Internet, students can access the educational resources easily and learning process can be monitored. In this study a virtual experiment program is developed for students to practice the basic electronic experiment, which is a fundamental subject in electronic department curriculum. Students can understand the basic theory and rules easily by simulated experimental process. Almost the same result is obtained as in real experiment because this program is made to simulate the real experiment. The virtual experiment site can be accessed easily by Internet and an experiment is performed based on individual basis without restriction of location and time. This program can be used as fully the real experiment substitution or supplementary educational materials. In both case, it provides many benefits in education.

  • PDF

A Remote Control System for Home Appliance using Low Speed Network (저속 네트워크 기반의 가전기기를 위한 원격 제어 시스템)

  • 김용호;이종환;유동희;김경석
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.699-711
    • /
    • 2003
  • Home networking and Internet control technologies must satisfy three requirements with a view to being applied to home for raising the qualify of human life. Firstly, the cost of adding home networking ability to the traditional appliance must be minimized. Secondly, the mutual accessibility between home network and Internet must be guaranteed in the various Internet service environment of home. Finally, communication must be possible between the home network and the Internet that use different communications protocols. This paper proposes the ARCS (Appliance Remote Control System) that controls appliances based on LnCP (Living network Control Protocol) via the Internet. LnCP is the most cost-effective network and control protocol for home network. ARCS guarantees the accessibility from the Internet to home network and provides users with the virtual interface designed for controlling appliances using the Internet application program. In addition, this paper proposes AICS (Appliance Internet Control Specification). AICS, is based on LnCP, defines the message structure and control commands for the Internet control communication. ARCS and home gateway are developed to meet AICS.

Korean Diaspora: From Overseas Compatriots to Network (코리안 디아스포라: 공동체에서 네트워크로)

  • Chung, Sung-Ho
    • Korea journal of population studies
    • /
    • v.31 no.3
    • /
    • pp.107-130
    • /
    • 2008
  • The study of Korean diaspora has focused on migration, adaptation, and identity of overseas Koreans in China, the CIS, Japan, and the United States. However, the contemporary concept of a diaspora is a way of understanding migration, cultural difference, identity politics, and so on. Thus, this more broadly defined diaspora is used to mean a dispersion of people of a common national origin or of common beliefs living in exile. As of 2007, it is estimated that there are about 7 million Koreans living in 170 countries outside the Korean peninsula. Some have left Korea involuntarily and some others voluntarily. But most of them actively try to maintain their identity and culture as Koreans. With the large number of overseas Koreans, there has recently been the recognition of the importance of networking among overseas Koreans in the 21st century. The purpose of this paper is to emphasize the necessity of Korean Global Network of overseas Koreans. In doing so, this paper reviewed the case of Jewish and Chinese network. Then, this paper indicates the problems in the networking of overseas Koreans and suggests the policy implications for Korean Global Network. Above all, there should be changes in the government's policy towards overseas Koreans in the direction of organizing networks of overseas Koreans to coexist with the mother country. The government should adopt a policy to restore trust in overseas Koreans. It should take a pragmatic approach to the mutual interests in the socioeconomic relations instead of taking a political approach to overseas Koreans.

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).