• Title/Summary/Keyword: network connection system

Search Result 705, Processing Time 0.027 seconds

An Implementation of an Intelligent Access Point System Based on a Feed Forward Neural Network for Internet of Things (사물인터넷을 위한 신경망 기반의 지능형 액세스 포인트 시스템의 구현)

  • Lee, Youngchan;Lee, SoYeon;Kim, Dae-Young
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.95-104
    • /
    • 2019
  • Various kinds of devices are used for the Internet of Things (IoT) service, and IoT devices mainly use communication technology that uses the frequency of the unlicensed band. There are several types of communication technology in the unlicensed band, but WiFi is most commonly used. Devices used for IoT services vary in computing resources from devices with limited capabilities to smartphones and provide services over wireless networks such as WiFi. Most IoT devices can't perform complex operations for network control, thus they choose a WiFi access point (AP) based on signal strength. This causes a decrease in IoT service efficiency. In this paper, an intelligent AP system that can efficiently control the WiFi connection of the IoT devices is implemented. Based on the network information measured by the IoT device, the access point learns using a feed forward neural network algorithm, and predicts a network connection state to control the WiFi connection. By controlling the WiFi connection at the AP, the service efficiency of the IoT device can be improved.

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

Rule-Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks

  • Gowri, Muthukrishnan;Paramasivan, Balasubramanian
    • ETRI Journal
    • /
    • v.38 no.6
    • /
    • pp.1145-1152
    • /
    • 2016
  • Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rule-based anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that all nodes in the network are covered by at least one honeypot. Honeypots check every new connection by letting the centralized administrator collect the information regarding the new connection by slowing down the communication with the new node. Certain predefined rules are applied on the new node to make a decision regarding the anomality of the node. When the timer value of each honeypot expires, other sensor nodes are appointed as honeypots. Owing to this honeypot rotation, the intruder will not be able to track a honeypot to impair the network. Simulation results show that this technique can efficiently handle the anomaly detection in a WSN.

Development of a Bluetooth Access Point on Embedded System for One - Phone Service (임베디드 시스템에서 원-폰 서비스를 위한 블루투스 액세스 포인트 개발)

  • Min Byungjo;Hwang June;Park Jongkyu;Kim Hagbae
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.433-438
    • /
    • 2004
  • In this paper, we describes the development of Bluetooth network Access Point(AP) for the access network connection of Bluetooth devices at home. Unlike headset, mouse, and keyboard, the AP should have capability to support multiple connection and stabilized network throughput. Our AP allows various kinds of Bluetooth terminals to access the access network like xDSL and PSTN(Public Swithced Telephone Network) stably. Especially, users can access the PSTN at home instead of expensive CDMA network through the AP by using the one-phone which is the cellular phone with the Bluetooth module.

Design of a Phase Aligned ISDN Terminal in 2 Wire Passive BUS (2선식 수동버스에서 위상배열된 ISDN 터미널의 설계)

  • 전재호;이명수;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.1
    • /
    • pp.19-27
    • /
    • 1988
  • In the user-network interface for the parcticing ISDN, an effective phase aligned time compression multiplexing transmission system is designed and analyzed in the 2 wire passive BUS. In TCM, tha average SNR due to crosstalk from adjacent channelis 9.72(dB), and in regarding the phase aligned process, frames are designed to have maximum propagation time of 6(us) so that the connection distance is extended by 0.8(Km). Therefore, the proposed transmission system is suitable for the connection between end-subscriber and network.

  • PDF

Performance Analysis of Mobile Home Network Based on Bluetooth (블루투스 기반 이동 Home Network의 성능 분석)

  • Park Hong-Seong;Jeong Myoung-Soon
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.1
    • /
    • pp.51-64
    • /
    • 2002
  • This paper analyzes performance measures of a Bluetooth_based mobile home network system. The home network system consists of terminals with Bluetooth interfaces, access points (AP), a home PC, and a gateway A mobile host in wireless terminals uses Mobile IP for supporting the mobility This paper considers four types of data traffic, which are new connection traffic, handoff traffic, Internet data traffic, and control data traffic and suggests a queueing system model of the home network system, where the AP and the home PC are modeled as M/G/1 with four priority queues and the gateway is modeled as M/G/1 with a single queue The generation rate and service time of individual traffic influence their performance measures. Based ell the suggested model, we propose the elapsed time of data traffic in terms of the number of cells, the number of Home PCs, arrival rates of four types of traffic and the service rates of AP/Home PCs/Gateway To analyze influences on the elapsed time with respect to arrival rate of four types of traffic, some examples are given.

  • PDF

A study on the connection admission control algorithm using dynamic bandwidth allocation in ATM network (ATM 망에서 동적대역폭 할당에 의한 연결수락제어 알고리즘에 관한 연구)

  • 신승호
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.20 no.41
    • /
    • pp.51-60
    • /
    • 1997
  • In this paper, A Connection Admission Control(CAC) algorithm by Dynamic Bandwidth Allocation is proposed. The B-ISDN will be required to carry traffic generated by a various traffic sources. These source will have all traffic flow characteristics and quality of services requirements. When a connectionless message with burstiness arrives at a node during a renewal period, CAC will be dynamically determined connection request by using the predetermined connection admission bounds in estimating the number of input arriving cells. The proposed algorithm estimates the available bandwidth by observing cell streams of the aggregate traffic. A connection request is accepted if the available bandwidth is larger than declared peak rate, and otherwise rejected. The proposed CAC scheme is shown to be promising and practically feasible in obtaining efficient transmission of burst traffic with guaranteed quality of services.

  • PDF

Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter

  • Osman Goni;Md. Abu Shameem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.141-146
    • /
    • 2024
  • A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.

Intelligent Digital Public Address System using Agent Based on Network

  • Kim, Jung-Sook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.1
    • /
    • pp.87-92
    • /
    • 2013
  • In this paper, we developed a digital and integrated PA(Public Address) system with speech recognition and sensor connection based on IP with an ID using agent. It has facilities such as an external input, a microphone and a radio for a PA system and has speech recognition. If "fire" is spoken to the PA system then it can recognize the emergency situation and will broadcast information to the appropriate agency immediately. In addition to that, many sensors, such as temperature, humidity, and infrared, etc., can be connected to the PA system and can be integrated with the context awareness which contains many types of information about internal statuses using inference agent. Also, developed the digital integrated PA system will make it possible to broadcast the message to adaptable places using network IP based on IDs. Finally, the digital PA system is designed for operation from a PC, which makes installation and setting of operating parameters very simple and user-friendly. For implementation details, we implemented thread based concurrent processing for the events which occur concurrently from many sensors or users.

Electrical Technologies for Grid Integration of Ocean Wave Power into the UK National Grid

  • Ahmed, Tarek
    • Journal of Power Electronics
    • /
    • v.10 no.3
    • /
    • pp.320-327
    • /
    • 2010
  • In this paper, multiple offshore wave energy converters with different output characteristics are connected to one power distribution substation. The connection between the power take-off of the different wave energy converters and the electrical power transmission system is presented in order to investigate whether multiple wave energy converters can augment energy yield and improve network integration capabilities. Moreover, the model of an array of wave energy converters is developed with the goal of analyzing the effects of the offshore wave farm on the electrical network to which it is connected. It is also developed to ensure that the electricity generated by the array is sufficiently controllable, and of a quality that can be integrate into the electricity supply network without unduly increasing the cost of connection, production or delivery.