• Title/Summary/Keyword: wired and wireless communication

Search Result 399, Processing Time 0.023 seconds

TCP Performance Analysis over Mobile ad-hoc Networks (모바일 ad-hoc 네트워크에서 TCP 성능 분석)

  • Nam, Ho-Seok;Cho, Sol;Lee, Tae-Hoon;Kim, Jun-Nyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.800-808
    • /
    • 2007
  • With the development of wireless data communication technology, all IP-based network will become compositions of wired and wireless networks. TCP is a connection-oriented, reliable transport protocol and has been used as de facto standard in most wired networks. Because TCP's congestion control algorithm could not distinguish congestion from BER, link failure and frequent route changes, TCP shows a poor performance over mobile ad-hoc networks. In this paper, the theoretical feature of TCP was studied and the performance of TCP over mobile ad-hoc networks was analyzed with ns2.

Magnetic Beamforming for Optimum Efficiency Wireless Power Transfer (최적 효율 무선 전력 전송을 위한 Magnetic Beam 형성)

  • Jung, Hyung-Jon;Choy, Ick
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.79-84
    • /
    • 2020
  • Wireless power transfer is more convenient than wired power transfer, but has a shorter transfer distance and lower efficiency. In addition, it is difficult to charge multiple devices simultaneously. In this paper, we propose a method of magnetic beam forming by using multiple transmitters in order to increase transfer distance and improve efficiency of wireless power transfer. To do this, the relationship between the transmitter coil current and magnetic field at the center of receiver coil is modelled, and calculate the optimal transmitter coil current using the characteristics of the pseudoinverse. Finally, the validity of the proposed method is verified by simulation.

Analysis of TCP NewReno using rapid loss detection (빠른 손실 감지를 이용한 TCP NewReno 분석)

  • Kim Dong min;Han Je chan;Kim Seog gyu;Leem Cha sik;Lee Jai yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3B
    • /
    • pp.130-137
    • /
    • 2005
  • Wireless communication environment is changing rapidly as we use new wireless communication technology such as WiBro to access high speed Internet. As a result, reliable data transmission using TCP is also expected to increase. Since TCP assumes that it is used in wired network, TCP suffers significant performance degradation over wireless network where packet losses are related to non-congestion loss. Especially RTO imposes a great performance degradation of TCP. In this paper, we analyze the loss recovery probabilities based on previous researches, and use simulation results of our algorithm to show that it prevents performance degradation by quickly detecting and recovery losses without RTO during fast recovery.

A study on the Implementation of Wireless Sensor Network for Wireless Home Networking (무선 홈네트웤을 위한 WSN에 관한 연구)

  • Jeon, Dong-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.6
    • /
    • pp.1337-1342
    • /
    • 2012
  • In recent years, many researches in Home Networking are being progressed actively. Most of techniques for Home Networking are based on wired but the technique for wireless connection is also needed. This paper focuses on wireless connection in Home Networking. Of many of wireless technologies, such as Wireless LAN, Bluetooth, or HomeRF, we especially propose to apply the new technique called Wireless Sensor Network. We present hardware and protocol stack design consideration for wireless sensor node and wireless sensor network, and then we present how to apply wireless sensor network to Home Networking and how to constitute Wireless Home-Networking with a variety of sensor nodes. Finally, we introduce the wireless sensor node system designed by us and conclude this paper.

The Efficient Scenario of Solving NAT Traversal in the IMS (IMS에서 효율적인 NAT Traversal 해결 시나리오)

  • Han, Seok-Jun;Lee, Jae-Oh;Kang, Seung-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1935-1941
    • /
    • 2013
  • We can use NAT(Network Address Translation) technology to solve the lack of IP address. The problem of NAT traversal is happened when the filtering characteristics of NAT remove the packet that has no binding in the address translation table of NAT. There were many kinds of way to solve these problems by using additional device. Lately, network market is changed into integrating wired and wireless network by the IMS(IP Multimedia Subsystem). The IMS integrates to control network of wired and wireless network, has emerged to control convergence network effectively. Lately, the additional devices like IBCF(Interconnection Border Control Function) and IBGF(Interconnection Border Gateway Function) are used to solve the NAT traversal problem in the IMS. In this paper, we propose the solution of NAT traversal using P-CSCF without any additional equipment in the IMS.

An Efficient User Authentication Scheme with Mobile Device in Wireless Network Environment (무선 네트워크 환경에서 모바일 디바이스 기반 효율적인 사용자 인증 기법)

  • Shin, Soobok;Yeh, Hongjin;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.169-179
    • /
    • 2013
  • Recently, with rapid advances of mobile devices such as smart phone and wireless networking, a number of services using mobile device based wireless network have been explosively increasing. From the viewpoint of security, because wireless network is more vulnerable than wired network, strong security is required in wireless network. On the contrary, the security for mobile devices has to be efficient due to the restrictions of battery powered mobile device such as low computation, low memory space and high communication cost. Therefore, in this paper, we propose an efficient authentication scheme with mobile devices in wireless network environment. The proposed scheme satisfies security requirements for the service using mobile device and it is suitable in wireless network environment.

Secure Group Key Agreement for IoT Environment (사물인터넷(IoT) 환경을 위한 안전한 그룹 키 관리 기법)

  • Lee, Su-Yeon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.121-127
    • /
    • 2016
  • Recently, the popularity of smart devices such as Wi-Fi and LTE has increased the use ratio of wireless dramatically. On the other hand, the use ratio of wired internet is decreasing. The IoT(Internet of Things) is not only for people but also for communication between people and things, and communication between things and things by connecting to a wireless without choosing a place. Along with the rapid spread of the IoT there is a growing concern about the threat of IoT security. In this paper, the proposed scheme is a efficiency group key agreement in IoT environment that guarantees secure communication among light-weight devices. The proposed scheme securely be able to communication with the group devices who share a group key, generated by own secret value and the public value. Such property is suitable to the environment which are required a local area and a group.

Study on Technologies of Mobile Communication based Train Control and its Radio Communication Requirements (이동통신기반 열차제어 기술과 무선통신 요구사항 연구)

  • Yoon, Byungsik;Choi, Minsuk;Kim, Dong Joon;Oh, Woo-Sik;Sung, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.457-460
    • /
    • 2018
  • The mobile communication based train control is the train control system by utilizing wireless communication rather than conventional wired communication. Traditional train control operates train occupation, safety integrity and moving authority using fixed block wired railway signal system. Since introduction of mobile communication in railway area, railway operators can provide improved passager services. Futhermore, it can replace inefficient train onboard equipments and railway ground facilities for economic benefits. In this paper we introduce mobile communication based railway system currently in operation around the world. Moreover, we provide the minimum requirements of the radio communication performance. Proposed minimum requirements of the radio communication improve more secure and efficient mobile communication based train control system.

  • PDF

Study on the Performance of Wireless Local Area Network in a Multistory Environment with 8-PSK TCM

  • Suwattana, Danai;Santiyanon, Jakkapol;Laopetcharat, Thawan;Charoenwattanaporn, Monton;Goenchanart, Ut;Malisuwan, Settapong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.549-551
    • /
    • 2002
  • A Wireless Local Area Network (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN with in a building or campus. However, communications in an indoor environment present problems not encountered in outdoor wireless communication systems. Since cellular type systems are interference limited, the indoor environment is more hostile than the outdoor environment due to the lower propagation constant. In this paper, the equation for the signal to interference ratio in a multistory building will be derived. Knowing the S/I ratio, the floor frequency reuse can be determined. Finally, the simulation in this research is designed to study the performance (BER) of WLAN system in the multistory environment by applying the 8-PSK Trellis Coded modulation technique. The procedure allows a quick evaluation of BER in Wireless LAN system due to the co-channel interference.

  • PDF

An Efficient Password-based Authentication and Key Exchange Protocol for M-Commerce Users (M-Commerce 사용자를 위한 효율적인 패스워드 기반 인증 및 키교환 프로토콜)

  • Park Soo-Jin;Seo Seung-Hyun;Lee Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.3
    • /
    • pp.125-132
    • /
    • 2005
  • Wireless access always has to include the authentication of communication partners and the encryption of communication data in order to use secure M-Commerce services. However, wireless systems have limitations compared with the wired systems, so we need an efficient authentication and key exchange protocol considering these limitations. In this paper, we propose an efficient authentication and key exchange protocol for M-Commerce users using elliptic curve crypto systems. The proposed protocol reduces the computational load of mobile users because the wireless service provider accomplishes some parts of computations instead of the mobile user, and it uses the password-based authentication in wireless links. Also, it guarantees the anonymity of the mobile user not to reveal directly the real identity of the user to the M-Commerce host, and preserves the confidentiality of communication data between the M-Commerce host and the user not to know the contents of communication between them to others including the wireless service provider.