• Title/Summary/Keyword: wired internet

Search Result 341, Processing Time 0.031 seconds

A Study on Wireless Network Management for Security Enhancement (보안강화를 위한 무선 네트워크 관리 방안에 관한 연구)

  • Lee, Eun-Sub;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.195-200
    • /
    • 2020
  • Wireless LANs are being used in many fields due to their ease of use. The biggest advantage of the WLAN can be said above all mobility. Domestic wired internet service has been saturated since 2006, but wireless internet users have been steadily increasing. However, WLAN has many advantages and characteristics of wireless service. It has a number of security vulnerabilities, and various security related technologies have been developed and applied to solve these problems. On the other hand, security awareness of WLAN users is still insufficient, and security accidents such as personal information leakage occur repeatedly every year. We will study the main weaknesses that can occur in WLAN and suggest security measures from the management level.

King Sejong's Invention: Korean Characters and Real-time Korean Information Network (세종대왕의 발명: 한글과 실시간 한민족 정보 네트워크)

  • Kim, Yung-Bok
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.463-468
    • /
    • 2003
  • The Internet, especially the mobile Internet influences enormously in many areas in human societym espeially in terms of the exchanging speed of knowledge and information. This new society of knowledge and information will introduce many new types of services based on valuable knowlwdge and information. Among many new services in this mobile computing environment, the real-time worldwide korean information networking service using the Korean characters invented by the mobile computing environment, the real-time worldwide Korean information networking service using the Koean characters invented by the King Sejong is possible ubiquitously with wired and mobile Internet. We studied the user interface with Korean characters in the mobile computing environment, and introduce the useful results with new metrics of performance analysis after real implementation for real-time Korean information networking using Korean domain names.

Secure Group Key Agreement for IoT Environment (사물인터넷(IoT) 환경을 위한 안전한 그룹 키 관리 기법)

  • Lee, Su-Yeon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.121-127
    • /
    • 2016
  • Recently, the popularity of smart devices such as Wi-Fi and LTE has increased the use ratio of wireless dramatically. On the other hand, the use ratio of wired internet is decreasing. The IoT(Internet of Things) is not only for people but also for communication between people and things, and communication between things and things by connecting to a wireless without choosing a place. Along with the rapid spread of the IoT there is a growing concern about the threat of IoT security. In this paper, the proposed scheme is a efficiency group key agreement in IoT environment that guarantees secure communication among light-weight devices. The proposed scheme securely be able to communication with the group devices who share a group key, generated by own secret value and the public value. Such property is suitable to the environment which are required a local area and a group.

Robust TCP algorithm against the burst error in wireless Internet (버스트 에러에 강인한 TCP 알고리즘)

  • 박종훈;배세인;유명식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6B
    • /
    • pp.548-553
    • /
    • 2004
  • Due to the recent advance in wireless communication technology, it is now more demanding to enjoy the high quality of service in the wireless Internal. TCP, which many Internet applications depend on for the end-to-end transport service, is optimized for the wired environment. Consequently, TCP suffers from severe performance degradation in the wireless environment where the bit error rate is relatively high and the burst errors frequently take place. In this paper, we propose a Robust TCP algorithm, which can effectively react against the burst error and significantly improve the TCP performance in wireless Internet. It is shown through the simulations that the Robust TCP performs well in the wireless environment, especially under the burst error condition.

A remotely controllable structural health monitoring framework for bridges using 3.5 generation mobile telecommunication technology

  • Koo, Ki-Young;Hong, Jun-Young;Park, Seunghee;Lee, Jong-Jae;Yun, Chung-Bang
    • Smart Structures and Systems
    • /
    • v.5 no.2
    • /
    • pp.193-207
    • /
    • 2009
  • A framework for structural health monitoring (SHM) systems is presented utilizing a recent 3.5 generation mobile telecommunication technology, HSDPA (High Speed Downlink Packet Access). It may be effectively applied to monitoring bridges, cut-slopes, and other facilities located in rural areas where the conventional Internet service is not readily available, since HSDPA is currently commercialized in 86 countries to make the Internet access possible in anywhere the mobile phone service is available. The proposed SHM framework is also incorporating remote desktop software to have remote control/operation of the SHM systems. The feasibility of the proposed framework has been demonstrated by field tests on a highway bridge in operation. One can expect that fast advances in the mobile telecommunication technology will further enhance the performance of the SHM network using the proposed framework for bridges and other facilities located in remote areas without the conventional wired Internet service.

Study on Effective Management of Heterogeneous Networks (이기종 네트워크의 효율적 관리에 연구)

  • Cho, Sok-Pol
    • The Journal of Information Technology
    • /
    • v.8 no.3
    • /
    • pp.131-142
    • /
    • 2005
  • The principles on which the Internet was designed and has evolved were first laid out in an explicit way 20 years age. The basic principle is that in layered communications network such as the Internet, functions should always be implemented at the end systems whenever the option exists. This applies to all functions that can be implemented either in the network or at the end systems. End-to-end arguments have recently been reexamined as the Internet and its uses have evolved, and a new set of requirements has begun to emerge. In addition to these, it add a new, and perhaps more important, requirement to this list in the case of heterogeneous networks: the proliferation of unpredictable wireless networks. Wireless networks must cope with dynamic link conditions not present in wired infrastructures, which place a heavy burden on quality of service management solutions. Managing QoS in the face of constantly changing operating conditions demands dynamic management approaches that span multiple layers in the protocol stack. Such as cross-layer design approaches have recently received attention in the context of cellular and mobile special networks. This article introduce the notion of network predictability and describe its relationship to achievable QoS. This relationship is used to propose a framework for cross layer design that can be used to guide development efforts and direct investment decisions for future networks.

  • PDF

IoT network configuration utilizing Xbee (Xbee를 활용한 IoT 활용 방법)

  • Kim, Min-kyu;Kim, Ki-Hwan;Lee, Hoonjae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.546-548
    • /
    • 2016
  • Recently, everyone enjoys the convenience of the rapid development of wireless network technology. There is the IoT (Internet of Things) with the technology come into the spotlight in the network technology. The IoT technology it is possible to view or manipulate the state of the object at a distance to connect to the Internet, all of the individual objects. The IoT existing technology was connected through the wireless technology used the wired network or Wi-Fi. In this paper, change the wireless network connection Xbee saw a brief to study the IoT network.

  • PDF

Development of Indicators for Information Security Level Assessment of VoIP Service Providers

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.634-645
    • /
    • 2014
  • VoIP (Voice over Internet Protocol) is a technology of transmitting and receiving voice and data over the Internet network. As the telecommunication industry is moving toward All-IP environment with growth of broadband Internet, the technology is becoming more important. Although the early VoIP services failed to gain popularity because of problems such as low QoS (Quality of Service) and inability to receive calls as the phone number could not be assigned, they are currently established as the alternative service to the conventional wired telephone due to low costs and active marketing by carriers. However, VoIP is vulnerable to eavesdropping and DDoS (Distributed Denial of Service) attack due to its nature of using the Internet. To counter the VoIP security threats efficiently, it is necessary to develop the criterion or the model for estimating the information security level of VoIP service providers. In this study, we developed reasonable security indicators through questionnaire study and statistical approach. To achieve this, we made use of 50 items from VoIP security checklists and verified the suitability and validity of the assessed items through Multiple Regression Analysis (MRA) using SPSS 18.0. As a result, we drew 23 indicators and calculate the weight of each indicators using Analytic Hierarchy Process (AHP). The proposed indicators in this study will provide feasible and reliable data to the individual and enterprise VoIP users as well as the reference data for VoIP service providers to establish the information security policy.

The QoS guaranteed seamless mobile multicast handover mechanism using probing based CAC and PMIPv6 (Probing 기반 수락제어와 PMIPv6를 이용한 품질보장 Seamless 모바일 멀티캐스트 핸드오버 메커니즘)

  • Kang, Hyun-Myoung;Choi, Hoan-Suk;Rhee, Woo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.1018-1033
    • /
    • 2010
  • Recently, as the use of mobile terminal is generalized, the needs of high-speed Internet mobile service is increased. Also users want to receive the multimedia contents what they want through the various terminals in anywhere, anytime via wired and wireless integrated environment. Therefore, various mechanisms that support the mobility are proposed. However, these mechanisms are difficult to support seamless mobility and QoS awareness on the mobile multicast environment. In this paper, we propose a QoS aware handover mechanism that is able to provide the high-quality and real-time services such as mobile IPTV in an integrated environment for these requests of users. Proposed mechanism manages the multicast admission control and multicast handover using the 2-layer multicast information management at the wired and wireless integrated network that extended the service guaranteed methods through the probing based admission control of the wired network to the wireless network based on PMIPv6. We present a performance evaluation results and features analyzed by the simulations using the ㎱-2.

A Study of Balanced TCP Bandwidth Allocation over Wired and Wireless Heterogeneous Network (유무선 혼합 망에서 TCP의 공평한 대역폭 분배를 위한 연구)

  • Kim, Seong-Chul;Cho, Yong-Bum;Moon, Il-Young;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.113-116
    • /
    • 2005
  • In general, multiple mobile hosts (MH) access at a base station (BS) that terminates the wired link and relays data flow to the wireless link in wired and wireless heterogeneous network. In this network, the BS is tend to be a bottleneck and to degrade a network performance. Many studies have been done throughout several protocol layers. Especially on the transport layer, many techniques were studied to enhance TCP performance. But most of them are concerned to enhance TCP throughput and TCP fairness is hardly considered. In this paper, an algorithm for enhancing TCP fairness is proposed and its performance is verified by ns-2 simulation.

  • PDF