• Title/Summary/Keyword: wireless applications

Search Result 1,703, Processing Time 0.03 seconds

Distributed Control Algorithms for QoS in Wireless Networks Using Wireless Token Ring Protocol (무선토큰링 프로토콜을 사용한 무선 네트워크에서 QoS를 지원하는 분산 제어 알고리즘)

  • 김성철
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.187-193
    • /
    • 2004
  • Wireless networks play a very important role in communications today. For example, wireless networks today provide from the basic services like e-mail and FTP to the multimedia applications like Web service. It is obvious that QoS requirements to these diverse applications over wireless networks will continue as in wired networks. Much research has been done to develop QoS supporting algorithms on Internet. But due to the limited bandwidth and varying channel states of the wireless networks, it is difficult to support differentiated service over wireless networks. In this paper we propose the modified wireless token ring protocol supporting QoS to the real-time traffic service node over Internet environments in which non-real-time and real-time traffic service nodes coexist. In the proposed algorithm, the real-time traffic service node gets the priority to take token over the non-real-time traffic service node. So the proposed algorithm support quick transmission of the real-time traffic service node. And this advantage can be obtained with minor modification of the legacy wireless token ing protocol to support QoS. We also consider the lost token recovery mechanism.

  • PDF

A Low-Complexity Planar Antenna Array for Wireless Communication Applications: Robust Source Localization in Impulsive Noise

  • Lee, Moon-Sik
    • ETRI Journal
    • /
    • v.32 no.6
    • /
    • pp.837-842
    • /
    • 2010
  • This paper proposes robust source localization methods for estimating the azimuth angle, elevation angle, velocity, and range using a low-complexity planar antenna array in impulsive non-Gaussian noise environments. The proposed robust source localization methods for wireless communication applications are based on nonlinear M-estimation provided from Huber and Hampel. Simulation results show the robustness performance of the proposed robust methods in impulsive non-Gaussian noise.

When Sensor and Actuator Networks Cover the World

  • Stankovic, John A.
    • ETRI Journal
    • /
    • v.30 no.5
    • /
    • pp.627-633
    • /
    • 2008
  • The technologies for wireless communication, sensing, and computation are each progressing at faster and faster rates. Notably, they are also being combined for an amazingly large multiplicative effect. It can be envisioned that the world will eventually be covered by networks of networks of smart sensors and actuators. This fact will give rise to revolutionary applications. However, to make this vision a reality, many research challenges must be overcome. This paper describes a representative set of new applications and identifies several key research challenges.

  • PDF

Implementation of Mobile Internet E-mail & Chatting Program using WIPI Platform

  • Hwang, Byung-Kon
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.7-12
    • /
    • 2005
  • In this paper, we implemented an e-mail and chat program (client) for communication between mobile devices and PCs based on WIPI a South Korea's open wireless platform form developing device and content independent software to break from the way of developing contents that is dependent on different wireless platforms to each mobile communications company. While traditional e-mail and chat programs are written for PC-to-PC communication, we develop them for mobile-to-PC and mobile-to-mobile communications, and we expect to see various mobile contents in the future.

  • PDF

Light Medium Access Control (MAC) Protocol for Wireless Universal Serial Bus (WUSB)

  • Kim, Jun-Whan;Huh, Jea-Doo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.199-201
    • /
    • 2005
  • USB has arguably become the most successful PC peripheral interconnect ever defined. As appearing UWB, wireless USB (WUSB) emerges very popular technology. However, the distributed Medium Access Control (MAC) does not harmonize with the topology of WUSB. In this paper, we address a novel MAC protocol for conformity with WUSB. The protocol is to handle negotiation on Distributed Reservation Protocol (DRP) including the channel time slot of WUSB.

  • PDF

Flexible Electronics Devices for Smart Card Applications

  • Hou, Jack;Kimball, Bob;Vincent, Bryan;Ratcliffe, Bill;Mahan, Mike
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.75-77
    • /
    • 2008
  • Flexible electronics devices such as plastic display, thin film battery, membrane switch, organic memory for smart card applications will be presented. The performance and power consumption of various display technologies will be compared for OTP requirement in smart cards. Wireless power transmission by RF coupling through an antenna provides a potential power solution to smart cards. Finally, the general trend of smart card future developments will be discussed.

  • PDF

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

Efficiently Managing Collected from External Wireless Sensors on Smart Devices Using a Sensor Virtualization Framework

  • Lee, Byung-Bog;Hong, SangGi;Lee, Kyeseon;Kim, Naesoo;Ko, JeongGil
    • Information and Communications Magazine
    • /
    • v.30 no.10
    • /
    • pp.79-85
    • /
    • 2013
  • By interacting with external wireless sensors, smartphones can gather high-fidelity data on the surrounding environment to develop various environment-aware, personalized applications. In this work we introduce the sensor virtualization module (SVM), which virtualizes external sensors so that smartphone applications can easily utilize a large number of external sensing resources. Implemented on the Android platform, our SVM simplifies the management of external sensors by abstracting them as virtual sensors to provide the capability of resolving conflicting data requests from multiple applications and also allowing sensor data fusion for data from different sensors to create new customized sensors elements. We envision our SVM to open the possibilities of designing novel personalized smartphone applications.

Analysis of Packet Delay in IEEE 802.11 Wireless LAN (IEEE 802.11 WLAN에서 패킷지연시간 분석)

  • Lim, Seog-Ku
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.989-993
    • /
    • 2009
  • Wireless LAN(WLAN) is a rather mature communication technology connecting mobile terminals. IEEE 802.11 is a representative protocol among WLAN technologies. With the rising popularity of delay-sensitive real-time multimedia applications(video, voice and data) in IEEE 802.11 wireless LAN, it is important to study the MAC layer delay performance of WLANs. In this paper, performance for packet delay that recently have been proposed schemes is analysed in wireless LAN and proved performance results via simulation.

  • PDF

Research of Security Methods based on Mobile Internet (모바일 인터넷 상의 보안 기법 연구)

  • 이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.296-300
    • /
    • 2004
  • In this paper, we discuss about mobile Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now

  • PDF