• Title/Summary/Keyword: 무선랜 네트워크

Search Result 335, Processing Time 0.027 seconds

An Improvement of Performance for Data Downstream in IEEE 802.11x Wireless LAN Networks (IEEE 802.11x 무선 랜에서의 데이터 다운스트림 성능 향상)

  • Kim, Ji-Hong;Kim, Yong-Hyun;Hong, Youn-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.149-158
    • /
    • 2006
  • We proposed a method for improving a performance of TCP downstream between a desktop PC as a fixed host and a PDA as a mobile host in a wired and wireless network based on IEEE 802.11x wireless LAN. With data transmission between these heterogeneous terminals a receiving time during downstream is slower than that during upstream by 20% at maximum. The reason is that their congestion window size will be oscillated due to a significantly lower packet processing rate at receiver compared to a packet sending rate at sender. Thus it will cause to increase the number of control packets to negotiate their window size. To mitigate these allergies, we proposed two distinct methods. First, by increasing a buffer size of a PDA at application layer an internal processing speed of a socket receive buffer of TCP becomes faster and then the window size is more stable. However, a file access time in a PDA is kept nearly constant as the buffer size increases. With the buffer size of 32,768bytes the receiving time is faster by 32% than with that of 512bytes. Second, a delay between packets to be transmitted at sender should be given. With an inter-packet delay of 5ms at sender a resulting receiving time is faster by 7% than without such a delay.

A Mobile P2P Message Platform Enabling the Energy-Efficient Handover between Heterogeneous Networks (이종 네트워크 간 에너지 효율적인 핸드오버를 지원하는 모바일 P2P 메시지 플랫폼)

  • Kim, Tae-Yong;Kang, Kyung-Ran;Cho, Young-Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.10
    • /
    • pp.724-739
    • /
    • 2009
  • This paper suggests the energy-efficient message delivery scheme and the software platform which exploits the multiple network interfaces of the mobile terminals and GPS in the current mobile devices. The mobile terminals determine the delivery method among 'direct', 'indirect', and 'WAN' based on the position information of itself and other terminals. 'Direct' method sends a message directly to the target terminal using local RAT. 'Indirect' method extends the service area by exploiting intermediate terminals as relay node. If the target terminal is too far to reach through 'direct' or 'indirect' method, the message is sent using wireless WAN technology. Our proposed scheme exploits the position information and, thus, power consumption is drastically reduced in determining handover time and direction. Network simulation results show that our proposed delivery scheme improves the message transfer efficiency and the handover detection latency. We implemented a message platform in a smart phone realizing the proposed delivery scheme. We compared our platform with other typical message platforms from energy efficiency aspect by observing the real power consumption and applying the mathematical modeling. The comparison results show that our platform requires significantly less power.

Measurement-based Channel Hopping Scheme against Jamming Attacks in IEEE 802.11 Wireless Networks (IEEE 802.11 무선랜 재밍 환경에서의 측정 기반 채널 도약 기법)

  • Jeong, Seung-Myeong;Jeung, Jae-Min;Lim, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4A
    • /
    • pp.205-213
    • /
    • 2012
  • In this paper, we propose a new channel hopping scheme based on IEEE 802.11h as a good countermeasure against jamming attacks in IEEE 802.11 wireless networks. 802.11h Dynamic Frequency Selection (DFS) is a mechanism which enables hopping to a best channel with full channel measurement, not a randomly chosen channel, when the current link quality degradation occurs due to interferers such as military radars. However, under jammer attacks, this needs a time for full channel measurement before a new channel hopping and due to link disconnection during the time network performance degradation is inevitable. In contrast, our proposed schemes make an immediate response right after a jammer detection since every device is aware of next hopping channel in advance. To do this, a next hopping channel is announced by Beacon frames and the channel is selected by full channel measurement within Beacon intervals. Simulation results show that proposed scheme minimizes throughput degradation and keeps the advantages of DFS.

Study of Optimum Parameters for Improving QoS in Wireless LAN (무선랜 QoS의 성능향상을 위한 최적 파라미터에 관한 연구)

  • Jin, Hyunjoon
    • Journal of IKEEE
    • /
    • v.17 no.2
    • /
    • pp.96-103
    • /
    • 2013
  • Since multimedia data takes large part of realtime transmission in wireless communication environments such as IEEE 802.11, QoS issues became one of the important problems with network performance. 802.11e MAC provides differentiated services based on priority schemes to solve existing 802.11 MAC problems. The TXOP is an important factor with the priority to improve network performance and QoS because it defines the time duration in which multiple frames can be transferred at one time for each station. In this paper, therefore frame sizes, TXOP Limit, and Priority values in accordance with the number of stations are experimented and derived for best network performance and QoS. Using 802.11e standard parameters, simulation results show the best throughput when the number of stations is 5 and TXOP Limit value is 6.016ms. For fairness, the best result is achieved at 3.008ms of TXOP Limit value and 15-31 of CW(Contention Window) that is lower priority than CW 7-15.

Proposal and Simulation of Flow Control and Error Recovery in EAP for Performance Improvement (EAP 성능 향상을 위한 흐름 제어 및 오류 복구 방식의 제안과 시뮬레이션)

  • Cha, Eun-Chul;Han, Chan-Kyu;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.299-306
    • /
    • 2009
  • Followed by the popularity of the Internet, a number of access technologies to the Internet have been developed. EAP is an authentication framework. It is designed to provide the authentication functionality in the access network. Because of its flexibility and extensibility EAP poses a global solution for the authentication supported by many access networks. However, EAP has critical weaknesses in the protocol which may, in turn, decrease the EAP performance. Some of the weaknesses are caused by the "lock-step" flow control which only supports a single packet in flight. Considering the weaknesses, we propose a solution for the flow control. Using simulation we prove that our solutions improve the EAP performance.

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.

Secure Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks (비대칭 무선랜 환경을 위한 안전한 패스워드 인증 키 교환 프로토콜)

  • Yang, Hyung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.173-181
    • /
    • 2011
  • User authentication and key exchange protocols are the most important cryptographic applications. For user authentication, most protocols are based on the users' secret passwords. However, protocols based on the users' secret passwords are vulnerable to the password guessing attack. In 1992, Bellovin and Merritt proposed an EKE(Encrypted Key Exchange) protocol for user authentication and key exchage that is secure against password guessing attack. After that, many enhanced and secure EKE protocols are proposed so far. In 2006, Lo pointed out that Yeh et al.'s password-based authenticated key exchange protocol has a security weakness and proposed an improved protocol. However, Cao and Lin showed that his protocol is also vulnerable to off-line password guessing attack. In this paper, we show his protocol is vulnerable to on-line password guessing attack using new attack method, and propose an improvement of password authenticated key exchange protocol for imbalanced wireless networks secure against password guessing attack.

QARA: Quality-Aware Rate Adaptation for Scalable Video Multicast in Multi-Rate Wireless LANs (다중 전송율 무선랜에서의 스케일러블 비디오 멀티캐스트를 위한 품질 기반 전송 속도 적응 기법)

  • Park, Gwangwoo;Jang, Insun;Pack, Sangheon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.29-34
    • /
    • 2012
  • Wireless multicast service can be used for video streaming service to save the network resources by sending the same popular multimedia contents to a group of users at once. For better multimedia streaming multicast service, we propose a quality-aware rate adaptation (QARA) scheme for scalable video multicast in rate adaptive wireless networks. In QARA, transmission rate is determined depending on the content's type and users' channel conditions. First, the base layer is transmitted by a low rate for high reliability. That means we provide basic service quality to all users. On the contrary, the transmission rate for enhancement layer is adapted by using channel condition feedback from a randomly selected node. So, the enhancement layer frames in a multimedia content is sent with various transmission rates. Therefore, each node can be provided with differentiated quality services. Consequently, QARA is capable of serving heterogeneous population of mobile nodes. Moreover, it can utilize network resources more efficiently. Our simulation results show that QARA outperforms utilization of the available transmission rate and reduces the data transmission time.

Model and Architecture of User-Defined Networks for Seamless Mobility Management in Diverse Wireless Environment (다양한 무선 환경에서 끊김 없는 이동성 관리를 위한 사용자 정의 네트워크 모델 및 구조)

  • Chun, Seung-Man;Nah, Jae-Wook;Lee, Seung-Mu;Choi, Jun-Hyuk;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.35-43
    • /
    • 2011
  • In this paper, we propose a novel architecture for seamless mobility management to provide users with seamless Internet connection when users roam between diverse wireless local area networks (WLANS) controlled by different management entities. There have been many researches in IETF, i.e., MIPv6, HMIPv6, and PMIPv6, to provide the mobility management. However, practically since wireless access points or access routers, which are managed by an individual manager or ISP managers, have different authentication scheme and the supported mobility management, the previous mobility management protocol developed by IETF can not guarantee the quality of service of application services as the mobile node performs the handover. To solve this drawback, we propose the mobility management scheme to provide QoS-guaranteed Internet services during the handover by configurating the wireless networks which is defined by users. More specifically, we present a model, the architecture and an algorithm for user-defined network (UDN) to provide the seamless Internet service. Finally, the performance of the proposed algorithm is evaluated by the network simulation tool.

이동형 의료영상 장치를 위한 JPEG2000 영상 뷰어 개발

  • 김새롬;김희중;정해조;강원석;이재훈;이상호;신성범;유선국
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2003.09a
    • /
    • pp.81-81
    • /
    • 2003
  • 목적 : 현재, 많은 병원이 방사선과 의료영상정보를 기존의 필름형태로 판독하고, 진료하는 방식에서 PACS 를 도입하여 디지털 형태로 영상을 전송, 저장, 검색, 판독하는 환경으로 변화하고 있다. 한편, PACS 가 가지는 가장 큰 제한점은 휴대성의 결핍이다. 본 연구는 이동형 장치가 가지는 호스트의 이동성 및 휴대성의 장점들을 살리면서, 무선 채널 용량의 한계, 무선 링크 사용이라는 제약점들을 감안하여 의료영상을 JPEG2000 영상압축 방식으로 부호화한 후 무선 환경을 고려한 전송 패킷의 크기를 결정하고자 하였으며, 무선 통신 중 발생되는 패킷 손실에 대응하기 위한 자동 오류 수정 기능도 함께 구현하고자하였다. 방법 : Window 2000 운영체계에서 의료영상을 로드하고, 데이터베이스화하며, 저장하고, 다른 네트워크와 접속, 제어가 가능한 PC급 서버를 구축하였다. 영상데이터는 무선망을 통해 전송하기 때문에 가장 높은 압축비율을 지원하면서 에너지 밀도가 높은 JPEG2000 알고리즘을 사용하여 영상을 압축하였다. 또한, 무선망 사용으로 인한 패킷 손실에 대비하여, 영상을 JPEG2000 방식으로 부호화한 후 각 블록단위로 전송하였다. 결과 : PDA에서 JPEG2000 영상을 복호화 하는데 걸리는 시간은 256$\times$256 크기의 MR 뇌영상의 경우 바로 확인할 수 있었지만, 800$\times$790 크기의 CR 흉부 영상의 경우 약 5 초 정도의 시간이 걸렸다. CDMA 1X(Code Division Multiple Access 1st Generation) 모듈을 사용하여 영상을 전송하는 경우, 256 byte/see 정도에서는 안정된 전송 결과를 보여주었고, 1 Kbyte/see 정도의 전송의 경우 중간 중간에 패킷이 손실되는 결과를 관찰할 수 있었다. 반면 무선 랜의 경우 이보다 더 큰 패킷을 전송하더라도 문제점은 발견되지 않았다. 결론 : 현재의 PACS는 유선과 무선사이의 인터페이스의 부재로 인해 유무선 연동이 되지 못하고 있다. 따라서 이동형 JPEG2000 영상 뷰어는 PACS가 가지는 문제점인 휴대성을 보완하기 위하여 개발되었다. 또한 무선망이 가지는 데이터 손실에 대하여서도 허용할 수 있는 범위에서 재전송을 가능하게 함으로서 약한 연결성을 보완하였다. 본 JPEG2000 영상 뷰어 시스템은 기존 유선상의 PACS와 이동형 장치간에 유기적인 인터페이스 역할을 하리라 기대된다.

  • PDF