• Title/Summary/Keyword: 무선 AP

Search Result 441, Processing Time 0.029 seconds

A Scheme of Avoiding Occupied Channel in Overlapped Wireless LANs (중첩된 무선 랜에서 점유된 채널의 회피 기법)

  • Song, Myong-Lyol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.33-41
    • /
    • 2009
  • Signals transmitted from access point (AP) or stations in different wireless LANs (WLAN) interfere each other when the WLANs are closely installed. When they are configured to use the same channel, signals from an WLAN get collided with signals from other WLANs so that the delay increases to user stations and the throughput decreases. In this paper, we propose a method in which an AP in a basic service set (BSS) detects other BSSs using the same channel and switches to a different channel not being occupied by any other BSS. We can avoid using the same channel with other BSS in spacially overlapped BSS environment. The proposed scheme is simulated and its characteristics are described with the analysis of the result. The results measured in terms of throughput show that the problems in overlapped wireless LANs can be resolved with the proposed method.

  • PDF

A Selection Method of Access Points to Improve IPTV Service Quality in WLAN Environments (무선랜 환경에서 IPTV 서비스 품질 향상을 위한 AP 선택 기법)

  • Park, Jae-Sung;Lim, Yu-Jin
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.251-254
    • /
    • 2011
  • In a WLAN, the data reception rate of a user station depends not only on the received signal strength (RSS) from an AP (Access Point) but also on the contention level of the AP. However, since only the RSSs measured at the physical layer have been used for a station to select an AP to associate with, the station may not satisfy the minimum quality requirements necessary for a seamless IPTV service. Thus, in this paper, we propose an AP selection method to support quality requirements of the IPTV service in a wireless LAN without modifying the IEEE 802.11 standard. A user station keeps monitoring a contention level of APs around it and a quality of an ongoing IPTV service. If the quality deteriorates below a threshold, the station reassociates with another AP having the least load so that the ongoing IPTV program is played without disruption.

A Study On Diameter IAPP Server Supporting WirelessLAN Terminal Handoff (무선랜단말 핸드오프지원 Diameter IAPP 서버에 대한 연구)

  • 함영환;정병호;정교일
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.597-601
    • /
    • 2003
  • 무선랜 환경에서 무선랜 단말이 AP(Access Point)사이를 로밍(Roaming)할 때 무선랜단말의 안전한 핸드오프를 위한 프로토콜로서 IAPP(InterAccess Point Protocol)가 있고 관련된 IEEE표준으로 802.11f가 있다. 무선랜단말의 안전한 핸드오프를 위해서는 IAPP를 통하여 기존에 접속되었던 AP에서 새로운 AP에게 무선랜단말의 인증 또는 과금관련 정보를 안전하게 전달하는 것이 필요하다. IEEE 802.11f에서는 무선랜단말의 핸드오프를 지원하는 액세스포인트를 인증하고 AP사이의 안전한 통신을 위한 정보를 제공하는 IAPP서버로 라디우스(RADIUS) 서버를 권고한다. 본 논문에서는 라디우스 서버의 한계를 극복하고 보다 확장성과 신뢰성이 뛰어난 서버를 위해 Diameter를 사용한 IAPP 서버의 구조와 동작에 대해서 설 명 한다.

  • PDF

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

WiFi Wireless Network based Control System (WiFi 무선 네트워크 기반의 제어 시스템)

  • Jeong, Eui-Hoon;Lim, Jung-Gwon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.575-577
    • /
    • 2013
  • Recently most of the hand-held smart devices have WiFi communication facility. This makes WiFi AP(access point) popular and cheaper than before. These circumstance launches some services with AP providing location based services and device control services. In this paper, we propose a AP based control system. The control system consists of AP's, AP controller and Android application program. The AP can collect MAC address information of the associated smart devices and control connected devices. The AP controller maintains DB for smart device position information and device control information. Finally Android application program provides users location based service and device control service.

  • PDF

Implementation of a Stand-Alone Access Point for Wireless LAN in Linux (리눅스로 구현한 무선 LAN 용 통합 Access Point)

  • 박정규;이호빈;송하윤;노삼혁
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.808-810
    • /
    • 2001
  • 현재 무선 네트웍이 발달됨에 따라 Access Point (AP)의 역할이 증대되고 있다. 그러나 현재 사용되고 있는 대부분의 AP는 단순한 HUB의 역할만 하고 있다. 본 연구에서는 기존의 AP에 라우터 기능 및 Mobile IP, Agent 기능을 추가하여 통합 AP를 제시하고 있다. 통합 AP는 AP 내에 필요한 기능이 내장된 것으로서 리눅스 운영체제를 기반으로 하였다. 요구되는 기능을 리눅스 커널에 내장함으로서 AF에 쉽게 포함시킬 수 있다. 또한 무료로 제공되는 리눅스 운영체제를 사용함으로서 기존의 AP에 비해서 저렴하게 통한 AP론 구성할 수 있다.

  • PDF

Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment (무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안)

  • Song, Il-Gyu;Hong, Choong-Seon;Lee, Dae-Young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.219-228
    • /
    • 2004
  • Wireless LAN(wireless Local Area Network) is constructed network environment by radio in indoors or outdoors environment and that to use electric wave or light instead of wire to client such as PC(Personal Computer), notebook, PDA in hub(Hub) in technological side. Now, among IEEE 802.11 WG(Working Group), there is TGf(Task Group F) that develop standard protocol between AP's(Access Point). In this group, proposed IAPP(Inter Access Point Protocol) to secure interoperability between AP producing in different manufacturer, this offers seamless connectivity between STA by sharing Security Context information or Layer 2 forwarding information between AP without passing through re-authentication process when STAs(Station) move by protocol to secure mobility between AP that differ in equal serve network. In this paper, I wish to suggest method that change avenue of communication of message to block information leakage that can occur at security message or WEP Key transmission between above AP, and uses public key to offer wireless area security little more.

A Study of Registration Hijacking Attack Analysis for Wi-Fi AP and FMC (Wi-Fi AP와 FMC에 대한 무선 호 가로채기 공격 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.261-264
    • /
    • 2011
  • Corded telephone to the phone using a wireless phone as the trend to switch, free Wi-Fi-enabled mobile phones, netbooks, and mobile devices, are spreading rapidly. But wireless Internet phone calls using your existing Internet network to deliver Internet services because it has a vulnerability that will occur. Government agencies are using Voice over Internet Protocol(VoIP) calls from the current wired and wireless connection and usage is increasing. In this paper, we have discovered that the vulnerability of wireless internet Wi-Fi AP and the FMC administrative agencies, such as VoIP on your wireless device to study the vulnerability. Wi-Fi AP and the FMC is to analyze the vulnerability. VoIP call interception, attack, attack on the base of the experiment is the analysis. Security-enhanced VoIP call for a Wi-Fi AP and the FMC's defense against man-in-the-middle attacks and is the study of security measures.

  • PDF

A Distributed System Architecture for Supporting Wireless Mobile Environments (무선 이동 환경을 지원하는 분산구조)

  • 박기현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.673-675
    • /
    • 1999
  • 본 논문은 기존의 유선환경에서의 서비스 환경을 이동 환경에서도 지원하기 위한 분산 구조를 다루고 있다. 이를 위하여 이동 단말기를 논리적으로 대신하는 이동 AP의 위치를 추적하는 추적 AP를 두어 기존의 응용 환경에서 수행되던 응용 프로그램들을 무선이동 환경에서도 수용할 수 있도록 하였다. 이동 단말기의 위치 변경에 따른 이동 AP, 추적 AP 사이에서 발생되는 핸드오프처리 알고리즘이 소개되었으며, 이 알고리즘은 패킷 손실이나 순서의 변경과 같은 흐름제어 기능을 포함하고 있다. 또한 무선 환경에서 발생 가능한 핸드오프와 소프트 핸드오프를 함께 고려하였다. 시뮬레이션의 결과는 핸드오프 과정에서의 추가 지연 시간에 대한 내용을 다루고 있다.

  • PDF

Monitoring system for packet analysis on Wi-Fi environment (Wi-Fi 환경에서 패킷 분석을 위한 모니터링 시스템)

  • Seo, Hee-Suk;Kim, Hee-Wan;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.227-234
    • /
    • 2011
  • Many technologies for wireless internet are increasing as more and more laptop computers, net books, smart phone and other terminals, which provide wireless network, are created. IEEE 802.11 is computer wireless network technology that used in small area, called wireless LAN or Wi-Fi. IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). AP (Access Point) is installed at cafes and public places providing wireless environment. It is more convenient to use wireless internet, however, It can be seen easily around us and possible to communicate with AP. IEEE 802.11 has many vulnerability, such as packet manipulation and information disclosure, so we should pay more attention when using IEEE 802.11. Therefore this paper developing monitoring system which can find out AP and Stations that connect with it, and capturing AP's information to find out vulnerability. This paper suggests monitoring system which traffic analysis in wireless environment.