• Title/Summary/Keyword: 무선 AP

Search Result 441, Processing Time 0.026 seconds

Integrated Wireless Network Control System using a Cloud-based AP Controller (클라우드 기반의 AP Controller를 이용한 무선 네트워크 통합 관리 시스템)

  • Min, Kyung-Su;Yoon, Kwon-Jin;Park, Min-Ho;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.720-722
    • /
    • 2015
  • In this paper, we propose a new type of integrated wireless control system using a cloud-based AP Controller. With this system, network administrator can control wireless network in head office and branch hierarchically. In head office, they have an AP Controller Manager, it can control all Access Points, Access point Controllers in their networks. In addition, if we need to install new Access point Controller because of the increasing number of Access Point, the process of making virtual Access point Controller can be automated. This paper presents an architecture of the integrated wireless control system, as well as describes its components and protocols.

An Investigation on the Operation of Wireless LANs in Korea (국내 무선랜 운영실태 조사)

  • Park, J.A.;Park, S.K.;Cho, P.D.
    • Electronics and Telecommunications Trends
    • /
    • v.19 no.2 s.86
    • /
    • pp.127-137
    • /
    • 2004
  • 본 논문에서는 2003년 9월, 설문조사를 통해 조사한 국내 무선랜 운영현황의 주요결과를 제시하고 있으며, 무선랜 AP의 비컨 신호의 복조를 통하여 일반 무선랜 이용자에게 운영 채널번호, 수신 신호세기, WEP 설정유무 등의 주변 무선랜 AP 정보를 제공하는 응용 소프트웨어(이하 ‘무선랜 가이더’라 함)를 소개하고 있다. 그리고 서울 도심지역에서 무선랜의 운영현황을 무선랜 가이더를 이용하여 측정하고, 그 결과를 바탕으로 도심지역의 무선랜 운영실태를 조사하였다. 특히, 주변 무선랜 AP의 운영 파악에 유용한 무선랜 가이더는 정보통신부 및 초고속 무선랜 포럼의 홈페이지를 통하여 무료로 배포될 예정으로 있다.

Design and Implementation of Outdoor Positioning System Using MSS Mechanism & Wireless AP characteristic (MSS 기법과 무선 AP 특징을 활용 실외 측위 시스템 설계 및 구현)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.433-439
    • /
    • 2011
  • The positioning system based on wireless AP collects AP information distributed in the real world, stores it into database, and measures the position objects by comparing with searched AP information. The existing fingerprinting method is a probabilistic modeling method that acquires much of the data collected from one location upon database composition, and stores the average of the data for the sake of use it in positioning objects. Using the average value, however, may cause the probability of errors Such errors are fatal weaknesses for services based on the accurate position. This paper described the characteristics and problems of the previously used wireless AP positioning system, and proposed a method of using the AP DB and an MSS mechanism for outdoor positioning in order to solve the aforementioned problems. And the results obtained from experimental tests showed that the proposed method achieved very low error rate(27%) compared with the existing method.

Unnecessary Packets for Smart Terminals in Wireless LAN Environment (무선랜 환경에서 스마트 단말기의 불필요한 패킷들)

  • Kim, Hyun-Soo;Kim, Eun-Gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.581-583
    • /
    • 2012
  • In this paper, linux-based wireless terminals that receives packets from the AP(Access Point) were analyzed. Wireless terminals received a number of unnecessary packets from AP, and received unnecessary packets were discarded in the appropriate layer. Whenever Wireless terminals receive unnecessary packets from AP, wireless terminals repeatedly perform an inefficient operation.

  • PDF

Inter-AP Security Transition Mechanism and Its FSM in WLAN AP Supporting Fast Roaming (이동 무선랜 접속장치의 접속점 보안 천이 메커니즘과 유한상태머신)

  • Chung ByungHo;Kang You Sung;Oh KyungHee;Kim SangHa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.601-606
    • /
    • 2005
  • Recently with the high expectation of voice over WLAN service, to supped fast inter-AP security transition in WLAN AP is one of the most actively investigating issues. It is also very important to minimize inter-AP security transition latency, while maintaining constantly the secure association from old AP when a station transits to new AP. Hence, this paper first defines secure transition latency as a primary performance metric of AP system in WLAN supporting IEEE802.11i, 802.1x, and 802.11f, and then presents low latency inter-AP security transition mechanism and its security FSM whose objective is to minimize inter-AP transition latency. Experiment shows that the proposed scheme outperforms the legacy 802.1X AP up to $79\%$ with regard to the transition latency.

Diffraction Characteristics in Wireless Environment by using the FDTD Method (FDTD법을 이용한 무선 환경에서의 회절 특성)

  • Kim, Tae Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1259-1265
    • /
    • 2013
  • In wireless environment such as wireless LAN, proper location of wireless LAN AP allows us to take an effective coverage to provide good wireless communication service. To simulate wireless environment, FDTD formulation is introduced and Gaussian pulse injection in grid space is considered to be replaced wireless LAN AP. So structural effect corresponding to location of arbitrary obstacle must be considered, and its received gain is estimated. An obstacle in scattering field should be modeled to be conductor and concrete wall and its diffraction effect for some cross wall is evaluated between transmitter and receiver point.

A Smart Phone Evil Twin Detection Method Using IP Address (IP 주소를 이용한 스마트폰 Evil Twin 탐지 기법)

  • Jeong, Yeon-Soo;Kim, Jong-Uk;Kang, Suk-In;Hong, Man-Pyo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.269-271
    • /
    • 2012
  • 무선 네트워크의 급속한 성장과 더불어 스마트폰(Smart Phone) 사용자들이 급증함에 따라 카페나 지하철역 등 곳곳에서 무선LAN을 이용할 수 있게 되었다. 그러나, 무선LAN 이용자의 증가는 심각한 보안 문제를 야기시킨다. 공격자 AP(Access Point)의 SSID를 합법적인 무선 AP의 SSID와 동일하게 설정한 후, 클라이언트의 접속을 유도하여 공격할 수 있는데, 이러한 공격을 에빌 트윈(evil twin)공격이라고도 한다. 에빌 트윈 공격을 함으로써 공격자의 무선 AP를 이용하는 사용자들의 비밀번호를 스니핑 하거나, 피싱등의 공격을 할 수 있게 된다. 특히, 모바일 AP기능이 가능한 스마트폰 사용자들이 급증하고 있는 가운데, 스마트폰을 이용하면 이러한 공격을 더욱 은밀하고 간편하게 수행할 수 있다. 본 논문에서는 IP주소를 이용하여, 스마트폰을 이용한 에빌 트윈 공격 탐지 방법을 제안하였다.

AP-Initiated Flow Redirection Mechanism for AP Load Balancing in WLAN Environments (무선랜 환경에서 AP 로드 밸런싱을 위한 AP-개시 플로우 리다이렉션 메커니즘)

  • Kim, Mi-Hui;Chae, Ki-Joon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.65-73
    • /
    • 2009
  • IEEE802.11 Wireless LAN(WLAN) is being widely used in public space such as airport, and increases the networking boundary in campus and enterprise, and it has lastly attracted considerable attention for mesh network and converged network with other 3G mobile communication networks. In WLAN, load balancing among Access Points(AP) is an important issue for efficient resource management or supporting the Quality of Service(QoS) of traffic, but most researches focused on the AP selection in network entry or roaming of Stations(STA). In this paper, we propose an AP-Initiated Flow Redirection(FR) for AP load balancing by monitoring AP's availability in the true sense. When the AP's resource becomes almost saturated, that is used more than a specific threshold, the AP queries the roaming possible neighbor APs about their availability and calculates the distribution of traffic load with statistical methods such as entropy or chi-square. Finally, the AP decides flows and new APs for redirection and performs it. Our simulation results show that our FR mechanism increases the performance in the various views.

  • PDF

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

Performance of an Efficient Association Control Scheme for Public Wireless LAN Systems (고속 공중 무선랜 시스템을 위한 효율적인 연결 요청 제어방법의 성능분석)

  • Lee Hyun woo;Kim Se han;Ryu Won;Yoon Chong ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3A
    • /
    • pp.209-216
    • /
    • 2005
  • This paper generally relates to the field of wireless local area networks(WLANs), and more particularly, to AP selection and association methods for the performance of a station. In these days, IEEE 802.11 Wireless LAN network is widely deployed and used as an emerging service to connect high-speed Internet in the public wireless environment. But, if there are many users in hot spot area, they suffer a severe decrease of performance. Thus it needs an association and access control mechanism especially when it is used in the public environment. In this paper, we suggest a selection and association method using Beacon or Probe Response frames based IEEE 802.11. Station selects AP using the information of the capacity area in a Beacon or a Probe Response frame. According to the present paper, an association method for a public WLAN service, which includes a WLAN user terminal and an AP for relaying WLAN communications to and from the user terminal, includes the steps of the user terminal asking the AP's states for access to a radio channel; and the station selects and associates with the AP According to the above-described selection in a high speed wireless Internet service based on public WLAN technologies that are currently in operations. Further, it is possible to improve the efficiency of network management.