• 제목/요약/키워드: 이동 무선망

Search Result 919, Processing Time 0.028 seconds

Power Aware Vertical Handoff Algorithm for Multi-Traffic Environment in Heterogeneous Networks (이기종 무선망에서의 다양한 트래픽 환경이 고려된 에너지 효율적인 수직적 핸드오프 기법에 대한 연구)

  • Seo, Sung-Hoon;Lee, Seung-Chan;Song, Joo-Seok
    • The KIPS Transactions:PartB
    • /
    • v.12B no.6 s.102
    • /
    • pp.679-684
    • /
    • 2005
  • There are a few representative wireless network access technologies used widely. WWAN is celluar based telecommunication networks supporting high mobility, WLAN ensures high data rate within hotspot coverage, and WDMB support both data and broadcasting services correspondingly. However, these technologies include some limitations especially on the mobility, data rate, transmission direction, and so on. In order to overvome these limitations, there are various studies have been proposed in terms of 'Vortical Handoff' that offers seamless connectivity by switching active connection to the appropriate interface which installed in the mobile devices. In this paper, we propose the interface selection algorithm and network architecture to maximize the life time of entire system by minimizing the unnecessary energy consumption of another interfaces such as WLAN, WDMB that are taken in the user equipment. In addition, by using the results of analyzing multiple types of traffic and managing user buffer as a metric for vertical handoff, we show that the energy efficiency of our scheme is $75\%$ and $34\%$ than typical WLAN for WDMB and WLAN preferred schemes, correspondingly.

Design and Evaluation of a Weighted Intrusion Detection Method for VANETs (VANETs을 위한 가중치 기반 침입탐지 방법의 설계 및 평가)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.181-188
    • /
    • 2011
  • With the rapid proliferation of wireless networks and mobile computing applications, the landscape of the network security has greatly changed recently. Especially, Vehicular Ad Hoc Networks maintaining network topology with vehicle nodes of high mobility are self-organizing Peer-to-Peer networks that typically have short-lasting and unstable communication links. VANETs are formed with neither fixed infrastructure, centralized administration, nor dedicated routing equipment, and vehicle nodes are moving, joining and leaving the network with very high speed over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connection without centralized control. In this paper, we propose a weighted intrusion detection method using rough set that can identify malicious behavior of vehicle node's activity and detect intrusions efficiently in VANETs. The performance of the proposed scheme is evaluated by a simulation study in terms of intrusion detection rate and false alarm rate for the threshold of deviation number ${\epsilon}$.

A Study on Improving the Billing System of the Wireless Internet Service (무선인터넷 서비스의 과금체계 개선에 관한 연구)

  • Min Gyeongju;Hong Jaehwan;Nam Sangsig;Kim Jeongho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.597-602
    • /
    • 2005
  • In this study, file size for measurement and the service system's billing data were submitted to a comparative analysis by performing a verification test on the billing system of three major mobile communication services providers, based on the wireless Internet service packet. As shown in the result of the verification test, there were some differences in the billing data due to transmission overhead, according to the network quality that is affected by the wireless environment of mobile operators. Consequently, the packet analysis system was proposed as a means of applying consistent packet billing to all service providers being compared. If the packet analysis system is added to supplement the current billing system various user requirements can be met. Billing by Packet among mobile operators and differentiated billing based on the content value are available, since the packet data can be extracted through protocol analysis by service, and it can be classified by content tape through traffic data analysis. Furthermore, customer's needs can be satisfied who request more information on the detailed usage, and more flexible and diverse billing policies can be supported like application of charging conditions to the non-charging packet handling. All these services are expected to contribute to the popularization of the wireless Internet service, since user complaints about the service charge could be reduced.

Study on Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (이동 Ad Hoc 망에 대한 동적 소스 라우팅 프로토콜에 관한 연구)

  • 하재승
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.9
    • /
    • pp.1219-1224
    • /
    • 2001
  • There can exist unidirectional links due to asymmetric property of mobile terminals or current wireless environments on practical mobile ad hoc networks. However, at present, the existing mobile ad hoc routing protocols are implemented to support only bidirectional links. Thus, in this paper, we extend the existing dynamic source routing protocol in order to implement a new routing protocol, which is fit to mobile ad hoc networks containing unidirectional links. For performance evaluation, we use combinations of mobility scenario files and connection pattern files from Carnegimelon Univ. We consider received data rate and average route discovery time as evaluation items, which are compared and evaluated for three suggested route discovery methods.

  • PDF

A Study on Improved AODV Routing Protocol for Mobility based on ZigBee (ZigBee 기반의 무선 네트워크에서 이동성을 고려한 개선된 AODV 라우팅 프로토콜의 연구)

  • Kim, Yu-Doo;Moon, Il-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7B
    • /
    • pp.703-709
    • /
    • 2009
  • Recently, we are using wireless system based on ZigBee technology. It solves a complicated space and frequency movement. Then, we had studied it for improved performance. So, we are must concerned about routing protocol for improvement of a weak point of physical feature. But many researchers are not focusiong on developing Routing Protocol. In this paper, we proposed improved routing protocol using AODV for wireless system based on ZigBee technology. And it is analyzed the simulation result which compare with original and improved AODV protocol based on ZigBee network.

Multiplex connection control processing method of web based Mobile Robot (Web 기반 이동로봇의 다중 접속 제어 처리법)

  • Jung, Sung-Ho;Kim, Seoung-Joo;Seo, Jae-Yong;Kim, Yong-Tack;Jeon, Hong-Tae
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.12a
    • /
    • pp.239-242
    • /
    • 2002
  • 점차 많은 형태의 가정용 로봇이 개발되고 있으며 일부 제품화되어 출시되고 있다. 이러한 가정용 로봇을 원격지에서 제어하고자 할 때 대부분이 인터넷이나 무선을 이용한 원격제어 또는 실시간 모니터링을 통해 제어하여 그 상황을 시뮬레이션으로 구현하고 있다. 그러나 제어대상이 극히 제한적인 수의 이동로봇인데 반해 다수의 가족 구성원인 제어조작자가 중복적으로 청소로봇과 같은 이동로봇을 제어하고자 접근을 시도했을 때 이동로봇에 다중적인 업무가 주어지게 될 수 도 있다. 이에 Database 를 이용하여 수행 업무의 우선순위와 제어조작자의 권한의 우선순위를 지정한 명령어를 Database 내에 구성하여 간접적으로 전송하여 제어하고자 한다. 그리고 제어를 통한 동작 시 실제 이동로봇의 속도와 방향 제어를 위해 퍼지 및 신경망을 이용한 지능제어를 구성하여 제어의 효율성을 극대화 하고자 한다.

Mobile Malicious AP Detection and Cut-off Mechanism based in Authentication Network (인증 네트워크 상의 비 인가된 모바일 AP 탐지 및 차단 기법)

  • Lim, Jae-Wan;Jang, Jong-Deok;Yoon, Chang-Pyo;Ryu, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.55-61
    • /
    • 2012
  • Owing to the development of wireless infrastructure and mobile communication technology, There is growing interest in smart phone using it. The resulting popularity of smart phone has increased the Mobile Malicious AP-related security threat and the access to the wireless AP(Access Point) using Wi-Fi. mobile AP mechanism is the use of a mobile device with Internet access such as 3G cellular service to serve as an Internet gateway or access point for other devices. Within the enterprise, the use of mobile AP mechanism made corporate information management difficult owing to use wireless system that is impossible to wire packet monitoring. In this thesis, we propose mobile AP mechanism-based mobile malicious AP detection and prevention mechanism in radius authentication server network. Detection approach detects mobile AP mechanism-based mobile malicious AP by sniffing the beacon frame and analyzing the difference between an authorized AP and a mobile AP mechanism-based mobile malicious AP detection.

Better Analysis of Lower Bounds of Frequency Assignment Problems in Wireless Networks with Cellular Topology (셀룰러 위상구조 무선망에서의 주파수 할당 문제의 향상된 하한 값 분석)

  • Lee, Sang-Kyu;Lee, Ju-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.11
    • /
    • pp.830-835
    • /
    • 2006
  • Because of its exponential growth of data and voice transmissions through wireless communications, efficient resource management became more important factor when we design wireless networks. One of those limited resources in the wireless communications is frequency bandwidth. As a solution of increasing reusability of resources, the efficient frequency assignment problems on wireless networks have been widely studied. One suitable approach to solve these frequency assignment problems is transforming the problem into traditional graph coloring problems in graph theory. However, most of frequency assignments on arbitrary network topology are NP-Complete problems. In this paper, we consider the Chromatic Bandwidth Problem on the cellular topology wireless networks. It is known that the lower bound of the necessary number of frequencies for this problem is $O(k^2)$. We prove that the lower bound of the necessary number of frequencies for the Chromatic Bandwidth Problem is $O(k^3)$ which is tighter lower bound than the previous known result.

QoS Based AAL2/ATM Multiplexing Schemes in the UTRAN Iub Interface (UTRAN Iub 인터폐이스에서 QoS 기반의 AAL2/ATM 다중화 전송방안)

  • 정창용;정조운;황호영;성단근;정수성;방만원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6A
    • /
    • pp.386-396
    • /
    • 2003
  • Recently, mobile communication systems have supported various services including internet from voice centric service as they evolve toward 3G. To accommodate the increasing number of users, an AAL2 multiplexing scheme is introduced in the UTRAN tub interface for link efficiency. However, limited radio resources and different requirements of various services make it difficult to guarantee the QoS requirements at radio access networks. The conventional AAL2/ATM multiplexing systems focused on the multiplexing efficiency of voice anddata services and QoS issues of real time and non real time services. In this paper, we classfy various services according to QoS requirements and propose AAL2/ATM multiplexing schemes using statistical multiplexing and scheduling with a rather simple structure to guarantee the given requirements. Simulation results show that the proposed schemes perform better than the conventional schemes to guarantee QoS requirements of various services.

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.