• Title/Summary/Keyword: 이동 무선망

Search Result 919, Processing Time 0.033 seconds

Implementation of Remote Control System using TeleRemote System (TeleRemote를 이용한 원격 제어 시스템 구현)

  • 김상복;한성호;진현준;박노경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1115-1123
    • /
    • 2003
  • In this paper, a remote control system called TeleRemote system which can be applied to existing wireless mobile networks or public telephone networks for remote control is designed and implemented. The proposed design employs program technology based on the theory of signal detect control and enables the EPG(Electronic Program Guide) functions such as recording reservation of bidirectional video signals with TV reception card on PC. It can also control recording reservation using remote control program through telecommunication network The PC-EPG system is implemented in Web programs with Server/Clinet architecture and the server system that provides EPG functionalities is in charge of recording reservations and data communications by means of the scheduler program. Data storing to client PCs is performed through TCP/IP and finished by client programs implemented using Visual C++/MFC programs. As remote control system, the developed system can be used for unmanned security system using the Web camera. Building intranet and making connection to internet, the TeleRemote system is believed to create potential for commercial communication system.

Secure AKA(Authentication and Key Agreement) Protocol for Binary CDMA Network (Binary CDMA 망을 위한 안전한 AKA 프로토콜)

  • Kim, Yong-Hee;Park, Mi-Ae;Cho, Jin-Woong;Lee, Hyeon-Seok;Lee, Jang-Yeon;Yi, Ok-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.51-61
    • /
    • 2010
  • Koinonia system is designed to fully utilize the advantage of Binary CDMA so as to guarantee QoS in wireless networks. In this paper, we propose the new network structure based on this system and refer to it as BLAN(Binary CDMA LAN). Although BLAN is similar structure to IEEE 802.11 WLAN, it will ensure the fast handover and QoS. We also propose the AKA(Authentication and Key Agreement) protocol and Reauthentication protocol to be used for communication in BLAN. These protocols are securely and efficiently designed using the user identity module to support the more powerful authentication. Hence, BLAN, including the proposed protocols, will support the high mobility and security. In conclusion, we expect that BLAN can be applied to future infrastructure on special environment, and it can be helpful showing the new network model which alternate WLAN.

A Study on Deployment of Digital Marine Network in Littoral Sea (연근해 디지틀 해상통신망 구축에 관한 연구)

  • Jang, Dong-Won;Lee, Young-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.77-80
    • /
    • 2008
  • 해상통신은 인명 안전을 위한 중요 통신으로 국제적으로 보호되어 왔다. 뿐 만 아니라 지구 전역을 커버하기 위해 전송 특성이 좋은 LF/MF/HF대역의 통신시스템 및 위성 시스템이 이용되고 있다. 최근에는 통신 기술의 발달로 육상이동통신 기술을 해상 및 항공에 확대하려는 시도가 꾸준히 진행되고 있다. 통신 기술의 급속한 발전으로 해상 및 항공 통신망은 기존 음성 위주의 통신망에서 멀티미디어를 처리할 수 있는 디지틀망으로의 전환이 시급히 필요하게 되었다. 대부분의 아날로그 시스템은 디지틀 시스템으로 전환되고 있으며 데이터를 이용해서 보다 정확한 정보를 제공해서 해상 안전을 높이고 있으며 기존 개별 장비를 시스템화하여 주파수를 효율적으로 활용하고 사용을 편리하게 할 수 있도록 하고 있다. DSC, AIS 등 이미 많은 디지틀 장비들이 국제 해상 통신에 이용되고 있으며 해상 통신 시스템을 종합화해서 해상안전을 제고하기 위해 IMO를 중심으로 주진 중에 있다. 그러나 연근해 해상 통신 시스템은 SOLAS조약에서 제외되어 있으므로 나라마다 다양하게 개발되고 있다. 특히 연근해에서 중요한 MF/HF/VHF대역 시스템을 각 국이 경쟁하면서 현대화를 추진하고 있으며 ITU-R을 통해서 표준화를 주도하려고 노력하고 있다. 본 고에서는 연근해 핵심 통신망을 구성할 HF/VHF대역 시스템에 대한 기술을 분석하고 기술하였다.

  • PDF

Communication Network Topology and Performance Evaluation of the Drone Delivery System for Collision Avoidance (충돌회피를 위한 드론택배 시스템의 통신망 토폴로지 및 성능평가)

  • Jo, Jun-Mo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.8
    • /
    • pp.915-920
    • /
    • 2015
  • Recently, many companies try to offer various services using drones. Especially, the drone delivery system is a good example. However, the drone delivery service has some problems since the heavy parcels flies over the people walking down streets, so many things must be considered such as dropping mails by collision of drones. To resolve the problem, in this paper, a inter-drone network communication will be used to design the topology and to simulate in the Opnet simulator for the performance evaluation. Additionally, the topology with random mobility of trajectory of drones is also designed and simulated for the result.

The Proposed UMA Mode in DMB CAS Authentication Process (비인가 무선접속 모드를 이용한 디지털 멀티미디어 방송의 제한 수신시스템의 인증 제안)

  • Oh, Se-Kab;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.239-244
    • /
    • 2008
  • In this paper refer to the digital multimedia mobile phone with the combination of broadcasting and the communication the unity of wire and wireless solution that can provide the UMA(Unlicensed Mobile Access) function is added. In UNC(Universal Naming Convention) in the case of CAS(Conditional Access System) is supported, the device(mobile phone) is authenticated through AP and then following the method of broadcasting signal the user can view the wanted contents as long as they want and for this matter the service charge system are proposed.

  • PDF

1-hop Data Traffic Reduction Method in Tactical Wireless Mobile Ad-Hoc Network based on MIL-STD-188-220C (MIL-STD-188-220C 기반 전술 무선 이동 Ad-Hoc 망에서 1-hop내 데이터 트래픽 감소 방법)

  • You, Ji-Sang
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.15-24
    • /
    • 2008
  • The data delivery confirmation method of MIL-STD-188-220C, which is a tactical wireless mobile Ad-Hoc communication protocol, is that a source node requires the end-to-end ack from all destination nodes and the data-link ack from 1-hop neighboring destination nodes and relaying nodes, regardless of the hop distance from a source node to destination nodes. This method has the problem to degrade the whole communication network performance because of excessive data traffic due to the duplicate use of end-to-end ack and data-link ack, and the collision among end-to-end acks on the wireless network in the case of confirming a data delivery within an 1-hop distance. In order to solve this problem, this paper has proposed the method to perform the data delivery confirmation with the improvement of communication network performance through the data traffic reduction by achieving the reliable data delivery confirmation requiring the only data-link ack within an 1-hop distance. The effects of the proposed method are analyzed in the two aspects of the data delivery confirmation delay time and the data delivery confirmation success ratio.

A Study on the VoIP Intrusion prevention over MANET (MANET 기반 VoIP의 침해방지에 관한 연구)

  • Yoon, Tong-Il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.543-545
    • /
    • 2011
  • The concern which is abundant in MANET VoIP for comprising the mobility guarantee and mobile network is received without the infrastructure system between the mobile terminal node. However, because the access of system and border is easy, the issue which is big in the security problem becomes more than the wired network system with this convenience by the foreign network attacker differently. In this paper, we would like to the fundamental web network, NAT and concluding the security problem technology in which Firewall can inquire on MANET VoIP and whether it is appropriate or not which can solve this is proposed.

  • PDF

Performance Evaluation and Analysis of Implicit Cluster-based Ad hoc Multicast Mechanism (암시적 클러스터기반 애드 혹 멀티캐스트 기법 성능 평가 및 분석)

  • Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Yu, Fucai;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.457-461
    • /
    • 2008
  • Previous studies on overlay ad hoc multi-casting are mainly divided into two categories: hierarchical structure-based multicast schemes and non-hierarchical structure-based multicast schemes. They do not reflect their real-time location information for routing updates. This can be a cause of low performance on energy consumption, throughput, and latency. For improving the problems, we propose an implicit cluster based overlay ad hoc multicast scheme with analysis of related work, and then we evaluate performance through computer simulation.

A Study on Deployment of Data Network in Marine VHF Bandwidth (VHF대역에서 디지틀 해상통신망 구축에 관한 연구)

  • Jang, Dong-Won;Lee, Young-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.159-162
    • /
    • 2007
  • 최근 통신 기술의 발달로 육상이동통신 기술을 해상 및 항공에 확대하려는 시도가 꾸준히 진행되고 있다. 해상 및 항공 통신은 인명 안전을 위한 통신으로 국제 기구에 의해서 최우선적인 보호를 받아 왔다. 그러나 통신 기술의 급속한 발전으로 해상 및 항공 통신망은 기존 음성 위주의 통신망에서 멀티미디어를 처리할 수 있는 디지틀망으로의 전환이 시급히 필요하게 되었다. 해상통신의 경우에는 디지틀 통신 방식을 이용하는 DSC(Digital Selective Calling), AIS(Automatic Identification System) 등을 이미 도입해서 운용 중에 있으며 다른 시스템으로의 확대가 진행 중에 있다. SOLAS 선박뿐 만 아니라 비 SOLAS(Safety Of Life At Sea) 선박들도 디지틀 통신을 활용하면 항행 안전에 매우 도움이 될 것이다. 최근에 ITU-R에서는 VHF(Very High Frequency) 대역에서 데이터 및 이메일 등을 송수신하기 위한 데이터 통신시스템 기술에 대한 논의가 진행 중에 있다. 본고에서는 이 VHF대역 데이터시스템에 대한 기술적 특성을 분석하고 향후 해상통신에서의 디지틀 기술이 도입된 후 전개될 해상통신망에 대해서 기술하였다.

  • PDF

Dynamic Frequency Allocation in OFDMA Cellular Networks (OFDMA 셀룰러 망에서 동적 주파수 할당 방법)

  • Lee, Jong-Chan;Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.6
    • /
    • pp.2992-2998
    • /
    • 2013
  • The future mobile communication system can support not only voice but also multimedia applications such as data, image and video. It requires greater resources than the voice-oriented mobile system. We propose user and sub-channel priority based resource allocation for mobile multimedia services in the OFDMA systems. Our method is able to guarantee QoS continuity of realtime services and carry the maximum number of non-realtime subscriber. Simulation is focused on total throughput and blocking rate. The simulation results show that our proposed method provides a better performance than the conventional method.