• Title/Summary/Keyword: 임시 통신망

Search Result 13, Processing Time 0.021 seconds

임시 무선통신망의 구성 - 통신망을 거치지 않고 망을 구성하기

  • Frodign Magnus;Johansson Per;Larsson Peter
    • TTA Journal
    • /
    • s.74
    • /
    • pp.113-140
    • /
    • 2001
  • 오늘날 수많은 사람들이 각자의 직업상이나 개인생활에 랩탑PC, 휴대전화, PDA 및 MP3 같은 여러 가지 휴대장비를 갖고 다니는 것이 일반적인 실정이다. 이들 장비들은 대개 분리하여 따로 사용되는데 이는 어플리케이션이 상호작용하지 않음을 의미하는 것이다. 그러나 이들이 하나의 시스템으로 통합되어 상호작용될 수 있다고 가정해 본다면 : 회의참석자들간에 문서나 발표자료를 공유하고; 명함내용을 랩탑PC의 주소등록 및 이동전화의 번호등록기에 자동기록하며; 통근자가 전차에서 내리면 랩탑PC가 온라인상태를 유지하고; 마찬가지로 수신되는 e-mail이 각자의 PDA로 전송되고; 마지막으로 사무실에 들어서면 자동적으로 사내무선망을 통하여 모든 통신의 경로가 지정되는 것이다. 이러한 예는 자연적으로 생성되는 장비간의 임시(Ad Hoc)무선통신을 ad hoc 망 구성이라고 부르는데 기간망을 거치지 않고 언제 어디서나 자기의 장비와 통신연락을 설정해 주는 것이다. 실제로 이 망 구성은 새로운 것은 아니지만 장치, 사용방법 및 이용자는 다르다. 과거의 임시 망 개념은 흔히 전쟁터와 재난지역의 통신과 관련되었다. 그러나 현재는 블루투스 같은 신기술의 중요성이 구체화됨에 따라 임시 망 구성 시나리오가 변화를 보이고 있다. 본 기사에서는 임시 망의 배경을 설명하고 기술적인 현안들을 제시하면서 임시망이 어떻게 구성되는지 그 개념을 설명하고자 한다.

  • PDF

Power-Aware Dynamic Source Routing in Wireless Ad-hoc Networks (무선 애드혹 망에서의 전력 인식 동적 소스 라우팅)

  • 정혜영;신광욱;임근휘;이승학;윤현수
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.519-531
    • /
    • 2004
  • Ad-hoc networks are temporary wireless systems composed of mobile nodes without any fixed infrastructure. The life time of each node in the ad-hoc network significantly affects the life time of whole ad-hoc network. A node which drained out its battery may incur the partition of whole network in some network topology The life time of each node depends on the battery capacity of each node. Therefore if all mobile nodes in the network live evenly long, the life time of the network will be longer. In this paper, we propose Power-Aware Dynamic Source Routing (PADSR) which selects the best path to make the life time of the network be longer. In PADSR, when a source node finds a path to the destination node, it selects the best path that makes nodes in the network live evenly long. To find the best path, PADSR considers the consumption of transmission energy and residual battery capacity of nodes upon the path. Consequently the network lives longer if we use PADSR.

An Authentication Protocol for Secure Routing in Ad-Hoc Networks (Ad-Hoc 네트워크에서 안전한 라우팅 설정을 위한 인증 프로토콜)

  • Park, Bok-Nyong;Lee, Won-Jun;Lee, Sang-Keun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.1441-1444
    • /
    • 2003
  • Ad-Hoc 네트워크는 기존에 설치된 유선망이나 기지국과 같은 기반 구조가 없는 환경에서 이동 호스트들로만 구성되는 임시적인 무선 이동 네트워치이다. Ad-Hoc 통신망은 이동단말기의 이동성 문제로 인하여 보안에서 심각한 문제를 가지고 있는데 아직까지 제안된 Ad-Hoc 통신망 프로토콜에는 충분한 보안에 관한 해결방안이 제시되지 못하고 있는 실정이다. Ad-Hoc 네트워크에서 안전한 라우팅 프로토콜을 설정하기 위해서는 호스트들 사이에 인증을 하여야 한다. 본 논문에서는 Ad-Hoc에서 안전한 라우팅 선정을 위한 인증 프로토콜을 제안한다. 제안한 프로토콜은 해쉬 함수와 디지털 서명을 통하여 노드들을 인증하여 라우팅 설정에 안전성을 제공한다.

  • PDF

PC의 개인정보보호법 대응 방안

  • Seo, Mi-Sook;Park, Dea-Woo
    • Review of KIISC
    • /
    • v.22 no.8
    • /
    • pp.21-25
    • /
    • 2012
  • 최근 해킹 및 개인정보 유출로 인한 관공서 개인정보 취급에 대한 사회적 불신감 팽배, 신뢰도 저하 문제가 발생하고 있다. 개인정보보호법, 정보통신망법의 강화에도 불구하고, 업무에 활용된 명부 등이 저장된 위치를 기억하지 못하여 그대로 방치되고 있으며, 자료공유시스템 등 웹사이트를 통해 열람(접근)된 개인정보파일이 개인 PC내 임시파일로 PC의 하드디스크에 저장되어 있다. 개인정보보호법은 2011년 3월 29일 공포되었고, 9월 30일부터 전면 실시되었다. 본 논문에서는 PC의 개인정보를 검색하고 검색된 파일을 암호화, 파일숨김을 하여 파일을 안전하게 보관하게 하며, 사용기간이 지난 파일의 경우 완전삭제를 하여 PC에서 개인정보보호법에 대응 방안을 제시한다.

Transmission Performance of Video Traffic on Underwater MANET (수중 MANET에서 비디오 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.49-54
    • /
    • 2019
  • Since the underwater communication environment, which is used mainly in acoustic channel, is different from terestrial communication, it needs to analyze the appropriate transmission performance in underwater environment to implement the communication services. Appropriate traffic process method for a communication service is required through transmission performance of object traffic for the communication service. In this paper, transmission performance of video traffic on underwater MANET(Mobile Ad-hoc Network) is analyzed and video traffic configuration scheme on underwater MANET with results of performance analysis is suggested, This study is done with computer simulation based on NS(Network Simulator)-3. throughput, transmission delay, packet loss rate is used for transmission performance.

Transmission Performance of MANET with Intermittent Blackhole Attacks (간헐적 블랙홀 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1037-1040
    • /
    • 2013
  • Based on easy construction and operation compared with infra-structure communication netowrks, and rapid spreading of smart phone having high powered calculation ability and Wi/Fi function, usage of MANET(Mobile Ad-Hoc Network), which is configured with simply several terminals, is increased in applications of emergency communications, leisure, explorations. However, because of supporting difficulty of communication infra-structure makes some defects of malicious information intrusion like as hacking. In this paper, effects of transmission performance caused by information intrusion is analyzed. The results of published studies is based on environment of continuous intrusions, but this paper assumed intermittent attacking condition. In this paper, blackhole attack is used for intrusion type to MANET, voice traffic is used as a application traffic. Compuer simulation, based on NS-2, is used for measuring of performance parameters, and the analysis for the simulation results is shown as considerations of this paper.

  • PDF

Movement Pattern Analysis based on Transmission Performance over Underwater MANET (수중 MANET에서 전송성능기반 이동패턴분석)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1083-1088
    • /
    • 2019
  • Even though the transmission performance is very important factor for not only study and development but also for design, implementation, and operation of underwater MANET. There is a trend of using it as a measurement factor for comparing and analyzing degree of network performance. In this paper, movement pattern using transmission performance is analyzed to enlarge the use of transmission performance in underwater MANET. The relation between transmission performance and movement pattern is firstly considered and then through this consideration, causing effects of movement pattern to transmission performance is studied. Results of this study can be used as an important base to predict and analyze movement pattern through measuring of transmission performance of moving objects in underwater environments.

Transmission Performance of MANET under Multiple Blackhole Attacks (다중 블랙홀 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.783-786
    • /
    • 2015
  • Hole attack, which is disturbed transmission function through change of routing information, can cause critical results for MANET as non-infrastructure network. Backhole attack, as a typical hole attack, is one malicious attack which is disabled network transmission function by assumption of transmission data through modification of routing information. It is very important to evaluate transmission performance caused by blackhole attack, because transmission performance of MANET is affective with blackhole attack. In this paper, transmission performance is analyzed with MANET under multiple blackhole attacks caused multiple blackhole nodes. Computer simulation based on NS-2 is used as analysis tool and voice traffic is considered ad application service on MANET.

  • PDF

Indoor Location Tracking for First Responders using Data Network (데이터 통신망을 이용한 복수 구조요원 실내 위치 추적)

  • Chun, Se-Bum;Lim, Soon;Lee, Min-Su;Heo, Moon-Beom
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.810-815
    • /
    • 2013
  • In case Wi-Fi network based First responder's position tracking system is used, range measurement must be generated from RSSI finger print database. However, it is impossible to build up finger print database and to perform rescue operation at same time in the scene of rescue. In this paper, improvised Wi-Fi network without finger print database and pedestrian dead reckoning based first responders tracking system is proposed.

Transmission Performance of Application Service Traffic on MANET with IDS (IDS가 있는 MANET에서 응용 서비스 트래픽의 전송 성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.584-587
    • /
    • 2012
  • MANET, which can be constructed with only terminal devices, has structural advantages of ease installation and operation, also has environmental change of rapid supply of smart phone, it's usage can be extended to application area likes as emergency communication, leasure, exploration and investigations. But, as one characteristic of MANET, no use of communicaton infrastructure caused disadvantage of weakness for information intrusion which is frequently occurred, nowadays. In this paper, the effects of IDS(Intrusion Detection System), one of defence tools for information intrusion, is analyzed for transmission performance. Blackhole attack is assumed as a type of intrusion, MANET defence with IDS from intrusions. Computer simulation based on NS-2 used for performance measurement. In this paper, performance measurement is done for application service to analyze application level effects of IDS. VoIP service is used as application service.

  • PDF