• Title/Summary/Keyword: 전송성능 평가

Search Result 1,632, Processing Time 0.025 seconds

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

LED-to-LED Two Way Visible Light Communication System (LED-to-LED 양방향 가시광통신 시스템)

  • Jo, Seung Wan;Oh, Hoon;Lee, Yeon Jae;Le, The Dung;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.79-85
    • /
    • 2016
  • Recently, visible light communication(VLC) is being actively researched as green wireless communication services are drawing attention. Currently, VLC mostly uses LED for transmission and PD(Photo Diode) for receiving. However, this kind of system has limited applications. Therefore, we design and propose in this paper, a LED-to-LED two way VLC system that doesn't use PD(Photo Diode). This system has the following features and contributions. First, this system uses just LED at both transmitter and receiver with analog switch, Second, this system support both one-way communication and two way communication together. One way communication can support multi-hop communication. The performance evaluation of the proposed system is conducted at a place with standard light. We test the success or failure of one way communication by changing distance and baud rate while test the success and failure of two way communication by changing distance. We expect that the proposed LED-to-LED system in this paper can be applied for various application fields.

Fuzzy Control for the Obstacle Avoidance of Remote Control Mobile Robot (원격제어 이동로봇의 장애물 회피를 위한 퍼지 제어)

  • Yeo, Hee-Joo;Sung, Mun-Hyun
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.1
    • /
    • pp.47-54
    • /
    • 2011
  • The remote control mobile robot is the robot accomplishing a task according to the orders giving by a user through departed communication system using a joystick. Basically, to supply a lot of information, as this type of robot uses visual information, the user can check the transmitted information by eyes and give orders to the robot. But the weak point of this type of robot is that it has a possibility to come into a collision with an obstacle not be seen to the user because of the communication delay occurring in a communication system and dead zone happening in visual information. To solve the problem, in this paper, we try to suggest a system applying a fuzzy control system to the robot to avoid collision with an obstacle by an immediate order of the user. The fuzzy control system has better performance than any other existing control methods in the change of noise and parameter. And it is more efficient than any other since it solves easy the complexity of the system analysis occurring because of the nonlinear feature of the mobile robot system. In this paper, we made experiments how the mobile robot controlled by the fuzzy control system avoids an obstacle, tracks the path and avoids the obstacle in the path, to prove the performance and to check the evaluation and the application possibility of the fuzzy control system.

Developing an On-Line Monitoring System for a Forest Hydrological Environment - Development of Hardware - (산림수문환경(山林水文環境) 모니터링을 위(爲)한 원거리(遠距離) 자동관측(自動觀測)시스템의 개발(開發) - 하드웨어를 중심(中心)으로 -)

  • Lee, Heon Ho;Suk, Soo Il
    • Journal of Korean Society of Forest Science
    • /
    • v.89 no.3
    • /
    • pp.405-413
    • /
    • 2000
  • This study was conducted to develop an on-line monitoring system for a forest hydrological environment and its meteorological condition, such as temperature, wind direction and speed, rainfall and water level on V-notch, electrical conductivity(EC), potential of hydrogen(PH) by the motor drive sensor unit and measurement with a single-chip microprocessor as controller. These results are summarized as follows ; 1. The monitoring system consists of a signal process unit, motor drive sensor unit, radio modem unit and power supply. 2. The motor drive sensor unit protects the sensor from swift current or freezing and can constantly maintain fixed water level during measurements. 3. This monitoring system can transfer the data by radio modem. Additionally, this system can monitor hydrological conditions in real time. 4. The hardware was made of several modules with an independent CPU. They can be mounted, removed, repaired and added to. Their function can be changed and expanded. 5. These are the result of an accuracy test, the values of temperature, EC and pH measured within an error range of ${\pm}0.2^{\circ}C$, ${\pm}1{\mu}S$ and ${\pm}0.1pH$ respectively. 6. This monitoring system proved to be able to measure various factors for a forest hydrological environment in various experimental stations.

  • PDF

The Inplementation of Fault-Tolerant Dual System Using the Hot-Standby Sparing Technique (핫 스탠바이 스페어링 기법을 이용한 고장 감내 이중화 시스템 설계)

  • Shin Jin wook;Park Dong sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10A
    • /
    • pp.1113-1122
    • /
    • 2004
  • This paper is basically to achieve the high-availability and high-reliability of the control system from the implementation of the fault-tolerant system using the hot-standby sparing technique. To meet the objective, we design and implement a board with fault tolerance I/O bus to detect the fault. Warm-standby sparing technique is the fault tolerance technique usually used for switching control system in present. This technique can be easily implemented, but can not detect the fault quickly and can malfunction because of the hardware fault. The hot-standby sparing fault tolerant technique implemented in this paper is consists of dual processor modules and a I/O processor using fault tolerant I/O bus. The proposed method can find the faults as soon as possible, so it can prevent from wrong operation. Also it is possible to normal re-service due to the short recovering time. To implement the fault-tolerant dual system with fault detection be, two daughter, called FTMA and FTIA, boards designed and implemented are applied to the system. And we also simulated the proposed method to verify the high-availability and high-reliability of the control system using Markov process.

Design and Implementation of Geographical Handoff System Using GPS Information (GPS정보를 이용한 위치기반 핸드오프 시스템의 설계 및 구현)

  • Han, Seung-Ho;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.33-43
    • /
    • 2010
  • Recently, users want to use real-time multimedia services, such as internet, VoIP, etc., using their IEEE 802.11 wireless lan mobile stations. In order to provide such services, a handoff among access points is essential to support the mobility of a node, in such an wide area. However, the legacy handoff methods of IEEE 802.11 technology are easy to lose connections. Also, the recognition of a disconnection and channel re-searching time make the major delay of the next AP to connect. In addition, because IEEE 802.11 decides the selection of an AP depending only on received signal strength, regardless of a node direction, position, etc., it cannot guarantee a stable bandwidth for communication. Therefore, in order to provide a real-time multimedia service, a node must reduce the disconnection time and needs an appropriate algorithm to support a sufficient communication bandwidth. In this paper, we suggest an algorithm which predicts a handoff point of a moving node by using GPS location information, and guarantees a high transmission bandwidth according to the signal strength and the distance. We implemented the suggested algorithm, and confirmed the superiority of our algorithm by reducing around 3.7ms of the layer-2 disconnection time, and guaranteed 24.8% of the communication bandwidth.

Development of 360° Omnidirectional IP Camera with High Resolution of 12Million Pixels (1200만 화소의 고해상도 360° 전방위 IP 카메라 개발)

  • Lee, Hee-Yeol;Lee, Sun-Gu;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.21 no.3
    • /
    • pp.268-271
    • /
    • 2017
  • In this paper, we propose the development of high resolution $360^{\circ}$ omnidirectional IP camera with 12 million pixels. The proposed 12-megapixel high-resolution $360^{\circ}$ omnidirectional IP camera consists of a lens unit with $360^{\circ}$ omnidirectional viewing angle and a 12-megapixel high-resolution IP camera unit. The lens section of $360^{\circ}$ omnidirectional viewing angle adopts the isochronous lens design method and the catadioptric facet production method to obtain the image without peripheral distortion which is inevitably generated in the fisheye lens. The 12 megapixel high-resolution IP camera unit consists of a CMOS sensor & ISP unit, a DSP unit, and an I / O unit, and converts the image input to the camera into a digital image to perform image distortion correction, image correction and image compression And then transmits it to the NVR (Network Video Recorder). In order to evaluate the performance of the proposed 12-megapixel high-resolution $360^{\circ}$ omnidirectional IP camera, 12.3 million pixel image efficiency, $360^{\circ}$ omnidirectional lens angle of view, and electromagnetic certification standard were measured.

Design and Evaluation of a Buffering Patching Technique for VOD Systems (주문형 비디오 시스템을 위한 버퍼링 패칭 기법의 설계 및 평가)

  • 하숙정;배인한
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.10
    • /
    • pp.523-532
    • /
    • 2003
  • Video on Demand(VOD) services cause high resource consumption in a video seuer, because multimedia are characterized by continuous playback, a high bandwidth requirement, and long playback duration. Patching has been proposed to save the network I/O bandwidth of a video server. To achieve true VOD, patching uses multicasting to share video streams, thereby providing immediate VOD services to users without any service latency. A communication channel is used to either multicast the entire video as a regular channel or multicast only the leading portion of a video as a Patching channel. This paper Proposes a buffering patching technique that divides regular channels, as used in patching, into sub-regular channels and regular channels to shorten the holding time of the channels. In the proposed technique, the last portion of video data, corresponding to the size of the buffering window, is not transferred by sub-regular channels, but rather downloaded and buffered in the user buffer from the latest regular channel. When simulations were performed to compare the performance of the proposed technique with that of conventional patching, the results indicated that the proposed technique was superior in terms of the defection rate, average service latency, and fairness, although the amount of video data buffered at each user station was higher than that with patching.

Novel Radix-26 DF IFFT Processor with Low Computational Complexity (연산복잡도가 적은 radix-26 FFT 프로세서)

  • Cho, Kyung-Ju
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.35-41
    • /
    • 2020
  • Fast Fourier transform (FFT) processors have been widely used in various application such as communications, image, and biomedical signal processing. Especially, high-performance and low-power FFT processing is indispensable in OFDM-based communication systems. This paper presents a novel radix-26 FFT algorithm with low computational complexity and high hardware efficiency. Applying a 7-dimensional index mapping, the twiddle factor is decomposed and then radix-26 FFT algorithm is derived. The proposed algorithm has a simple twiddle factor sequence and a small number of complex multiplications, which can reduce the memory size for storing the twiddle factor. When the coefficient of twiddle factor is small, complex constant multipliers can be used efficiently instead of complex multipliers. Complex constant multipliers can be designed more efficiently using canonic signed digit (CSD) and common subexpression elimination (CSE) algorithm. An efficient complex constant multiplier design method for the twiddle factor multiplication used in the proposed radix-26 algorithm is proposed applying CSD and CSE algorithm. To evaluate performance of the previous and the proposed methods, 256-point single-path delay feedback (SDF) FFT is designed and synthesized into FPGA. The proposed algorithm uses about 10% less hardware than the previous algorithm.