• Title/Summary/Keyword: Access Network

Search Result 3,705, Processing Time 0.028 seconds

Performance Evaluation of a Bandwidth Allocation Algorithm of E-PON (가입자 통신망을 위한 대역 할당 알고리즘 성능 분석)

  • Ju, Un-Gi;Lee, Sang-U;Kim, Chan;Gwon, Yul
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.361-364
    • /
    • 2005
  • As increasing the Internet traffic, many researches on access network are reported for end-to-end high-speed broadband network, where E-PON(Ethernet-Passive Active Network) is one of reasonable candidate fur the network with respect to cost and bandwidth utilization. For the high-speed access network, E-PON need an efficient bandwidth allocation method. This paper suggests a WFA(Water-Filling Allocation) algorithm for the efficient bandwidth allocation with various simulation test.

  • PDF

An Access Code Key for Verification Service Model on the Blockchain in a Door Security (출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델)

  • Hong, Ki Hyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

Performance Evaluation of Random Access in Cognitive Radios (인지 무선 통신 환경에서 임의접속 기법의 전송 효율 분석)

  • Wang, Han-Ho;Yoo, Hwa-Sun;Woo, Choong-Chae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.3
    • /
    • pp.156-161
    • /
    • 2012
  • Random access protocol takes advantage of constructing a decentralized wireless network due to its intrinsic spectrum sensing capability. Such technical feature goes well with cognitive radio networks consisting of heterogeneous wireless systems, in which a centralized control between heterogeneous wireless systems is hard to be implemented. Motivated by the decentralized feature of the random access, we adopt the random access protocol in cognitive radio networks, and evaluate the performance of a CSMA-based cognitive radio network.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

The study on effective PDV control for IEE1588 (초소형 기지국에서 타이밍 품질 향상을 위한 PDV 제어 방안)

  • Kim, Hyun-Soo;Shin, Jun-Hyo;Kim, Jung-Hun;Jeong, Seok-Jong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.275-280
    • /
    • 2009
  • Femtocells are viewed as a promising option for mobile operators to improve coverage and provide high-data-rate services in a cost-effective manner Femtocells can be used to serve indoor users, resulting in a powerful solution for ubiquitous indoor and outdoor coverage. TThe frequency accuracy and phase alignment is necessary for ensuring the quality of service (QoS) forapplications such as voice, real-time video, wireless hand-off, and data over a converged access medium at the femtocell. But, the GPS has some problem to be used at the femtocell, because it is difficult to set-up, depends on the satellite condition, and very expensive. The IEEE 1588 specification provides a low-cost means for clock synchronisation over a broadband Internet connection. The Time of Packet (ToP) specified in IEEE 1588 is able to synchronize distributed clocks with an accuracy of less than one microsecond in packet networks. However, the timing synchronization over packet switched networks is a difficult task because packet networks introduce large and highly variable packet delays. This paper proposes an enhanced filter algorithm to reduce ths packet delay variation effects and maintain ToP slave clock synchronization performance. The results are presented to demonstrate in the intra-networks and show the improved performance case when the efficient ToP filter algorithm is applied.

  • PDF

Shared-medium Access Control Protocol for the ATM Access Network - Part II : Performance Analysis of the DMR-II Protocol - (ATM 액세스망을 위한 공유매체 접속 제어 프로토콜 - II부 : DMR-II 프로토콜의 성능분석-)

  • 황민태;김장경;이정태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.389-399
    • /
    • 1998
  • The DMR-II shared-medium access control protocol was developed for the ATM access network users to supper the isochronous traffic and the non-isochronous traffic simultaneously under the bandwidth-skating environment. In this paper we analyze the performance of the DMR-II protocol by using both the analytical analysis and the simulation method. Under the ATM access network environment, the performance analysis result shows that the DMR-II protocol maintains the delay variation of the isochronous traffic beyond the threshold value, and satisfies the delay time criteria of the non-isochronous traffic by supporting the priority service. Moreover the result shows high network utilization over 130% due to the destination release mechanism of the DMR-II protocol.

  • PDF

Structure and Performance Analysis of SCM-FTTH Network Based on WDM Technology of Next-Generation Optical Access Networks (차세대 광 액세스 네트워크의 WDM 기술을 기반으로 하는 SCM-FTTH 네트워크의 구조 및 성능 분석)

  • Lee, Sang-Wha
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.10
    • /
    • pp.153-162
    • /
    • 2006
  • The WDM/SCM-FTTH is an advanced optical access Network that can efficiently support various kinds of access network requirements using the WDM and SCM technologies in the near future. In this paper, we propose new network structures of the FTTH(Fiber To The Home) in the WDM(Wavelength Division Multiplexing) and WDM/SCM(Sub-Carrier Multiplexing) FTTH, and evaluate its performance with simulation results for the optical characteristics of the network and the dynamic allocation of bandwidth on demand of the users.

  • PDF

Prototype for the Weather Monitoring System with Web - Based Data Management - Construction and Operation

  • Kim, Jinwoo;Kim, Jin-Young;Oh, Jai-Ho;Kim, Do-Yong
    • Atmosphere
    • /
    • v.20 no.2
    • /
    • pp.153-160
    • /
    • 2010
  • In this paper, an attempt has been made to build and test self-configuring weather sensor networks and internet based observation system to gather atmospheric data. The aim is to provide integrated or real-time weather information in standard form using network data access protocol. This system was successfully developed to record weather information both digital as well as visual using sensor network and web-enabled surveillance cameras. These data were transformed by network based data access protocol to access and utilize for public domain. The competed system has been successfully utilized to monitor different types of weather. The results show that this is one of the most useful weather monitoring system.

Research on the Feasibility of DAP-NAD for Wideband Tactical Ad-hoc Network (광대역 전술 Ad-hoc Network를 위한 DAP-NAD 가용성에 대한 연구)

  • Han, Se-Won;Kim, Byung-Seo;Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.199-204
    • /
    • 2011
  • This paper evaluates on the feasibility of MIL-STD-188-220 protocol as a medium access protocol over WNW(Wideband Network Waveform) by simulating and comparing with IEEE 802.11e-based protocol. WNW is newly designed waveform for next-generation broadband tactical communication system. This paper shows the feasibility of using the MIL-STD-188-220 protocol that shows better performance than IEEE 802.11e-based protocol on the particular environment.

Design and Implementation of Network Access Control based on IPv6 (IPv6 기반의 네트워크 접근제어 시스템 설계 및 구현)

  • Shin, HaeJoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6310-6316
    • /
    • 2014
  • The increase in the Internet and smart device users requires high-level network security. Network security consists of Web Firewall, Network Firewall, IPS, DDoS system, UTM (Unified Treat Management), VPN, NAC (Network Access Control), Wireless security, Mobile security, and Virtualization. Most network security solutions running on IPv4, and IPv6 network services are not sufficiently ready. Therefore, in this paper, this study designed and implemented important functions of Network Access Control (NAC), which include IPv6 host detection, isolation, blocking and domain assignment for the IPv6 network. In particular, domain assignment function makes 128 bits IPv6 address management easy. This system was implemented on a KISA IPv6 test-bed using well known devices. Finally, the test result showed that all IPv6 based wired and wireless devices were well-controlled (detection, blocking, isolation and domain assignment).