• Title/Summary/Keyword: Access Network

검색결과 3,698건 처리시간 0.03초

ISDN 가입자 - 망 접속에서의 실험적 경험에 대한 고찰 (ISDN Experimental Experiences on User-Network Interfaces)

  • 정일영;정희창;조규섭;임주환
    • ETRI Journal
    • /
    • 제10권1호
    • /
    • pp.3-13
    • /
    • 1988
  • With the contunuing trends towards an information based society, telecommunications services are becoming an integral part of social activities. So, emphasis on ISDN is growing rapidly and placed on supporting integrated services delivery of different levels to the end user. The end user’s perception of an integraged services delivery(in particular, ISDN services) should reflect three interrelated capabilities, ISDN access capabilities and ISDN network capabilities. For turning the ISDN concept of above capabilities into reality, we have implemented the experimental system on user-network interfaces, which are three kinds of implementations in user access arrangements, namely basic access, intermediate rate multiplexed access and primary rate multiplexed access. Through these implementations, NTE(Network Terminating Equipment) is used for single basic access [2B+D], IMUX (Intermediate rate Multiplexer) for 4 basic accesses [4X(2B+D)] and PMUX(Primary rate Multiplexer) for [10/12 X (2B+D)]. This paper describes the outlines of system features on user access equipments, system architectures of testbed and experiment result of each access arrangements.

  • PDF

G.983.1 기반의 Ranging 시뮬레이터의 구현 (An Implementation of Ranging Simulator Based on ITU-T G.983.1)

  • 홍재근;우만식;정해;김진희;고상호;유건일
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 하계종합학술대회 논문집(1)
    • /
    • pp.248-251
    • /
    • 2000
  • The ATM-PON is regarded as an effective access network because the system transmits the various user's information through the passive optical splitter in a single platform. The ranging technology is to place all ONUs at the same distance virtually in order to form ATM-PON based on the Time Division Multiplexing (TDM). In This paper, We show the steps about ranging protocol based on ITU-T G.983.1 and ranging procedure modeling. Also, We implement the simulator that considers various environments to verify the time specifications of G.983.1. By using the simulator, We find out the wasted bandwidth which influences active ONUs during the ranging procedure.

  • PDF

임베디드 시스템에서 원-폰 서비스를 위한 블루투스 액세스 포인트 개발 (Development of a Bluetooth Access Point on Embedded System for One - Phone Service)

  • 민병조;황준;박종규;김학배
    • 정보처리학회논문지A
    • /
    • 제11A권6호
    • /
    • pp.433-438
    • /
    • 2004
  • 본 논문에서는 가정에서 블루투스 장비를 이용하여 액세스 네트워크에 접속하기 위한 블루투스 접속장비(AP)의 개발을 제안한다. 헤드셋, 마우스, 키보드 등과는 달리 AP는 다중 접속 및 안정된 네트워크 처리량을 유지할 수 있는 능력을 갖추어야 한다. 제안된 AP는 다양한 종류의 블루투스 장비들이 xDSL이나 PSTN으로 이루어진 액세스 네트워크에 안정적으로 접속하게 한다. 특히, 가정 내에서 AP는 사용자들이 one-Phone-블루투스 모듈이 포함된 셀룰러 전화기-을 이용하여 상대적으로 비싼 CDMA 네트워크 대신 PSTN에 접속할 수 있게 한다.

신규 가입자망 기술의 경제성 평가를 위한 망 구조모형과 그 응용 (Modeling of Access Networks and Applications for the Economics of New Access Network Technology)

  • 류태규;이정동;김태유
    • 기술혁신학회지
    • /
    • 제4권2호
    • /
    • pp.157-171
    • /
    • 2001
  • This paper discusses the economics of local loop architecture focusing on existing technologies, ADSL, HFC, and new one, PLC, and suggests a new modeling approach of access network system and the numerical equations. To modelize access network system and drive the numerical equations, we consider the double star and the tree & branch architecture and made block diagram of each access system. In addition, we introduce the density of subscriber as a variable and the equation of seeking the optimal number of cell in a service area. The economics of local loop architecture is analyzed in two ways, i.e. with and without consideration of the cost of cable and infrastructure. From the numerical analysis, we find that in case of not including the cost of cable and infrastructure, there is no much difference in the cost per one subscriber, while, in case of including it, there is remarkable difference among technologies. Therefore we conclude that the economics of local loop architecture is depend on the density of subscriber and existing network infrastructures.

  • PDF

무선망 설계/최적화 시뮬레이션 툴 의 다양한 신뢰도 향상 기법 (Various Techniques for Improving of the Reliability of the Wireless Network Design/Optimization Simulation Tool)

  • 전현철;류재현;박상진;박주열;김정철
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2006년도 하계학술대회
    • /
    • pp.39-42
    • /
    • 2006
  • There are various analysis functions(including prediction of path loss, analyzing of capacity and coverage, etc.) of simulation tool to design and optimize the mobile communication network. Its reliability absolutely effects the performance of mobile communication network. Especially as the wireless network highly advancing focused on data service, it more needs to research and develop on the standard establishment of reliability of the simulation tool. Also it is important the systematic research how to improve the reliability of simulation tool. In this paper, to give the concrete process and skill about how to improve reliability, we define the kinds of reliability at first. And then we explain the comparison results between real field measurement data and theoretic simulation data.

  • PDF

Performance of Bipolar Optical Spectral Encoding CDMA with Modified PN Codes

  • Chang, Sun-Hyok;Kim, Bong-Kyu;Park, Heuk;Lee, Won-Kyoung;Kim, Kwang-Joon
    • ETRI Journal
    • /
    • 제28권4호
    • /
    • pp.513-516
    • /
    • 2006
  • Experimental demonstration of bipolar spectral encoding code-division multiple-access with modified pseudorandom noise codes is presented. Bipolar spectral encoding is achieved with an erbium-doped fiber amplifier amplified spontaneous emission source and arrayed waveguide gratings. The bit-error rate performance of 1.25 Gbps signal transmission over 80 km single mode fiber is measured in a multiple-user environment.

  • PDF

ACL(: Access list)이 적용된 라우터 기반 네트워크의 검증 사례연구 (The case study to verify of a network based on router applying an ACL(: Access List))

  • 김노환
    • 한국전자통신학회논문지
    • /
    • 제11권5호
    • /
    • pp.491-498
    • /
    • 2016
  • ACL(: Access List)은 네트워크의 접근 허용 여부를 정해놓은 목록으로 주로 네트워크의 보안을 위해 사용한다. 라우터 인터페이스에 적용함으로써 특정 패킷을 필터링하고 출발지 주소, 목적지 주소, TCP/UDP 포트 등을 기반으로 허가되지 않은 특정 IP 혹은 포트를 지정하여 차단하거나 허용한다. 본 논문에서는 표준 ACL과 확장 ACL이 적용된 라우터 기반의 네트워크를 설계하기 위해 토폴로지를 설계한 후 패킷 트레이서를 이용하여 공통 가상 망을 구현한 다음 시뮬레이션을 통해서 결과를 검증할 수 있는 네트워크의 효율적인 구현사례를 제시하였다.

WiBro/WLAN Hierarchical 네트워크에서 듀얼모드 단말기의 Power Saving 전략 (The Power Saving Strategy of Dual Mode Access Terminal in WiBro and WLAN Hierarchical Network)

  • 문태욱;고봉진;조성준
    • 한국항행학회논문지
    • /
    • 제10권4호
    • /
    • pp.306-311
    • /
    • 2006
  • WiBro/WLAN Hierarchical 네트워크 구성 시 듀얼모드 단말기는 Hotspot 지역 이외의 WiBro 네트워크만 존재하는 지역에서도 Vertical 핸드오프를 위해서 항상 WLAN 모듈을 Power on 상태로 유지해야 한다. 핫스팟 지역이 아닌 WiBro 네트워크에서도 듀얼모드 단말기의 WLAN 모듈을 Power on 상태로 유지하기 때문에 사용자의 단말은 불필요한 전력을 소모하게 된다. 본 논문은 이를 보완할 수 있는 WiBro/WLAN Hierarchical 네트워크에서 듀얼모드 단말기의 Power Saving 전략에 관해 다루었다. 본 논문에서는 WiBro 네트워크 내의 핫스팟에 대한 정보를 이용하여 듀얼모드 단말기의 효율적인 Power Saving 전략을 수립하고자 한다.

  • PDF

Development of a Bluetooth Access Point for One-Phone System

  • Min, Byung-Jo;Hwang, June;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.778-781
    • /
    • 2005
  • In this paper, we describe a development of a Bluetooth Access Point for the WAN connection of home network devices. Especially, users can access the PSTN at home instead of expensive digital cellular network through the AP, using the 'one-phone', which is the Bluetooth enabled cellular phone. The simultaneous benchmark test about telephone service and LAN access service shows the perfect compatibility and reasonable performance of the access point. The one-phone service can become a convergence of wired and wireless communication through the AP.

  • PDF

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • 제10권2호
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.