• Title/Summary/Keyword: Access Network

Search Result 3,698, Processing Time 0.024 seconds

QoS Evaluation of Streaming Media in the Secure Wireless Access Network (보안 무선엑세스 네트워크에서 스트리밍 미디어의 QoS 평가)

  • Kim, Jong-Woo;Shin, Seung-Wook;Lee, Sang-Duck;Han, Seung-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.61-72
    • /
    • 2007
  • With the increasing growth of Internet and wireless IP networks, Multimedia systems need to be envisaged as information resources where users can access anywhere and anytime. However, efficient services in these multimedia systems are open and challenging research problem due to user mobility, limited resources in wireless devices and expensive radio bandwidth. To implement multimedia services over heterogeneous network, the IP header compression scheme can be used for saving bandwidth. In this paper, we present an efficient solution for header compression, which is modified form of ECRTP. It shows an architectural framework adopting modified ECRTP when IP tunneling network using GRE over IPSec is implemented. We have conducted simulations in order to analyze the effects of different header compression techniques while delivering real-time services to the wireless access network through secured IP Network. The impacts on performance have been investigated through a series of experiments.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

A New Techno-Economic Modeling and Analysis for FTTH Optical Access Networks (광 가입자 망 진화를 위한 기술 경제성 평가)

  • Lee, Young-Ho;Hahm, Tae-Hoon;Kim, Young-Jin;Han, Jung-Hee
    • IE interfaces
    • /
    • v.18 no.3
    • /
    • pp.277-287
    • /
    • 2005
  • In this paper, we deal with a new techno-economic modeling and analysis for optical access networks. In deploying the fiber-to-the-home (FTTH) architecture, network planner needs to consider the following techno-economic issues: when do we need to upgrade existing local access network to FTTH network? how much do we invest to maximize profit? In order to answer these techno-economic questions, we need to consider the impact of emerging technologies and business environment. Toward this end, we develop a new techno-economic modeling to deal with the inherent complexity of technology evolution and cost economics. In particular, the new modeling approach provides us with an techno-economic analysis of technology alternatives such as ethernet passive optical network (E-PON) and wavelength division multiplex passive optical network (WDM-PON). In this analysis, we focus on the impact of critical factors such as the cost characteristic of proposed architecture and digital subscriber line (DSL) subscriber's churn-in to FTTH service and churn-out. We develop mixed integer-programming models for finding the evolution path of local access networks to broadband network architectures.

Implementation of Wireless Network Design Tool for TD-SCDMA (TD-SCDMA 무선망 설계 Tool 의 구현 방법론)

  • Jeon, Hyun-Cheol;Ryu, Jae-Hyun;Park, Sang-Jin;Kim, Jung-Chul;Ihm, Jong-Tae
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.247-250
    • /
    • 2007
  • There are three main kinds of service standards for 3G(Third-Generation) wireless communication as WCDMA, CDMA2000 and TD-SCDMA(Time Division-Synchronous Code Division Multiple Access). Compare with WCDMA and CDMA2000, TD-SCDMA system has distinguished technical characters. It is a TDD(Time Division Duplexing) based technology and deploys several advanced but in some respects complex technologies such as smart antenna, joint-detection and baton-handoff, etc. Therefore to analyze and design TD-SCDMA wireless network, it needs more efficient and systematic simulation tool. General simulation tool has so many analysis functions including path loss prediction, capacity and coverage analysis. For more suitable for TD-SCDMA, new additional technologies have to be implemented in simulation tool. Especially as the wireless network highly advancing focused on data service, it more needs to research and develop on the reliability of the simulation tool. In this paper, to give the concrete process and skill about how to implement TD-SCDMA simulation tool, we define the kinds of simulation tool and list basic analysis functions available for TD-SCDMA network design at first. And then we explain how to consider the effects of new technologies of TD-SCDMA and give the solutions about theses considerations.

  • PDF

Cloud Radio Access Network: Virtualizing Wireless Access for Dense Heterogeneous Systems

  • Simeone, Osvaldo;Maeder, Andreas;Peng, Mugen;Sahin, Onur;Yu, Wei
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.135-149
    • /
    • 2016
  • Cloud radio access network (C-RAN) refers to the virtualization of base station functionalities by means of cloud computing. This results in a novel cellular architecture in which low-cost wireless access points, known as radio units or remote radio heads, are centrally managed by a reconfigurable centralized "cloud", or central, unit. C-RAN allows operators to reduce the capital and operating expenses needed to deploy and maintain dense heterogeneous networks. This critical advantage, along with spectral efficiency, statistical multiplexing and load balancing gains, make C-RAN well positioned to be one of the key technologies in the development of 5G systems. In this paper, a succinct overview is presented regarding the state of the art on the research on C-RAN with emphasis on fronthaul compression, baseband processing, medium access control, resource allocation, system-level considerations and standardization efforts.

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

국내가입자망에서의 광 전송 기술응용

  • 이종희
    • Information and Communications Magazine
    • /
    • v.3 no.1
    • /
    • pp.52-63
    • /
    • 1986
  • This paper discusses the network evolution strategies, worldwide trends in fiber optics systems, fiber hub in KTA access network, positioning the access network for new digital services - DLC(Digital Loop Carrier), CSA(Carrier Serving Area), and fiber optics systems overlay in the existing access network and its evolution toward near term ISDN.

  • PDF

Design of UNI for connection of MAN and the ATM Network (ATM네트윅과의 접속을 위한 MAN을 이용한 사용자-망 인터페이스 설계)

  • Lee, Sang-Hee;Seo, Ju-Ha;Kim, Hwa-Jong;Choi, Kyung;Choi, Hwang-Kyu
    • Journal of Industrial Technology
    • /
    • v.11
    • /
    • pp.99-106
    • /
    • 1991
  • In this paper the functional requirements of a B-ISDN access network based on MAN are investigated. Firstly, criteria of designing access network for the B-ISDN is studied. Secondly, the types of subscribers and their service requirements are defined. Thirdly, various architectures of CPNs(Customer Premises Networks) are considered and their characteristics are studied, Finally, the interworking functions of a DQDB MAN as an access network are investigated.

  • PDF

Access Network Separation and Facility Sharing: Recent Cases and Their Implications (액세스망 분리와 설비제공: 해외 사례 및 시사점)

  • Lee, Jongyong;Ku, Jung-Eun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.78-88
    • /
    • 2013
  • In Korea, no institutional tool or regulation exists by which a retail business in charge of gathering and maintaining subscribers can be guaranteed independence from the wholesale business division of a fixed incumbent provider of essential facilities such as ducts, poles and copper or fiber cables, which may also be offering the same products to its rivals. For that reason, a wholesale division may have an incentive to intentionally disrupt the sharing of facilities requested by competitive operators in cooperation with the retail division. Ultimately, the facility sharing process will remain inactive when there is a lack of equivalent access to the fixed access network. Therefore, this paper analyzes recent cases of access network separation and suggests long-term measures for the successful implementation of the sharing of facilities.

Performance Analysis of Multiple Access for Secondary Users in The Spectrum Sensing Cognitive Radio (스펙트럼 감지 무선 인지 네트워크에서 이차 사용자들의 다중 접속 성능 분석)

  • Hong, Seung Geun;Lee, Jae Hong
    • Journal of Broadcast Engineering
    • /
    • v.21 no.1
    • /
    • pp.113-116
    • /
    • 2016
  • Cognitive radio network technology is that secondary (unlicensed) users use the spectrum of primary (licensed) users without interfering primary communication. In this paper, we propose multiple access scheme for a cognitive radio network, where multiple secondary users access spectrum of one primary user. We consider two types of multiple access scheme, one is p-persistent and one is non-persistent, and apply these two schemes in the secondary network. For each multiple access scheme, total throughput of secondary network is derived and verified by Monte Carlo simulation. Simulation results show that maximum total throughput of the secondary network is achieved when channel access probability or the number of maximum waiting frames is chosen appropriately.