• Title/Summary/Keyword: Address Information

Search Result 3,290, Processing Time 0.031 seconds

A Distributed Dynamic Address Assignment for Tactical Mobile Ad-hoc Networks (전술 MANET에서 그룹 단위 분산된 동적 주소 할당 기법)

  • Park, Mun-Young;Lee, Jong-Kwan;Baek, Ho-Ki;Kim, Du-Hwan;Lim, Jae-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.327-335
    • /
    • 2014
  • In this paper, we propose a group distributed dynamic address assignment scheme suitable for tactical mobile ad hoc networks(MANET). Efficient address assignment is an important issue in the MANET because a node may frequently leave the current network and join another network owing to the mobility of the node. The conventional schemes do not consider the features of the tactical networks: existence of a leader node and network activity on a group basis. Thus, they may not be suitable for military operations. In our proposed scheme, called grouped units dynamic address assignment protocol(G-DAAP), a leader node maintains the address information for the members in the network and any of the nodes can exploit the information for the assignment or request of the IP address by a simple message exchange procedure. This leads to fast address assignment with small overheads. In addition, G-DAAP based on the modified IEEE 802.11e Enhanced Distributed Channel Access(EDCA) can assign addresses more quickly. We describe the delay performance of the G-DAAP and compare it with conventional schemes by numerical analysis and computer simulations. The results show that the G-DAAP significantly improves the delay performance as compared with the conventional schemes.

Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks (소규모 이동 애드혹 네트워크에서의 자동 노드 설정 프로토콜)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.100-109
    • /
    • 2005
  • A Mobile Ad-Hoc Network (MANET) supports a multi-hop wireless network without any prepared base station (BS). The MANET is capable of building a mobile network automatically without any help from DHCP servers for address allocation or routers to forward or route messages. Many routing protocols have been proposed for the MANET, but these specify the most optimized or shortest path from a source to a destination, and they assume that nodes are pre-configured before communication. To make up for this, address allocation algorithms, such as MANETConf [1] and prophet address allocation algorithm [2], have been proposed. Especially, MANETConf proposes address allocation algorithm with duplication address check. In this paper, we present a dynamic node configuration protocol based on 2-tierd hierarchical network architecture for mobile ad-hoc network, modified from [1]. Especially, it reduces the number of broadcast message exchange between nodes when a new node somes into a network, which lessens network overhead, remarkably. This protocol is based on two-tired structure, and it ensures address allocation with simple duplication address defection mechanism.

An Analysis of Wi-Fi Probe Request for Crowd Counting through MAC-Address classification (MAC-Address 분류를 통한 Wi-Fi Probe Request 기반 유동인구 분석 방법)

  • Oppokhonov, Shokirkhon;Lee, Jae-Hyun;Moon, Jun-young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.4
    • /
    • pp.612-623
    • /
    • 2022
  • Estimation of the presence of people in real time is extremely useful for businesses in providing better services. Many companies and researchers have attempted various researches in order to count the number of floating population in a specific space. Recently, as part of smart cities and digital twins, commercialization of measuring floating populations using Wi-Fi signals has become active in the public and private sectors. In this paper we present a method of estimating the floating population based on MAC-address values collected from smartphones. By distinguishing Real MAC-address and Random MAC-address values, we compare the estimated number of smartphone devices and the actual number of people caught on CCTV screens to evaluate the accuracy of the proposed method. And it appeared to have a similar correlation between the two datas. As a result, we present a method of estimating the floating population based on analyzing Wi-Fi Probe Requests.

Why abandon Randomized MAC-Address : An Analysis of Wi-Fi Probe Request for Crowd Counting (Why abandon Randomized MAC-Address : Wi-Fi Probe Request 기반 유동인구 분석 방법)

  • Oppokhonov, Shokirkhon;Lee, Jae-Hyun;Moon, Jun-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.24-34
    • /
    • 2021
  • Estimation of the presence of people in real time is extremely useful for businesses in providing better services. Many companies and researchers have attempted various researches in order to count the number of floating population in specific space. Recently, as part of smart cities and digital twins, commercialization of measuring floating populations using Wi-Fi signals has become active in the public and private sectors. This paper explains the floating population measuring system from the perspective of general consumers(non-experts) who uses current population data. Specifically, it presents a method of estimating the floating population based on MAC-address values collected from smartphones. By distinguishing Real MAC-address and Random MAC-address values, we compare the estimated number of smartphone devices and the actual number of people caught on CCTV screens to evaluate the accuracy of the proposed method. And it appeared to have a similar correlation between the two datas. As a result, we present a method of estimating the floating population based on analyzing Wi-Fi Probe Requests

  • PDF

A Study on the Implementation of New Address Management and Guide System for Jecheon City Area (제천시 새주소 관리 및 안내 시스템 구축에 관한 연구)

  • Yeon, Sang-Ho;Yoo, Joon-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.4 no.3
    • /
    • pp.13-20
    • /
    • 2001
  • The purpose of this study is development of the management and guide system for convenient use of new address guide system for systematic management and use of spatial information gained by mapping of numerical map of building and road to large basic new address, survey and input of main gate, decision of the road session, naming and input of road name, grant of numbering of all houses and buildings, new address guide, real life geographical information and added information service on web site in Jecheon-si city area. In this study, the development and establishment of new address management and guide system in local cities are designed by making full use of GIS function of client server based system. A guide system is designed the same database as management system, and it is transformed into Web GIS environment and developed in order to add the various functions of life GIS as well as new address guide. In the result, the effectiveness of new address system and guide of Jecheon-si city could be highly increased owing to not only citizens' easy access but also easy availability of various informations necessary in life by developed its system.

  • PDF

Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication (그룹 통신을 위한 안전 MAC 주소 기반 X.509 인증서에 관한 연구)

  • Hong, Sung-Hyuck
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.69-77
    • /
    • 2008
  • I propose adding users’Media Access Control (MAC) addresses to standard X.509 certificates to provide more secure authentication. The MAC address can be added by the issuing Certification Authority (CA) to the "extensions" section of the X.509 certificate. I demonstrate that when two users with MAC address information on their digital certificates communicate, the MAC address on the first user’s certificate can be easily verified by the second user. In this way, security can be improved without markedly degrading system performance and the level of initial trust between participants in virtual communities will be improved.

  • PDF

Modified Driving Method for Reducing Address Time During Subfield Time in AC PDP (플라즈마 디스플레이 패널에서 부화면 시간동안 기입시간을 단축시키기 위한 수정된 구동파형)

  • Cho, Byung-Gwon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.135-139
    • /
    • 2015
  • The address discharge time lags are investigated in each subfield time in AC plasma display panel and a modified driving waveform is proposed to reduce the address discharge time lag by applying different additional scan voltage under no misfiring discharge production. The weak plasma discharge in AC PDP is generated by applying high positive-going ramp waveform to the scan electrode during the first reset period and that induce the production of the priming particle and wall charge. Because the wall charge becomes the wall voltage in a cell, the wall plus external address voltage produce the address discharge. However, as the wall charge in a cell is gradually disappeared as time passed, the address discharge time in the subfield time for 1 TV frame is lagged. In the first subfield time, the address discharge is faster produced than the other subfield time because the wall charge are much remained by the high positive-going ramp voltage during the reset period in the first subfield time. Meanwhile, from the second to last subfield, the address discharge production time is gradually delayed due to the dissipation of the wall charge in a cell. In this study, the address discharge time lags are measured in each subfield time and the total address discharge time lags are shortened by applying the different additional scan voltage during the address period in each the subfield time.

Binary Search on Multiple Small Trees for IP Address Lookup

  • Lee BoMi;Kim Won-Jung;Lim Hyesook
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.175-178
    • /
    • 2004
  • This paper describes a new IP address lookup algorithm using a binary search on multiple balanced trees stored in one memory. The proposed scheme has 3 different tables; a range table, a main table, and multiple sub-tables. The range table includes $2^8$ entries of 22 bits wide. Each of the main table and sub-table entries is composed of fields for a prefix, a prefix length, the number of sub-table entries, a sub-table pointer, and a forwarding RAM pointer. Binary searches are performed in the main table and the multiple sub-tables in sequence. Address lookups in our proposed scheme are achieved by memory access times of 11 in average, 1 in minimum, and 24 in maximum using 267 Kbytes of memory for 38.000 prefixes. Hence the forwarding table of the proposed scheme is stored into L2 cache, and the address lookup algorithm is implemented in software running on general purpose processor. Since the proposed scheme only depends on the number of prefixes not the length of prefixes, it is easily scaled to IPv6.

  • PDF

Design of a Protected Server Network with Decoys for Network-based Moving Target Defense

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.57-64
    • /
    • 2018
  • In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. In this paper, we design a protected server network with a large number of decoys to anonymize the protected servers that dynamically mutate their IP address and port numbers according to Hidden Tunnel Networking, which is a network-based moving target defense scheme. In the network, a protected server is one-to-one mapped to a decoy-bed that generates a number of decoys, and the decoys share the same IP address pool with the protected server. First, the protected server network supports mutating the IP address and port numbers of the protected server very frequently regardless of the number of decoys. Second, it provides independence of the decoy-bed configuration. Third, it allows the protected servers to freely change their IP address pool. Lastly, it can reduce the possibility that an attacker will reuse the discovered attributes of a protected server in previous scanning. We believe that applying Hidden Tunnel Networking to protected servers in the proposed network can significantly reduce the probability of the protected servers being identified and compromised by attackers through deploying a large number of decoys.

The trend of international address standardization and implications - with a focus on ISO 19160-2 - (주소의 국제표준화 동향분석 및 시사점 - ISO 19160-2를 중심으로 -)

  • Kim, Sung-Hoon;Kim, Bo-Eun;Won, Seok-Hwan
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.1
    • /
    • pp.57-68
    • /
    • 2022
  • This study analyzed the status of international address standardization and reviewed responses of nations contained in the ISO/CD 19160-2-N5652 standard document. It identified problems in Korea's responses to the standard document, and presented ways of improvement. International standard procedures for ISO 19160-2 are underway with the goal to its completion by July 2023. To create an international standard, continuous monitoring and responses are required, and efforts to reflect the strength of the Korean addressing system on the new standard is needed.