• 제목/요약/키워드: Closed Access

검색결과 180건 처리시간 0.022초

외란 입력을 극복하기 위한 입력/출력 비동기 머신의 교정 제어 (Corrective Control of Input/Output Asynchronous Sequential Machines for Overcoming Disturbance Inputs)

  • 양정민;곽성우
    • 전기학회논문지
    • /
    • 제58권3호
    • /
    • pp.591-597
    • /
    • 2009
  • The problem of controlling a finite-state asynchronous sequential machine is examined. The considered machine is governed by input/output control, where access to the state of the machine is not available. In particular, disturbance inputs can infiltrate into the asynchronous machine and provoke unauthorized state transitions. The control objective is to use output feedback to compensate the machine so that the closed-loop system drive the faulty asynchronous machine from a failed state to the original one. Necessary and sufficient condition for the existence of appropriate controllers are presented in a theoretical framework. As a case study, the closed-loop system of an asynchronous machine with the proposed control scheme is implemented in VHDL code.

스패닝 트리 프로토콜을 이용한 브릿지 시뮬레이션 (A Simulation of Bridge using the Spanning Tree Protocol)

  • 이숙영;이은화;이미정;채기준;최길영;강훈
    • 한국시뮬레이션학회논문지
    • /
    • 제6권2호
    • /
    • pp.45-57
    • /
    • 1997
  • MAC (media access control) bridge is used to interconnect separate LANs and to relay frames between the BLANs (bridged LANs). Bridge architecture consists of MAC entity, MAC relay entity and bridge protocol entity protocol entity and performs learning, filtering and forwarding functions using filtering database. In this paper, we simulate these functions of bridge and the STP (spanning tree protocol). The STP derives an active topology from an arbitrarily connected BLAN. Our simulation model assumes a BLAN consisted of three bridge forming a closed loop. In order to remove the loop, each bridge process exchanges configruation BPDU (bridge protocol data unit0 with other bridge processes connected to the bridge itself. To simulate the communication between bridges, we implement the IPC (inter-process communication) server using message queues. Our simulation results show that the assumed BLAN contains no closed loop and then there is no alternative route and no unnecessary traffic.

  • PDF

SSH 터널링을 이용한 CCTV 원격접속 보안기법 (Security Technique using SSH Tunneling for CCTV Remote Access)

  • 황기진;박재표;양승민
    • 한국산학기술학회논문지
    • /
    • 제17권11호
    • /
    • pp.148-154
    • /
    • 2016
  • 최근 인터넷을 통한 CCTV 영상 유출 사건으로 인해, 영상 보안 문제가 중요한 화두로 떠오르고 있다. 한국인터넷진 흥원은 "CCTV 개인영상 정보보호를 위한 가이드라인"을 통해, CCTV 원격 접속 시 암호화된 프로토콜 사용을 권장하고 있지만, 아직도 다수의 제품이 이런 규칙을 지키지 않아서 해킹과 같은 보안 위협에 노출되고 있다. 본 논문에서는 이러한 보안 취약성 문제를 해결하기 위해서, SSH 터널링 기법을 사용하여 원격지에서 접속이 가능한 CCTV 시스템을 제안하고 구현하였다. 시스템은 SSH Secure Shell을 사용하여 암호화된 데이터를 전송함으로써, 보안성을 강화하였다. 또한 터널링 기법 사용하여 방화벽 내부에 존재하는 CCTV 녹화기로의 접근이 불가능 했던 문제를 해결하였다. 시스템에 대한 평가를 위해 여러 가지 CCTV 원격 접속 기법과 보안성에 대한 비교를 하였고, 시스템의 효율성에 대한 실험 결과, 전송 품질 및 시간의 큰 차이 없이 원격 접속이 가능함을 확인 할 수 있었다. 본 논문에서 제안하는 방법을 현장에 적용한다면, 해킹의 위협으로부터 안전한 시스템을 구성할 수 있을 것이다.

Up/Downlink Hybrid Inter-Cell Coordination Patterns of the TDD/MC-CDMA System, TDD/MC-CDMA

  • 한상진;이성진;이상훈;길계태
    • 한국통신학회논문지
    • /
    • 제34권5A호
    • /
    • pp.421-428
    • /
    • 2009
  • Inter-cell coordination has been an emerging issue for mitigating inter-cell interference in broadband wireless access networks such as IEEE802.16 and 3GPP LTE (Long Term Evolution). This paper proposes uplink/downlink hybrid inter-cell coordination patterns for a TDD (Time Division Duplex)/MC-CDMA (Multi-Carrier Code Division Multiple Access) system. For the performance analysis, closed forms of inter-cell interferences are derived when uplink and downlink transmissions coexist over a multi-cell environment. In the analysis, we find an optimal ratio of downlink transmit powers of BSs (Base Stations) based on the target outage probability and the performance according to ratios of uplink/downlink transmit powers of MSs (Mobile Stations)/BSs is explored. Our numerical results show that interference mitigation utilizing the characteristics of the uplink and downlink power ratio is very effective in improving system performance in terms of QoS.

버스트 교환 방식 CDMA 시스템에서의 패킷 데이터 서비스를 위한 전송률 스케줄링 기법 비교 분석 (Performance Analysis of Transmission rate Scheduling Schemes for non-real Service in Burst-Switching (DS/CDMA) System)

  • 김미정;김수원
    • 한국통신학회논문지
    • /
    • 제29권5A호
    • /
    • pp.574-582
    • /
    • 2004
  • 본 논문에서는 패킷 데이터 서비스를 지원하는 DS/CDMA 시스템에서 역방향 링크의 대기 패킷 버스트들이 겪는 평균 전송 시간을 최소화하기 위한 여러 가지 패킷 스캐줄링 방식을 비교 분석하였다. 모든 활성화된 데이터 사용자들이 동시에 전송을 하는 경우의 최적의 스케줄링 방식에 대하여 논하고 기존의 여러 가지 다른 전송률 스케줄링 방식들과의 수학적인 비교 분석을 통하여 평균 전송 지연을 고려한 전송률 스케줄링 방식의 효율적인 지표를 제시하였다.

A Spectral Efficient NOMA-based Two-Way Relaying Scheme for Wireless Networks with Two Relays

  • Li, Guosheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.365-382
    • /
    • 2021
  • This paper proposes a novel two-way relaying (TWR) approach for a two-relay wireless network based on non-orthogonal multiple access (NOMA), where two terminals exchange messages with a cellular base station (BS) via two intermediate relay stations (RSs). We propose a NOMA-based TWR approach with two relaying schemes, i.e., amplify-and-forward (AF) and decode-and-forward (DF), referred to as NOMA-AF and NOMA-DF. The sum-rate performance of our proposed NOMA-AF and NOMA-DF is analyzed. A closed-form sum-rate upper bound for the NOMA-AF is obtained, and the exact ergodic sum-rate of NOMA-DF is also derived. The asymptotic sum-rate of NOMA-AF and NOMA-DF is also analyzed. Simulation results show that the proposed scheme outperforms conventional orthogonal multiple access based transmission schemes. It is also shown that increasing the transmit power budget of the relays only cannot always improve the sum-rates.

Sum-Rate Performance of A NOMA-based Two-Way Relay Approach for A Two-User Cellular Network

  • Li, Guosheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권5호
    • /
    • pp.1944-1956
    • /
    • 2021
  • This paper considers a cellular two-way relay network with one base station (BS), one relay station (RS), and two users. The two users are far from the BS and no direct links exist, and the two users exchange messages with the BS via the RS. A non-orthogonal multiple access (NOMA) and network coding (NC)-based decode-and-forward (DF) two-way relaying (TWR) scheme TWR-NOMA-NC is proposed, which is able to reduce the number of channel-uses to three from four in conventional time-division multiple access (TDMA) based TWR approaches. The achievable sum-rate performance of the proposed approach is analyzed, and a closed-form expression for the sum-rate upper bound is derived. Numerical results show that the analytical sum-rate upper bound is tight, and the proposed TWR-NOMA-NC scheme significantly outperforms the TDMA-based TWR and NOMA-based one-way relaying counterparts.

특정 AP를 이용한 안드로이드 기반 모바일 보안 메신저 구현 (Implementation of Android-Based Mobile Messenger with Security Function Using Specific AP)

  • 김지형;이충호
    • 융합신호처리학회논문지
    • /
    • 제16권3호
    • /
    • pp.102-107
    • /
    • 2015
  • 안드로이드를 탑재한 스마트 폰에서 사용자 그룹간의 통신 메신저를 사용하는 경우 해킹 또는 검열에 의한 개인 정보 유출이 최근 큰 문제 중 하나로 대두되고 이다. 이 문제를 해결하기 위하여 일반적으로 기업에서는 내부 메신저에 복잡한 보안 절차를 적용시키고 있으나 이는 기존의 업무 효율성을 저하시키는 결과를 초래한다. 본 논문에서는 특정 AP(Access Point)에 접근한 클라이언트만 통신 할 수 있도록 특정 그룹만의 폐쇄된 메신저를 구현함으로써 업무효율성을 높이면서도 보안을 강화할 수 있는 방법을 제안한다. 이 방법은 기존의 일반적 방식과 달리 서버에서 데이터를 보관하지 않으며, 클라이언트가 특정 AP와 접속이 단절되는 순간 메신저의 내용을 자동으로 삭제하도록 구현되어 있어 보안 및 검열문제를 해결하고 있다. 제안된 방법은 안드로이드 메신저로 구현하여 그 유효성을 검증하였다.

Throughput Analysis and Optimization of Distributed Collision Detection Protocols in Dense Wireless Local Area Networks

  • Choi, Hyun-Ho;Lee, Howon;Kim, Sanghoon;Lee, In-Ho
    • Journal of Communications and Networks
    • /
    • 제18권3호
    • /
    • pp.502-512
    • /
    • 2016
  • The wireless carrier sense multiple access with collision detection (WCSMA/CD) and carrier sense multiple access with collision resolution (CSMA/CR) protocols are considered representative distributed collision detection protocols for fully connected dense wireless local area networks. These protocols identify collisions through additional short-sensing within a collision detection (CD) period after the start of data transmission. In this study, we analyze their throughput numerically and show that the throughput has a trade-off that accords with the length of the CD period. Consequently, we obtain the optimal length of the CD period that maximizes the throughput as a closed-form solution. Analysis and simulation results show that the throughput of distributed collision detection protocols is considerably improved when the optimal CD period is allocated according to the number of stations and the length of the transmitted packet.

Multi-homing in Heterogeneous Wireless Access Networks: A Stackelberg Game for Pricing

  • Lee, Joohyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권5호
    • /
    • pp.1973-1991
    • /
    • 2018
  • Multimedia applications over wireless networks have been evolving to augmented reality or virtual reality services. However, a rich data size compared to conventional multimedia services causes bandwidth bottlenecks over wireless networks, which is one of the main reasons why those applications are not used widely. To overcome this limitation, bandwidth aggregation techniques, which exploit a multi-path transmission, have been considered to maximize link utilization. Currently, most of the conventional researches have been focusing on the user end problems to improve the quality of service (QoS) through optimal load distribution. In this paper, we address the joint pricing and load distribution problem for multi-homing in heterogeneous wireless access networks (ANs), considering the interests of both the users and the service providers. Specifically, we consider profit from resource allocation and cost of power consumption expenditure for operation as an utility of each service provider. Here, users decide how much to request the resource and how to split the resource over heterogeneous wireless ANs to minimize their cost while supporting the required QoS. Then, service providers compete with each other by setting the price to maximize their utilities over user reactions. We study the behaviors of users and service providers by analyzing their hierarchical decision-making process as a multileader-, multifollower Stackelberg game. We show that both the user and service provider strategies are closed form solutions. Finally, we discuss how the proposed scheme is well converged to equilibrium points.