• Title/Summary/Keyword: IP-based wireless network

Search Result 255, Processing Time 0.045 seconds

Design and Implementation of Tiny TCP/IPv6 Protocol for Wireless Sensor Networks (센서 네트워크를 위한 초경량 TCP/IPv6 프로토콜의 설계 및 구현)

  • Kim, Shin-Jae;Kim, Young-Gyun;Lee, Wan-Jik;Heo, Seok-Yeol;Shin, Bum-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1955-1961
    • /
    • 2009
  • As a core technology realizing ubiquitous world, recent researches are being concentrated to wireless sensor network. However, most research results were focused to the sensor network technology itself, even though interworking between the sensor network and Internet is also one of primitive requirements for ubiquitous world. In this paper, we design the tiny TCP/IPv6 profile which makes it possible to inter-connect the sensor network device to IPv6 based Internet. To confirm operation of the designed profile, we experimentally implemented and evaluated minimum TCP/IPv6 based on TinyOS. The evaluation result shows that throughput of our tiny TCP/IPv6 is almost same as that of TinyOS component.

Web Server Implementation via OpenWRT-based Wired/Wireless Router (OpenWRT 기반 유무선 공유기를 통한 웹 서버 구축)

  • Ha, Seung-Eup;Min, Jun-Ki;Ban, Tae-Hak;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1055-1057
    • /
    • 2013
  • Routers currently used in homes and institutions have a function of multiple computers to connect to the Internet with a single IP address. It is possible only through setting or establishing a separate operation in a used PC or server to function as a web/printer server, web hard, and P2P. In this paper, by utilizing the OpenWRT Linux-based through the construction of the Web server through a router OpenWRT of (Open Wireless Router) base, to build a server simple compact, low power consumption, low cost, to operate by reliability to provide Internet telephony and multimedia services high securely over the server security, which is based on the setting of policy and various firewall at the same time the configuration of the network utilizing OpenWRT router that can be enhanced, to construct a Web server through a router multi functional can receive the provision of services using the program PC and mobile APP.

  • PDF

Low-power 6LoWPAN Protocol Design (저 전력 6LoWPAN 프로토콜 설계)

  • Kim, Chang-Hoon;Kim, Il-Hyu;Cha, Jung-Woo;Nam, In-Gil;Lee, Chae-Wook
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.274-280
    • /
    • 2011
  • Due to their rapid growth and new paradigm applications, wireless sensor networks(WSNs) are morphing into low power personal area networks(LoWPANs), which are envisioned to grow radically. The fragmentation and reassembly of IP data packet is one of the most important function in the 6LoWPAN based communication between Internet and wireless sensor network. However, since the 6LoWPAN data unit size is 102 byte for IPv6 MTU size is 1200 byte, it increases the number of fragmentation and reassembly. In order to reduce the number of fragmentation and reassembly, this paper presents a new scheme that can be applicable to 6LoWPAN. When a fragmented packet header is constructed, we can have more space for data. This is because we use 8-bits routing table ill instead of 16-bits or 54-bits MAC address to decide the destination node. Analysis shows that our design has roughly 7% or 22% less transmission number of fragmented packets, depending on MAC address size(16-bits or 54-bits), compared with the previously proposed scheme in RFC4944. The reduced fragmented packet transmission means a low power consumption since the packet transmission is the very high power function in wireless sensor networks. Therefore the presented fragmented transmission scheme is well suited for low-power wireless sensor networks.

A Study on Slow Driving of Metropolitan Train for Disorder Condition of Platform Safety Gate using LTE-R and Beacon (LTE-R과 비콘을 활용한 승강장안전문 장애발생 시 열차 서행운전에 관한 연구)

  • Joh, Eungyoung;Noh, Jowon;Kim, Jin-Tea;Lee, Sunghwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.31-36
    • /
    • 2020
  • The LTE-R system is a system consisting of a packet network that provides all IP-based services. Continuous failures related to the platform safety gate and subsequent safety accidents related to passengers and safety gate workers continue. The secondary damage caused by the failure of the platform safety door and the related human life damage have emerged as a major social issue.. By linking the beacon system to the Long Term Evoluton-Railway (LTE-R) network, an LTE-based railway wireless network currently in operation or being installed, it precisely locates trains and provides standardized fault alerts to train crews. When entering into the station, ultimately we will decelerate the train and reduce the accidents of metropolitabn railroad traffic by securing safe driving.

Development of remote monitoring system based on wire and wireless internet Environment (유.무선 인터넷 환경에 연동한 원격 감시시스템 개발)

  • 박상국
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.557-560
    • /
    • 2004
  • In this paper, wireless internet services are combined with conventional wire internet service system. These system support that instrument manager can be access his instrument by use personal mobile devices and instrument manager can be take emergency action by use mobile devices. for this, error signal of local instruments are transmitted to the serial port of local server through Rf wireless communication channel. Also, The image of local instruments are transmitted to the web monitoring screen of main server. Network Camera System Supports remote monitoring functions. The interfacing of nam server with external user are possible through the mobile devices.

  • PDF

Implementation of IMS Core SIP Gateway based on Embedded (임베디드 기반의 IMS 코아 SIP 게이트웨이 구현)

  • Yoo, Seung-Sun;Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.209-214
    • /
    • 2014
  • IMS(IP Multi-Media Subsystem) is in the limelight as the Integrated wire and wireless Systems because of a sudden increase of smart mobile devices and growth of multimedia additional services such as IPTV. The structure of IMS is designed as a session control layer to provide various multimedia summative service using SIP based on IP communication network in order to carry out set-up, change and release by NGN of course, the existing voice services. But now It is broadly substituting in the IPTV, wire phone company and it is substituted in internet platform base on the soft-switch in currently. Especially, in currently, 4G LTE in a mobile communication company is rapidly growing in market. Therefore, in this study, we had designed and developed to the main prosser that can admit to 1000 user over and SIP gateway which can link the IMS Core that can link SIP Device which adopt the standard protocol on the SIP and to provide variable multimedia services.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Implementation of IPv6 based Virtual Storage System for Mobile Devices and Its Application (IPv6 기반의 모바일용 가상 저장장치 드라이버 구현 및 응용)

  • Lim, Hyo-Taek;Choi, Sae-Bom;Singh, Vinay;Cha, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.1
    • /
    • pp.74-82
    • /
    • 2007
  • IPv6 is the internet protocol for next generation which can solve the problem of IPv4 protocol. Mobile IPv6 efficiently provides the mobility for mobile devices holding the properties of IPv6. iSCSI(Internet Small Computer System Interface) is a block-oriented storage access protocol that enables a user to recognize a remote storage as their own local block device through general TCP/IP networks. Since iSCSI uses a standard Ethernet switch and router for this kind of access, it can not only be applized to Ethernet technologies, but can also be used to create a storage networking system without any distance restrictions that can equally be applied to a wireless network environment. Accordingly, this paper presents an alternative approach to overcome the limited storage space of mobile devices based on the IPv6 iSCSI initiator driver which was originally designed for wired networks. Also, this paper describes about the implementation and performance analysis of mobile education service system using virtual storage devices in IPv6 wireless networks.

  • PDF

Advanced Fast Handover Scheme for Reliable Multimedia Communication in IP-based Wireless/Mobile Networks (안정적인 멀티미디어 통신을 위한 Mobile IPv6 네트워크에서 진보된 고속 핸드오버 기법)

  • Lee, Ki-Jeong;Park, Byung-Joo;Park, Gil-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.93-99
    • /
    • 2009
  • The Internet Engineering Task Force (lETF)proposed the Mobile IPv6 protocol to provide host mobility in IPv6-based network and to offer a standardized technology. However, Mobile IPv6 (MIPv6) is not applied in actual network because of long handover latency and packet loss problems. Therefore, to compensate these drawbacks, many studies are in progress and FMIPv6 (Fast handover for Mobile IPv6) is one of the studies that has been proposed to supplement the shortcomings of MIPv6. But there are problems occurred in using router tunneling which causes packet loss and out of sequence problems. In this paper, we propose an Advanced Mobile IPv6 (AMIPv6) protocol to minimize the handover latency when Mobile Node frequently moves in each subnet. We compared the performance analysis of AMIPv6 handover latency with MIPv6 handover latency in the same network environment to prove that AMIPv6 is more efficient.

  • PDF

Performance Analysis of the Encryption Algorithms in a Satellite Communication Network based on H-ARQ (H-ARQ 기반 위성통신망에서 암호화 알고리즘에 따른 성능 분석)

  • Jeong, Won Ho;Yeo, Bong-Gu;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.45-52
    • /
    • 2015
  • Since the broadcast message in satellite signals the security of the data is extremely poor compared to other communication technologies such as the broadcast signal. Thus, encryption of the communication satellite has become a very important issue, an analysis of the communication performance of a general service is always required. In this paper, In order to analyze the encrypted communication the turbo code in an IP-based satellite communication applies the code rate compatible punctured and The wireless channel in consideration of the actual satellite communication was constructed by placing a weight on the Rayleigh fading and the Rician fading two channels. Retransmission-based error control scheme were constructed in the best performance of H-ARQ Type-II, III scheme of a number of ways that are recently considered. we analyzed the effects of normal service against a satellite communication network The security services were configured with encryption algorithms AES, ARIA (CTR, CBC mode).