• Title/Summary/Keyword: Location Register

Search Result 85, Processing Time 0.027 seconds

A Study on Analysis of Pseudo Noise Generator in Position Location Reporting System by W.F (Walsh 함수에 의한 PLR System에서의 의사잡음발생기 해석에 관한 연구)

  • An, Du-Su;Lee, Jae-Chun;Park, Jun-Hun
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1622-1624
    • /
    • 1987
  • In general, pseudo noise generator(PNG) used for PLR System consists of linear feedback shift register. Based on a W.F. representation of shift registers, a method for analyzing operational characters & sequence of PNG are studied. PNG is characterized by the time-recursive equation & PNG sequence is analyzed by the output state variable equation. Methods studied in this paper are illustrated by appropriate example.

  • PDF

A Study on the Registration and Reconstruction of the Land Boundary Location in Numerical Cadastre (수치지적에서 토지경계의 등록과 복원에 관한 연구)

  • 김욱남;박희주
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.16 no.1
    • /
    • pp.9-15
    • /
    • 1998
  • Numerical cadastral surveying method has advantages of higher accuracy and less individual error than planetable surveying method if we consider the result of surveying at the same area. Now in the areas where they use numerical cadastral records, coordinate is the basis when the boundary location is registered in numerical cadastral re-cords or is reconstructed on land surface, and this coordinate represents simply the absolute locational relationship with respect to origin point. But when we register the cadastral boundary location in cadastral or reconstruct it on land, relative relationship with respect to traverse point is more advisable basis than absolute relationship with respect to orgin point. This study contributes to the numerical cadastral surveying by discussing the problems to be improved that the principle of coordinate based boundary location registration and reconstruction has.

  • PDF

Location Management for Wireless ATM (무선 ATM을 위한 위치관리 기법)

  • Kim, Y.J.;Lee, W.Y.;Kim, J.K.;Cho, Y.Z.
    • Electronics and Telecommunications Trends
    • /
    • v.13 no.2 s.50
    • /
    • pp.10-28
    • /
    • 1998
  • 무선 ATM에서는 위치관리 기법으로는 PNNI 라우팅 프로토콜의 확장과 기존의 셀룰러 전화망의 위치 등록기 개념에 근거한 방식들이 제안되고 있는데 크게 Mobile PNNI 방식과 Location Register(LR) 방식으로 나누어진다. Mobile PNNI 방식은 기존의 PNNI 라우팅 프로토콜을 기반으로 하여 단말기의 이동성을 제공할 수 있도록 수정 확장한 위치 관리 기법이다. Mobile PNNI 방식에서는 단말기가 이동할 경우에 영역 변수(scope parameter) S에 의해 제한된 범위 내에서 교환국 간에 reachability information이 갱신되며, 이러한 정보를 이용하는 PNNI 라우팅 프로토콜을 기반으로 하여 위치 추적과 호 설정이 동시에 수행된다. LR 방식은 Mobile PNNI 방식과는 달리 발신호가 발생하게 되면, 계층적인 구조의 위치 등록기들의 추적을 통해 상대편 이동 단말기가 접속된 교환국의 위치 정보를 알아낸 다음, 호 설정 과정을 수행하게 된다. 본 연구에서는 무선 ATM에서의 여러 가지 위치관리 요구사항을 살펴보고, 위에서 언급한 두 가지 방식에 대하여 자세히 소개하고, 이들을 비교 분석한다.

A Study on Mobility Management in PCS Networks (PCS 망에서의 이동성 관리에 관한 연구)

  • 김현주;강경인;박경배;곽승욱;김현욱
    • Journal of the Korea Safety Management & Science
    • /
    • v.1 no.1
    • /
    • pp.145-157
    • /
    • 1999
  • In this paper, a research on the structure and the network configuration of the location register(LR), which database of new locations and service informations of subscribers according to the movement of subscribers in personal communication system(PCS). since the traditional PCS manages all the databases with the location informations as a centralized type. The service informations of the subscribers are centrally controlled by the HLR. So there have been the heavy signal traffic and the call setup delay. In order to relieve such problem, the proposed types of the configurations are the distributed type of PCS scheme and the hierarchical PCS scheme. In the distributed scheme, each PCS has its own LR and in the hierarchical PCS scheme, several LR are grouped to from a layer so that overall structure is a tree style.

  • PDF

Simple Protection Method against Deregistration Attack in SIP (SIP 등록취소 공격에 대한 단순한 방어 기법)

  • Kwon, Kyung Hee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.15 no.4
    • /
    • pp.92-96
    • /
    • 2016
  • Although deregistration attack is caused by simple spoofing the REGISTER message of a legitimate SIP UA, its impact is serious. The root cause of this attack is based on the fact that RFC 3261 allows the UA to remove the binding from the Location Server. In this paper, we propose a simple protection method to allow Registrar or Location Server just to ignore deregistration messages. We also show that this method works well by analyzing the process of registration and deregistration. Without any additional overhead such as an encryption or authentication, this method is able to establish a secure SIP environment efficiently protecting against the deregistration attack.

A Study on HLR technology in the IMT-2000 (IMT-2000의 HLR(Home Location Register)에 관한 연구)

  • 박태진;이상준
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.99-108
    • /
    • 2002
  • Users location management and handoff management is constructed more effective for giving satisfaction to QoS of multimedia service in Mobility network. For this, We have the HLR of IMT-2000, difference of the HLR of PCS, and connectivity Artificial Intelligent network and to provide data service of packet that is analyze to effect on the HLR. We have a study on effective for satisfaction of QoS, that is the VHE of full concepts for provide of service in the IMT-2000, packet data service for internet connectivity, for satisfaction of QoS on basis mobility network technologies of the 2nd generation.

  • PDF

Modification of User Authentication Protocol for Partial Anonymity in the GSM System (GSM 시스템에서 부분적 익명성을 위한 사용자인증 프로토콜의 변형)

  • Park Mi-Og;Kim Sang-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.645-650
    • /
    • 2006
  • GSM(Global System for Mobile communications) provides mobile users with portability and convenience as the most popular standard for mobile phones in the world. However, GSM system has the problem that can't normally authenticate a user by the exposure of IMSI(International Mobile Subscriber Identity) of Ms(Mobile station) during the user authentication procedure. In this paper, we propose secure user authentication by preventing the exposure if IMSI via transfer the encrypted IMSI from the HLR(Home Location Register) and making the only network entities verified from the HLR use the IMSI value, as the modified mechanism based on the original user authentication protocol to solve this authentication problem. Also the proposed mechanism provides fast user authentication without changing the architecture between new VLR and old VLR in the original GSM user authentication protocol as well as user's anonymity by using a temporary ID.

Performance analysis of cache strategy for signaling traffic management in wireless ATM network (무선 ATM망에서 신호 트래픽 관리를 위한 기억공간 적재기법의 성능분석)

  • 최기무;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.7
    • /
    • pp.1639-1649
    • /
    • 1998
  • For mobile multimedia services, wireless ATM(Asynchronous transfer Mode) network is studied actively. In wireless ATM network, the existing signaling protocols generate heavy traffics for HLR due to the centralized structure that all signaling loads mush be handled in HLR(Home Location Register). Also, centralized structure causes critical connection setup delays. Thus, it is important that wireless ATM reduces the connection setup delays occurred due to high traffic loads of signaling based on distributed processing. In this thesis, we propose a cache strategy for call delivery as well as the cache updates of registration based on ATM multicasting and compares the cost of cache scheme with that of conventional scheme. Our study shows that cache scheme has better performance than the conventional methods in the case that the portable mobility is low and traffic density is large.

  • PDF

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

Autonomous Knowledge Acquisition Methodology using Knowledge Workers' Context Information : Focused on the Acquisition of Dialogue-Based Knowledge for the Next Generation Knowledge Management Systems (지식근로자의 상황정보를 이용한 자율적 지식획득 방법론 : 대화형 지식의 획득을 위한 차세대형 지식경영시스템)

  • Yoo, Keedong
    • Knowledge Management Research
    • /
    • v.9 no.4
    • /
    • pp.65-75
    • /
    • 2008
  • Knowledge workers' workload to register knowledge can cause quality defects in the quality as well as the quantity of knowledge that must be accumulated in a knowledge management system(KMS). To enhance the availability of a KMS by acquiring more quality-guaranteed knowledge, autonomous knowledge acquisition which outdoes the automated acquisition must be initiated. Adopting the capabilities of context-awareness and inference in the field of context-aware computing, this paper intends to autonomously identify and acquire knowledge from knowledge workers' daily lives. Based on knowledge workers' context information, such as location, identification, schedule, etc, a methodology to monitor, sense, and gather knowledge that resides in their ordinary discussions is proposed. Also, a prototype systems of the context-based knowledge acquisition system(CKAS), which autonomously dictates, analyzes, and stores dialogue-based knowledge is introduced to prove the validity of the proposed concepts. This paper's methodology and prototype system can support relieving knowledge workers' burden to manually register knowledge, and hence provide a way to accomplish the goal of knowledge management, efficient and effective management of qualified knowledge.

  • PDF