• Title/Summary/Keyword: Personal Communication Network

Search Result 489, Processing Time 0.03 seconds

A Research About Real-time Communication in Hetegeneous Network for Personal Robot (퍼스널 로봇 이종 네트워크 환경에서 실시간 통신에 관한 연구)

  • Lee, Ju-Sung;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.151-154
    • /
    • 2003
  • In this paper, we described a method to guarantee a real-time communication in the hetegeneous network for the personal robot. The hetegeneous network is composed of many kinds of network like IEEE1394, Ethernet, CAN, Bluetooth, Wireless Lan and so on. real-time data is transfered via those kinds of network. Those network have different characteristics as speed, bandwidth, Priority. we used IEEE1394, Ethernet, CAN to study in this paper. To guarantee a real-time communication, a worst case response time must be scalable. In this environment to guarantee a real-time communication, we get a worst case response time of each network and a end-to-end worst case response time.

  • PDF

Toward the Personal Robot Software Framework

  • Kim, Hong-Ryeol;Kim, Dae-Won;Kim, Hong-Seok;Lee, Ho-Gil
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.117.2-117
    • /
    • 2002
  • In this paper, a software framework is proposed for the personal robot located on home network. The proposed software framework is divided into four layers-a transparency layer, a behavior layer, a distributed task layer, and a mission scenario layer. The transparency layer consists of a virtual machine for platform transparency, and a communication broker for communication transparency among behavior modules. The communication architecture includes both server/client communication and publisher/subscriber communication. A mission scenario is assumed to be a composition of sequentially planned distributed tasks. In addition to the software framework, a new concept, personal robot design cent...

  • PDF

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.

A Study on Efficient Numbering Plan of Communication Networks (통신망의 효율적인 번호배분에 관한 연구)

  • 김석태;최영상
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.4
    • /
    • pp.485-494
    • /
    • 1998
  • Communication network numbers are used in classifying each kind of network, identifying the communication companies and choosing services that are supplied by the companies. In the present, a new numbering system is needed to distinguish a new additional communication network. However the present numbering system of domestic communication network has some problems such as exhaustion of network number, excessive local numbers, and so forth So, in this thesis we call the wire and the wireless telephone network, the pager network and the personal number as communication networks, and consider the present condition and problems of our country, Korea, and foreign countries. Then we propose the efficient numbering plan. Firstly, the present 10 numbering systems that are distributed, such as communication networking number $\ulcorner$01X$\lrcorner$ are diminished into 5 communication network numbers that have same quality. Secondly, subscriber numbers are united to 8 digit and 144 area codes are made into widened 5 area codes. Thirdly, the personal numbering services are cross-distributed by century. And we examine the technical convening plan and the legal converting plan and investigate expecting efficiency of proposed numbering system. If this numbering plan is executed, subscriber's number on communication networks are unified at 8 digits, 5 reserve numbers are secured in exhausted communication network number of $\ulcorner$01X$\lrcorner$, and they can distribute subscriber numbers over twice as much. In addition, number acceptability is enlarged from 237,600 thousands to 400,000 thousands. Personal number can be classified at not only century but also a decade. Accordingly, acceptable numbers are increased two folds enough to provide unification and population increase. We were able to confirm all the efficiencies.

  • PDF

Service Profile Replication Scheme with Local Anchor for Next Generation Personal Communication Networks

  • Jinkyung Hwang;Bae, Eun-Shil;Park, Myong-Soon
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.215-221
    • /
    • 2003
  • It is expected that per-user customized services are widely used in next generation Personal Communication Network. To provide personalized services for each call, per-user service profiles are frequently referenced and signaling traffic is considerably large. Since the service calls are requested from the places where user stays, we can expect that the traffic is localized. In this paper, we propose a new service profile replication scheme, named Follow-Me Replication with local Anchor (FMRA). By replicating user's service profile in a user-specific location area, local anchor of each region, the signaling traffic for call and mobility can be distributed to local network. We compared the performance of the FMRA with two typical schemes: Intelligent Network-based !Central scheme and IMT-2000 based full replication scheme, as we refer it to Follow-Me Replication Unconditional (FMRU). Performance results indicate that FMRA lies between Central and FMRU schemes according to call to mobility ratio, and we identified the efficient ranges of CMR for FMRA depending on the various network parameters.

Toward the Personal Robot Software Framework (차세대 퍼스널 로봇 소프트웨어 프러임워크에 관한 연구)

  • Kim, Hong-Ryeol;Kim, Dae-Won;Kim, Hong-Seok;Lee, Ho-Gil
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2410-2414
    • /
    • 2002
  • In this paper, a software framework is proposed for the personal robot located on home network. The proposed software framework is divided into four layers-a transparency layer, a behavior layer, a distributed task layer, and a mission scenario layer. The transparency layer consists of a virtual machine for platform transparency, and a communication broker for communication transparency among behavior modules. The communication architecture includes both server/client communication and publisher/subscriber communication. A mission scenario is assumed to be a composition of sequentially planned distributed tasks. In addition to the software framework, a new concept, personal robot design center platform as proposed in this paper with its implementation mechanisms. The personal robot design center is defined as a developing and a managing environment for high-level behavior modules, distributed tasks, and mission scenarios.

  • PDF

Issues and Tasks of Personal Information Protection Liability Insurance (개인정보 손해배상책임 보장제도의 쟁점과 과제)

  • Lee, Suyeon;Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

Effects of Psychological Style on On-line Network Connectivity

  • Cho, Nam-Jae;Park, Ki-Ho;Park, Sang-Hyuk
    • Journal of Digital Convergence
    • /
    • v.1 no.1
    • /
    • pp.147-164
    • /
    • 2003
  • The use of electronic mail and messenger software tools has been increased rapidly over a decade. Compared to the variety of research related to the relationship between personal psychological traits and communication modes, effects of human psychology on online activities have only recently become a focus of interest. This research analyzed the relationship between personal psychological type and online connectivity. We employed network analysis methodology and collected and analyzed data from 146 subjects. Significant differences in network measures were found among groups with different psychological style. Findings of the research can provide several implications for managerial activities regarding social connectivity.

  • PDF

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

A Simulation Study of MAC Protocol Based on Beacon Mode for Considering IEEE 802.15.7 Star Topology Visible Personal Area Network System (IEEE 802.15.7 스타 토폴로지 VPAN 시스템을 고려한 비콘 모드 기반 MAC 프로토콜 성능 평가)

  • Hwang, Junho;Yoo, Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.247-256
    • /
    • 2013
  • According to the complete standard document for PHY/MAC layer of visible light communication through the IEEE 802.15.7 WG on Sept. 2011, visible light communication lays a good foundation for developing a variety of application services. Thus, visible light communication moves to the advanced research period for developing application services, but most of applications are limited only to PtP service model. However, PtMP communication environment for VLC is required to accommodate more various applications. In this paper, we analyze an effect of key parameters on network performance in the star topology based visible personal area network system. We implement a simulator with considering attributes of PHY and MAC layer which are defined by IEEE 802.15.7 standard documents, and analyze the VLC performance.