• 제목/요약/키워드: User Network

검색결과 4,591건 처리시간 0.031초

ISDN용 전화가입자 - 망 간 접속에 관한 연구 제 2 부 : ISDN용 가입자 단말장치-Digital Telethone-에 관한 연구 (A Study on the ISDN Telephone User-Network Interface Part2: A Study on the ISDN User Terminal; Digital Telephone)

  • 옥승수;김선형;김영철;조규섭;박병철
    • 한국통신학회논문지
    • /
    • 제12권1호
    • /
    • pp.71-81
    • /
    • 1987
  • ISDN의 효율적 활용을 위해서는 다양한 가입자 서어비스를 제공할 수 있는 terminal의 개발이 선결되어야 한다. 본 논문의 ISDN가입자-망 간 접속에 관한 2편의 논문중 제2부로서 ISDN가입자 단말장치의 일반적 관련요소에 대한 연구를 수행하였으며 ISDN이 제공할 수 있는 서어비스 중 가장 간단한 예로 전화 서어비스를 위한 stimulus mode type의 digital telephone을 설계, 제작하여 그 성능을 고찰하여 보았다. 본 digital telephone은 ECM(Echo Cancellation Method)방식을 사용하여 network에 접속되며 user-network간 신호방식으로 CCITT의 I.440-441에서 권고하는 LAPD Protocol을 채택하였고 소규모 ISDN교환 emulator와의 연동을 통하여 관련된 S/W 및 H/W개발의 타당성을 검증하였다. 또한 digital telephone으로서의 기본 기능인 음성의 디지틀화, man-machine interface등이 실현되었다.

  • PDF

Peer-to-Peer 환경에서의 정보 공유를 위한 인증 메커니즘 구현 (Authentication Mechanism Implementation for Information Sharing in Peer-to-Peer Environment)

  • 이정기;배일호;이철승;문정환;박찬모;이준
    • 한국정보통신학회논문지
    • /
    • 제6권7호
    • /
    • pp.1120-1125
    • /
    • 2002
  • 정보사회로 진행되어 감에 따라 컴퓨터 네트워크 사용 및 규모의 증대는 더욱 가속화되어 가고 있다. 또한 컴퓨터 네트워크를 통해서 교환되는 정보의 양의 증가와 함께 네트워크의 보안성이 새로운 문제점으로 부각되고 있다. P2P는 자유로운 네트웍을 구성할 수 있고, 중앙 서버 기능을 없애거나 약화시켜서 각 User간에 참여판 수 있는 개방 네트워크이기 때문에, 각 User간 인증에 관한 문제가 대두되고있다. 네트웍에 있는 어떤 사용자가 공개된 환경에 있다고 가정하면, 각 User간에 허가받은 사용자에게만 접속을 제한하기 위해서는 서비스에 대한 요구를 인증 해야한다. 본 논문에서는 이를 해결하기 위해 P2P 환경에서 보안을 유지하는 방법을 제안하고, P2P 환경에서 안전하게 정보를 공유할 수 있는 메커니즘으로 Kerberos 인증 메커니즘을 인용하여 인증 메커니즘을 설계하였다.

Robust $H_{\infty}$ Power Control for CDMA Systems in User-Centric and Network-Centric Manners

  • Zhao, Nan;Wu, Zhilu;Zhao, Yaqin;Quan, Taifan
    • ETRI Journal
    • /
    • 제31권4호
    • /
    • pp.399-407
    • /
    • 2009
  • In this paper, we present a robust $H_{\infty}$ distributed power control scheme for wireless CDMA communication systems. The proposed scheme is obtained by optimizing an objective function consisting of the user's performance degradation and the network interference, and it enables a user to address various user-centric and network-centric objectives by updating power in either a greedy or energy efficient manner. The control law is fully distributed in the sense that only its own channel variation needs to be estimated for each user. The proposed scheme is robust to channel fading due to the immediate decision of the power allocation of the next time step based on the estimations from the $H_{\infty}$ filter. Simulation results demonstrate the robustness of the scheme to the uncertainties of the channel and the excellent performance and versatility of the scheme with users adapting transmit power either in a user-centric or a network-centric efficient manner.

Improved Convolutional Neural Network Based Cooperative Spectrum Sensing For Cognitive Radio

  • Uppala, Appala Raju;Narasimhulu C, Venkata;Prasad K, Satya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권6호
    • /
    • pp.2128-2147
    • /
    • 2021
  • Cognitive radio systems are being implemented recently to tackle spectrum underutilization problems and aid efficient data traffic. Spectrum sensing is the crucial step in cognitive applications in which cognitive user detects the presence of primary user (PU) in a particular channel thereby switching to another channel for continuous transmission. In cognitive radio systems, the capacity to precisely identify the primary user's signal is essential to secondary user so as to use idle licensed spectrum. Based on the inherent capability, a new spectrum sensing technique is proposed in this paper to identify all types of primary user signals in a cognitive radio condition. Hence, a spectrum sensing algorithm using improved convolutional neural network and long short-term memory (CNN-LSTM) is presented. The principle used in our approach is simulated annealing that discovers reasonable number of neurons for each layer of a completely associated deep neural network to tackle the streamlining issue. The probability of detection is considered as the determining parameter to find the efficiency of the proposed algorithm. Experiments are carried under different signal to noise ratio to indicate better performance of the proposed algorithm. The PU signal will have an associated modulation format and hence identifying the presence of a modulation format itself establishes the presence of PU signal.

An Analytical Hierarchy Process Combined with Game Theory for Interface Selection in 5G Heterogeneous Networks

  • Chowdhury, Mostafa Zaman;Rahman, Md. Tashikur;Jang, Yeong Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권4호
    • /
    • pp.1817-1836
    • /
    • 2020
  • Network convergence is considered as one of the key solutions to the problem of achieving future high-capacity and reliable communications. This approach overcomes the limitations of separate wireless technologies. Efficient interface selection is one of the most important issues in convergence networks. This paper solves the problem faced by users of selecting the most appropriate interface in the heterogeneous radio-access network (RAN) environment. Our proposed scheme combines a hierarchical evaluation of networks and game theory to solve the network-selection problem. Instead, of considering a fixed weight system while ranking the networks, the proposed scheme considers the service requirements, as well as static and dynamic network attributes. The best network is selected for a particular service request. To establish a hierarchy among the network-evaluation criteria for service requests, an analytical hierarchy process (AHP) is used. To determine the optimum network selection, the network hierarchy is combined with game theory. AHP attains the network hierarchy. The weights of different access networks for a service are calculated. It is performed by combining AHP scores considering user's experienced static network attributes and dynamic radio parameters. This paper provides a strategic game. In this game, the network scores of service requests for various RANs and the user's willingness to pay for these services are used to model a network-versus-user game. The Nash equilibria signify those access networks that are chosen by individual user and result maximum payoff. The examples for the interface selection illustrate the effectiveness of the proposed scheme.

광대역 무선 엑세스 망에서 WiFi 액세스 사용자 인증 (WiFi Access User Authentication in Broadband Wireless Access Network)

  • 이용;이구연
    • 산업기술연구
    • /
    • 제28권B호
    • /
    • pp.33-37
    • /
    • 2008
  • Recently, there have been intensive researches on the wireless Internet access through WiFi WLAN using WiRro network as backhaul link in the Internet service providing business area. However, in the wireless Internet access method, we need to solve the compatibility problem for different user authentications between licensed WiBro network and unlicensed WiFi network for billing and user management. In this paper, we propose an authentication method for WiFi users by BWAN operators through WiNNERs which is RS connecting the two networks, and discuss the effectiveness of the method.

  • PDF

Data mining approach to predicting user's past location

  • Lee, Eun Min;Lee, Kun Chang
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권11호
    • /
    • pp.97-104
    • /
    • 2017
  • Location prediction has been successfully utilized to provide high quality of location-based services to customers in many applications. In its usual form, the conventional type of location prediction is to predict future locations based on user's past movement history. However, as location prediction needs are expanded into much complicated cases, it becomes necessary quite frequently to make inference on the locations that target user visited in the past. Typical cases include the identification of locations that infectious disease carriers may have visited before, and crime suspects may have dropped by on a certain day at a specific time-band. Therefore, primary goal of this study is to predict locations that users visited in the past. Information used for this purpose include user's demographic information and movement histories. Data mining classifiers such as Bayesian network, neural network, support vector machine, decision tree were adopted to analyze 6868 contextual dataset and compare classifiers' performance. Results show that general Bayesian network is the most robust classifier.

NGN에서 오버레이를 이용한 사용자 관점의 End-to-end QoS 지원 구조 (An Architecture for User Level End-to-end QoS using Overlay in NGN)

  • 이지현;임경식;오행석;남택용
    • 정보처리학회논문지C
    • /
    • 제12C권6호
    • /
    • pp.781-792
    • /
    • 2005
  • 본 논문은 광대역 통합망에서 오버레이를 이용하여 사용자 관점의 End-to-end QoS 지원 구조를 제안한다. 기존 광대역 통합망은 제어평면의 IMS에서 사용자평면에 존재하는 IP 전달망의 직접적인 트래픽제어와 자원예약을 수행하여 QoS를 제공한다. 그리고 사용자의 End-to-end QoS를 지원하기 위하여 전달망에서 확보한 QoS를 사용자에게 최대로 전송하고 품질 저하를 최소화하는 연구가 진행되고 있다. 하지만 이러한 기존 연구와 더불어 사용자가 요구하는 서비스 품질의 차별화, 사용자의 단말환경에 최적화된 컨텐츠의 제공과 같은 사용자 수준에서의 확장된 QoS 개념이 고려될 필요가 있다. 따라서 본 논문에서 제안하는 오버레이 서비스 네트워크 구조의 전송계층에서는 다양한 망환경에 가장 효율적인 전송 프로토콜을 사용하여 최대의 전송효율을 제공하는 프로토콜 최적화기능을 지원한다. 그리고 응용계층에서는 사용자 단말의 데이터 변환과정에서 발생하는 프로세싱지연을 네트워크로 분산시키고, 오버에이를 이용하여 사용자의 서비스수준과 응용서비스의 특징 및 단말환경에 적합한 형태로의 중간변환기능을 수행한다. 결과적으로 본 논문에서는 광대역 통합망에서 전송계층과 응용계층의 서비스 품질 제어 기능을 추가하여 사용자의 End-to-end QoS를 지원하는 오버레이 서비스 네트워크의 구조와 내부 컴포넌트 기능, 그리고 3GPP와의 연동을 통한 QoS 제공 방안을 제안한다.

ISDN의 최근동향 (Latest Trends of ISDN)

  • 박항구
    • 전자통신동향분석
    • /
    • 제4권1호
    • /
    • pp.35-43
    • /
    • 1989
  • The evolution of telecommunications has raised the profile of many segments of the network that were not previously considered important. Until recently, basic telephony existed with the extension of passive cables without any particular user network interface. In the area of data communications, the introduction of flexible packet switching has allowed the network to evolve in a far more efficient manner. To overcome such separated network problems and business needs of both users and network providers, the integrated narrowband ISDN concept is being developed in most countries for implementation in the public switched telephone network (PSTN). The targets of ISDN, in my opinion, can be explained as follows : To the user, ISDN should provide the services at any time, at any place, through any media. To the business customer using PABX or LAN applications, ISDN should introduce customized services rapidly and also, ISDN should be developed by the modular hardware and software design approach in order for new services to be introduced rapidly and effectively. Software can be also developed by non-expert local staff to cater for adopting new user's service requirements immediately. Finally, ISDN will be able to increase business chances and benefit both users and operating companies.

가입자 정보보호를 위한 Virtual Home Environment 시나리오 보안 취약점 분석 (A Study of Virtual Home Environment Implementation Scenario for Subscriber Privacy)

  • 정종민;이구연;이용
    • 산업기술연구
    • /
    • 제21권A호
    • /
    • pp.117-122
    • /
    • 2001
  • Currently, the VHE (suggested for global roaming user to provide personal service environment) implementation scenario is being proposed to realize 3G network requirements. However, developing VHE scenarios are focused on signal flow between node and network, and network and network. this case may result in weakness to protect subscriber's privacy in 3G network which commonly uses visited network. In this paper, we reanalyze a several VHE implementation scenarios for user profile protection, indicate a problem concerning user privacy, and finally, design a procedure to cope with vulnerability in VHE implementation scenario.

  • PDF