• Title/Summary/Keyword: Wireless Network Design

Search Result 1,381, Processing Time 0.03 seconds

A study on the Implementation of Wireless Sensor Network for Wireless Home Networking (무선 홈네트웤을 위한 WSN에 관한 연구)

  • Jeon, Dong-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.6
    • /
    • pp.1337-1342
    • /
    • 2012
  • In recent years, many researches in Home Networking are being progressed actively. Most of techniques for Home Networking are based on wired but the technique for wireless connection is also needed. This paper focuses on wireless connection in Home Networking. Of many of wireless technologies, such as Wireless LAN, Bluetooth, or HomeRF, we especially propose to apply the new technique called Wireless Sensor Network. We present hardware and protocol stack design consideration for wireless sensor node and wireless sensor network, and then we present how to apply wireless sensor network to Home Networking and how to constitute Wireless Home-Networking with a variety of sensor nodes. Finally, we introduce the wireless sensor node system designed by us and conclude this paper.

Security Design of Information Security for Wireless Local Area Network (무선 네트워크망의 정보보호를 위한 시스템 설계)

  • Kim, Jung-Tae;Jung, Sung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.729-732
    • /
    • 2003
  • Security and privacy issues complicate wireless local area network deployment. for a wired network, certain levels of security are maintained since access to the physical medium is restricted to the devices physically connected to the network. Though wireless local area networks offer some built-in security features, security breaches are possible if appropriate precautions are not taken. This paper describes security issues related to wireless local area networks and presents a software approach for restricting and controlling wireless access. The system authenticates users on the basis of identity, privileges and access hardware by distributed software agents that implement security policy and restrict unauthorized access.

  • PDF

A Design of Wireless Sensor Network Based on ZigBee Technology in Petrochemical Industry

  • Huang, Song;Zhou, Qingsen;Zhang, Ke;Suh, Hee-Jong
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.27-28
    • /
    • 2007
  • In this paper, the Wireless Sensor Network (WSN) based on ZigBee technology was devised and developed. Wireless communication was applied to petrochemical domain, like other industries. And sensor network of IEEE 802.15.4 protocol stack diagram was described. Then, by analyzing the protocol, the software systems included the communication Protocol and point-to-point network were implemented with Freescale Semiconductor's product MC13192-SARD DSK board. After that, the performance of this design system was evaluated, and finally, by using PC Graphic User Interface (GUI) and IDE CW08 V3.1 programming tool, the real time communication data and the curve function were displayed.

  • PDF

Wearable Magnetic Sensor Device Using Wireless Sensor Network (무선센서 네트워크를 이용한 웨어러블 자기장 센서 장치)

  • Yeo, Hee-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.294-298
    • /
    • 2021
  • Recently, many electronic devices have been integrated with various kinds of wireless sensor network technologies that have been enabled with wireless network connections. These wireless sensor network devices have adopted various kinds of wireless network technologies. On the other hand, because each wireless network technology has its advantages and disadvantages, the target and purposes should be considered carefully at the beginning of the development. In particular, the approach to the magnetic sensor should be considered carefully because it has its own characteristic compared to general sensors. The magnetic field generates nonlinear data. This paper introduces the design aspects to reflect low cost and wearable devices to use in a wireless sensor network. In addition, this paper addresses how to select proper sensor network technology. As a result, wireless sensor network devices were integrated using Zigbee and showed the performance of the throughput.

Design by Improved Energy Efficiency MAC Protocol based on Wireless Sensor Networks (무선 센서 네트워크 기반 에너지 효율성이 개선된 MAC 프로토콜 설계)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.3
    • /
    • pp.439-444
    • /
    • 2017
  • Wireless sensor network technology is a rapidly growing technology of ubiquitous computing environment and application and research are being carried out in various fields. The sensor nodes constituting the wireless sensor network maintain the life cycle by using the battery in the distributed network environment, so energy efficiency is more important than QoS requirement. In MAC protocol of IEEE802.15.4, MAC protocol study adaptive to traffic and standardization work emphasizing reliability and efficiency in wireless sensor network environment are underway. but, Wireless sensor networks have the problem that the response speed of the sensor node drops as the energy efficiency decreases. In this paper, we designed the MAC protocol with improved energy efficiency of the whole network by analyzing the MAC protocol of the synchronous method and the hybrid method.

Optimal Design of Contending-type MAC Scheme for Wireless Passive Sensor Networks (무선 수동형 센서 망을 위한 경합형 MAC 방식의 최적 설계)

  • Choi, Cheon Won;Seo, Heewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.6
    • /
    • pp.29-36
    • /
    • 2016
  • A wireless passive sensor network is a network which, by letting separate RF sources supply energy to sensor nodes, is able to live an eternal life without batteries. Against expectations about an eternal life, however, a wireless passive sensor network still has many problems; scarcity of energy, non-simultaneity of energy reception and data transmission and inefficiency in resource allocation. In this paper, we focus on a wireless passive sensor network providing a packet service which is tolerable to packet losses but requires timely delivery of packets. Perceiving the practical constraints, we then consider a contending-type MAC scheme, rooted in framed and slotted ALOHA, for supporting many sensor nodes to deliver packets to a sink node. Next, we investigate the network-wide throughput achieved by the MAC scheme when the packets transmitted by geographically scattered sensor nodes experience path losses hence capture phenomena. Especially, we derive an exact formula of network-wide throughput in a closed form when 2 sensor nodes reside in the network. By controlling design parameters, we finally optimize the contending-type MAC scheme as to attain the maximum network-wide throughput.

Design and Implementation of a Diagnostic System for MOST Network using Wireless LAN (무선 랜을 이용한 MOST 네트워크 진단 시스템의 설계 및 구현)

  • Jang, Si-Woong;Kim, Kyeoung-Jin;Jeon, Young-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.8
    • /
    • pp.1695-1703
    • /
    • 2011
  • According to increase of the number of electronic devices for user comfort and safety, electronic systems are being constructed by using network to effectively control the devices. In this paper, we design and implement the MOST network diagnostic system by using wireless LAN to diagnose MOST network and the devices connected by the network and to effectively manage them. MOST, which is a vehicle multimedia network standard for the next generation, is being used for construction of car infotainment systems, and enables to develop various devices which are required for them. The wireless diagnostic system implemented in this paper enables to self-diagnose MOST network and also to check errors by diagnosing status of MOST electronic devices. We also can check and manage status of a in-vehicle MOST network system using mobile devices based on wireless LAN.

Using Genetic Algorithms in Wireless Mesh Network Routing Protocol Design (유전 알고리즘을 이용한 무선 메쉬 네트워크에서의 라우팅 프로토콜 설계)

  • Yoon, Chang-Pyo;Ryou, Hwang-Bin
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.179-186
    • /
    • 2011
  • Wireless Mesh Network technology refers to the technology which establishes wireless network whose transmission speed is similar to that of the wire system, and provides more enhanced flexibility in the building of network, compared to the existing wired network. In addition, it has the feature of less mobility and less restriction from the energy effect. However, there follow many considerations such as system overhead in the case of setting or the selection of multi-path. Accordingly, the focus is on the design and optimization of network which can reflect this network feature and the technology to establish path. This paper suggests the methods on the programming of path in Wireless Mesh Network routing by applying the evaluation value of node service, making use of the loss rate of data, the hop count of bandwidth and link and the traffic status of node, considering the performance of link and load in the fitness evaluation function, in order to respond to the programming of multi-path effectively.

Design and Implementation of USIM Security Module for the Wireless Network Interworking (무선 네트워크 연동을 위한 USIM 보안 모듈 설계 및 구현)

  • Kim, Choon-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.41-49
    • /
    • 2007
  • USIM(UMTS Subscriber Identity Module) technology that accept 3GPP(3rd Generation Partnership Project) standards for information security supports security function in 3GPP. Supported security functions of USIM are confidentiality of user identity, mutual authentication and key agreement between end user and network, confidentiality of user data and data integrity. It is very important technology in wireless network. It makes secure environment that user and service provider can use securely mobile service in network. In this paper, design and implementation USIM security module that supports common network access method and authentication protocol in 3GPP and WLAN(Wireless LAN) and AAA (3A-Authentication Authorization Accounting) server system based RADIUS.

The Study on the Effective Prevention Mechanism of Masquerade Attacks on Wireless Ad hoc Network (무선 Ad hoc 네트워크의 효율적인 위장 공격 방지 메커니즘에 관한 연구)

  • Hong, Soon-Jwa;Park, Hyun-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.135-149
    • /
    • 2006
  • Securing wireless Ad hoc network including the secure mechanism design and implementation is generally more difficult for vulnerability of channels and nodes, the absence of infrastructure, topology that change dynamically, and etc, than ire network. The efforts of early researches are based on the adaptation of securing methods for the wire network to wireless ad hoc network. However, wireless ad hoc network could not get effective study finding because network has essential problems. This paper proposes that some new problems are being came to light over the survivability and availability of the network itself, that are caused by the massive packet attack of more than one or two nodes, and proves the consequence of this phenomenon. Also, we propose an effective prevention mechanism of masquerade attacks for survivability reinforcement that escape standard of the early way by survivability of wireless Ad hoc network and approaches for performance elevation and reflect special quality of wireless Ad hoc network.