• 제목/요약/키워드: Wireless Network Management

검색결과 1,168건 처리시간 0.034초

다양한 무선 환경에서 끊김 없는 이동성 관리를 위한 사용자 정의 네트워크 모델 및 구조 (Model and Architecture of User-Defined Networks for Seamless Mobility Management in Diverse Wireless Environment)

  • 천승만;나재욱;이승무;최준혁;박종태
    • 대한전자공학회논문지TC
    • /
    • 제48권11호
    • /
    • pp.35-43
    • /
    • 2011
  • 본 논문에서는 사용자가 각기 다른 구조를 가진 다양한 무선랜 네트워크 (Wireless Local Area Network) 들 간 핸드오버시 사용자에게 끊김 없는 인터넷 연결을 제공하기 위한 새로운 이동성 관리 구조 및 모델을 제시한다. IETF에서는 MIPv6와 이를 확장한 HMIPv6, PMIPv6 등의 많은 이동성 관리를 위한 연구가 진행되었지만 현실적으로 무선 접속점이 서로 다른 개인 관리자 또는 ISP에 의해 관리되고 있기 때문에 접속 인증 방법 및 이동성 프로토콜이 달라 이러한 이동성 관리 프로토콜은 이동 단말의 핸드오버 시 응용 서비스에 대한 QoS (Quality of Service)를 보장 할 수 없다. 이러한 문제점을 해결하기 위해 본 논문에서는 사용자가 무선 네트워크를 생성하여 핸드오버 시 QoS를 보장하는 이동성 관리 방법을 제안한다. 더욱 자세히는, 끊김 없는 인터넷 서비스를 제공하기 위한 사용자 정의 네트워크의 모델, 구조 및 알고리즘을 제시한다. 마지막으로, 네트워크 시뮬레이터 2 (Network Simulator Tool 2)를 이용하여 제안된 알고리즘에 대한 성능 분석을 하였다.

PCS/SCADA 센서 네트워크용 키 관리 프로토콜에 대한 보안 분석 (A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks)

  • 박동국
    • 디지털산업정보학회논문지
    • /
    • 제5권2호
    • /
    • pp.123-131
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. Recently, Nilsson et al. proposed a key management scheme for PCS/SCADA, which was claimed to provide forward and backward secrecies. In this paper, we define four different types of adversaries or attackers in wireless sensor network environments in order to facilitate the evaluation of protocol strength. We then analyze Nilsson et al. 's protocol and show that it does not provide forward and backward secrecies against any type of adversary model.

Key Challenges of Mobility Management and Handover Process In 5G HetNets

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.139-146
    • /
    • 2022
  • Wireless access technologies are emerging to enable high data rates for mobile users and novel applications that encompass both human and machine-type interactions. An essential approach to meet the rising demands on network capacity and offer high coverage for wireless users on upcoming fifth generation (5G) networks is heterogeneous networks (HetNets), which are generated by combining the installation of macro cells with a large number of densely distributed small cells Deployment in 5G architecture has several issues because to the rising complexity of network topology in 5G HetNets with many distinct base station types. Aside from the numerous benefits that dense small cell deployment delivers, it also introduces key mobility management issues such as frequent handover (HO), failures, delays and pingpong HO. This article investigates 5G HetNet mobility management in terms of radio resource control. This article also discusses the key challenges for 5G mobility management.

OPEN LBS PLATFORM ARCHITECTURE

  • Choi, Hae-Ock
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2002년도 Proceedings of International Symposium on Remote Sensing
    • /
    • pp.854-859
    • /
    • 2002
  • Location Based Services, or LBS refers to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless internet, the LBS has preconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. This paper describes the open architecture for LBS platform ensuring interoperability among the wireless networks and various location-based application services and the functional requirements for the LBS platform. The LBS platform in a narrow sense provides a standard interfaces for location management and network management for location services as follows, positioning (location acquisition through network or/and handset), location managing, location based functions, profile management, authentication and security, location based billing, information roaming between carriers and the system monitoring independent to specific network or ISP/CPs(Content Providers).

  • PDF

무선네트워크 관리시스템에서 효율적인 MAG 선택 기법 (Effective Mobile Agent Generator Selection Scheme for Wireless network management system)

  • 김동옥
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2007년도 학술대회
    • /
    • pp.69-72
    • /
    • 2007
  • In this paper, we analyze the performance of the network management system with intelligent mobile agent system. The proposed system dynamically selects appropriate its destinations. Thus, the system has an advantage of flexible network management in mobile network environments as well as dynamic change of traffic. Comparing its delay and throughput performance with the conventional SNMP based network management system, we find that the proposed mobile agent system performs better efficiency than the conventional one.

  • PDF

철도에서 무선 네트워크 이동성 적용기술 연구 (A study of network mobility for internet service in railway system)

  • 조봉관
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2004년도 추계학술대회 논문집
    • /
    • pp.1223-1228
    • /
    • 2004
  • The study for ubiquitous computing infra is proceeding actively, it make possible to use service and access network anywhere, anytime because of wire/wireless communication technology and progress of hardware. Domestically, study for the network mobility support technology which is the key technology for future ubiquitous computing realization have progressed, but that is insufficient. Especially, there is no study for independent mobility support study about railway wireless network. So, this study propose network mobility management technology for mobile network infra in railway and proper network model in train.

  • PDF

열차에서 이동네트워크 적용 방안 (A study of network mobility for internet service in railway system)

  • 조봉관;정재일
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 춘계학술대회 논문집 전기기기 및 에너지변환시스템부문
    • /
    • pp.241-243
    • /
    • 2005
  • The study for ubiquitous computing infra is proceeding actively, it make possible to use service and access network anywhere, anytime because of wire/wireless communication technology and progress of hardware. Domestically, study for the network mobility support technology which is the key technology for future ubiquitous computing realization have progressed, but that is insufficient. Especially, there is no study for independent mobility support study about railway wireless network. So, this study propose network mobility management technology for mobile network infra in railway and proper network model in train.

  • PDF

Mobile ATM: A Generic and flexible network infrastructure for 3G mobile services

  • Jun Li;Roy Yates;Dipankar Raychaudhuri
    • Journal of Communications and Networks
    • /
    • 제2권1호
    • /
    • pp.35-45
    • /
    • 2000
  • this paper presents the concept of "mobile ATM', a proposal for third-generation (3G) mobile communication network infrastructure capable of supporting flexible evolution of radio technologies from today's cellular and data services towards future wireless multimedia services. Mobile ATM provides generic mobility management and QoS-based transport capabilities suitable for integration of multiple radio access technologies including cellular voice. wireless data, and future broadband wireless services. The architecture of a mobile ATM network is outlined in terms of the newly-defined "W-UNI" interface at the radio link and "M-UNI"and "M-UNI" interface which supports unified access for WATM and non-ATM mobile terminals through corresponding interworking functions (IWF) is explained. leading to an understanding of how different radio access technologies are supported by the same ATM-based core network infrastructure. Generic mechanisms for handoff and location management within the core mobile network are discussed. and related protocol extensions over the "W-UNI" and "M-UNI/NNI"interfaces are proposed. the issue of "crossover switch (COS)" selection in mobile ATM is considered, and a unified handoff signaling syntax which supports flexibility in COS selection is described. Typical signaling sequences for call connection and handoff using the proposed protocols are outlined. Experimental results form a proof-of-concept mobile ATM network prototype are presented in conclusion.

  • PDF

Wireless Channel Management Scheme for ASMD Groups in Wireless N-screen Services

  • Hur, Kyeong
    • 한국멀티미디어학회논문지
    • /
    • 제19권11호
    • /
    • pp.1871-1877
    • /
    • 2016
  • In this paper, a Wireless USB (WUSB) protocol is adopted for development of ASMD (Adaptive Source Multi Device) N-screen wireless services. WUSB is the USB technology merged with WiMedia PHY and Distributed-MAC (D-MAC). However, the current WUSB protocol can't provide seamless N-screen streaming services to moving WUSB devices in home network environment. Therefore, to provide the ASMD N-screen services through WUSB based on D-MAC protocol, a channel management scheme is proposed to support seamless mobility between adjacent ASMD groups for wireless IPTV N-screen services. In simulation results, proposed ASMD channel management (ACM) scheme is compared with conventional WUSB channel management scheme in view points of throughput, average path interference and energy consumption according to various numbers of nodes and elapsed simulation times. Through simulation results, it is explained that proposed ASMD channel management (ACM) scheme should be adopted in the WUSB protocol to realize ASMD N-screen wireless services.

전술 Ad-hoc 네트워크에서의 효율적인 키 관리 기법 (An Efficient Key Management Scheme in Tactical Ad-Hoc Network)

  • 김은호;이수진
    • 한국군사과학기술학회지
    • /
    • 제12권3호
    • /
    • pp.317-324
    • /
    • 2009
  • Tactical Information Communication Network(TICN) uses both a wireless and wired network. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. However, Ad-hoc network is faced to many security threats due to its intrinsic characteristics. Therefore, to apply the Ad-hoc networking technology to battlefield environments and TICN, an intensive study on security countermeasure must go side by side with the development of enabling technology. In this paper, we suggest an efficient key management scheme for TICN of which the Ad-hoc networking technology is applied.