• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.028 seconds

A Study on Safety Management of Day Care Center using disaster management system (재난관리스템을 이용한 어린이집 안전관리에 관한 연구)

  • Jeong, Chang-sik;Kwon, Mee-Rhan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.29-35
    • /
    • 2018
  • Safety accidents are frequently occurring in day care centers in recent years. The number of types of safety accidents is bumping into, falling, burning, school bus accident, insertion... etc., and the number of children who have died due to such accidents is increasing steadily every year. Therefore, it is urgent to prevent accidents at day care centers. IoT (Internet of Things) is managed by connecting various sensors and related products from the living space to the Internet in order to prevent them from being dangerous. In particular, IoT products can be automatically controlled by smart phones and sensors anytime and anywhere, thus saving energy, time, convenience and prompt accuracy. This paper proposes a research model to prevent and respond to disasters by using SK LoRa communication network and Arduino, which are Internet access networks for building disaster management in schools, kindergartens and day care centers. And various sensors needed for building disaster management express various safety states in the building and suggests a system that can control the residential environment by transmitting and receiving data to smart phone.

Global Mobility Support in Network Based Proxy Mobile IPv6 (네트워크 기반 프록시 모바일 IPv6에서 글로벌 이동 지원에 관한 연구)

  • Phung, Gia Khiem;Ro, Soong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7A
    • /
    • pp.688-696
    • /
    • 2010
  • The Proxy Mobile IPv6 (PMIPv6) is a network localized mobility management protocol that is independent of global mobility management protocols. In a single mobility domain (LMD), the mobile node (MN) is not involved in any IP mobility-related signaling and uses only its PMIPv6 home address for all its communication. Subsequently, when the MN moves into another LMD, the MN must change its PMIPv6 home address. In such a circumstance, host-based mobility signaling is activated. Thus, the nature of the network-based mobility of the PMIPv6 cannot be retained. Additionally, if the MN does not support global mobility, it cannot maintain communication with its correspondent node (CN). In this paper, we propose a solution for global mobility support in PMIPv6 networks, called Global-PMIPv6 that allows current communication sessions of a MN without mobility protocol stacks to be maintained, even when the MN moves into another LMD. Thus, Global-PMIPv6 retains the advantages of the PMIPv6 for global mobility support. We then evaluate and compare network performance between our proposed solution and PMIPv6.

Optimized Design of Mobile Communication Antenna In the Underground Area (지하공간에서의 이동통신 셀 설계에 관한 연구)

  • Oh, Sung-Kyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.27-32
    • /
    • 2008
  • In the signals-shadowed areas, In order to providing the suitable signals reception level repeaters are used for relay the signals. Repeater receives the weak signals and amplifies it up to required power level, The amplified signals get radiated by the various methods. Both antenna distribution and LCX(Leakage Coaxial Cable) are typical methods in the repeater and BTS signals radiation. Their applications are depended on the environment condition and frequency band. Generally the antenna distribution are used for the mobile telecommunication networks which use the higher frequency band than 500MHz. On the other side, LCX distribution is suitable to the frequency band under 500MHz. The network plan of repeater in FM, T-DMB, Fire Radio and Internal subway communication network are the typical LCX application fields. Cell planning with repeaters are based on the free space loss, LCX connection loss and actual field data. The actual field data can be the most important factor to design the network planning.

An Optimal Design of a TDMA Baseband Modem for Relay Protocol (중계 프로토콜을 위한 TDMA 기저대역 중계모뎀의 최적 설계)

  • Bae, Yongwook;Ahn, Byoungchul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.6
    • /
    • pp.124-131
    • /
    • 2014
  • This paper describes a design of an adaptive baseband modem based on TDMA(time division multiple access) with a relay protocol function for wireless personal area networks. The designed baseband modem is controlled by a master synchronization signal and can be configured a relay network up to 14 hops. For efficient data relay communications, the internal buffer design is optimized by implementing a priority memory bus controller to a single port memory. And the priority memory bus controller is also designed to minimize the number of synthesized logic gates. To implement the synchronization function of the narrowband TDMA relay communication, the number of gates has been reduced by dividing the frame synchronization circuits and the network slot synchronization circuits. By using these methods, the number of gates are used about 37%(34,000 gates) on Xilinx FPGA XC6SLX9 which has 90,000 gates. For the 1024-bit frame size with a 32-bit synchronization word, the communication reception rate is 96.4%. The measured maximum transmission delay of the designed baseband modem is 230.4 msec for the 14-hop relay communication.

An Energy-Efficient Clustering Design Apply Security Method in Ubiquitous Sensor Networks (USN에서 보안을 적용한 에너지 효율적 클러스터링 설계)

  • Nam, Do-Hyun;Min, Hong-Ki
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.205-212
    • /
    • 2007
  • The ubiquitous sensor network consists of micro sensors with wireless communication capabilities. Compared to wired communication, wireless communication is more subject to eavesdropping as well as data variation and manipulation. Accordingly, there must be efforts to secure the information delivered over the sensor network. Providing security to the sensor network, however, requires additional energy consumption, which is an important issue since energy transformation is difficult to implement in a sensor network. This paper proposes a routing mechanism based on the energy-efficient cluster that features security functions capable of safely processing the data acquired from the sensor network. The proposed algorithm reduces energy consumption by fixing the clusters formed at the initial stage and using the pre-distribution scheme so that the cluster and node keys generated and exchanged at the initial stage are not re-generated or re-exchanged. Simulation experiments confirmed that the proposed approach reduces energy consumption compared to implementing security measures to the conventional cluster-based routing mechanism.

  • PDF

Mobility Management Scheme based on User Mobility QoS and Security-Effective Network in Heterogeneous Mobile Networks (이종의 모바일 네트워크에서 사용자 이동성 QoS와 보안효과적인 네트워크 기반의 이동성관리 기법)

  • Lee, Hyeungwoo;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.87-97
    • /
    • 2015
  • To support the efficient mobility MIPv6v, FMIPv6, HMIPv6 and host-based mobility management protocols have been developed. AAAC (Authentication, Authorization, Accounting and Charging) system is applied in this paper analyzed the the existing IPv6 PMIPv6, FPMIPv6 network security effective and IPv6 MMP (Mobile Management Protocol) Features and performance analysis is performed. And IPv6 MMP seamless transfer performance in terms of packet loss probability, will be analyzed. That can be efficiently used as a method for the integration of QoS and mobility so that you can manage and control the resources presented QoSB usage. Results of evaluation results showed a better overall fast handover structure of mobility management techniques. PMIPv6 and FPMIPv6 in many respects the most efficient structure that can be specifically, a fast handover of the structure of the network-based mobility management scheme showed the best results.

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

Implementation of Smart Sensor Network System Based on Open Source Hardware (오픈 소스 하드웨어 기반의 스마트 센서 네트워크 시스템 구현)

  • Kwon, Oh-Seok;Kim, Kee-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.123-128
    • /
    • 2017
  • In this paper, we have proposed and implemented a smart sensor network system based on the Arduino open source hardware. The proposed smart sensor network system is composed of kinds of sensors and open-source hardware based, Arduino, etc. that can handle the measured sensor values. Also the communication modules that can be used to transmit the measured sensor values from the sensor control unit are configured. In the control unit the sensor data such as temperature, humidity, light intensity can be transmit to the main program and the main program will save the data in the DB or transmitting the value of the particular control signal to the control device or the actuator. The user can also check the information in the system using the measured values from the smart sensor networks through the web, or to remotely control a variety of actuators. And it is possible to manage a smart autonomous control over whether and how the proposed system.

Detection Method of Distributed Denial-of-Service Flooding Attacks Using Analysis of Flow Information (플로우 분석을 이용한 분산 서비스 거부 공격 탐지 방법)

  • Jun, Jae-Hyun;Kim, Min-Jun;Cho, Jeong-Hyun;Ahn, Cheol-Woong;Kim, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.203-209
    • /
    • 2014
  • Today, Distributed denial of service (DDoS) attack present a very serious threat to the stability of the internet. The DDoS attack, which is consuming all of the computing or communication resources necessary for the service, is known very difficult to protect. The DDoS attack usually transmits heavy traffic data to networks or servers and they cannot handle the normal service requests because of running out of resources. It is very hard to prevent the DDoS attack. Therefore, an intrusion detection system on large network is need to efficient real-time detection. In this paper, we propose the detection mechanism using analysis of flow information against DDoS attacks in order to guarantee the transmission of normal traffic and prevent the flood of abnormal traffic. The OPNET simulation results show that our ideas can provide enough services in DDoS attack.

Design and Performance Analysis of Bandwidth-Efficient Handoff Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 대역폭에 효율적인 핸드오프 기법의 설계 및 성능 분석)

  • Yoo, Seung-Beak;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.219-236
    • /
    • 2014
  • In this paper, we propose a novel Proxy Mobile IPv6 network bandwidth-efficient handoff scheme. MN are classified into slow and fast one. At first MN should be registered in the microcell for bandwidth efficient handoff scheme. microcell is overlapped to handle the overflow session request which is nested. Overflow session request in macrocell requests to go back from the boundary of the microcell to new microcell. If idle session traffic is in a cell, it is requested by the target microcell. Analysis model was developed, an existing session of the session blocking probability and forcing termination probability of the session request have improved considerably. If the total traffic load of the system is not very large, the proposed scheme has the best bandwidth efficiency and provides better quality of service (QoS) to MN without costs of a lot of processing on the system.