• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.028 seconds

Design of Optical Filter with Multilayer Slab/Fiber Structure (다층 슬랩-광섬유접속구조를 갖는 광필터의 설계)

  • Jeoung, Chan-Gwoun;Kang, Young-Jin;Kim, Sun-Youb
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1369-1375
    • /
    • 2007
  • The recent, a large capacity of telecommunication networks is required in order to it is in proportion to capacity of information communication increase and to satisfy a demand because of the demand about Internet, a multimedia service of internet, Video of internet protocol(VoIP), Audio/Video streaming. As a result, DWDM(Dense Wavelength Division Multiplexing)technologies are emerging to be a prevailing the method of solving it without additional optical fiber network building and high-speed equipment. Therefore this thesis proposed the optical filter of fiber/multilayer slab coupled structure combining it to multilayer slab waveguide by polishing the cladding of one side of fiber to design the optical filter having these functions. When a separation distance of fiber and slab was $3{\mu}m$, The optical filter proposed as the simulation result was satisfied with a DWDM filter characteristic with FWHM of 0.1nm on TM mode and TE mode as 32nm polarization independence in a communication window of $1.3{\mu}m$ when center wavelength was each ${\lambda}_0=1.274755{\mu}m$ and ${\lambda}_0=1.30591{\mu}m$.

  • PDF

A Communication Protocol Based on Safety Zone for Solving Hidden Node Problem in Cognitive Radio Networks (Cognitive Radio 네트워크에서 Hidden Node 문제 해결을 위한 Safety Zone 기반의 통신 프로토콜)

  • Jeong, Pil-Jung;Shin, Yo-An;Lee, Won-Cheol;Yoo, Myung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1B
    • /
    • pp.8-15
    • /
    • 2008
  • Cognitive radio technology enables to share the spectrum dedicated to primary users. In CR network, it is of primary concern to protect the primary users. Thus, it is required to periodically sense the spectrums occupied by primary users and adapt the communication parameters used by CR users to protect the primary users. However, it is inevitable to experience the hidden node problem due to the primary users, that are not detected by spectrum sensing. To perfectly protect the primary users, it is essential to address the hidden node problem in CR network. In this paper, we propose a new approach to handle the hidden node problem and evaluate the performance of proposed scheme.

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.103-118
    • /
    • 2014
  • Over the last couple of years, traditional VANET (Vehicular Ad Hoc NETwork) evolved into VANET-based clouds. From the VANET standpoint, applications became richer by virtue of the boom in automotive telematics and infotainment technologies. Nevertheless, the research community and industries are concerned about the under-utilization of rich computation, communication, and storage resources in middle and high-end vehicles. This phenomenon became the driving force for the birth of VANET-based clouds. In this paper, we envision a novel application layer of VANET-based clouds based on the cooperation of the moving cars on the road, called CaaS (Cooperation as a Service). CaaS is divided into TIaaS (Traffic Information as a Service), WaaS (Warning as a Service), and IfaaS (Infotainment as a Service). Note, however, that this work focuses only on TIaaS and WaaS. TIaaS provides vehicular nodes, more precisely subscribers, with the fine-grained traffic information constructed by CDM (Cloud Decision Module) as a result of the cooperation of the vehicles on the roads in the form of mobility vectors. On the other hand, WaaS provides subscribers with potential warning messages in case of hazard situations on the road. Communication between the cloud infrastructure and the vehicles is done through GTs (Gateway Terminals), whereas GTs are physically realized through RSUs (Road-Side Units) and vehicles with 4G Internet access. These GTs forward the coarse-grained cooperation from vehicles to cloud and fine-grained traffic information and warnings from cloud to vehicles (subscribers) in a secure, privacy-aware fashion. In our proposed scheme, privacy is conditionally preserved wherein the location and the identity of the cooperators are preserved by leveraging the modified location-based encryption and, in case of any dispute, the node is subject to revocation. To the best of our knowledge, our proposed scheme is the first effort to offshore the extended traffic view construction function and warning messages dissemination function to the cloud.

Development of Telecommunication Network Management Agents using Farmer Model on Distributed System (분산 시스템 상에서 Farmer Model을 이용한 통신망 관리 에이전트 개발)

  • Lee, Gwang-Hyeong;Park, Su-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2493-2503
    • /
    • 1999
  • The TMN that appears to operate the various communication networks generally and efficiently is developed under the different platform environment such as the different hardware and the different operating system. One of the main problems is that all the agents of the TMN system must be duplicated and maintain the software and the data blocks that perform the identical function. Therefore, the multi-platform cannot be supported in the development of the TMN agent. In order to overcome these problems, the Farming methodology that is based on the Farmer model has been suggested. With the Farming methodology, the software and the data components which are duplicated and stored in each distributed object are saved in the platform independent class repository (PICR) by converting into the format of the independent componentware in the platform, so that the componentwares that are essential for the execution can be loaded and used statically or dynamically from PICR as described in the framework of each distributed object. The distributed TMN agent of the personal communication network is designed and developed by using the Farmer model.

  • PDF

A study on Economic Effects of Electronic Commerce (전자상거래의 경제적인 효과에 관한 연구)

  • 조원길
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.155-172
    • /
    • 1998
  • Electronic commerce is more than just handling purchase transactions and funds transfers over the internet. Despite electronic commerce's past roots in transactions between large corporations, banks, and other financial institutions, the use of the internet as a way to bring electronic commerce to the individual consumer has led to a shift in viewpoint. Over the past few years, both the press and the business community have increased their focus on electronic commerce involving the consumer Electronic commerce includes the tasks that support the buying and selling of goods and services, and interactions among those tasks. Electronic commerce enables companies to close stores, reduce inventory requirements, and distribute products over the internet. Electronic commerce can simplify communication and change relationships The economics of electonic commerce is concernec with a new market whose delivery and communication infrastructure happens to be the internet. The economics of electronic commerce focuses on markets whose transactions are facilitated by communications networks and delivery systems. However, any digital communications media will soon be capable of supporting virtual transactions In the electronic marketplace, including telephone wires, cables, microwaves, and satellites. Thus, electronic commerce can offer your company both short-term and long-term befits. moving business practices, such as ordering, invoicing, and consumer support, to network-based systems can also reduce the paperwork involved in business-to-business transactions. This study conducted a study on economic effects of electronic commerce

  • PDF

Measuring Complementarities between Cities in the Korean Southeastern Region : A Network City Approach (영남권 도시들 간의 상보성 측정에 관한 연구: 네트워크 도시 접근)

  • Sohn, Jungyul
    • Journal of the Korean association of regional geographers
    • /
    • v.21 no.1
    • /
    • pp.21-38
    • /
    • 2015
  • This study attempts to estimate the complementarity between 21 cities in the Korean Southeastern Region using data on the network time distance and the volume of flow between the cities. Four types of flows recognized are people, commodities, information and finance. The first two types of flows are thought to be made on the transportation network while the last two are on the communication network. For the purpose of the study, the expected volumes of flows between cities are first estimated using the gravity-based regression and doubly-constrained entropy maximization models. These baseline volumes are then subtracted from the observed volumes of flows (of people and commodities) or the estimated volumes of flows (of information and finance) in order to identify positive differences or complementarities. The result shows that these four types of complementarity flows form distinctive urban networks in terms of spatial pattern and urban hierarchy. This suggests that more customized strategies to different types of complementarity are recommended to properly address the issues related to network infrastructure provision in the pursuit of the network city model in the region.

  • PDF

A Data Protection Scheme based on Hilbert Curve for Data Aggregation in Wireless Sensor Network (센서 네트워크에서 데이터 집계를 위한 힐버트 커브 기반 데이터 보호 기법)

  • Yoon, Min;Kim, Yong-Ki;Chang, Jae-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.11
    • /
    • pp.1071-1075
    • /
    • 2010
  • Because a sensor node in wireless sensor networks(WSNs) has limited resources, such as battery capacity and memory, data aggregation techniques have been studied to manage the limited resources efficiently. Because sensor network uses wireless communication, a data can be disclosed by attacker. Thus, the study on data protection schemes for data aggregation is essential in WSNs. But the existing data aggregation methods require both a large number of computation and communication, in case of network construction and data aggregation processing. To solve the problem, we propose a data protection scheme based on Hilbert-curve for data aggregation. Our scheme can minimizes communications among neighboring sensor nodes by using tree-based routing. Moreover, it can protect the data from attacker by doing encryption through a Hilbert-curve technique based on a private seed, Finally, we show that our scheme outperforms the existing methods in terms of message transmission and average sensor node lifetime.

A Comparison of Fault Tolerant Ethernet Implementation Approaches (고장 극복 (Fault Tolerant) Ethernet 구현 방안의 비교 분석)

  • Kim, Se Mog;Ko, Yun Min;Choi, Han-Seok;Min, Jung Hyun;Hoang, Anh Pham;Lee, Dong Ho;Rhee, Jong Myung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.13-20
    • /
    • 2008
  • Reliability is absolutely necessary in most recent mission critical systems which usually utilize the Ethernet based computer networks. A typical way to increase system reliability is to equip the fault tolerant Ethernet. In this paper we try to formulate the fault tolerant dual Ethernet concept and presents a comparison of its implementation approaches. Two types of dual Ethernet configuration are analyzed; the divided and the connected. Then the characteristics of three current implementation approaches which are the hardware based, the software based, and the recently proposed hybrid approach are compared. The results show that the hardware based or the hybrid approaches can be a better solution for the real time mission critical systems. Also for the systems which require the use of Commercial-Off-The-Shelf (COTS) hardware for fault tolerant Ethernet the possible choice is the software based or the hybrid approach.

  • PDF

Performance Analysis of OFDM-CDMA Systems using Space-Time Coding (공간-시간부호화를 이용한 OFDM-CDMA의 성능분석)

  • Kang, Mingoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.265-275
    • /
    • 2004
  • In this paper, an OFDM-CDMA broadband system is considered for a possible candidate of fixed wireless broadband access network applications. With an emphasis on a preamble design for multi-channel separation, we address a channel estimation based on the time-domain windowing and its imperfectness in OFDM-based multiple-antenna transmission systems. By properly designing each preamble for multiple antennas to be orthogonal in the time domain, the channel estimation can be applied to the ETSI HlPERLAN/2 and IEEE-802.11a standards in the case of more than two transmit antennas. Also, an effect of diversity techniques on the performance of OFDM-CDMA based broadband wireless access networks is investigated and the maximum achievable diversity gain for a two-path Rayleigh fading environment is evaluated Simulation results show that the OFDM-CDMA system applying a space-time-frequency diversity with a full-rate full diversity code can give the diversity of D = 4 and D = 8 for both multi-user cases of maximum user and half user capacities, respectively.

Hybrid MAC Protocol Design for an Underwater Acoustic Network (수중음향통신망을 위한 하이브리드 MAC 프로토콜 설계)

  • Park, Jong-Won;Ko, Hak-Lim;Cho, A-Ra;Yun, Chang-Ho;Choi, Young-Chol;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2088-2096
    • /
    • 2009
  • This paper deals with hybrid MAC protocol design for underwater acoustic networks. The proposed MAC protocol has the cluster structure with a master node and slave nodes, and the hybrid network structure that combines a contention free period based on TDMA(Time Division Multiple Access) with a contention period. The suggested MAC protocol has a beacon packet for supervising network, a guard period between time slots for packet collision, time tag for estimation of propagation delay with a master node, the time synchronization of nodes, entering and leaving of network, and the communication method among nodes. In this paper, we adapt the proposed hybrid MAC protocol to AUV network, that is the representative mobile device of underwater acoustic network, and verify this protocol is applicable in real underwater acoustic network environment.