• 제목/요약/키워드: digital wireless network

검색결과 480건 처리시간 0.022초

A Quantitative Analysis of System-Level Performance of the Wireless LAN in Digital Home Environments

  • Son, Byoung-Hee;Kim, Hag-Bae
    • Journal of Ubiquitous Convergence Technology
    • /
    • 제2권1호
    • /
    • pp.51-55
    • /
    • 2008
  • A digital home is a ubiquitous environment that is expected to be realized in the near future. All information appliances in a house are connected to each other through wired and/or wireless home networks. Authenticated user can access the various services provided by the digital home, and the access is not restricted by equipment, time, or location. The technologies that form the digital home can be grouped into two categories: wired networking technologies and wireless networking technologies. For the purpose of ubiquitous environments, wireless-networks offer suitable and seamless high-quality services. A wireless LAN can be created simply by equipping a single access point. For that reason, the cost of establishing such a network is low and using it is easy. Of course, there is an exciting new wireless technology. It is the Ultra Wide Band (UWB). However, it is not enough to bring wireless convenience, although offering a broad range of high-speed data transfer capabilities, Because of unstable. Thus, of the wireless-networking systems, we focus on the wireless LAN. We quantitatively analyze its capabilities. The dynamic and adaptive wireless LAN provides a foundation for the evolution toward the next generation of wireless and adaptive networks. The difference between wired LAN and wireless LAN in upload and download rates is small. Although the wireless LAN experiences a greater loss rate than the wired LAN, the difference is minimal. We conclude that a wireless LAN is suitable for use in an apartment environment.

  • PDF

무선 랜 802.11b 트래픽의 두꺼운 꼬리분포 모델링 (Modeling Heavy-tailed Behavior of 802.11b Wireless LAN Traffic)

  • 대시도즈 얌힌;원유집
    • 디지털콘텐츠학회 논문지
    • /
    • 제10권2호
    • /
    • pp.357-365
    • /
    • 2009
  • 사용자가 느끼는 QoS를 최대화하면서 네트워크 대역폭의 특성을 효율적으로 활용하기 위해서는 네트워크의 패킷 손실과 대기행렬의 지연 시간을 구체적으로 예측이 필요하다. 네트워크의 자원이 충분치 않은 무선 네트워크 환경의 경우 예측은 특히 중요한 문제로 부각된다. 본 연구는 무선 네트워크의 성능 모델을 개발하는 것을 목표로 하고 있다. 실험을 위해서 실제 운영 중인 무선 네트워크 환경에서 패킷 흐름 자료를 수집하였다. 무선 환경에서의 패킷 개수 공정과 대역폭 공정은 장기 기억 특성을 갖고 있는 것으로 나타났다. 실험을 통해서 네트워크 트래픽의 주요 성능 변수들을 추출해 냈고, 대기 시간과 버퍼 오버플로우 확률에 대한 분석적 모델을 개발하였다. 프랙탈 브라운 운동 (FBM)을 이용한 대기 행렬의 꼬리 확률을 얻었고, 대기행렬의 길이 모델을 통해서 평균대기 지연을 표현하였다. 실측 데이터를 활용하여 개발한 성능 모델이 IEEE 802.11b 네트워크 트래픽의 물리적 특성을 잘 표현하고 있음을 알 수가 있다

  • PDF

센서 네트워크의 MAC 프로토콜 구현 (Implementation of a MAC protocol for wireless sensor networks)

  • 김하양;김민정;김경애;김진태;이승준
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2004년도 정기총회 및 학술대회
    • /
    • pp.291-294
    • /
    • 2004
  • Wireless sensor network을 위 한 MAC(Medium Access Control) layer를 low-rate WPAN을 목적으로 한 IEEE 802.15.4 사양에 따라 구현하고 검증하였다. 센서 네트워크의 노드는 배터리로 동작하므로 에너지 소모가 가장 큰 걸림돌이 된다. power saving을 위한 몇 가지 방법을 포함한 IEEE 802.15.4 MAC protocol을 구현함으로써 wireless sensor network에 적용 가능함을 보였다.

  • PDF

무선 센서 네트워크에서 중복 메세지 순신 회피를 통한 에너지 소비절감 매체 접근 제어 (A Medium Access Control Scheme for Reducing Energy Consumption through Avoiding Receipt of Redundant Messages in Wireless Sensor Networks)

  • 한정안;이문호
    • Journal of Information Technology Applications and Management
    • /
    • 제12권4호
    • /
    • pp.13-24
    • /
    • 2005
  • The sensor network is a key component of the ubiquitous computing system which is expected to be widely utilized in logistics control, environment/disaster control, medical/health-care services, digital home and other applications. Nodes in the sensor network are small-sized and exposed to adverse environments. They are demanded to perform their missions with very limited power supply only. Also the sensor network is composed of much more nodes than the wireless ad hoc networks are. In case that some nodes consume up their power capacity, the network topology should change, and rerouting/retransmission is necessitated. Communication protocols studied for conventional wireless networks or ad hoc networks are not suited for the sensor network resultantly. Schemes should be devised to control the efficient usage of node power in the sensor network. This paper proposes a medium access protocol to enhance the efficiency of energy consumption in the sensor network node. Its performance is analyzed by simulation.

  • PDF

디렉티드 디퓨젼 기반의 무선 센서 네트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명기법에 관한 연구 (Transaction Signing-based Authentication Scheme for Protecting Sinkhole Attack in Directed Diffusion based Wireless Sensor Networks)

  • 김태경
    • 디지털산업정보학회논문지
    • /
    • 제6권3호
    • /
    • pp.31-36
    • /
    • 2010
  • In this paper, We propose a transaction signing-based authentication scheme for protecting sinkhole attacks in wireless sensor networks. Sinkhole attack makes packets that flow network pass through attacker. So, Sinkhole attack can be extended to various kind of attacks such as denial of service attacks, selective delivery or data tamper etc. We analyze sinkhole attack methods in directed diffusion based wireless sensor networks. For the purpose of response to attack method, Transaction signing-based authentication scheme is proposed. This scheme can work for those sensor networks which use directed diffusion based wireless sensor networks. The validity of proposed scheme is provided by BAN logic.

Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구 (A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석 (Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare)

  • 정윤수
    • 디지털융복합연구
    • /
    • 제11권3호
    • /
    • pp.279-284
    • /
    • 2013
  • IT 기술에 의료기술이 접목되면서 유헬스케어 서비스에 적용한 체내삽입장치는 환자의 민감한 생체정보를 제3자에게 쉽게 유출되어 환자의 프라이버시 침해되지 않도록 무선 액세스 네트워크 구간에 높은 데이터율과 이동성을 지원하는 강한 보안이 필요하다. 본 논문에서는 이동성을 가지는 환자가 체내삽입장치내 환자의 생체정보를 무선 액세스 네트워크 구간에서 제3자에게 불법적으로 노출되지 않도록 무선 액세스 네트워크에 WiMAX 네트워크을 구축하여 이동 환자의 생체정보가 안전하게 송 수신될 수 있도록 테스트 베드를 구축하여 WiMAX 네트워크의 보안 성능 측정 및 평가를 수행한다. 특히, 본 논문에서는 WiMAX 보안 compliance, WiMAX MAC 상의 IPSec, MAC 계층에서 ECDH 수행 등에서 데이터 보안, MAC 제어 메시지 보안, 핸드오버 연결 지연, 프레임 손실 및 대역폭 등을 비교평가한다.

Digital X-ray장비 구축 검진차량의 웹 기반 무선 네트워크 환경 구축 전과 후의 비교분석 (Comparative Analysis of pre and Post Digital X-ray Equipment Construction and Web-Based Wireless Network Environment Construction for Medical Screening Vehicles)

  • 류영환;권대철;구은회;동경래;최성현;장영일
    • 대한디지털의료영상학회논문지
    • /
    • 제12권2호
    • /
    • pp.103-111
    • /
    • 2010
  • A total of 200 hospital employees participated in this study from January 2009 to June 2010. For the survey, each participant was given necessary items for external health exams. Cronbach's alpha was calculated for the survey regarding wireless networks. There was a need for educating data processing workers in the medical field regarding fundamental information prior to wireless network construction. The reason is high scores would be collected, which would reflect knowledge regarding data processing used at hospitals and the differences between paper charts and electronic charts. However, low scores were obtained which reflected knowledge regarding the differences between wired and wireless networks and Mini-PACS. Time for each patient was shortened to a maximum of three minutes and minimum of one minute for treatment and transmitting medical images when comparing pre and post wireless network construction(p < 0.01). Scores from the pre and post construction survey increase 1.98, 1.65, and 1.43 points for activity in the health screening area, usage of space in the health screening vehicle, and patient information storage respectively(p < 0.05). The number of patients receiving external health screenings twelve times was 3,655 prior to construction of a wireless network system. However, the number increased to 4,265 after construction. The increasing percentage was 17% in total. Prior to construction, X-ray images were taken 527 times, but after construction of a wireless network, this number growed to 1,194 and it was 116% increase. The loss of patient's medical treatment charts was reduced from 19.8% to 18.7% after construction. We believe that educating medical workers on Mini-PACS and Mini-OCS Systems will not only increase their efficiency but also make patients receiving better treatment.

  • PDF

유비쿼터스 인터페이스 기술에 대한 고찰 (A Study on the Ubiquitous Interface Technologies)

  • 이현재;오창헌
    • 디지털융복합연구
    • /
    • 제4권1호
    • /
    • pp.31-41
    • /
    • 2006
  • This article introduces developing trends of an 'Ubiquitous Interface' as an access method for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. 'Ubiquitous Interface' is a relatively wide sense meaning not only physical interface of specified device or between processors, but anything method for access USN. These 'Ubiquitous Interface' able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Recently, strongly recommended current technologies are RFID, NFC, Multi-mode mobile terminal, UMA mobile terminal and Wearable computer as a future ubiquitous interface. These technologies are have to have flexibility and multiple physical communication channels for seamless service hand over and serve easy connection at huge USN to user. Also, they have to must have flexible software structure. Finally, through the 'Ubiquitous Interface', we will be experience of seamless communication and realize a real liberty of communication.

  • PDF

분산 무선 네트워크 환경에서 트러스트 모델 기반의 작업 할당 스케줄링 알고리즘에 관한 연구 (An Analysis on the Scheduling Algorithm of Job Allocation Based on the Trust Model in Wireless Distributed Network)

  • 김태경;서희석
    • 디지털산업정보학회논문지
    • /
    • 제4권1호
    • /
    • pp.33-40
    • /
    • 2008
  • This paper presents a new scheduling scheme in wireless distributed network. To overcome the limited information about unfamiliar mobile nodes and to reduce the required system performance, we propose a scheduling algorithm of job allocation based on the trust model. The suggested scheduler evaluate an unfamiliar mobile node's trust and make reference to the trust value of neighboring scheduler. This scheduling algorithm can avoid malicious or selfish mobile nodes by assigning low trust values. We also present a trust evaluation metric and show the efficiency of suggested scheduling algorithm by performance evaluation.