• Title/Summary/Keyword: wireless communication service

Search Result 1,265, Processing Time 0.03 seconds

A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service (WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.479-482
    • /
    • 2012
  • WiBro(Wireless Broadband) service is the world standardized fourth-generation communications in Korea. The services through internet-based applications using WiBro communication-based is increasing. WiBro service in the Internet-based applications when using the service, the application may need to analyze the vulnerability. In this paper, we use the Internet when in WiBro service, to analyze the vulnerability. And, Internet-based applications for vulnerabilities that could lead to hacker attacks is analyzed. It will be studied that security measures through analysis of vulnerability of WiBro services and applications.

  • PDF

A Real-Time MAC Protocol with Extended Backoff Scheme for Wireless Sensor Networks

  • Teng, Zhang;Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.3
    • /
    • pp.341-346
    • /
    • 2011
  • Wireless sensor networks (WSNs) are formed by a great quantity of sensor nodes, which are consisted of battery-powered and some tiny devices. In WSN, both efficient energy management and Quality of Service (QoS) are important issues for some applications. Real-time services are usually employed to satisfy QoS requirements in critical environment. This paper proposes a real-time MAC (Medium Access Control) protocol with extended backoff scheme for wireless sensor networks. The basic idea of the proposed protocol employs (m,k)-firm constraint scheduling which is to adjust the contention window (CW) around the optimal value for decreasing the dynamic failure and reducing collisions DBP (Distant Based Priority). In the proposed protocol, the scheduling algorithm dynamically assigns uniform transmitting opportunities to each node. Numerical results reveal the effect of the proposed backoff mechanism.

Base Station Processing Capacity in Wireless Multimedia Networks (무선 멀티미디어 서비스를 위한 기지국 설계용량 분석)

  • Jang, Hee-Seon;Cho, Kee-Sung;Kim, Young-Bu
    • IE interfaces
    • /
    • v.17 no.1
    • /
    • pp.121-127
    • /
    • 2004
  • In this paper, we present the base station(BS) processing capacity to provide the multimedia services in IMT-2000 wireless communication network. The IMT-2000 services are classified into two types, circuit and packet services, and user‘s environments such as indoor, pedestrian and vehicle are considered. Using the parameters of service economics and wireless technology, the user's reference traffic and BS‘s traffic are computed. The traffic is measured by throughput(kbps). Based on the measured traffic, the accommodating users in BS are also evaluated. In addition to, the BS design capacity is presented for varying the number of users and traffic distribution in different user's environments.

Performance Analysis of Multi-Gigabit Wireless Transmission at THz WLAN-Type Applications

  • Choi, Yonghoon
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.305-310
    • /
    • 2014
  • Optimal position of access point (AP) is important for multi-gigabit wireless transmission in terahertz (THz) wireless local area network (WLAN)-type applications, where there exist the THz characteristic multiple clusters in channel propagation. By considering the multiple clusters in THz indoor communications, this paper investigates the optimal AP position when two APs are issued for increasing the system capacity. Numerical results reveal that the central position of each AP within each half service region, which offers the shortest cumulated path length for line-of-sight paths, is optimal to achieve the maximal system capacity.

Low Handover Latency for WiBro Network

  • Tae Ryoo-Kyoo;Park Se-Jun;Roh Jae-Hoon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.43-46
    • /
    • 2006
  • IEEE 802.16 WirelessMAN aiming to broadband wireless access (BWA) is evolving to 4G mobile communication system through the standardization of IEEE 802.16e supporting mobility on existing fixed WirelessMAN system. It is necessary for hand-over to provide seamless data service while MS (Mobile Station) moves to another BS (Base Station). Because the performance of handover affects packet loss or delay of any communications, it must consider low latency handover mechanism in packet based network. In this paper, we describes handover scheme of IEEE 802.16e with the cell edge interference problem and shows the way to solve the problem in frequency reuse one deployment. Our scheme reduces the handover latency and packet loss probability.

  • PDF

Performance Analysis of Multimedia CDMA Network with Concatenated Coding and RAKE Receiver

  • Roh Jae-Sung;Kim Choon-Gil;Cho Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.3
    • /
    • pp.139-144
    • /
    • 2004
  • In order to transmit various types of multimedia data (i.e. voice, video, and data) over a wireless channel, the coding and modulation scheme needs to be flexible and capable of providing a variable quality of service, data rates, and latency. In this paper, we study a mobile multimedia COMA network combined with the concatenated Reed-Solomon/Rate Compatible Punctured Convolution code (RS/RCPC). Also, this paper propose the combination of concatenated RS/RCPC coder and COMA RAKE receiver for multimedia COMA traffic which can be sent over wireless channels. From the results, using a frequency selective Rayleigh fading channel model, it is shown that concatenated RS/RCPC coder at the wireless physical layer can be effective in providing reliable wireless multimedia CDMA network. And the proposed scheme that combine concatenated RS/RCPC coder and CDMA RAKE receiver provides a significant gain in the BER performance over multi-user interference and multipath frequency selective fading channels.

Packet Scheduling Scheme to Enhance Throughput at IEEE 802.11e WLAN System (IEEE 802.11e 무선 LAN 시스템에서 서비스 처리율 증대를 위한 패킷 스케줄링 기법)

  • Jang Jae-Shin;Jeon Hyung-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4A
    • /
    • pp.412-420
    • /
    • 2006
  • With the appearance of various types of traffic services in communication networks, a study on QoS(Quality of Service) packet scheduling mechanisms which can support differentiated service to each traffic service becomes very important. To meet this requirement, IEEE 802.11 Working Group established the IEEE 802.11e MAC protocol which categorizes every traffic services into 4 access categories(AC) and provides the differentiated service to each AC. In addition, the physical layer of IEEE 802.11a/g standards provide up to 54 Mbps transmission rate per one wireless LAN terminal. However, since the radio resource is hardly limited in wireless channel, it is necessary to find an efficient packet scheduling scheme to maximize the transmission efficiency. Therefore, in this paper, we proposed a new packet scheduling scheme that can enhance the total throughput by setting different contention windows(CW) of CSMA-CA channel access scheme to each wireless LAN terminal according its current channel states. Numerical results derived from using NS-2 network simulator have shown that our proposed packet scheduling scheme can enhance the performance of IEEE 802.11e more and more.

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.