• Title, Summary, Keyword: WLAN

Search Result 1,211, Processing Time 0.036 seconds

WLAN CR Coexistence Beacon Protocol for Cognitive Radio-Based WLAN Network (무선인지 기술을 이용한 차세대 WLAN 네트워크에서의 WLAN CR 공존 비콘 프로토콜)

  • Kim, Hyun-Ju;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.790-799
    • /
    • 2007
  • In this paper, we propose WLAN CR coexistence beacon protocol for thenext WLAN network. This method can provide WLAN with high-speed data rate in new WLAN architecture and network platform based on cognitive radio technology. WLAN CR devices that enter the CR network can know UHF channels by listening CR beacon including the coexistence parameter set and start using CR channel fast. During handover of WLAN device in UHF spectrums, WLAN device that lost their channel can change available channel by obtaining the current CR channel information from the CR beacon. In advance relaying coexistence parameter set to entire CR system, WLAN CR system can prepare own candidate channel set that is different with other CR system. In CR beacon and relay delay, we show the results that WLAN CR coexistence beacon protocol supports spectrum handover efficiently and decreases the probability of collision in candidate channel set.

Smart WLAN Discovery for Power Saving of Dual-Mode Terminals

  • Park, Hyunho;Lee, Hyeong Ho
    • ETRI Journal
    • /
    • v.35 no.6
    • /
    • pp.1144-1147
    • /
    • 2013
  • Dual-mode terminals (DMTs) equipped with cellular and WLAN interfaces have become popular in recent years. Users of DMTs can enjoy high-speed WLAN Internet access and wide area Internet access to cellular networks. However, a DMT may consume power inefficiently when discovering a WLAN with inherently limited service coverage. In this letter, we propose to use smart WLAN discovery (SWD) to minimize the power consumption required for WLAN discovery. To minimize the power consumption of a DMT, an SWD DMT activates its WLAN interface only when the DMT transfers data within the WLAN coverage area. The simulation results of SWD show an improved power-saving performance compared to previous WLAN discovery schemes.

DIAMETER Strong Security Extension using Kerberos v5 in WLAN (WLAN에서 Kerberos v5를 이용하여 안전성을 강화한 DIAMETER의 확장)

  • Wiroon, Sriborrirux;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • /
    • pp.1023-1026
    • /
    • 2002
  • The demand for Wireless LAN (WLAN) access to use their network and the Internet is surged dramatically over the past year. Since WLAN provides users' access from anywhere in the workplace without having to plug in, it therefore leads the WLAN market to grow steadily. Unfortunately, the first WLAN implementation designed primarily for home networking did little to address these security issues. Moreover, although the 802.11b standard published by IEEE in 1999 improved WLAN connections LAN-equivalent speed and security from the 802.11 standard. However, there still are several flaws such as the weaknesses in the Authentication and WEP encryption schemes in the IEEE 802.11 WLAN standard. In this paper, we propose WLAN architecture for providing the strong centralized authentication, encryption, and dynamic key distribution on a WLAN. Additionally, this proposed architecture is able to support roaming users and is flexible and extensible to future developments in the network security.

  • PDF

The Power Saving Strategy of Dual Mode Access Terminal in WiBro and WLAN Hierarchical Network (WiBro/WLAN Hierarchical 네트워크에서 듀얼모드 단말기의 Power Saving 전략)

  • Moon, Tae-Wook;Ko, Bong-Jin;Cho, Sung-Joon
    • The Journal of Advanced Navigation Technology
    • /
    • v.10 no.4
    • /
    • pp.306-311
    • /
    • 2006
  • When the WiBro/WLAN hierarchical network is structured, a dual mode access terminal should keep WLAN module with power on state for operating in WiBro network outside of WLAN hotspot zone. Power consumption of user's access terminal can be increased to maintain WLAN module power on state of dual mode access terminal in WiBro network outside of the hotspot zone. This paper focuses on power saving strategy for a dual mode access terminal in WiBro/WLAN Hierarchical network to overcome problems regarding power. We will apply information about hotspot in WiBro network to establish the efficient power saving strategy for dual mode access terminal.

  • PDF

A Handover Mechanism to Support Mobility for Inter- and Intra-Wireless LAN Networks (WLAN 환경에서 이동성 지원을 위한 Handover 방안)

  • 김병호;민상원;김화성
    • Proceedings of the Korean Information Science Society Conference
    • /
    • /
    • pp.217-219
    • /
    • 2001
  • WLAN은 다양한 정보와 자원을 공유할 수 있게 하는 LAN의 장점과, 제약 없는 연결성 제공이라는 편리성을 동시에 제공하고, 신뢰성 있는 data전송뿐만 아니라 유연성과 설치의 용이성을 장점으로 갖고 있다. 그러나 WLAN 이용하여 여러 어플리케이션을 사용할 때 제기되는 문제로 WLAN은 셀룰라 폰의 soft handover와 같은 mobility가 완전하게 지원되지 않으므로 WLAN 환경에서 VoIP 서비스 같은 실시간 서비스에 제약이 있다는 단점이 있다. 본 논문에서는 WLAN의 제약을 극복하기 위해 WLAN환경에서 이동단말의 이동성을 지원하기 위한 handover 방안을 제시하였다.

  • PDF

Efficient security mechanism in 3GPP-WLAN interworking (3GPP-WLAN interworking에서의 효율적인 보안 메커니즘)

  • 신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.137-144
    • /
    • 2004
  • 3GPP(3rd Generation Project Partnership)-WLAN(Wireless Local Area Network) interworking refers to the utilization of resources and access to services within the 3GPP system by the WLAN UE(User Equipment) and user respectively. The intent of 3GPP-WLAN Interworking is to extend 3GPP services and functionality to the WALN access environment. We propose an efficient mechanism for the setup of UE-initiated tunnels in 3GPP-WLAN interworking. The proposed mechanism is based on a secret key which is pre-distributed in the process of authentication and key agreement between UE and 3GPP AAA(Authentication, Authorization Accounting) server. Therefore it can avoid modular exponentiation and public key signature which need a large amount of computation in UE. Also the proposed scheme provides mutual authentication and session key establishment between UE and PDGW(Packet Data Gateway).

Design of Triple-Band Microstrip Antenna for WLAN/WiMAX (WLAN/WiMAX용 삼중대역 마이크로스트립 안테나 설계)

  • Oh, Mal-Goen;Kim, Kab-Ki
    • The Journal of The Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.213-217
    • /
    • 2014
  • In this paper, we designed monopole microstrip antenna for WLAN/WiMAX system. The monopole antenna is designed by FR-4 substrate with size is $30mm{\times}40mm$. The proposed antenna is based on a planar monopole design which cover WLAN and WiMAX frequency bands. To obtain the optimized parameters, we used the simulator, CST's Microwave Studio Program and found the parameters that greatly effect antenna characteristics. Using the obtained parameters, the antenna is designed. Thus the proposed antenna satisfied the -10 dB impedance bandwidth requirement while simultaneously covering the WLAN and WiMAX bands. And characteristics of gain and radiation patterns are obtained for WLAN/WiMAX frequency bands.

WLAN Security Access Protocol for Rapid Initial Link Setup Process (신속한 초기 링크 셋업 과정을 위한 WLAN 보안 접속 프로토콜)

  • Kim, Min-Hee;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1515-1523
    • /
    • 2015
  • It has been prevalent to be serviced through WLAN(Wireless Local Area Network) as a variety of mobile devices have been introduced. If the number of mobile devices increases rapidly for the network access in a limited range of ESS(Extended Service Set), a lengthy connection delays are induced due to the initial link setup process of the IEEE 802.11i which is WLAN security standard. In this paper, we propose a new initial link setup protocol which can be executed in the ESS area of WLAN.

Design and Implementation of Low-Power Object-based IP Storage for Mobile Devices using WLAN Power Control (WLAN 전력제어를 적용한 모바일 단말용 저전력 객체기반 IP 스토리지 설계 및 구현)

  • Nam, Young-Jin;Choi, Min-Seok;Jeon, Young-Joon;Ryu, Jeong-Tak;Moon, Byung-Hyun
    • Journal of the Korea Industrial Information Systems Research
    • /
    • v.12 no.4
    • /
    • pp.32-40
    • /
    • 2007
  • A mobile device accesses large-sized data in object-based IP storage as an object unit over IP network. It relies heavily on a WLAN device, which has been known as one of the major power consumers. This paper designs and implements low-power object-based IP storage for mobile devices using an efficient WLAN power control. The proposed WLAN power control exploits prefetch buffer to maximize the idleness for incoming network traffic and controls available WLAN power modes to minimize the power consumption. Our experimental results reveal that the proposed WLAN control can save the total power consumption in a PXA270-based mobile device about 9% while playing the multimedia contents through an object-based IP storage device

  • PDF

An Economic Assessment Analysis on Deploying VoWLANs (VoWLAN 도입의 경제적 타당성 분석에 관한 연구)

  • Cho Nam-Wook;Ahn Jac-Kyoung;Kim Ji-Pyo;Hong Jung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7B
    • /
    • pp.660-667
    • /
    • 2006
  • Voice over Wireless LAN (VoWLAN) is defined as a communication service which transmits voice over wireless LAN. Due to its capability of providing high quality service while reducing communication costs, the VoWLAN is expected to be widely introduced to hospitals, hotels, and many more industry sectors. However, despite the increased interest in the new service, there has been limited research on the economic assessment of deploying VoWLAN. This paper provides a systematic and quantitative approach to the return on investment (ROI) analysis of VoWLAN service. We first analyze the domestic and international market trend of VoWLAN. Then, implementing scenarios of VoWLAN and corresponding alternatives are established. For each scenario, cost and benefit analysis is conducted. The proposed framework is implemented by using VBA program. To validate the result of the analysis, a case study is also conducted.