• Title/Summary/Keyword: 고속네트워크

Search Result 886, Processing Time 0.028 seconds

The Implementation of Remote Meter Reading System Using Bluetooth Technology & SkT3 Protocol in CDMA (블루투스와 CDMA의 SMS프로토콜을 이용한 원격 가스 검침 시스템의 구현)

  • 김종현;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.443-446
    • /
    • 2003
  • This paper implement Remote Meter Reading System which is used Bluetooth and SMS in CDMA. This System propose system which tan detect a total amount of gas, electricity or water without a meterman, at home BlueTooth is a close range wireless communication technology which uses a wireless frequency 2.4GHz and has a high trust and self error correction technology according to a low power consumption quality and a high-speed frequency hopping. This makes get a high trust concerning a data transmission than an existing modem. In addition, though wireless modem is restricted by a minimal of a wireless terminal, it will be possible to coincide with the function of the portable with the low power consumption quality by using Bluetooth. And as the system on a chip of module progresses, the possibility of the small size is present. Nowadays, SMS Protocol in CDMA for have a network function based on PPP in CDMA Phone. The proposed Remote Meter Reading System to get more nobility, efficiency, and have good function. SMS Protocol in CDMA have profits which is low power, low cost, and low microwave output.

  • PDF

An Analysis of Satellite Communications System structure for NCW (NCW대비 군 위성통신 구조 분석)

  • Park, Woo-Chul;Cha, Jae-Ryong;Kim, Jae-Hyun
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • As the information age comes out, the aspect of future war brings about the many changes in terms of war-fighting environment. Accordingly, information superiority and intelligence-centric warfare have been important and new war-fighting concept such as NCW(network centric warfare) have been turned up. This paper proposed all-weather core-strategy communications systems guaranteeing not only the real-time transmission of the information collected in a battlefield and expansion, automation, and rapidity of a battlefield but also broadband, mobility, survivability, and flexibility. The proposed military satellite communications system is classified into wideband mass capacity link, survivability, and the system supporting OTM(on the move) communication for the real-time transmission of battlefield information. This paper analyzed the essential operation concepts and core schemes of the U.S. Army's next generation system, TSAT(Transformational Satellite Communication System). Base on the analysis results, this paper proposed that the architecture of next generation military satellite communications systems for NCW have to provide the data rate, anti-jamming capability, network control and management capability which are optimally adaptable for the wireless channel environments such as jamming and interference and to support the variety of platforms like high-speed mobile vehicles, micromini devices, super-high speed unmanned aerial vehicles. Finally, this paper also proposed that next generation military satellite communications systems need the technologies such as the adaptable multi-antenna, laser link, and next-generation anti-jamming waveform.

  • PDF

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

A Performance Analysis of the Virtual CellSystem for Mobile Hosts (이동 호스트를 위한 가상 셀 시스템의 성능 분석)

  • Lim, Kyung-Shik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.10
    • /
    • pp.2627-2640
    • /
    • 1998
  • In this paper, we analyze the performance of the virtual cell system[1] for the transmission of IP datagrams in mobile computer communications. A virtual cell consistsof a group of physical cells shose base stationsl are implemented b recote bridges and interconnected via high speed datagram packet switched networks. Host mobility is supported at the data link layer using the distributed hierachical location information of mobile hosts. Given mobility and communication ptems among physical cells, the problem of deploying virtual cells is equivalent to the optimization cost for the entire system where interclster communication is more expesive than intracluster communication[2]. Once an iptimal partitionof disjoint clusters is obtained, we deploy the virtual cell system according to the topology of the optimal partition such that each virtual cell correspods to a cluser. To analyze the performance of the virtual cell system, we adopt a BCMP open multipel class queueing network model. In addition to mobility and communication patterns, among physical cells, the topology of the virtual cell system is used to determine service transition probabilities of the queueing network model. With various system parameters, we conduct interesting sensitivity analyses to determine network design tradeoffs. The first application of the proposed model is to determine an adequate network bandwidth for base station networking such that the networks would not become an bottleneck. We also evaluate the network vlilization and system response time due to various types of messages. For instance, when the mobile hosts begin moving fast, the migration rate will be increased. This results of the performance analysis provide a good evidence in demonsratc the sysem effciency under different assumptions of mobility and communication patterns.

  • PDF

HIMIPv6: An Efficient IP Mobility Management Protocol for Broadband Wireless Networks (HIMIPv6: 광대역 무선 통신 네트워크를 위한 효율적인 IP 이동성 관리 프로토콜)

  • Jeong Hyeon-Gu;Kim Young-Tak;Maeng Seung-Ryoul;Chae Young-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.291-302
    • /
    • 2006
  • With the increasing deployment of mobile devices and the advent of broadband wireless access systems such as WiBro, WiMAX, and HSDPA, an efficient IP mobility management protocol becomes one of the most important technical issues for the successful deployment of the broadband wireless data networking service. IETF has proposed the Mobile IPv6(MIPv6) as the basic mobilitymanagement protocol for IPv6 networks. To enhance the performance of the basic MIPv6, researchers have been actively working on HMIPv6 and FMIPv6 protocols. In this paper, we propose a new mobility management protocol, HIMIPv6 (Highly Integrated MIPv6), which tightly integrates the hierarchical mobility management mechanism of the HMIPv6 and the proactive handover support of the FMIPv6 to enhance the handover performance especially for the cellular networking environment with high frequent handover activities. We have performed extensive simulation study using ns-2 and the results show that the proposed HIMIPv6 outperforms MIPv6, FMIPv6 and HMIPv6 in terms of signaling overhead, service interruption and packet lost during handovers.

A Traffic Pattern Matching Hardware for a Contents Security System (콘텐츠 보안 시스템용 트래픽 패턴 매칭 하드웨어)

  • Choi, Young;Hong, Eun-Kyung;Kim, Tae-Wan;Paek, Seung-Tae;Choi, Il-Hoon;Oh, Hyeong-Cheol
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.88-95
    • /
    • 2009
  • This paper presents a traffic pattern matching hardware that can be used in high performance network applications. The presented hardware is designed for a contents security system which is to block various kinds of information drain or intrusion activities. The hardware consists of two parts: the header lookup and string pattern matching parts. For implementing the header lookup part in hardware, the TCAMs(ternary CAMs) are popularly used. Since the TCAM approach is inefficient in terms of the hardware and memory costs and the power consumption, however, we adopt and modify an alternative approach based on the comparator arrays and the HiCuts tree. Our implementation results, using Xilinx FPGA XC4VSX55, show that our design can reduce the usage of the FPGA slices by about 26%, and the Block RAM by about 58%. In the design of string pattern matching part, we design and use a hashing module based on cellular automata, which is hardware efficient and consumes less power by adaptively changing its configuration to reduce the collision rates.

Security of Ethernet in Automotive Electric/Electronic Architectures (차량 전자/전기 아키텍쳐에 이더넷 적용을 위한 보안 기술에 대한 연구)

  • Lee, Ho-Yong;Lee, Dong-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.39-48
    • /
    • 2016
  • One of the major trends of automotive networking architecture is the introduction of automotive Ethernet. Ethernet is already used in single automotive applications (e.g. to connect high-data-rate sources as video cameras), it is expected that the ongoing standardization at IEEE (IEEE802.3bw - 100BASE-T1, respectively IEEE P802.3bp - 1000BASE-T1) will lead to a much broader adoption in future. Those applications will not be limited to simple point-to-point connections, but may affect Electric/Electronic(EE) Architectures as a whole. It is agreed that IP based traffic via Ethernet could be secured by application of well-established IP security protocols (e.g., IPSec, TLS) combined with additional components like, e.g., automotive firewall or IDS. In the case of safety and real-time related applications on resource constraint devices, the IP based communication is not the favorite option to be used with complicated and performance demanding TLS or IPSec. Those applications will be foreseeable incorporate Layer-2 based communication protocols as, e.g., currently standardized at IEEE[13]. The present paper reflects the state-of-the-art communication concepts with respect to security and identifies architectural challenges and potential solutions for future Ethernet Switch-based EE-Architectures. It also gives an overview and provide insights into the ongoing security relevant standardization activities concerning automotive Ethernet. Furthermore, the properties of non-automotive Ethernet security mechanisms as, e.g., IEEE 802.1AE aka. MACsec or 802.1X Port-based Network Access Control, will be evaluated and the applicability for automotive applications will be assessed.

Implementation of a QoS routing path control based on KREONET OpenFlow Network Test-bed (KREONET OpenFlow 네트워크 테스트베드 기반의 QoS 라우팅 경로 제어 구현)

  • Kim, Seung-Ju;Min, Seok-Hong;Kim, Byung-Chul;Lee, Jae-Yong;Hong, Won-Taek
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.9
    • /
    • pp.35-46
    • /
    • 2011
  • Future Internet should support more efficient mobility management, flexible traffic engineering and various emerging new services. So, lots of traffic engineering techniques have been suggested and developed, but it's impossible to apply them on the current running commercial Internet. To overcome this problem, OpenFlow protocol was proposed as a technique to control network equipments using network controller with various networking applications. It is a software defined network, so researchers can verify their own traffic engineering techniques by applying them on the controller. In addition, for high-speed packet processing in the OpenFlow network, programmable NetFPGA card with four 1G-interfaces and commercial Procurve OpenFlow switches can be used. In this paper, we implement an OpenFlow test-bed using hardware-accelerated NetFPGA cards and Procurve switches on the KREONET, and implement CSPF (Constraint-based Shortest Path First) algorithm, which is one of popular QoS routing algorithms, and apply it on the large-scale testbed to verify performance and efficiency of multimedia traffic engineering scheme in Future Internet.

Measurement and Analysis of Performance to Transfer Data in a Wireless-Cum-Wired Intra-Network (유무선 통합 인트라넷 환경에서 데이터 전송 성능 측정 및 분석)

  • Hur Hye-Sun;Hong Youn-Sik;Woo Yo-Seop
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.99-108
    • /
    • 2004
  • We have designed and implemented a Voice Messenger System(VMS) for sending and receiving voice data in order to measure and analyze the performance of a multimedia data transfer system using PDAs(Personal Digital Assistants) in a fast wireless LAN environment. The VMS has been configured as an infrastructure network by integrating a wireless intra-network based on IEEE 802,11 b standard with a wired network based on Ethernet. A sending time, a receiving time and a round-trip time(RTT) have been measured by varying its pecket size from 256 to 6656 bytes, Besides, we have performed the experiments to see which NIC is more stable between CF and PCMCIA type in such a wireless LAN environment, The results of such experiments show that the NIC with PCMClA type is better than that with CF type from the points of both efficiency and stability. The performance of a notebook computer with the attachment of a wireless NIC that is used as a VMS client is almost constant by varying its packet size when transferring voice data. However, with PDA client, in the case of receiving packets from the VMS server, the performance is the best when the pecket size is 6656 bytes, In addition, in the case of sending packets from PDA client to the VMS server, the performance is the best when the packet size is 4096 bytes. Even with the same pecket size, the time of receiving packets from the VMS server to PDA is longer than the time of sending packets from PDA to the VMS Server, Thus, we conclude that when PDA is used as a client by applying different pecket size when sending and receiving packets should be achieved a better performance over a wireless LAN environment.

  • PDF

Blocking probability improvement for Lightpath Setup based on GMPLS (GMPLS망 기반의 광 경로 설정을 위한 블로킹율 개선 방안)

  • Im Song-Bin;Kim Kyoung-Mok;Oh Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.12
    • /
    • pp.41-49
    • /
    • 2004
  • Increase of internet users and new types of applied traffics, have led to demand for more bandwidth for each application. Hence, the amount of internet traffic has risen sharply and it has demanded to use limited resources, such as wavelength and bandwidth, more effectively. These kind of needs can be satisfied with OXC(Optical cross-connects) based on GMPLS that carry out IP packet switching and wavelength switching at the same time and Provide very wide bandwidth. In RSVP-TE signaling of GMPLS studied by IETF. every lambda router in core network should be able to convert wavelength. So, lots of wavelength converters and needed and building and managing cost is high. Another problem is that optimized traffic is limited. In this paper We suggest strengthened GMPLS RSVP-TE signaling algorithm for a better lightpath setup. When setup signaling is blocked suggested algorithm does not send PathErr message to Edge Router, but looks for nearest lambda router which can convert wavelength and carry out setup signaling from that node. Such algorithm can reduce the chance of blocked lightpath setup signaling and provide effective arrangement of lambda router in core network by calculating proper number of wavelength converter.