• Title/Summary/Keyword: 네트워크 접속

Search Result 1,299, Processing Time 0.032 seconds

Effective Emergency-Warning Message Transmission in the Vehicle-to-Vehicle Communication Environment (차량 간 통신 환경에서 효과적인 위험 경고 메시지 전송 방안)

  • Byun, Jae-Uk;Kwon, Sung-Oh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1B
    • /
    • pp.1-8
    • /
    • 2012
  • In this paper, we propose an algorithm to improve collision avoidance in Vehicle-to-Vehicle (V2V) networks based on IEEE 802.11p. Since IEEE 802.11p adopts CSMA/CA as a multiple access scheme and an emergency warning message (EWM) is delivered to behind vehicles in a multi-hop manner, due to transmission collision, the more vehicles in the vehicle chain results in a longer delay. The longer delay increases the possibility of a rear-end collision. In order to ensure message reception with low latency, we consider implicit acknowledgement of a broadcasted EWM message and propose an algorithm to reduce redundant message transactions, called Two-Way Implicit Acknowledgement (TWIA). By simulations, we show that our proposed algorithm can reduce the latency until the last car receives the message by 9% and the success rate every car receives the message within 0.7sec by 12% at 100 fixed-number-of-car environment.

Performance Evaluation of Mobile Across Layer in Next Generation Network (차세대 네트워크에서 모바일 액세스 계층의 성능 평가)

  • Roh Jae-Sung;Moon Il-Young
    • Journal of Digital Contents Society
    • /
    • v.6 no.2
    • /
    • pp.101-106
    • /
    • 2005
  • In this paper, performance evaluation of mobile access layer for multiple-input multiple-output (MIMO) MultiCarrier(MC)/CDMA 16 QAM system is considered to mitigate multiple access interference and enhance system channel capacity in Rayleigh wireless fading channel. Traditionally, multi-path is viewed as an undesirable feature of wireless communications. Therefore, diversity and adaptive array schemes are proposed to mitigate its effects. Recently, to increase the spectrum efficiency and the link reliability, MIMO schemes is devised to exploit multi-path in a scattering wireless channel. In particular, the channel capacity of MIMO-MC/CDMA 16 QAM system is evaluated according to Eb/No, Mc, p. From the results, in order to improve the channel capacity, the signals at various elements must be uncorrelated. And if the paths are correlated due to inappropriate spacing or mutual coupling effects, the channel capacity of MIMO-MC/CDMA 16 QAM system becomes substantially smaller.

  • PDF

A Development of Mobile IPTV Service Platform for User and Service Session Mobility Guarantee (사용자와 서비스 세션 이동성 보장을 위한 모바일 IPTV 서비스 플랫폼 개발)

  • Jang, Ji-Won;Kim, Geun-Hyung
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.87-96
    • /
    • 2009
  • Digital Broadcast Service is being very popular and the delivery mechanism for digital broadcast content through IP network has progressed constantly, due to the advance of video and audio compression and network technologies. From these trends, in Korea, the commercial IPTV service starts in this year after the law related to IPTV is enacted last year. Since IPTV service, which integrates broadcast and communication services, can give an infrastructure for fusion of communication and interactive multimedia data service, IPTV service is attractive. Recently, by the advent of various wireless connection technologies and the mobile devices of high capability, Mobile IPTV, which has an advantage of not only IPTV but also mobile TV, has gained much interest. In this paper, we review a necessary ingredient for Mobile IPTV in the next generation wired/wireless convergence network environment which consists of heterogeneous wireless access networks. In addition, we propose the scheme for user mobility and service session mobility management using RTSP protocol and introduce the service gateway concept to guarantee the extension of IPTV service platform.

  • PDF

Analysis of Government R&D Contribution to the IT Industry (공공부문의 R&D 투자가 IT 산업에 미치는 파급효과 분석)

  • Seo, Hwanjoo;Hong, Pilky
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.63-77
    • /
    • 2010
  • This paper investigates the impact of the government R&D expenditure on the IT industry in Korea. The analysis of such impact can be used to derive the policy implications for the IT industry. The contribution of government R&D to the IT industry was analyzed based on the input-output table of the year 1990-1995-2000. The results show that the amount of the government R&D expenditure induced the IT industry to book twice greater production than it would have been in the absence of such government R&D expenditure during the period under investigation. It is also shown that job creation was strongly encouraged in the broadcasting equipment, software and computer-related services. During the period under the study, the composition of the workers in the IT hardware industry remained unchanged while the production increased significantly, which confirms the jobless growth in the IT hardware industry. The results of this study suggest that the government R&D should focus on improving the competitiveness of the intermediate good and parts industry.

  • PDF

Attacks and Defenses for Vulnerability of Cross Site Scripting (크로스 사이트 스크립팅(XSS) 취약점에 대한 공격과 방어)

  • Choi, Eun-Jung;Jung, Whi-Chan;Kim, Seung-Yeop
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2015
  • Cross Site Scripting enables hackers to steal other user's information (such as cookie, session etc.) or to do abnormal functions automatically using vulnerability of web application. This attack patterns of Cross Site Scripting(XSS) can be divided into two types. One is Reflect XSS which can be executed in one request for HTTP and its reply, and the other is Stored XSS which attacks those many victim users whoever access to the page which accepted the payload transmitted. To correspond to these XSS attacks, some measures have been suggested. They are data validation for user input, output validation during HTML encoding procedures, and removal of possible risk injection point to prevent from trying to insert malicious code into web application. In this paper, the methods and procedures for these two types are explained and a penetration testing is done. With these suggestions, the attack by XSS could be understood and prepared by its countermeasures.

Web Server Implementation via OpenWRT-based Wired/Wireless Router (OpenWRT 기반 유무선 공유기를 통한 웹 서버 구축)

  • Ha, Seung-Eup;Min, Jun-Ki;Ban, Tae-Hak;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1055-1057
    • /
    • 2013
  • Routers currently used in homes and institutions have a function of multiple computers to connect to the Internet with a single IP address. It is possible only through setting or establishing a separate operation in a used PC or server to function as a web/printer server, web hard, and P2P. In this paper, by utilizing the OpenWRT Linux-based through the construction of the Web server through a router OpenWRT of (Open Wireless Router) base, to build a server simple compact, low power consumption, low cost, to operate by reliability to provide Internet telephony and multimedia services high securely over the server security, which is based on the setting of policy and various firewall at the same time the configuration of the network utilizing OpenWRT router that can be enhanced, to construct a Web server through a router multi functional can receive the provision of services using the program PC and mobile APP.

  • PDF

Intelligent Mobile Surveillance System Based on Wireless Communication (무선통신에 기반한 지능형 이동 감시 시스템 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • In this paper, we develop an intelligent mobile surveillance system based on binary CDMA for the unmanned automatic tracking and surveillance. That is, we implement a intelligent surveillance system using the binary CDMA wireless communication technology which is applied the merit of CDMA and TDMA on it complexly. This system is able to monitor the site of the accident on network in real time and process the various situations by implementing the security surveillance system. This system pursues an object by the 360-degree using camera, expands image using a PTZ(Pan/Tilt/Zoom) camera zooming function, identifies the mobile objects image within a screen and transfers the identified image to the remote site. Finally, we show the efficiency of the implemented system through the simulation of the controlled situations, such as tracking coverage on objects, object expansion, object detection number, monitoring the remote transferred image, number of frame per second by the image output signal etc..

Strategic Plan for Improvement of Citizen Service using Ubiquitous Technology on Public Area: Geospatial Web based Service (유비쿼터스 기술을 이용한 다중집합장소의 시민서비스 고도화 방안 : 지리공간 웹 기반 서비스 제공을 중심으로)

  • Kang, Young-Ok;Kim, Hee-Won
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.79-99
    • /
    • 2008
  • Enterprises as well as central and local governments have tried to apply ubiquitous technology to the actual life on the various types of business and projects. In this paper we develop strategic plan to provide public service on public areas based on needs analysis of public services as well as trend analysis of ubiquitous and web technology. Ubiquitous service model should be based on geospatial web which can incorporate participation and collaboration concepts, as the wire/wireless network system develop rapidly. To achieve this purpose, we suggest the following projects; 1), construction of internet map based on geospatial web technology, 2), development of web contents based on geospatial web, 3), installing ubiquitous equipment, and 4), upgrade Seoul Metropolitan Government's homepage and internet system which can incorporate web 2.0 concepts. Ubiquitous service model should be based on not only development of ubiquitous technology but also needs of consumer such as citizen, enterprises, and public sectors which have an interest in that place. Geospatial web will be the core of development of ubiquitous service models.

  • PDF

Performance evaluation of Multicast in an Integrated Services Packet Network (종합 서비스 패킷망에서의 멀티캐스트의 성능 평가)

  • Lee, Wang-Bong;Kim, Young-Han
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.1
    • /
    • pp.9-19
    • /
    • 1999
  • An increase of the number of the real time applications and the Internet hosts make the Internet architecture changed. Current Internet architecture has some problems to process the real time traffics. To solve these problem, a new Internet architecture is proposed as the Integrated Service model. In the current Internet, as multicast protocols, the QoS multicast and the best-effort multicast have been studied in their separate network environments. But, the Integrated Service Packet Network is a heterogeneous network composed of the QoS delivery domain and the best-effort delivery domain. Thus, those separated multicast protocols have limitations in an ISPN. In this paper, we propose a multicast protocol for the ISPN with the QoS and the best-effort multicasting, and analyze the performance of this protocol. As a result, we find that the packet losses are same for hybrid multicast and best-effort multicast when the bandwidth is sufficient. But, if there exist some background traffics, the hybrid multicast has less packet loss than of the best-effort multicast.

  • PDF

The analysis of the relation between the quality of voice service and the quality of the wireless channel over a WiBro network (와이브로를 통한 음성서비스의 품질과 무선 채널 품질과의 통계적 상관관계 분석)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.719-726
    • /
    • 2014
  • This paper addresses quality of experience(QoE) and how to measure and evaluate QoE including its subjective aspects. Adopting the real measurements on the field, a various quality metric have been measured for VoIP(voice over IP) service provided through a wireless interface of WiBro(Wireless Broadband). By analyzing the measured values and correlation between the metrics, we attempt to find a method to evaluate QoE of the VoIP service in a objective way. As a result, it has been shown that QoE of the VoIP service through WiBro network has close relation to the packet-level end-to-end delay, and the delay has close relation to received signal strength indicator(RSSI).