• Title/Summary/Keyword: 망 이동

Search Result 2,620, Processing Time 0.028 seconds

Number Portability Based on Intelligent Network (지능망을 이용한 번호 이동성 제공)

  • Kim, Sang-Gi
    • Electronics and Telecommunications Trends
    • /
    • v.12 no.1 s.43
    • /
    • pp.51-61
    • /
    • 1997
  • 최근 미국을 비롯한 세계 각국에서는, 경쟁 환경이 도입된 통신 시장에서 가입자들이 자신의 전화 번호를 그대로 유지하면서 타 사업자에게 이동할 수 있는 번호 이동성(Number Portability)제공이 커다란 이슈로 등장하고 있다. 본 고에서는 번호 이동성의 유형을 살펴보고, 특히 문제가 되는 시내 전화시장의 경쟁에 따른 LNP(Local Number Portability)에 대하여 그 실현 방법들을 조사 분석하였다. 미국에서의 연구 동향을 바탕으로 교환기 기반의 단기 해결 방안과 지능망을 이용한 장기적 해결 방안을 소개하고, 구체적인 호 처리 흐름을 예시하였다.

Paging for Hierarchical Mobile IPv6 (계층적 이동 IPv6 망에서의 페이징 기법)

  • 김수미;최종원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.676-678
    • /
    • 2004
  • 인터넷이 활성화되고 무선통신 가입자들이 늘어남에 따라 이동성에 대한 요구는 커져 가고 있고. 이에 대한 요구는 현재 IETF의 Mobile IP WG에서 진행중이다. 계층적 이동 IPv6은 MAP(Mobility anchor PDint)을 도입하여 지역적 이동성을 효율적으로 관리하게 했다. 이러한 HMIPv6 환경에서 활동상태 노드와 비활동상태 노드의 상태를 구분하여 망의 부하 문제를 해결해 주는 페이징 기법이 적용된 P-HMIPv6 프로토콜이 있다. 본 논문에서는 P-HMIPv6의 문제점을 살피고, 이를 보완할 수 있는 방법을 적용한 MP-HMIPv6 프로토콜을 제안한다.

  • PDF

A Study on the realization of VoIP number portability by QoR (QoR 방식의 인터넷전화간 번호이동성의 구현)

  • Jeong, Young-Sic
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.55-56
    • /
    • 2007
  • 본 논문은 QoR 방식으로 인터넷 전화간 번호이동성 구현을 위하여 망의 기능구조 및 정보흐름을 규정한다. 본 논문에서는 번호이동성 요구사항에 따라, 소요되는 망기능 및 시스템 기능을 정의하고, 이들 기능간에 주고받는 정보를 규정한다 특히, H.323 과 SIP 프로토콜을 사용하는 두 개의 시스템이 직접 연동될 경우 번호이동성 정보를 교환하기 위한 방법을 제안한다.

  • PDF

An MPLS VPN with Mobility Support (이동성을 지원하는 MPLS 방식 가상사설망)

  • Lee, Young-Seok;Choi, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.225-232
    • /
    • 2001
  • In this paper, we describe a mechanism that supports the mobility service for VPN(Virtual Private Network) users on MPLS(Multiprotocol Label Switching) network. The MPLS VPN considered in this study is controlled by CE(Customer Edge) routers. In such a VPN, CE routers have additional functions to support mobile VPN users, i.e., Home Agent function, foreign Agent function, Correspondent Agent function. This mechanism is applied when a VPN node moves to other site of the saute VPN, or when it moves to other site of a different VPN, or to a non-VPN site. We perform a simulation study to compare the performance of CE based MPLS VPN with that of PE(Provider Edge) based MPLS VPN with mobility support.

  • PDF

5G mobile network and ATSC 3.0 broadcasting network interworking trend and plan (5G 이동망과 ATSC 3.0 방송망 연동 동향 및 방안)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.47-52
    • /
    • 2020
  • The introduction of virtualization technology in the broadcasting field is actively progressing broadcasting service automation and intelligence based on the effective operation of IT resources throughout the broadcasting industry ecosystem. In recent years, there is increasing interest in increasing the flexibility of various broadcasting resources and increasing the efficiency of interworking with other networks through network virtualization of the broadcasting network infrastructure. The fundamental transformation from the broadcasting network to the IP paradigm is facing a situation where it is necessary to solve various problems for the effective interworking of Internet-based service platforms and 5G networks and the development of new convergence services. In other words, for organic and effective interworking with the next-generation broadcasting network represented by ATSC 3.0, a mobile communication network represented by 5G, and the Internet, a number of difficulties must be solved. In this paper, the basic technology and status for the convergence of ATSC 3.0 broadcasting network and mobile communication network represented by 5G was examined, and a plan for the ATSC 3.0 broadcasting network and 5G network to interwork with each other as a network was described.

Development of Integrated Accessibility Measurement Algorithm for the Seoul Metropolitan Public Transportation System (서울 대도시권 대중교통체계의 통합 시간거리 접근성 산출 알고리즘 개발)

  • Park, Jong Soo;Lee, Keumsook
    • Journal of the Korean Regional Science Association
    • /
    • v.33 no.1
    • /
    • pp.29-41
    • /
    • 2017
  • This study proposes an integrated accessibility measurement algorithm, which is applied to the Seoul Metropolitan public transportation system consisting of bus and subway networks, and analyzes the result. We construct a public transportation network graph linking bus-subway networks and take the time distance as the link weight in the graph. We develop a time-distance algorithm to measure the time distance between each pair of transit stations based on the T-card transaction database. The average travel time between nodes has been computed via the shortest-path algorithm applied to the time-distance matrix, which is obtained from the average speed of each transit route in the T-card transaction database. Here the walking time between nodes is also taken into account if walking is involved. The integrated time-distance accessibility of each node in the Seoul Metropolitan public transportation system has been computed from the T-card data of 2013. We make a comparison between the results and those of the bus system and of the subway system, and analyze the spatial patterns. This study is the first attempt to measure the integrated time-distance accessibility for the Seoul Metropolitan public transportation system consisting of 16,277 nodes with 600 bus routes and 16 subway lines.

Studies on the Behaviour of fish Schools in the Main-net of a Large Scale Set-net using Scanning Sonar - II - The Behaviour of Large Schools of Sardine, Sardinops mwlanosticta in and around the Set-net - (소나 관찰에 의한 대형정치강내 어군행동의 연구 - II - 정치망내외에서 정어리대형군의 행동 -)

  • Kim, Mun-Kwan;Inoue, Yoshihiro;Park, Jeong-Sik
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.31 no.1
    • /
    • pp.8-14
    • /
    • 1995
  • The behaviour of large school of sardine Sardinops melanosticta in and around the set-net were analyzed from sonar image recordings. The survey was conducted at Kishihata set-net in Japan from January 29th to February 22th 1992. The results obtained are summarized as follows ; 1. When large schools of sardine moved along the outside of the set-net. the shape of the school gradually changed, that was the front part extended forward in the direction of movement and the rear part concentrated in the same direction such that the school retained its original shape. 2. When large school of sardine entered the main-net of the set-net. the school was decentralized directly to the slope-net. to the central part. and to the opposite side, and then the fish school was concentrated as it moved directly to the slope-net. 3. When the size of the front part of the fish school enlarged. the maximum recorded moving speeds were 176cm/sec and 277cm/sec for schools inside and outside the set-net, respectively.

  • PDF

IMT-2000 Network Architecture using MPLS for Mobile IP (Mobile IP를 수용하는 IMT-2000 교환망의 MPLS 구조)

  • Yoo, Jae-Pil;Kim, Kee-Cheon;Lee, Yeon-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.219-225
    • /
    • 2000
  • In order to provide a proper mobile internet service, Mobile IP is necessary to support IP mobility. Service network should be a backbone network among mobile agents which support mobility, and MPLS(Multi-protocol Label Switching) of IETF(Internet Engineering Task Force) is being considered as a backbone network because of its speed, scalability and the excellent service capability. MPLS, however, doesn't provide a way to support the mobility of the nodes. In this paper, we present an efficient IMT-2000 network architecture using MPLS to handle Mobile IP. The proposed architecture combines the MPLS label distribution and Mobile IP registration. It doesn't use the layer 3 encapsulation, instead it uses layer 2 for tunneling the data, reduces the size of the header, and it can tunnel the data without delay, which is needed to look up the mobility binding list, as a result.

  • PDF

A study on Robust Topology for the Resilient Ontology-based Dynamic Multicast Routing Protocol (노드의 복원력이 있는 온톨로지 기반의 동적 멀티캐스트 라우팅 연구)

  • Kim, Sun-Guk;Doo, Kyung-Min;Chi, Sam-Hyun;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.188-194
    • /
    • 2007
  • We propose a new ad hoc multicast routing protocol for based on the ontology scheme called inference network. Ontology knowledge-based is one of the structure of context-aware. We will have developed an algorithm that will design multi-hierarchy Layered networks to simulate a desired system.

  • PDF

Design and evaluation of a dissimilarity-based anomaly detection method for mobile wireless networks (이동 무선망을 위한 비유사도 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.2
    • /
    • pp.387-399
    • /
    • 2009
  • Mobile wireless networks continue to be plagued by theft of identify and intrusion. Both problems can be addressed in two different ways, either by misuse detection or anomaly-based detection. In this paper, we propose a dissimilarity-based anomaly detection method which can effectively identify abnormal behavior such as mobility patterns of mobile wireless networks. In the proposed algorithm, a normal profile is constructed from normal mobility patterns of mobile nodes in mobile wireless networks. From the constructed normal profile, a dissimilarity is computed by a weighted dissimilarity measure. If the value of the weighted dissimilarity measure is greater than the dissimilarity threshold that is a system parameter, an alert message is occurred. The performance of the proposed method is evaluated through a simulation. From the result of the simulation, we know that the proposed method is superior to the performance of other anomaly detection methods using dissimilarity measures.

  • PDF