• Title/Summary/Keyword: 유무선 통합

Search Result 329, Processing Time 0.025 seconds

Advanced Protocols and Methods of Robot Collision Avoidance for Social Network Service (로봇의 소셜 네트워크 서비스를 위한 프로토콜 및 충돌회피 방법)

  • Shin, Seok-Hoon;Hwang, Tae-Hyun;Shin, Seung-A;No, In-Ho;Shim, Joo-Bo;Oh, Mi-Sun;Ko, Joo-Young;Shim, Jae-Chang
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.931-940
    • /
    • 2012
  • Social networking services which spreading rapidly is a system using interrelationship of people by internet or mobile. SNS is a network system of the human-centered. In this paper, in order to make robot become a member of social networks we studied the necessary elements and formation. For robot with communication function and sensing, autonomous, collision avoidance method and communication protocol is needed to let Robot share the present conditions dangerous or special situation. We realized this after investigating necessary sensor for SNS, studying robot's collision-avoidance method, and defining protocol of robot for SNS. Also, we suggested and implemented the wired and wireless integrated communications method.

An Enhanced Wireless TCP protocol based on Explicit Error Notification (에러 보고를 통한 무선 TCP의 성능 향상)

  • 김경희;김낙명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12B
    • /
    • pp.1656-1664
    • /
    • 2001
  • When a packet loss occurs in a communication network operating a TCP protocol, the TCP protocol regards it that the loss has resulted from network congestion. Then the TCP protocol performs congestion control. When it is applied to the wireless network having quite a high BER characteristics, the performance of TCP protocol is degraded very much. In this paper, we propose an Explicit Error Notification(EEN) algorithm to improve the performance of the wireless TCP When a packet loss occurs in the wireless network, the TCP receiver decodes the TCP segment sequence number and the address of the TCP sender and receiver, and then informs the TCP sender of the error in wireless network by sending a NACK. It is to distinguish packets in error from losses of network congestion. In this paper, the performance of the proposed EEN algorithm is analyzed and simulated. In fact, as more errors are corrected, the proposed algorithm shows a larger improvements in performance.

  • PDF

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

A Fault-tolerant Network-based Mobility Management Scheme for Supporting Multi-media Services (방통융합 멀티미디어 서비스를 제공하기 위한 안정된 네트워크 기반의 이동성 관리 기술)

  • Lee, Sung-Kuen;Lee, Kyoung-Hee;Hong, Kang-Woon;Um, Tai-Won;Lee, Hyun-Woo;Ryu, Won;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.526-535
    • /
    • 2010
  • In this paper, we propose the fault-tolerant network-based mobility management scheme for supporting multimedia services of broadcasting & communications convergence in fixed mobile convergence (FMC) networks. The proposed scheme is based on AIMS (Access Independent Mobility Service) which is developed for the mobility support among heterogeneous access networks. To support stable location management and handover control for a MN, the proposed scheme supports stable management of binding information by sensing network attachment and detachment of a mobile node (MN). In addition, the proposed fault-tolerant (FT) AIMS supports a function of message retransmission for the support of handover control message and a function of heartbeat message transmission for the support of stable access network environments to a mobile node. We evaluate and analyze the performance of the proposed scheme through the implementation of AIMS system test-bed.

A Development of Mobile IPTV Service Platform for User and Service Session Mobility Guarantee (사용자와 서비스 세션 이동성 보장을 위한 모바일 IPTV 서비스 플랫폼 개발)

  • Jang, Ji-Won;Kim, Geun-Hyung
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.87-96
    • /
    • 2009
  • Digital Broadcast Service is being very popular and the delivery mechanism for digital broadcast content through IP network has progressed constantly, due to the advance of video and audio compression and network technologies. From these trends, in Korea, the commercial IPTV service starts in this year after the law related to IPTV is enacted last year. Since IPTV service, which integrates broadcast and communication services, can give an infrastructure for fusion of communication and interactive multimedia data service, IPTV service is attractive. Recently, by the advent of various wireless connection technologies and the mobile devices of high capability, Mobile IPTV, which has an advantage of not only IPTV but also mobile TV, has gained much interest. In this paper, we review a necessary ingredient for Mobile IPTV in the next generation wired/wireless convergence network environment which consists of heterogeneous wireless access networks. In addition, we propose the scheme for user mobility and service session mobility management using RTSP protocol and introduce the service gateway concept to guarantee the extension of IPTV service platform.

  • PDF

Management System of USN-based Collaborative Lighting Energy (USN기반 참여형 조명에너지 관리시스템)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.47-53
    • /
    • 2013
  • Nowadays, Advanced country have devised a plan energy-saving through lighting effectiveness and increasing performance of lighting control system. If it uses the LED as a source of light then conserve electricity by 50%. This paper implement LEMS(Lighting Energy Management System) that applicate and Smart Dimmer and Smart Switch that control the digital LED light, support wired-wireless communication using USN(Ubiquitous Sensor Network). This system of validity and reliability control special purpose lamp including indoor and outdoor lighting and landscape lighting effectively. It minimize the use of indoor and outdoor lighting energy by USN remote integral control function of Digital System Lighting of LED and increase effectiveness of energy and is a collaborative system that can feedback the use of electricity by measurement itself through Web and Switch.

TCP Performance Improvement Scheme in Network Mobility Environment (네트워크 이동 환경에서의 TCP 성능 향상 기법)

  • Kim Myung-Sup;Choi Myung-Whan
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.345-352
    • /
    • 2006
  • In the integrated wired/wireless network which consists of the Internet and moving networks, multiple wireless links are used to connect a fixed host(FH) in the Internet to a mobile host(MH) in the moving network. For use in such an environment, we propose a scheme to overcome the TCP performance degradation due to the packet losses over the wireless links without losing the end-to-end TCP semantics. The proposed scheme in each mobile router(MR) allows to obtain the information regarding packet losses over the upstream wireless links based on the received packet sequence number and the ACK number. This information is delivered to the upstream router, which enables the upstream access router(AR) or MR to quickly retransmit the lost packets. The proposed scheme has the feature to quickly recover the packet losses incurred over the upstream wireless links and the performance of the proposed scheme is evaluated through simulation. It is shown that the significant performance gain can be obtained using the proposed scheme compared with the snoop mechanism which maintains end-to-end TCP semantics and does not require any additional features at the source and/or destination nodes.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

A Study on Local Retransmission Timeout of AT-Snoop Protocol (AT-Snoop 프로토콜의 지역 재전송 시간에 관한 연구)

  • Cho Yong bum;Cho Sung joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.218-225
    • /
    • 2005
  • Although Snoop protocol can enhance TCP throughput efficiently in a wired-cum-wireless environment, it has a problem in performing local packet retransmissions under a burst error-prone wireless link. AT-Snoop protocol is proposed to cope with this Snoop protocol's problem by adopting adaptive timer. In this paper, TCP throughputs of AT-Snoop protocol have been analyzed with varying wireless link conditions and the ways of setting parameters of AT-Snoop protocol for higher TCP throughput are found out through computer simulations. From the simulation results, AT-Snoop protocol's two parameters, local retransmission threshold value and local retransmission timeout value, are closely related with the fading changing rate. To get higher TCP throughput, local retransmission threshold value and local retransmission timeout value should be set to a little bit larger values than average WSRTT(Wireless Smoothed Round Trip Time) and mean bad period of the wireless link, respectively.