• 제목/요약/키워드: 인터넷 프로토콜

검색결과 2,045건 처리시간 0.131초

A New Dynamic Paging Mechanism for HMIPv6 Networks (HMIPv6환경에서 새로운 동적 페이징 기법)

  • Jeong, Yu-Jin;Choe, Jong-Won
    • Journal of KIISE:Information Networking
    • /
    • 제32권6호
    • /
    • pp.687-695
    • /
    • 2005
  • With increasing demand of using mobile Internet, HMIPv6 is proposed by IETF to reduce location management traffics due to micro mobility and to provide IP-based movement. A paging mechanism combined with HMIPv6 can reduce the signaling traffics of a mobile node. We propose a dynamic paging mechanism in HMIPv6 which decides an optimal paging area for each mobile node by considering its characteristics. Total costs of a static paging mechanism and a dynamic paging mechanism are analyzed by mathematical formulas. As a result, we proved that the dynamic paging mechanism reduced total signal traffic costs more than a static paging mechanism.

Design and Implementation of Jini Surrogate System for Supporting Non-Java Devices (Non-Java 장치를 지원하기 위한 Jini 서로게이트 시스템의 설계 및 구현)

  • 최현석;모상덕;정광수;오승준
    • Journal of KIISE:Information Networking
    • /
    • 제29권6호
    • /
    • pp.685-695
    • /
    • 2002
  • Recently, there has been increasingly demand for connecting a embedded device to the Internet. Jini technology is interested in automatically composing a distributed network with devices But, there are some problems that the device needs high hardware requirements to adopt Jini technology for supporting Jini-enabled services. In this paper, we focused on design and implementation of surrogate system that supports non-Java devices in Jini networks. This system and protocol are implemented in Java language. The surrogate system delegates Discovery and Join processing to support a Jini service in connected networks. A Jini client can use service of the device through the surrogate system. We tested a Jini sample program to verify the implemented surrogate system. In the test result, we showed that the Jini client can use functionalities and operations of the non-Java device through the surrogate system.

Harvest and Providing System based on OAI for Science Technology Information (OAI 기반 과학기술정보 수집 제공 시스템)

  • Yoon, Jun-Weon
    • Journal of Information Management
    • /
    • 제38권1호
    • /
    • pp.141-160
    • /
    • 2007
  • Many contents produced and provided as development of information technology on the internet. Especially discussion that collecting and storing of digital information resources, is expanded as growing dependence on academic information of research workers. Open Access is a new paradigm of information distribution that is opposite concept of high price distribution academic information. It is an OAI system that is intended to collect and automate open access data in good order. This paper constructs stOAI based on OAI that is a science and technology information providing system. This system provides international academic journal free of charge that collect and store through OAI protocol in OA(Open Access) of yesKISTI(science and technology information portal service). Also, It provides automate and centralize science technology information, that KISTI has, to external institution as a standard type.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • 제13권2호
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

A Mobile IPTV Authentication Protocol using Session Key in Wireless LAN (무선랜 환경에서 세션키를 이용한 모바일 IPTV 인증 프로토콜)

  • Baek, Jong-Gyu;Sohn, Kyu-Seek;Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제36권12B호
    • /
    • pp.1474-1480
    • /
    • 2011
  • Recently the mobile IPTV service has been spread through the wireless LAN(WLAN). In order to provide the commercial mobile IPTV service through the WLAN, re-authentication for the mobile IPTV terminal is required whenever the mobile terminal roams between APs(Access Points). The most popular one of the authentication protocol standards for the wired and/or wireless LAN is IEEE 802.1X. However IEEE 802.1X takes much time to authenticate the terminal and is not adequate for the seamless mobile IPTV service. We introduce the session key and separate the user authentication and the hardware authentication. And we strengthen the device authentication by the initial registration. By these, the proposed authentication protocol reduces the authentication time and can protect the authentication key securely.

A Performance Analysis of VoIP in the FMC Network to provide QoE for users (융합 망에서 사용자에게 QoE를 제공하기 위한 VoIP 성능 분석)

  • Lee, Kyu-Hwan;Oh, Sung-Min;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제35권3B호
    • /
    • pp.398-407
    • /
    • 2010
  • Due to increase of user requirement for various traffics and the advance of network technology, each distinct network has converge into FMC(Fixed Mobile Convergence) networks. However, we need to research the performance analysis of VoIP(Voice over Internet Protocol) in the FMC network to provide QoE for the voice user of FMC network. Therefore, this paper introduces the scenario which is the situation of voice quality degradation when a user uses VoIP to communicate with other users in the FMC network. Especially, this paper presents scenario in terms of the component of the network and finds the improvement point of voice quality. In the simulation results, three improvement points of voice quality are found as following: voice quality degradation by packet loss in the physical layer of the HSDPA network, by utilizing GGSN without QoS parameter mapping mechanism which is gateway between 3GPP and IP backbone, and by using non-QoS AP in the WLAN network.

Implementation on Wi-Fi/IR Gateway and Smartphone Application for Integration and Control of Consumer Appliances (가전제품 통합 제어를 위한 Wi-Fi/IR 게이트웨이 및 스마트폰 애플리케이션 구현)

  • Ryu, Won Jae;Chae, Seog;Shin, Soo Young;Kim, Young Hyung;Jung, Dong Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제42권4호
    • /
    • pp.879-888
    • /
    • 2017
  • Recently, the Smart household appliances to provide Smart services have been actively spreaded by providing IoT(Internet of Things). Also, the appliances which Wi-Fi and Bluetooth can directly control are preferred. But until now, the most household appliances are based on IR(InfraRed) and the each procotols of them are different. In this paper, to solve these problems, we suggested the system to control both smart appliances and general appliances by using Smart phone. The system is "Wi-Fi to IR" gateway which receives the Wi-Fi signal to convert to IR signal and transmit it. Also, we made the remote control function in specific brands' appliances possible to most brands without limitation and tried to control not only one remote controller for one TV brand but also for all brand without limitation.

Implementation of Visible Light Communication Transceiver of Mobile Devices for Location-Based Services (위치기반서비스 제공을 위한 휴대기기용 가시광통신 송수신기 구현)

  • Park, Sangil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제42권4호
    • /
    • pp.889-891
    • /
    • 2017
  • Visible light communication technology, which is a communication using LED lighting, is defined by IEEE 802.15.7 WG and active research is under way. Visible light communication is advantageous not only to avoid interference with existing RF communication but also to provide location based service through accurate positioning by utilizing LOS (Line of Sight) characteristic. Therefore, it is very easy and efficient to locate and track the user's location. In this paper, we implemented a visible light communication transceiver using USB interface for easy application to portable devices. It supports the mobility of mobile devices through internet protocol and showed BER performance of less than $10^{-3}dBm$ at over 1m, which is the height of lighting and smart device during walking.

A Study on the security demand and Handoff of the pocket Internet (Wibro) with MIPv6 (MIPv6 의한 휴대인터넷(Wibro)의 보안요구 및 Handoff에 관한 연구)

  • Lee, Cheong-Jin;Kim, Do-Hwan;Kwon, Oh-Heung
    • Journal of Digital Contents Society
    • /
    • 제7권3호
    • /
    • pp.161-168
    • /
    • 2006
  • Wibro(Wibro - Wireless Broadband Internet ) is a system that can accept effectively the IP-based Wireless data traffic with upward / downward asymmetric transfer characteristic by using a Wirelss broadband transfer technology in OFDMA/TDD (Orthogonal frequency Division Multiple Access/Time Division Duplex). Wibro service should support handover to maintain connection continuously in movement because the service is based on If system which is different from cellular system. Current Micro Mobility system and general Mobile If system has got a problem of delayed speed and lost packets during handover. IETF protocol has been proposed for minimizing this problem and its standardization is under process, mainly focused on Mip4, Mip6 and Mipshop WG. This article studies and analyzes an effective method of minimizing handover delay to improve the problem of WiBro system and its revitalization & outlook.

  • PDF

Low-Latency Handover Scheme Using Exponential Smoothing Method in WiBro Networks (와이브로 망에서 지수평활법을 이용한 핸드오버 지연 단축 기법)

  • Pyo, Se-Hwan;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • 제8권3호
    • /
    • pp.91-99
    • /
    • 2009
  • Development of high-speed Internet services and the increased supply of mobile devices have become the key factor for the acceleration of ubiquitous technology. WiBro system, formed with lP backbone network, is a MBWA technology which provides high-speed multimedia service in a possibly broader coverage than Wireless LAN can offer. Wireless telecommunication environment needs not only mobility support in Layer 2 but also mobility management protocol in Layer 3 and has to minimize handover latency to provide seamless mobile services. In this paper, we propose a fast cross-layer handover scheme based on signal strength prediction in WiBro environment. The signal strength is measured at regular intervals and future value of the strength is predicted by Exponential Smoothing Method. With the help of the prediction, layer-3 handover activities are able to occur prior to layer-2 handover, and therefore, total handover latency is reduced. Simulation results demonstrate that the proposed scheme predicts that future signal level accurately and reduces the total handover latency.

  • PDF