• Title/Summary/Keyword: 재전송 지속성

Search Result 28, Processing Time 0.028 seconds

A Handover Method for Service Continuity of Mobile Multimedia (이동 멀티미디어 서비스의 연속성 보장을 위한 핸드오버 방법)

  • Lee, Jong-Chan;Lee, Moon-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7A
    • /
    • pp.770-777
    • /
    • 2007
  • Smaller cell size in the micro-cell or pico-cell structure brings about more frequent hand-overs between cells, and higher speed movement of the mobile terminal makes short the permissible time interval for executing these hand-over procedures. In this situation the hand-over failure may occur or some packets may be lost during the hand-over. Moreover a rapid degradation of throughput is triggered by packet re-transmission for compensating such errors. The QoS (Quality of Services) of mobile multimedia applications with higher bits rate requirements and higher speed mobility are severely affected by even shot service interruption. This paper proposes a new hand-over scheme to provide seamless services in the next generation mobile communication systems. Simulation is done to evaluate the performance of the proposed scheme based on its hand-over failure rate and packet loss rate.

A Study on the Development of TGPS Buoy for the Ocean Surface Current Measurement (표층해류 관측을 위한 TGPS Buoy 개발 연구)

  • 전호경;함석현
    • 한국해양학회지
    • /
    • v.30 no.1
    • /
    • pp.27-38
    • /
    • 1995
  • For the study of oceanic surface current, this work presents a system design which is composed of three parts, a Global Positiong System(GPS) unit, a transmitter with radio frequency (RF) modem and an antenna which are housed in a plastic spherical buoy, and computerised of VHF receiving system. The key idea for this study is to employ a commercially available GPS on a drifting buoy and to utilize the receiver position information from the buoy in determining the Lagrangian motion of surface ocean waters. Great efforts has been paid to the system design which would demand several points in harsh conditions common in the sea surface, that is power supply problems housed inside of a plastic buoy, optimizing transmitting radio frequency which limits transmitting distance to a receiving station. for all these difficulties, the system appears to be promising in future oceanic applications and is considered to economical compared to ARGOS drift buoy which is being used by commercial base. We believe that the system needs to be improved in terms of several aspects such as a longer transmitting distance, a power supply and software. for the test experiments in situ, the system has employed off the coast of Ku Ryong Po int the southeast part of Korea and successfully collected the surface current data. The results are presented for two cases from 21 to 31, March 1994 and 21 to 25, June 1994 in terms of current statistics and trajectories of drifting buoys.

  • PDF

Design of DRM System for Secure Contents Transfer in Home Domain (홈 도메인에서 안전한 콘텐츠 전송을 위한 DRM 시스템의 설계)

  • Lee, Chang-Bo;Kim, Jung-Jae;Moon, Ju-Young;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.221-228
    • /
    • 2007
  • For the usage of the different standard technology among DRM vendors, the DRM technologies in today could not guarantee the interoperability between the digital contents and digital devices. While users have been guaranteed the protection of contents, they have to put up with the limitation and inconvenience. The Superdistribution methods that InterTrust has proposed is the content distribution technology which is possible to use the content only by the user authentication with the license regardless of the acquisition of the DRM contents. However, it need a additional license with re-authentication from DRM server when the original contents need to be moved to other devices from the own device. In this paper, to reduce the inconveniences of re-authentication and re-issue procedures of the license and continually to protect the rights of contents on the offline, we propose the DRM system that creates domain between home devices and enable users to freely transfer contents with the domain.

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.

A Review on the IPTV Regulatory Regime and Market Performance (IPTV 시장성과와 관련 규제제도의 검토)

  • MIn, Dae Hong;Kim, Sung Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.511-514
    • /
    • 2012
  • IPTV는 기술적으로 TV에 PC적 기능이 더해지고 인터넷 프로토콜(IP)을 통해 인터넷과 연결되는 서비스로, 국내 초고속인터넷의 속도가 VDSL, 광랜과 같은 서비스의 등장으로 최대 100Mbps에 이르러 동영상 콘텐츠의 실시간 스트리밍 서비스가 가능한 환경이 구현되었다. IPTV 도입을 통해 산사건 방송, VOD 등의 기본적인 서비스뿐만 아니라, 양방향 광고, IPTV 민원발급 및 IPTV 공공서비스 제공 등 다양한 응용서비스의 개발 및 활성화를 기대하였다. 또한 IPTV를 통해 유료방송의 경쟁을 촉진시키고 케이블TV의 디지털 전환을 촉진시킴으로써 시청자들의 복지를 향상시킨다는 취지도 함께 있었다. 정량적으로는 IPTV가입자가 2012년에 이르러 보수적으로 290만가구, 낙관적으로는 450만 가구에 이를 것으로 예상하였으며, 관련 시장규모도 동년도에 약 7,515억원에 이를 것으로 전망하였다. 하지만, 2011년 말이 이미 450만 가입자를 돌파하고 2012년 8월 500만 가입자를 유치하면서 IPTV 서비스는 본격적인 mass market을 형성해 나가고 있다. IPTV 시장이 확대해 나가면서 유료방송 가입가구 수도 증가하였는데, 도입당시인 2008년 말 1,740만 가구가 유료방송에 가입하여 104%의 보급률을 보였으나 2011년 6월말 현재 가구수 대비 유료방송 가입자구수는 127%로 증가하였다. 이렇게 IPTV서비스 시장이 확대되고는 있으나, 정부의 신규 서비스에 대한 과도한 요금규제, IPTV와 경쟁하는 케이블방송사(SO) 계열의 콘텐츠 사업자(CP)들의 방송채널 공급거절 및 지상파 방송사의 과도한 재전송 대가, 전국 권역사업자인 IPTV에 대한 권역별 가입자점유율 규제, IPTV의 차별성으로 내세웠던 T-Commerce 및 양방향 광고에 대한 규제는 앞으로 개선해 내가야할 과제이다. 이에 본고는 IPTV의 시장성과를 조망하고, 시장의 지속성장을 위해 필요한 제도개선 방향을 살펴보았다.

  • PDF

Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 생체 정보 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.147-153
    • /
    • 2014
  • The numerous improved schemes of remote user authentication based on password have been proposed in order to overcome the security weakness in user authentication process. Recently, some of biometric-based user authentication schemes to use personal biometric information have been introduced and they have shown the relatively higher security and the enhanced convenience as compared to traditional password-based schemes. These days wireless sensor network is a fundamental technology in face of the ubiquitous era. The wireless sensor networks to collect and process the data from sensor nodes in increasing high-tech applications require important security issues to prevent the data access from the unauthorized person. Accordingly, the research to apply to the user authentication to the wireless sensor networks has been under the progress. In 2010, Yuan et al. proposed a biometric-based user authentication scheme to be applicable for wireless sensor networks. Yuan et al. claimed that their scheme is effectively secure against the various security flaws including the stolen verifier attack. In this paper, author will prove that Yuan et al.'s scheme is still vulnerable to the password guessing attack, user impersonation attack and the replay attack, by analyzing their security weakness.

Communication Module Selection Algorithm for Energy Saving of Smartphone (스마트폰 에너지 절감을 위한 통신모듈 선택 알고리즘)

  • Lee, Chang-Moo;Lee, Seung-Jae;Choi, Deok-Jai
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.5
    • /
    • pp.22-31
    • /
    • 2012
  • A Smartphone is an intelligent device combined mobile phone and pc's support functions, and can perform multiple functions to satisfy the demands of users. It has excellent processing power and communication modules(DMB, Wi-Fi, Bluetooth, NFC etc) to carry out the demands of users. But continuous using of battery power on processor and equipped modules causes acceleration of battery consumption. This means that effective power management in devices like smartphone is important. Therefore, the management of power consumption on system execution and communication module is a serious issue in this field of study. In this paper, we would like to propose a communication module selection algorithm based on energy consumption parameter of each communication module and data transfer time. Our scheme automatically select appropriate communication system to reduce high energy consumption on bluetooth sleep mode so that this scheme is more efficient and effective thus improving user convenience in longer usage time. Experimental results showed the 20% energy saving.

Evaluation of Compaction Quality Control applied the Dynamic Cone Penetrometer Test based on IoT (다짐품질관리를 위한 IoT 기반 DCPT 적용 평가)

  • Jisun, Kim;Jinyoung, Kim;Namgyu, Kim;Sungha, Baek;Jinwoo, Cho
    • Journal of the Korean Geosynthetics Society
    • /
    • v.21 no.4
    • /
    • pp.1-12
    • /
    • 2022
  • Generally, the plate load test and the field density test are conducted for compaction quality control in earthwork, and then additional analysis. Recently developed that the DCPT (Dynamic Cone Penetration Test) equipment for smart compaction quality control its the system are able to get location and real-time information about worker history management. The IoT-based the DCPT system improved the time-cost in the field compared traditional test, and the functions recording and storage of the DPI (Dynamic Cone Penetration Index) were automated. This paper describes using these DCPT equipment on in-situ and compared to the standards of the DCPT, and the compaction trend had be confirmed with DPI as the field test data. As a result, the DPI of the final compaction decreased by 1.4 times compared to the initial compaction, confirming the increase in the compaction strength of the subgrade compaction layer 10 to 14 cm deep from the surface. A trend of increasing compaction strength was observed. This showed a tendency to increase the compaction strength of the target DPI proposed by MnDOT and the results of the existing plate load test, but there was a difference in the increase rate. Therefore, additional studies are needed on domestic compaction materials and laboratory conditions for target DPI and correlation studies with the plate load tests. If this is reflected, it is suggested that DCPT will be widely used as smart construction equipment in earthworks.