• Title/Summary/Keyword: 정보통신 서비스

Search Result 10,433, Processing Time 0.034 seconds

An Efficient Movement Management Method of Mobile Node in Mobile IPv6 (Mobile IPv6환경에서 이동노드의 효율적인 위치 관리 방안)

  • Shin Chung-Soo;Mun Young-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.211-218
    • /
    • 2006
  • The Mobile IPv6 provides the enhanced internet services to user by supporting a node's mobility. In Mobile IPv6(MIPv6), the mobile node sends the binding message which binds home address(HoA) with care-of address(CoA) to the home agent whenever it changes its point of attachment to the internet. To reduce the mobility management signal message the Paging Hierarchical Mobile IPv6(PHMIPv6) is proposed. The mobile node does not send the binding message within the domain if the mobile node's state is idle. Therefore the mobility signal message cost can be reduced. However, when the mobile node's session arrival rate is high the many mobility management signal cost are needed because the paging cost is very high. In this paper, we analysis the drawback of PHMIPv6 and propose the scheme which can reduce the mobility management signal cost. The proposed scheme works independent of the number of subnet in the domain. Therefore the proposed scheme can improve the mobile node's mobility management scheme.

A Stable Access Point Selection Method Considering RSSI Variation in Fingerprinting for Indoor Positioning (실내측위를 위한 핑거프린팅에서의 RSSI 변동을 고려한 안정된 AP 선출방법)

  • Hwang, DongYeop;Kim, Kangseok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.9
    • /
    • pp.369-376
    • /
    • 2017
  • Recently, an RSSI-based fingerprinting localization technology has been widely used in indoor location-based services. In the conventional fingerprinting method, as many APs as possible are used to increase the accuracy of location estimation. In another study, a part of APs having the strongest RSSI signal intensity are selected and used to reduce the time spent for positioning. However, it does not reflect the influence of RSSI occurred from the changes of the surrounding environments such as human movement or moving obstacles in a real environment. The environmental changes may cause the difference between the predicted RSSI signal strength value and the measured value, and thus occur an unpredictable error in the position estimation. Therefore, in order to mitigate the error caused by environmental factors, it is necessary to select APs suitable for indoor positioning estimation considering the changes in the surrounding environments. In this paper, we propose a method to select stable APs considering the influence of surrounding environments and derive a suitable positioning algorithm. In addition, we compare and analyze the performance of the proposed method with that of the existing AP selection methods through experiments.

A Method of Selecting Layered File System Based on Learning Block I/O History for Service-Customized Container (서비스 맞춤형 컨테이너를 위한 블록 입출력 히스토리 학습 기반 컨테이너 레이어 파일 시스템 선정 기법)

  • Yong, Chanho;Na, Sang-Ho;Lee, Pill-Woo;Huh, Eui-Nam
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.415-420
    • /
    • 2017
  • Virtualization technique of OS-level is a new paradigm for deploying applications, and is attracting attention as a technology to replace traditional virtualization technique, VM (Virtual Machine). Especially, docker containers are capable of distributing application images faster and more efficient than before by applying layered image structures and union mount point to existing linux container. These characteristics of containers can only be used in layered file systems that support snapshot functionality, so it is required to select appropriate layered file systems according to the characteristics of the containerized application. We examine the characteristics of representative layered file systems and conduct write performance evaluations of each layered file systems according to the operating principles of the layered file system, Allocate-on-Demand and Copy-up. We also suggest the method of determining a appropriate layered file system principle for unknown containerized application by learning block I/O usage history of each layered file system principles in artificial neural network. Finally we validate effectiveness of artificial neural network created from block I/O history of each layered file system principles.

A Study on the Application Method of Digital Signature to International e-Trade over the Internet (인터넷 전자무역에서의 전자서명 적용방안 연구)

  • Park, Sang-Hwan;Lee, Seok-Lae;Park, Chu-Hwan
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.227-241
    • /
    • 2004
  • With the expansion of internet usage and the advanced technology for information and communication, the international e-Trade environment gradually migrates from the VAN/EDI to the global Internet-based e-Traed on an ebXML framework. In an effort to provide a Internet-based e-Trade environment with a security and trust, this paper analyzes security components and proposed the SSL and ebXML security technologies in order to assure of the trust and security over Internet-based e-Trade. In addition, this paper presents 3-phase methodology to realize the secure and trustworthy Internet-based e-Trade. In summary, as the first phase, the e-Trade business processes are re-engineered and the digital signature council for mutual recognition is orgainzed. And as the second phase, the Internet-based e-Trade system and the concerned digital signature technology are implemented. Finally as third phase, the PKI mutual recognition agreement is signed by parties concerned and then the Internet-based e-trade business is started. Furthermore, this paper presents the promising Internet-based e-Trade models where the digital signature can be applied.

  • PDF

The Defense Strategies against Consumer Unethical Behaviors (소비자의 비윤리적 행동에 대한 방어전략)

  • Lee, Un-Kon;Park, Jong Pil;Choi, Young Eun;Oh, Yonghui
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.17-37
    • /
    • 2012
  • The evolution of the IT facilitated the social actions of the consumers by supporting social communication of the online users. At the same time it help for the consumer to post malicious comments on the Internet or to spread the unproven news for distorting the public opinion in the SNSs. Although the number of the consumer unethical behaviors and the estimated damage of the innocent companies have been increased, a few studies had investigate on this issue. Based on the Literature on the consumer unethical behaviors and the institution based trust, we had developed the defense strategies against the consumer unethical behaviors. This study would introduce the new perspective that the consumer could always not be innocent. Also, the defense strategy developed in this study could contribute to make the guideline for consumer service manual.

Design and Implementation of M2M-based Smart Factory Management Systems that controls with Smart Phone (스마트폰과 연동되는 M2M 기반 스마트 팩토리 관리시스템의 설계 및 구현)

  • Park, Byoung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.189-196
    • /
    • 2011
  • The main issues of the researches are monitoring environment such as weather or temperature variation and natural accident, and sensor gateways which have mobile device, applications for mobile health care. In this paper, we propose the SFMS(Smart Factory Management System) that can effectively monitor and manage a green smart factory area based on M2M service and smart phone with android OS platform. The proposed system is performed based on the TinyOS-based IEEE 802.15.4 protocol stack. To validate system functionality, we built sensor network environments where were equipped with four application sensors such as Temp/Hum, PIR, door, and camera sensor. We also built and tested the SFMS system to provide a novel model for event detection systems with smart phone.

The Performance Evaluation of an ATM Switch supporting AAL Type 2 cell Switching and The FPGA Implementation of AAL Type 2 Switch Module (AAL 유형 2 셀 스위칭을 지원하는 ATM 스위치의 성능 평가 및 AAL 유형 2 스위치 모듈의 FPGA 구현)

  • Sonh Seung-il
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.45-56
    • /
    • 2004
  • In this paper, we propose ATM switch architecture including ALL type 2 switch which can efficiently transmit low-bit rate data, even if the network has many endpoints. We simulate the architecture of ATM switch fabric that is modeled in computer program and analyze the performance according to offered loads. ATM switch proposed in this paper can support cell switching for all types of m cells which consist of ALL type 1. ALL type 2, ALL type 3/4 and ALL type 5 cells. We propose two switch fabric methods; One supports the ALL type 2 cell processing per input port, the other global ALL type 2 cell processing for every input port. The simulation results show that the latter is superior to the former. But the former has a merit for easy implementation and extensibility. In this paper, the AAL Type 2 switch module which adapts the former method is designed using VHDL language and implemented in FPGA chip. The designed AAL Type 2 switch module operates at 52MHz. The proposed ATM switch fabric is widely applicable to mobile communication, narrow band services over ATM network and wireless ATM as well as general ATM switching fabric.

  • PDF

Design of a Secure Session Key Exchange Method for tow Latency Handoffs (Low Latency Handoffs를 위한 안전한 세션 키 교환 기법 설계)

  • Kim Hyun-Gon;Park Chee-Hang
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.25-33
    • /
    • 2004
  • Mobile IP Low Latency Handoffs(l) allow greater support for real-time services on a Mobile IP network by minimizing the period of time when a mobile node is unable to send or receive IP packets due to the delay in the Mobile IP Registration process. However, on Mobile IP network with AAA servers that are capable of performing Authentication, Authorization, and Accounting(AAA) services, every Registration has to be traversed to the home network to achieve new session keys, that are distributed by home AAA server, for a new Mobile IP session. This communication delay is the time taken to re-authentication the mobile node and to traverse between foreign and home network even if the mobile node has been previously authorized to old foreign agent. In order to reduce these extra time overheads, we present a method that performs Low Latency Handoffs without requiring further involvement by home AAA server. The method re-uses the previously assigned session keys. To provide confidentiality and integrity of session keys in the phase of key exchange between agents, it uses a key sharing method by gateway foreign agent that performs a trusted thirty party. The proposed method allows the mobile node to perform Low Latency Handoffs with fast as well as secure operation.

  • PDF

Performance improvement for Streaming of High Capacity Panoramic Video (대용량 파노라마 비디오 스트리밍의 성능개선)

  • Kim, Young-Back;Kim, Tae-Ho;Lee, Dae-Gyu;Kim, Jae-Joon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.143-153
    • /
    • 2010
  • When providing high quality panoramic video across the Internet, mobile communications, and broadcasting areas, it requires a suitable video codec that satisfies both high-compression efficiency and random access functionality. The users must have high-compression efficiency in order to enable video streaming of high-volume panoramic data. Random access allows the user to move the viewpoint and direction freely. In this paper, we propose the parallel processing scheme under cell units in order to improve the performance of streaming service for large screen panoramic video in 10Mbps bandwidths based on H.264/AVC with high compression rate. This improved algorithm divides a screen composed of cells less than $256{\times}256$ in size, encodes it, and decodes it with the cells in the present view. At this point, encoding/decoding is parallel processed by the present cell units. Also, since the cells only included in the present view are packed and transmitted, the possible processing of not extricating blocks is proven by experiment.

Collision Avoidance Beamforming for Mitigating Inter-cell Interference in Cooperative Wireless Communication Systems (순방향 셀 간 간섭 억제를 위한 충돌 회피 빔성형 기법)

  • Mun, Cheol;Jung, Chang-Kyoo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.10
    • /
    • pp.1173-1179
    • /
    • 2012
  • In this paper, collision avoidance beamforming(CA-BF) technology is proposed to mitigate inter-cell interference in cooperative wireless communications system with limited feedback. Each acess terminal(AT) selects both the best BF weight vector for a serving base transceiver station(BTS) and the most interfering BF weight vectors of interfering BTSs within a cluster, and sends it back to a cluster scheduler. At the cluster scheduler, a set of transmit BF weights of BTSs and the corresponding scheduled ATs are jointly determined to avoid collision among beams formed by BTSs within a cluster, which enhances system throughput by mitigating inter-cell interference. It is shown that the proposed CA-BF outperforms existing non-coordinated BF schemes in terms of the average system throughput.