• Title/Summary/Keyword: 호네트

Search Result 852, Processing Time 0.024 seconds

Transmission System of TDM signal based on E-PON (E-PON 기반 TDM 신호 전송 시스템)

  • Kwon, Jeong-Gook;Jin, Geol;Park, Chun-Kwan;Song, Han-Young;Jeon, Byung-Chun;Lee, Sang-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.12
    • /
    • pp.63-72
    • /
    • 2007
  • This paper addresses the system development that can transfer data and TDM signals simultaneously by adding TDM pseudowires functions to E-PON system. E-PON technology is one of many technologies which can realize FTTH, has raised as next generation access network solution having both low-cost Ethernet technology and optical infrastructure. TDM pseudowires service is the new voice/data conversion technology which can transfer the existing TDM circuit switched voice and data over packet switching network. In this paper, this system can provide both data and TDM service without deteriorating QoS by adding TDM pseudowires service module to E-PON, and then implementing QoS control function. Therefore, the competitive system which can transfer both data and TDM signal, can be installed.

Energy-Efficient Clustering Scheme using Candidates Nodes of Cluster Head (클러스터헤더 후보노드를 이용한 에너지 효율적인 클러스터링 방법)

  • Cho, Young-Bok;Kim, Kwang-Deuk;You, Mi-Kyeong;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.121-129
    • /
    • 2011
  • One of the major challenges of minimum energy consumption for wireless sensor networks(WSN) environment. LEACH protocol is hierarchical routing protocol that obtains energy efficiency by using clustering. However, LEACH protocol in each round, because the new cluster configuration, cluster configuration, whenever the energy consumed shorten the life of the network. Therefore in this paper, the cluster is formed in WSN environment in early stage and the problems with energy waste have been solved by selecting C-node. In the initial round of proposed model uses 26 percent more than traditional LEACH energy consumption. However, as the round is ongoing, it has been proved by the network simulation tool that the waste of energy could be diminished up to 35%.

Mutual Authentication Protocol for Preserving Privacy of Mobile RFID User using Random Key Division (랜덤 키 분할을 이용한 모바일 RFID 사용자의 프라이버시를 보호하는 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.220-230
    • /
    • 2011
  • Mobile RFID which integrates mobile network with RFID technique is the technique to get the information of products by transmitting the identifier through mobile network after reading the identifier of RFID tag. It attached on the equipment as the mobile phone. However, mobile RFID has the privacy-related problem among requested secure problems required from the existing RFID. In this paper, the random key created by mobile RFID reader and Tag during the inter-certificating and initialization procedure for mobile RFID users to receive tag information from backend server securely is divided into random sizes and any information on the tag which requires the protection of privacy shouldn't be provided to anyone. In performance analysis, previous protocol used modulo operation in registration and login computation. But the proposed protocol has higher efficiency in saving space and computation volume than MARP scheme and Kim. et. al scheme because our protocol is accomplished by mutual authentication and registering user information through one-way hash function.

A Dynamic Synchronization Method for Multimedia Delivery and Presentation based on QoS (QoS를 이용한 동적 멀티미디어 전송 및 프리젠테이션 동기화 기법)

  • 나인호;양해권;고남영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.1 no.2
    • /
    • pp.145-158
    • /
    • 1997
  • Method for synchronizing multimedia data is needed to support continuous transmission of multimedia data through a network in a bounded time and it also required for supporting continuous presentation of multimedia data with the required norminal playout rate in distributed network environments. This paper describes a new synchronization method for supporting delay-sensitive multimedia Presentation without degration of Quality of services of multimedia application. It mainly aims to support both intermedia and intermedia synchronization by absorbing network variations which may cause skew or jitter. In order to remove asynchonization problems, we make use of logical time system, dynamic buffer control method, and adjusting synchronization intervals based on the quality of services of a multimedia. It might be more suitable for working on distribute[1 multimedia systems where the network delay variation is changed from time to time and no global clock is supported. And it also can effectively reduce the amount of buffer requirements needed for transfering multimedia data between source and destination system by adjusting synchronization intervals with acceptable packet delay limits and packet loss rates.

  • PDF

An Efficient Location Management Scheme based on Individual and Group Location Managements with Different Sized Location Areas in Mobile Communication Networks (이동통신 네트워크에서 서로 다른 크기의 위치 영역을 가지는 개별 및 그룹 위치 관리에 기반한 효과적인 위치 관리 기법)

  • Chung, Yun-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1B
    • /
    • pp.1-7
    • /
    • 2008
  • In group location management, when a transportation system(TS) with multiple mobile subscribers(MSs) changes location area(LA), location management is performed by group location registration by TS, instead of individual location registrations by MSs. In previous works, although it is assumed that LA in group location management is the same as that in individual location management, it is not appropriate to assume the same sized LAs since MSs in a TS have different characteristics from MSs which are not in a TS from the aspect of the speed and aggregate call arrival rates. Thus, in this paper, we propose an efficient location management scheme based on individual and group location managements with different sized LAs, and the performance of the proposed scheme is analyzed from the aspect of signaling cost at the wireless interface. Results reveal that the proposed scheme outperforms the conventional scheme by selecting an appropriate sized LA for group location management.

A Cluster-Based Top-k Query Processing Algorithm in Wireless Sensor Networks (무선 센서 네트워크에서 클러스터 기반의 Top-k 질의 처리)

  • Yeo, Myung-Ho;Seong, Dong-Ook;Yoo, Jae-Soo
    • Journal of KIISE:Databases
    • /
    • v.36 no.4
    • /
    • pp.306-313
    • /
    • 2009
  • Top-k queries are issued to find out the highest (or lowest) readings in many sensor applications. Many top-k query processing algorithms are proposed to reduce energy consumption; FILA installs a filter at each sensor node and suppress unnecessary sensor updates; PRIM allots priorities to sensor nodes and collects the minimal number of sensor reading according to the priorities. However, if many sensor reading converge into the same range of sensor values, it leads to a problem that many false positives are occurred. In this paper, we propose a cluster-based approach to reduce them effectively. Our proposed algorithm operates in two phases: top-k query processing in the cluster level and top-k query processing in the tree level. False positives are effectively filtered out in each level. Performance evaluations show that our proposed algorithm reduces about 70% false positives and achieves about 105% better performance than the existing top-k algorithms in terms of the network lifetime.

Network topology automatic configuration and remote fault diagnosis system (네트워크 토폴로지 자동 구성 및 원격 장애진단 시스템)

  • Shim, Kyou-Chul;Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.548-556
    • /
    • 2018
  • NMS (Network Management System) is a system that is used for a small or large networks management. As the size of network becomes larger and the configuration information become complicated, it becomes more difficult to grasp the network status and it takes much time to diagnose the failure of the network equipment. In this paper, to alleviate the problems of NMS we implement web-based network topology automatically using JavaScript, Python, HTML5 based TWaver. The detailed implementation of the system include the automatic collection of the connection information based on the equipment information registered in the NMS system, the implementation of the web-based network topology and the remote fault diagnosis. In the network topology, we can expect to improve the quality of the NMS system through structured data management by adding the configuration management, fault management and performance management functions in a comprehensive manner.

Design of A Database Architecture for Hierarchical Security Policy Model (계층적 구조 보안 정책 모델을위한 데이터 베이스 구조 설계)

  • Yun, Yeo-Wung;Hwang, Yoon-Cheol;Um, Nam-Kyeong;Kim, Kwun-Woo;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.711-720
    • /
    • 2001
  • An enlarging a scale of logical domain organizing Internet, security policy association among entities become complicated. Establishment and control of security policies for each system is a hard problem to solve because of the environment and composite factors with variable properties. In this paper, to solve this actual problems, we orgainze a hierarchical structure of network and than we design the structure of database to apply security policies for secure communication. This enables efficient management of security data and association of security policy by using designed data structure between different domain in hierarchical structure with make secure communication possible.

  • PDF

A Study on Sharing the Remote Devices through USB over IP (USB/IP를 이용한 원격장치공유에 대한 연구)

  • Yoo, Jin-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4592-4596
    • /
    • 2010
  • This paper is related to the method for sharing some remote devices through USB/IP on the connected system environment. Sharing the remote devices is actually based on the connection technology using USB which is one way of access methods on virtualized server environment. The users who receive server computing unit might want to connect to remote allocated server with the local devices. We can solve the problem of the access methods related to the sharing devices through USB device emulation. This paper discusses the implementation of USB emulation which is based on personalized services on virtualized server environment. Like this, this paper will share devices on the level of USB device. This research can write to the device directly due to virtualizing the device level.

A Study on Cloud Computing for Detecting Cyber Attacks (사이버공격 탐지를 위한 클라우드 컴퓨팅 활용방안에 관한 연구)

  • Lee, Jun-Won;Cho, Jae-Ik;Lee, Seok-Jun;Won, Dong-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.816-822
    • /
    • 2013
  • In modern networks, data rate is getting faster and transferred data is extremely increased. At this point, the malicious codes are evolving to various types very fast, and the frequency of occurring new malicious code is very short. So, it is hard to collect/analyze data using general networks with the techniques like traditional intrusion detection or anormaly detection. In this paper, we collect and analyze the data more effectively with cloud environment than general simple networks. Also we analyze the malicious code which is similar to real network's malware, using botnet server/client includes DNS Spoofing attack.