• Title/Summary/Keyword: 4S 통신망

Search Result 188, Processing Time 0.027 seconds

A Study on the Efficient Label Management Methods in High-Speed IP Switching Networks (고속 IP 교환망에서 효율적인 레이블 관리 방식에 관한 연구)

  • Shim, Jae-Hun;Chang, Hoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.527-538
    • /
    • 2004
  • In this paper, we present the flow aggregation method and the FLTC(flow lasting time control) algorithm to reduce the number of flows and solve the scalability problem in high speed IP switching networks. The flow aggregation based on the destination address could reduce the total number of flows, improve the label efficiency, and increase the total amount of the switched packets. The FLTC algorithm also eliminates the waste of label by deleting the flow binding efficiently. With the traces of real Internet traffics, we evaluate the performance of these schemes by simulation. The label efficiency, the average number of label used, and the percentage of packets switched and the number of packets switched are used as performance measures for this simulation.

Channel Allocation Using Mobile Mobility and Neural Net Spectrum Hole Prediction in Cellular-Based Wireless Cognitive Radio Networks (셀룰러 기반 무선 인지망에서 모바일 이동성과 신경망 스펙트럼 홀 예측에 의한 채널할당)

  • Lee, Jin-yi
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.4
    • /
    • pp.347-352
    • /
    • 2017
  • In this paper, we propose a method that reduces mobile user's handover call dropping probability by using cognitive radio technology(CR) in cellular - based wireless cognitive radio networks. The proposed method predicts a cell to visit by Ziv-Lempel algorithm, and then supports mobile user with prediction of spectrum holes based on CR technology when allocated channels are short in the cell. We make neural network predict spectrum hole resources, and make handover calls use the resources before initial calls. Simulation results show CR technology has the capability to reduce mobile user handover call dropping probability in cellular mobile communication networks.

A Study on the Insurance programs using UTIS System(II) (UTIS 통신망을 활용한 보험상품 개발에 관한 연구(II))

  • Lim, Pil-Sub;Im, Yo-Wung;Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.4
    • /
    • pp.483-490
    • /
    • 2015
  • In this paper, The UBI(: Usage Based Insurance) insurance products for existing and analyze a variety of data pertaining to the operation or disposition or utilization of advanced telematics devices, such as digital recording device operates as a means to identify the insured or the insurer operates in real time recording (monitoring). Therefore, this study performs a city in wireless communication infrastructure functions Traffic Information System : leverage(UTIS : Urban Traffic Information System) and to develop a system that linked insurance products, such as PAYD, PHYD and MHYD. Utilizing the UTIS systems and analyze the driver's vehicle driving recorder tendencies.

An Architecture Supporting Emergency Services in WiBro Networks (와이브로 망에서 긴급 서비스 지원을 위한 구조)

  • Lee, Kye-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.51-56
    • /
    • 2011
  • WiBro network technologies developed mainly by Korea are one of very promising 4G technologies. WiBro has been standardized as international standard called Mobile WiMAX, and has been deployed in many countries. Emergency Services in WiBro networks are infrastructure services and will be very essential to induce subscribers from other types of networks. This paper proposes a network architecture for supporting emergency services for WiBro mobile VoIP networks. The proposed architecture is based on WMF's architecture for international compatibilities, and reflects national considerations on interfacing PSAP for domestic compatibilities.

Design and Implementation of a M-commerce Content Provider System by Extracting the Internet Product Information (인터넷 상품정보 추출을 통한 M-commerce 콘텐츠 제공자 시스템의 설계 및 구현)

  • Ha, Sang-Ho
    • The KIPS Transactions:PartA
    • /
    • v.19A no.4
    • /
    • pp.195-204
    • /
    • 2012
  • M-commerce services are rapidly emerging with recent advances in mobile devices and wireless communications. Internet Shopping mall managers provide mobile phone users with their mobile shopping malls for m-commerce. However, these mobile shopping malls usually have their own sites which are not compatible with their Internet shopping malls, thus resulting in inefficiency to manage the two kinds of shopping malls. In this paper, we develop a M-commerce content provider system to effectively bring Internet shopping malls to mobile phones by extracting items only concerned to users from product documents. We then apply and evaluate the system over a specific internet shopping mall site. The results show that the system reduces considerably the amount of data transferred to user's mobile phones compared with using general web browsers.

An Architecture Supporting Emergency Service in WiBro Mobile VoIP Networks (와이브로 모바일 VoIP에서 긴급 서비스 지원을 위한 구조)

  • Lee, Kye-Sang;Lee, Il-Jin;Kang, Sin-Gak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.414-416
    • /
    • 2010
  • WiBro network technologies developed mainly by Korea are one of very promising 4G technologies. WiBro has been standardized as international standard called Mobile WiMAX, and has been deployed in many countries. Emergency Services are infrastructural servicesa and very essential to induce subscribers from other types of networks. This paper propose a network architecture for supporting emergency services for mobile VoIP services in WiBro networks. The proposed architecture is based on WMF's architecture for internationa compatibilities, and reflects national considerations on interfacing PSAP for domestic compatibilities.

  • PDF

Yi et al.'s Group Key Exchange Protocol : A Security Vulnerability and its Remediation (Yi등이 제안한 그룹 키 교환 프로토콜의 보안 취약성 및 개선 방법)

  • Lee, Young-Sook;Kim, Jee-Yeon;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.91-98
    • /
    • 2012
  • A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secure multicast channel. Among the many protocols is Yi et al.'s password-based GKE protocol in which each participant is assumed to hold their individual password registered with a trusted server. A fundamental requirement for password-based key exchange is security against off-line dictionary attacks. However, Yi et al.'s protocol fails to meet the requirement. In this paper, we report this security problem with Yi et al.'s protocol and show how to solve it.

A Study on the Navigation Data Transmission-Management System of a Small Vessel (소형선박의 항행정보 전송관리시스템에 대한 연구)

  • 조학현;최조천;최병하;김기문
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.191-200
    • /
    • 2000
  • The marine accident is being highlighted as a serious worldwide problem for the guard station of human safety and the protection of marine environment pollution. Especially, the GMDSS is operated as a international rule for the safety of a large scale ship, but the small size ship's management is required a adaptive national rule because of the complex condition of national circumstance. This study is motivated to develop a ship's position tracking system combined with GPS information for VTS and control the ship navigation, velocity and longitude etc.. In Part of Navigation Data Transmission is GPS data transmission whih ship's ID using microprocessor and TX speed translation for flexibility with 4800∼2400 [bps]. Results show that the our system for data transmission using microprocessor is useful tool in maritime transmission as SSB used the main TX method of small ship and has a cost competitive power. Therefore, we will expected cost and technical competitive power compared to AIS. But those systems are still remained the unsolved problem for protection from marine accident.. Finally, we examined the semi-actual receiving state on simulated sailing in the around sea of Mok-Po harbor.

  • PDF

The Detection of Signaling Dos on 4G LTE Cellular Network (4G LTE 이동통신망에서의 시그널링 DoS 탐지 기술)

  • Jang, Woung;Kim, Se-Kwon;Oh, Joo-Hyung;Im, Chae-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.146-149
    • /
    • 2013
  • For in recently years, global cellular network service is changing rapidly to 4G. However, the fast introducing of 4G has been going with not enough research about security threat, it could be many kind of vulnerability. Therefore the research about security threat on 4G network is ongoing in external countries, but not sufficient in domestic. particularly in domestic situation of rapidly increased subscribers, The security threats which are hindering stability and usability could make a fatal effect on many users. 4G network should be considered about the feature of mobile network to protect 4G network stable. Mobile network has limited radio resources, it releases the radio resource which is not used in selected time and reallocate when detected the data transmission. Many signaling messages are transferred in the network entities to allocate or release the radio resource. In this paper, it will be introduced the technology to detect signaling DoS traffic hindering the stability and usability of network entities managing the radio resources by huge signaling message from the repetitive wireless connection/release message.

  • PDF

Design of Intrustion Prevention System(IPS) in Linux Environment (리눅스 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.1-7
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing Power. while in Previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, Political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF