• Title/Summary/Keyword: All-IP

Search Result 614, Processing Time 0.021 seconds

Study on Mobile Multicast Support over Mobile IPv6 Networks (Mobile IPv6 망에서 이동 멀티캐스트 지원 방안에 관한 연구)

  • 변태영;김성희
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1187-1193
    • /
    • 2003
  • The interest for IPv6, which is next generation IP, increases, while the difficulty for adopting it into IT industries also increases too. We also expect that Internet technologies develop on basis of All-IP networks, which include various heterogeneous networks. Therefore, it is necessary for network to support mobility and multicast capability to create applications with wide-variety. In this paper, we propose a new mobile multicasting protocol called Mobile IPv6 Multicast Protocol(MIMP). The proposed scheme satisfies no packet losses from roaming and optimal routing efficiency.

Providing QoS in the Internet using Dynamic Node Setting Method (동적 노드 설정을 이용한 인터넷상의 QoS 제공)

  • 김중규
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.400-406
    • /
    • 2002
  • Historically, IP-based internets have been able to provide a simple best-effort delivery service to all applications they carry. Best effort treats all packets equally, with no service level, packet loss, and delay. The best-effort style has generally worked fine. But the needs of users have changed. The want to use the new real-time, multimedia, and multicasting applications. Thus, there is a strong need to be able to support a variety of traffic with a variety of quality-of-service requirements, within the TCP/IP architecture. This paper propose a framework that offers QoS in a DS domain using dynamic node setting method.

  • PDF

Providing QoS in the Internet using Dynamic Node Setting Method (동적 노드 설정을 이용한 인터넷상의 QoS 제공)

  • 김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.400-406
    • /
    • 2002
  • Historically, IP-based internets have been able to provide a simple best-effort delivery service to all applications they carry. Best effort treats all packets equally, with no service level, packet loss, and delay. The best-effort style has generally worked One. But the needs of users have changed. The want to use the new real-time multimedia, and multicasting applications. Thus, there is a strong need to be able to support a variety of traffic with a variety of quality-or-service requirements, within the TCP/IP architecture. This paper propose a framework that offers QoS in a DS domain using dynamic node setting method.

  • PDF

Cost-Effective and Distributed Mobility Management Scheme in Sensor-Based PMIPv6 Networks with SPIG Support (센서기반 프록시 모바일 IPv6 네트워크에서 SPIG를 이용한 비용효과적인 분산 이동성관리 기법)

  • Jang, Soon-Ho;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.211-221
    • /
    • 2012
  • The development of wireless sensor networks (WSNs) is progressed slowly due to limited resources, but it is in progress to the development of the latest IP-based IP-WSN by the development of hardware and power management technology. IPv6 over Low power WPAN (6LoWPAN) is capable of IPv6-built low-power devices. In these IP-based WSNs, existing IP-based techniques which was impossible in WSNs becomes possible. 6LoWPAN is based on the IEEE 802.15.4 sensor networks and is a IPv6-supported technology. Host-based mobility management scheme in IP-WSNs are not suitable due to the additional signaling, network-based mobility management scheme is more suitable. In this paper, we propose an enhanced PMIPv6-based route optimization scheme which consider multi-6LoWPAN network environments. All SLMA (Sensor Local Mobility Anchor) of the 6LoWPAN domain are connected with the SPIG (Sensor Proxy Internetworking Gateway) and performs distributed mobility control for the 6LoWPAN-based inter-domain operations. All information of SLMA in 6LoWPAN domain is maintained by SMAG (Sensor Mobile Access Gateway), and then is performed the route optimization quickly. The status information of the route optimization from SPIG is stored to SLMA and it is supported without additional signaling.

A Study on Trace-Back Method of Financial Network Using IP Marking Server (IP 마킹 서버를 활용한 금융 전산망 공격자 역추적 기술 연구)

  • Park, Keunho;Choi, Ken;Shon, TaeShik
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.129-139
    • /
    • 2017
  • With the advent of FinTech, many financial services have become available in the mobile Internet environment and recently, there is an internet bank that provides all bank services online. As the proportion of financial services over the Internet increases, it offers convenience to users, but at the same time, the threat of financial network is increasing. Financial institutions are investing heavily in security systems in case of an intrusion. However attacks by hackers are getting more sophisticated and difficult to cope with. However, applying an IP Trace-back method that can detect the actual location of an attacker to a financial network can prepare for an attacker's arrest and additional attacks. In this paper, we investigate IP Trace-back technology that can detect the actual location of attacker and analyze it to apply it to financial network. And we propose a new IP Trace-back method through Infra-structure construction through simulation experiments.

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.

The prosodic characters of particles in Korean -- focusing on the read speech -- (한국어 조사의 운율적 특성 - 낭독체 문장을 중심으로-)

  • Jun Eun;Lee Sook-hyang
    • MALSORI
    • /
    • no.37
    • /
    • pp.73-85
    • /
    • 1999
  • The prosodic characteristics of Korean particles in read speech were examined in this paper based on K-ToBI labeling system in order to see whether they are prosodically weak form like functions words in English. Acoustic measurements and statistical analysis were done focusing on the distribution of particles over a variety of prosodic positions, prosodic positional effects on the phonetic realization of particles, and acoustic strength of particles compared to those of their surrounding syllables. The panicles were distributed rather equally over all 4 prosodic positions with the highest frequency at IP-medial/AP-final position and the lowest at IP-medial/AP-medial position except that topic marker 'Un/nUn' showed preference for IP-final/AP-final position. There was a significant prosodic positional effect on the duration and F0 of the particles. Duration was the longest at IP-final/AP-final position and interestingly, at IP-medial/AP-medial position while F0 was the highest at IP-final/AP-medial Position as expected. The comparison of the acoustic properties of the particles with those of neighbor syllables showed that duration was generally significantly longer and energy also showed larger values, if not significant, in particles suggesting that the particles in Korean are not prosodically weaker like function words in English.

  • PDF

Comparison and Analysis of Mobility Support Schemes for NGN standardization plan (차세대 네트워크 표준화 방안에서의 이동성 기술 비교 분석)

  • Yu, Myoung-Ju;Lee, Jong-Min;Kim, Hyun-Jong;Jeong, Tae-Soo;Choi, Seong-Gon
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.659-668
    • /
    • 2006
  • Various schemes for mobility support are currently proposed in NGN. However the performance comparison of all existing schemes is not relatively examined as yet. Therefore, in this paper, we investigate the location registration and handover procedure of MIPv6, IP2, Q.MMF, IMS, compare and analyze the location registration time and cost and handover latency time using various performance parameters and simulation for the performance analysis. As a result of analysis, when Location Manager locates in the center of core network, IP2 showed better performance than other schemes.

Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts (신뢰 호스트 상호 협력을 통한 IP 스푸핑 공격의 효율적 탐지 및 방어 모델 설계)

  • Lee, Hae-Dong;Ha, Hyeon-Tae;Baek, Hyun-Chul;Kim, Chang-Gun;Kim, Sang-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2649-2656
    • /
    • 2012
  • Today, many enterprises have invested heavily for the part of information security in order to protect the internal critical information assets and the business agility. However, there is a big problem that big budget and too many manpower are needed to set the internal corporate network up to the same high level of defense for all of part. On the distributed enterprise networks in this paper, a defense model for effective and rapid response on the IP spoofing attack was designed to protect the enterprise network through the exchange of information between the trust hosts when an attacker attacked any target system using other trusted host.