• Title/Summary/Keyword: All-IP

Search Result 617, Processing Time 0.028 seconds

Flow Handover Management Scheme based on QoS in SDN Considering IoT (IoT를 고려한 SDN에서 QoS 기반 플로우 핸드오버 관리 방법)

  • Kyung, Yeun-Woong;Kim, Tae-Kook
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.45-50
    • /
    • 2020
  • In this paper, we propose a QoS-based handover management scheme in SDN. Even though there have been lots of recent services such as IoT, the conventional networks provide a monolitic handover method without considerations on flow-specific QoS features. For example, the conventional Internet provides a handover method which only considers IP continuity. On the other hand, 4G and 5G networks use a strict handover method for all kinds of flows with resource reservations. This means that it is difficult to guarantee the QoS requirements for the flow with a strict QoS requirement in Internet and the inefficient resource utilization can occur in the 4G and 5G because of the strict QoS-based handover management. The proposed scheme proposes the flow handover management scheme based on QoS requirements according to the SDN controller's management. From the network operators' perspective, the proposed scheme can provide the efficient resource utilization as well as QoS provisioning.

Design and Implementation of Wireless Lighting LED Controller using Modbus TCP for a Ship (Modbus TCP를 이용한 선박용 무선 LED 제어기의 설계 및 구현)

  • Jeong, Jeong-Soo;Lee, Sang-Bae
    • Journal of Navigation and Port Research
    • /
    • v.41 no.6
    • /
    • pp.395-400
    • /
    • 2017
  • As a serial communications protocol, Modbus has become a practically standard communication protocol and is now a commonly available means of connecting industrial electronic devices. Therefore, all devices can be connected using the Modbus protocol with the measurement and remote control on ships, buildings, trains, airplanes and more. The existing Modbus that has been used is based on serial communication. Modbus TCP uses Ethernet communication based on TCP / IP which is the most widely used Internet protocol today; so, it is faster than serial communication and can be connected to the Internet of Things. In this paper, we designed an algorithm to control LED lighting in a wireless Wi-Fi environment using the Modbus TCP communication protocol, and designed and implemented a LED controller circuit that can check external environmental factors and control remotely through the integrated management system of a ship. Temperature, humidity, current and illuminance values, which are external environmental factors, are received by the controller through the sensors, and these values are communicated to the ship's integrated management system via the Modbus protocol. The Modbus can be connected to Master devices via TCP communication to monitor temperature, humidity, current, illuminance status and LED output values, and also users can change the RGB value remotely in order to change to the desired color. In addition, in order to confirm the implementation of the controller, we developed a simulated ship management system to monitor the temperature, humidity, current and illumination conditions, and change the LED color of the controller by changing the RGB value remotely.

Analysis of VoLTE Charge Reduction under VoLTE Growth (VoLTE 활성화에 따른 요금 인하 여력 분석)

  • Lee, Sang-Woo;Jeong, Seon-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.92-100
    • /
    • 2016
  • It is informed that the Voice over LTE(VoLTE) which serves voice and message on IP networks is better in terms of economies of scale than the legacy voice service on 2G/3G circuit-switched networks because of its technological and cost efficiency. In addition, services of voice and data are running on a single LTE network and as a result VoLTE has the more economies of scope. But, there is no study about how much technology-efficiency VoLTE has compared to circuit-based voice service and how much voice charge can be reduced as VoLTE grows up. This paper analyzes empirically cost-efficiency of VoLTE against circuit-based voice service and quantifies the reduction of voice charge as 2G/3G voice traffic shifts to VoLTE. The results describe the first is that the average cost of the total voice traffic rises shortly just after the investment of LTE network for providing VoLTE but it will soon have a capacity available to reduce the charge due to VoLTE's outstanding cost efficiency on the assumption that voice traffic is fixed, and the second is that the charge can be cut to 60% of the current rate in case of all the voice traffic moves to VoLTE. The latter proves partially the validation of data-focusing pricing plan. Our results are expected to become basic data for network operators' establishing pricing strategies and for policy makers' inducing price cutting.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

A Study of Carry Over Contamination in Chematology (이월오염에 대한 연구)

  • Chang, Sang-Wu;Kim, Nam-Yong;Lyu, Jae-Gi;Jung, Dong-Jin;Kim, Gi-You;Park, Yong-Won;Chu, Kyung-Bok
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.37 no.3
    • /
    • pp.178-184
    • /
    • 2005
  • Carry over contamination has been reduced in some systems by flushing the internal and external surfaces of the sample probe with copious amount of diluent. It between specimens should be kept as small as possible. A built-in, continuous-flow wash reservoir, which allows the simultaneous washing of the interior and exterior of the syringe needles, addresses this issue. In addition, residual contamination can further be prevented through the use of efficient needle rinsing procedures. In discrete systems with disposable reaction vessels and measuring cuvets, any carry over is entirely caused by the pipetting system. In analyzers with reuseable cuvets or flow cells, carry over may arise at every point through which high samples pass sequentially. Therefore, disposable sample probe tips can eliminate both the contamination of one sample by another inside the probe and the carry over of in specimen into the specimen in the cup. The results of the applicative carry over experiment studied on 21 items for total protein (TP), albumin (ALB), total bilirubin (TB), alkaline phosphatase (ALP), aspratate aminotranferase (AST), alanine aminotranferase (ALT), gamma glutamyl transferase (GGT), creatinine kinase (CK), lactic dehydrogenase (LD), creatnine (CRE), blood urea nitrogen (BUN), uric acid (UA), total cholesterol (TC), triglyceride (TG), glucose (GLU), amylase (AMY), calcium (CA), inorganic phosphorus (IP), sodium (Na), potassium (K), chloride (CL) tests in chematology were as follows. Evaluation of process performance less than 1% in all tests was very good, but a percentage of ALB, TP, TB, ALP, CRE, UA, TC, GLU, AMY, IP, K, Na, and CL was 0%, implying no carry over. Other tests were ALT(-0.08%), GGT(-0.09%), CK(0.08%), LD(0.06%), BUN(0.12%), TG (-0.06%), and CA(0.89%).

  • PDF

Design and Implementation of Packet Filtering System for IPv4/IPv6 Tunneling Environment (IPv4/IPv6 터널링 환경에 적합한 패킷 필터링 기능 설계 및 구현)

  • Heo, Seok-Yeol;Lee, Wan-Jik;Kim, Kyung-Jun;Jeong, Sang-Jin;Shin, Myung-Ki;Kim, Hyoung-Jun;Han, Ki-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.6
    • /
    • pp.407-419
    • /
    • 2006
  • As substituting IPv6 network for all IPv4 network in a short time seems unattainable due to high cost and technical limitation, IPv4 and IPv6 are expected to coexist for a certain period of time. Under the co]existing environment of IPv4 and IPv6, interworking brings a number of extra security considerations even if it may have no security problem for each protocol respectively. Thus, the analysis and solutions for those various attacks toward IPv4/IPv6 interworking-related security are inevitably required for the sake of effective transition and settlement to IPv6. In this paper we carried out a proper rule of packet filtering for IPv6-in-IPv4 tunneling interworking environment to protect the IPv4/IPv6 interworking-related security attacks. Design and implementation of the packet filtering system suitable for IPv4/IPv6 tunneling environment in the form of Linux netfilter and ip6tables are also shown. Thru this study, the packet filtering system was found operating correctly ill the tunneling mechanism.

An Efficient AP Channel Scanning Scheme for Real-time VoIP Streaming in Wireless LAN (WLAN 기반 실시간 VoIP Streaming을 위한 효율적 채널 스캐닝 기법)

  • Cheon, Young-Chang;Youn, Hee-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.595-598
    • /
    • 2014
  • In order to provide the Mobile Stations operating in IEEE 802.11 Wireless LAN network with seamless handover, a comprehensive study on the functions of handover considering various networking environments and characteristics of Mobile Stations is required. Note that the channel scan process finding a new AP takes the major portion of handover time, and this is the most significant issue with seamless handover for real-time multimedia service in WLAN environment. In this paper the functions required to provide seamless handover in IEEE 802.11 WLAN network are identified, and a new scanning technique is proposed with which the Mobile Stations can selectively scan the channels to reduce the channel scan time in various network environments. Here each Mobile Station awares of the channels the neighbor APs are using by scanning them in advance according to the proposed technique. Afterwards, when handover is actually required, the optimal AP is decided quickly by scanning only the predetemined group of channels and order of scan without unnecessary scan of all the channels. In addition, proposes to enter the Scan Trigger Value and Handover Threshold Value in mobile phones in order to prevent the phenomenon can not handover.

  • PDF

The Development of 1G-PON Reach Extender based on Wavelength Division Multiplexing for Reduction of Optical Core (국사 광역화와 광코어 절감을 위한 파장분할다중 기반의 1기가급 수동 광가입자망 Reach Extender 효율 극대화 기술 개발)

  • Lee, Kyu-Man;Kwon, Taek-Won
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.229-235
    • /
    • 2019
  • As the demand for broadband multimedia including the Internet explosively increases, the advancement of the subscriber network is becoming the biggest issue in the telecommunication industry due to the surge of data traffic caused by the emergence of new services such as smart phone, IPTV, VoIP, VOD and cloud services. In this paper, we have developed WDM(Wavelength Division Multiplexing)-PON(passive optical network) based on the 1-Gigabit Reach Externder (RE) technique to reduce optical core. Particularly, in order to strengthen the market competitiveness, we considered low cost, miniaturization, integration technique, and low power of optical parts. In addition, we have developed a batch system by integrating all techniques for reliability, remote management through the development of transmission distance extension and development of capacity increase of optical line by using RE technology in existing PON network. Based on system interworking with existing commercial 1G PON devices, it can be worthy of achievement of wide nationalization and optical core reduction by using this developed system. Based on these results, we are studying development of 10G PON technology.

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

Performance Analysis of DoS/DDoS Attack Detection Algorithms using Different False Alarm Rates (False Alarm Rate 변화에 따른 DoS/DDoS 탐지 알고리즘의 성능 분석)

  • Jang, Beom-Soo;Lee, Joo-Young;Jung, Jae-Il
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.139-149
    • /
    • 2010
  • Internet was designed for network scalability and best-effort service which makes all hosts connected to Internet to be vulnerable against attack. Many papers have been proposed about attack detection algorithms against the attack using IP spoofing and DoS/DDoS attack. Purpose of DoS/DDoS attack is achieved in short period after the attack begins. Therefore, DoS/DDoS attack should be detected as soon as possible. Attack detection algorithms using false alarm rates consist of the false negative rate and the false positive rate. Moreover, they are important metrics to evaluate the attack detections. In this paper, we analyze the performance of the attack detection algorithms using the impact of false negative rate and false positive rate variation to the normal traffic and the attack traffic by simulations. As the result of this, we find that the number of passed attack packets is in the proportion to the false negative rate and the number of passed normal packets is in the inverse proportion to the false positive rate. We also analyze the limits of attack detection due to the relation between the false negative rate and the false positive rate. Finally, we propose a solution to minimize the limits of attack detection algorithms by defining the network state using the ratio between the number of packets classified as attack packets and the number of packets classified as normal packets. We find the performance of attack detection algorithm is improved by passing the packets classified as attacks.