• Title/Summary/Keyword: All-IP Network

Search Result 268, Processing Time 0.026 seconds

Vertical Handover between LTE and Wireless LAN Systems based on Common Radio Resource Management (CRRM) and Generic Link Layer (GLL) (LTE/WLAN 이종망 환경에서 범용링크계층과 통합무선자 원관리 기법이 적용된 VHO 방안 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Yoon, Suk-Ho;Ryu, Seung-Wan;Cho, Choong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.35-48
    • /
    • 2010
  • For the next generation mobile communication system, diverse wireless network techniques such as beyond 3G LTE, WiMAX/WiBro, and next generation WLAN etc. are proceeding to the form integrated into the All-IP core network. According to this development, Beyond 3G integrated into heterogeneous wireless access technologies must support the vertical handover and network to be used of several radio networks. However, unified management of each network is demanded since it is individually serviced. Therefore, in order to solve this problem this study is introducing the theory of Common Radio Resource Management (CRRM) based on Generic Link Layer (GLL). This study designs the structure and functions to support the vertical handover and propose the vertical handover algorithm of which policy-based and MCDM are composed between LTE and WLAN systems using GLL and CRRM. Finally, simulation results are presented to show the improved performance over the data throughput, handover success rate and the system service cost.

TCP Performance Analysis over Mobile ad-hoc Networks (모바일 ad-hoc 네트워크에서 TCP 성능 분석)

  • Nam, Ho-Seok;Cho, Sol;Lee, Tae-Hoon;Kim, Jun-Nyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.800-808
    • /
    • 2007
  • With the development of wireless data communication technology, all IP-based network will become compositions of wired and wireless networks. TCP is a connection-oriented, reliable transport protocol and has been used as de facto standard in most wired networks. Because TCP's congestion control algorithm could not distinguish congestion from BER, link failure and frequent route changes, TCP shows a poor performance over mobile ad-hoc networks. In this paper, the theoretical feature of TCP was studied and the performance of TCP over mobile ad-hoc networks was analyzed with ns2.

A Study on the Active Traceback Scheme Respond ing to a Security Incident (침해사고 대응을 위한 능동적 역추적 기법에 관한 연구)

  • Park Myung Chan;Park Young Shin;Choi Yong Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.27-34
    • /
    • 2005
  • Current security reinforcement systems are Passive defense system that only blocks filter to all traffic from the attacker. So, Those are weak re-attack and Stepping Stones attack because active response about attacker is lacking. Also, present techniques of traceback need much time and manpower by log information collection and trace through the personal inspection and active response is lacking. In this paper, We propose technique for TCP connection traceback that can apply in present internet and trace to inserted marking on IP header to correspond re-attack and Stepping Stones attack. Therefore, Proposed technique is unnecessary correction of existing network component and can reduce size of marked information and overhead of resources.

  • PDF

AAA System for PLMN-WLAN Internetworking

  • Janevski Toni
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.192-206
    • /
    • 2005
  • Integration of mobile networks and Internet has started with 2.5 generation of mobile cellular networks. Internet traffic is today dominant traffic type worldwide. The hanger for higher data rates needed for data traffic and new IP based services is essential in the development of future wireless networks. In such situation, even 3G with up to 2 Mbit/s has not provided data rates that are used by Internet users with fixed broadband dial-up or through wired local area networks. The solution to provide higher bit rates in wireless access network has been found in wireless LAN although initially it has been developed to extend wired LAN into wireless domain. In this paper, we propose and describe a solution created for interoperability between mobile cellular network and WLAN. The integration between two networks, cellular and WLAN, is performed on the authentication, authorization, and accounting, i.e., AAA side. For that purpose we developed WLAN access controller and WLAN AAA gateway, which provide gateway-type access control as well as charging and billing functionalities for the WLAN service. In the development process of these elements, we have considered current development stadium of all needed network entities and protocols. The provided solution provides cost-effective and easy-to-deploy PLMN-WLAN Internetworking scenario.

Design and Implementation of High-quality Video Service with Adaptive Transport for Multi-party Collaborative Environments (다자간 원격 협업을 위한 적응형 전송 기능을 가진 고화질 영상 서비스의 설계 및 구현)

  • Han, Sang-Woo;Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1B
    • /
    • pp.26-38
    • /
    • 2006
  • To construct seamless collaborative environments, what all participants intent should be delivered, and visual elements such gesture, facial expression, and ambiance should be shared with all participants. In this paper, we propose high-quality video service to support DV(digital video) and HDV(high-definition DV) based on Access Grid(AG) which is a prevalent collaborative system. The proposed service is designed for employing versatile media tools and codecs with SDP(session description protocol) and SAP(session announcement protocol). We also design network-adaptive video transmission module to mitigate the impact of network fluctuation. This periodically monitors multicast performance and controls frame rate on sender side considering network condition. The experimental results over the test bed show that proposed service enhances quality of AG video service and provides seamless high-quality video transport by mitigating the impact of network fluctuation.

Implementation of Multilateral Control System for Small UAV Control-Focused on Design (소형 무인기 통제를 위한 다자간 방식 관제시스템 구축방안-설계 중심으로)

  • Choi, Hyun-Taek;Kim, Seok-Kwan;Ryu, Gab-Sang
    • Smart Media Journal
    • /
    • v.6 no.4
    • /
    • pp.65-71
    • /
    • 2017
  • In this paper, we propose a design method for the construction of LTE-based small unmanned aerial vehicle control system to quickly and reliably collect multiple small unmanned aerial vehicle position information simultaneously flying all over the country. In particular, the main requirements are the network (N/W), hardware (H/ W), software(SW), Database(DB), development architecture, and business needs. To satisfy these requirements, N/W, H/W, SW, DB design, and architectural design plan were suggested regarding the design requirements of a small UAV system. To effectively control the small unmanned multi-party system in the system design, the architecture is divided into the front-end service area and the back-end service area according to the function and role of the unit system. In the front-end service area that grasps and controls the position and state of small unmanned aerial vehicles (UAVs), we have studied the design part that can be expanded to N through TCP/IP network by applying Client PC method.

A Study on the Authentication Model using Integrated Management Center (통합관리센터를 이용한 인증 모델에 관한 연구)

  • Jin, Kwang-Youn;Choi, Shin-Hyeong;Seo, Jang-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.576-583
    • /
    • 2010
  • U-City includes various information devices and network techniques, which connect among several information devices. Integrated Management Center, which is the core element of u-City, is designed to manage all services of u-City and carry out the control function for a city. Accordingly, u-City needs the methods of user authentication and security, so these methods must be implemented to integrated management center. This paper is devoted to describe some conventional authentication techniques, and authentication methods and procedures that may be available to u-City network context. Proposed u-City integrated authentication model assigns IP to only right user after authenticating information terminals and users in u-City and authorizes users according to the policy, so this model plays an important role for the security of integrated management center.

Logical view based Copy-Ahead technique for P2P IPTV (P2P IPTV 성능향상을 위한 논리 뷰 기반 Copy-Ahead기법)

  • Song, Young-Ho;Kwon, Taeck-Geun
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.7
    • /
    • pp.933-942
    • /
    • 2010
  • The convergence of the telecommunication industry through the combination of existing network technology and multimedia technology has brought along interactive data services in addition to the traditional broadcast services by providing direct connections between the users and the broadcasters. The interactive data service technology has developed a network which is able to fully support QoS and also a fast enough channel changing technology that is satisfactory to the user, are prerequisites for IPTV success, to provide satisfactory levels of service to exist users. However the current server-client system can't support all increasing needs of users. To overcome these limitations, P2P based IPTV service is currently under researched. Therefore, this thesis proposes a logical view based copy-ahead technique for P2P IPTV to improve the performance of IPTV system.

An Efficient MPLS Routing System for Supporting QoS and Best-Effort Services (QoS 서비스와 최선형 서비스를 위한 효율적인 MPLS 라우팅 시스템)

  • Jeon, Hahn-Earl;Kim, Sung-Dae;Shin, Yong-Chul;Lee, Jai-Yong;Kim, Hyung-Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.71-79
    • /
    • 2003
  • As the traffic grows rapidly in the Internet, the QoS guarantee of the flows and the traffic engineering problems have become very important issues. MPLS has more advantages to solve the problems than existing IP routing because of its use of multiple paths between the source and destination pairs Particularly, the availability of Constraint-based Shortest Path First(CSPF) algorithm and explicit route in MPLS made the problem referred above to be solved efficiently. However, the CSPF algorithm has the characteristic of selecting the shortest path of all paths which meet the traffics' QoS constraints Therefore, even though there are alternative paths to route traffic, alternate QoS paths may not be found and best-effort traffic will be dropped during congestion period In this paper, we present the network resource optimization method related to the traffic engineering by using load balancing through routing in MPLS network.

Performance Evaluation of End-to-End Security Protocols in WiBro using NS-2 (NS-2를 이용한 WiBro상에서의 종단 간 보안 프로토콜의 성능평가 및 분석)

  • Kim, Jung-Yoon;Song, Se-Hwa;Kim, In-Hwan;Hwang, In-Yong;Kim, Seok-Joong;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.184-190
    • /
    • 2009
  • WiBro has advantages when both WLAN and 3G UMTS are adopted. Much research is being carried out in this area. However, the WiBro specification does not consider end-to-end security. Hence, another security protocol has to be adopted to support secure communication. Most previous research only focused on WiBro MAC performance improvement or security. In this paper, we adopt a security protocol such as IPsec, TLS, and DTLS, well known end-to-end security protocols, to make full use of WiBro in the IP network. Using NS-2 we simulated the adoption of end-to-end security protocol and evaluated performance and usability. Simulation shows DTLS had some performance advantages. All the protocols, TLS and IPsec are also suitable for use in WiBro.