• Title/Summary/Keyword: ETSI(European Telecommunications Standards Institute)

Search Result 36, Processing Time 0.018 seconds

ETSI의 제25차 기술총회 참가보고

  • 김형준
    • TTA Journal
    • /
    • s.48
    • /
    • pp.172-180
    • /
    • 1996
  • 지난 4월, 향후 유럽 정보사회를 겨냥한 효율적 표준화 추진을 위해 TFIG(Task Force Implementation Group)에서 제안한 ETSI(European Telecommunications Standards Institute)의 표준화 조직구조 개편 요구에 따라 기존 ETSI의 기술 총회(TA : Technical Assembly)는 지난 25차 회의를 마지막으로 그간의 기술총회 활동을 마감하고 새로이 25명으로 구성된 이사회(Board) 체계로 변경되어진다. 이에 본 고에서는 지난 96년 10월에 열렸던 마지막 기술총회 참석 결과를 정리하고, 새로운 ETSI 조직 구조 변경에 따른 변화를 살펴보고자 한다.

  • PDF

Performance Analysis of Key Exchange Protocols on ETSI Standard (ETSI 표준 키 교환 프로토콜의 성능 분석)

  • Lee, Young-Seok;Choi, Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.520-527
    • /
    • 2015
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the security functions in ETSI(European Telecommunications Standards Institute), and analyze the specification of the security primitives and the key exchange protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(Network Control Centre). ETSI key exchange protocols consists of Main Key Exchange, Quick Key Exchange, and Explicit Key Exchange. We analyse the pros and cons of key exchange protocols based on performance analysis and performance evaluation.

범유럽의 글로벌 멀티미디어 이동통신기술 - ETSI의 GMM보고서를 중심으로 -

  • 김형준
    • TTA Journal
    • /
    • s.49
    • /
    • pp.114-123
    • /
    • 1997
  • 본 고는 유럽 정보통신 표준화 선도기관인 ETSI(European Telecommunications Standards Institute)에서 발간한 GMM(Global Multimedia Mobility) 보고서로 향후 2000년대의 멀티미디어 이동통신 기술의 전망과 관련 표준화 추진방향을 그 내용으로 한다. 이에 필자는 상기 보고서 내용을 중심으로 범유럽의 이동통신기술 현황과 향후 표준화추진 정책방향을 2회에 걸쳐 정리하고, 우리의 대응책을 점검하고자 한다.

  • PDF

범 유럽의 글로벌 멀티미디어 이동통신 기술 (II) -ETSI GMM보고서를 중심으로-

  • 김형준
    • TTA Journal
    • /
    • s.50
    • /
    • pp.95-105
    • /
    • 1997
  • 본 고는 유럽 정보통신 표준화 선도기관인 ETSI(European Telecommunications Standards Institute)에서 발간한 GMM(Global Multimedia Mobility) 보고서로 향후 2000년대의 멀티미디어 이동통신 기술의 전망과 관련 표준화 추진방향을 그 내용으로 한다. 이에 필자는 상기 보고서의 내용을 중심으로 범유럽의 이동통신기술 현황과 향후 표준화추진 정책방향을 2회에 걸쳐 정리, 기술하고자 한다.

  • PDF

ETSI 지적 재산권 정책

  • 한국정보통신기술협회
    • TTA Journal
    • /
    • s.77
    • /
    • pp.113-119
    • /
    • 2001
  • 기술정보를 모두에게 공유하게 하는 정보통신 표준과 특정인의 지적 재산을 보호하려는 IPR(Intellectual Property Right)의 관계는 정보화 사회가 가속됨에 따라 그 갈등이 더욱 심화되고 있다. 이에 국제 선진 표준화기구의 IPR 정책을 소개하여 각 기구의 동향을 살펴보고 우리가 나아가야 할 방향을 찾고자 한다. 이번 호에는 ETSI(European Telecommunication Standards Institute)의 Directive 별지6 ''ETSI 지적재산권 정책''을 소개한다.

  • PDF

Status and trends of standard patents in European Telecommunications Standards Institute (유럽 전기통신 표준기구(ETSI)의 표준 특허 현황 및 동향)

  • Rho, Seungmin;Kim, Sanggeun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.8
    • /
    • pp.1995-2000
    • /
    • 2014
  • Patent information, which is generated under a specific, objective rule for a prolonged period of time, has the properties of technology, right, and management. Because of these characteristics of patents, patent analysis is used to identify R&D capacities and performances, and management strategies of a given nation or enterprise. In this paper, we analyze LTE essential patents which are key IPRs for implementing standardized LTE technology and major weapons in a global patent war. Also, we discuss the status of standard patent data, main applicants and standardization trends based on declared in ETSI standard patents. Especially, we analyzed 15,073 patents data which are possible to analyze patent information.

Adaption and Assessment of ETSI M2M Standard in Smart Home Environments (ETSI M2M 표준의 스마트 홈 적용 및 적합성 평가)

  • Park, Yunjung;Wu, Hyuk;Paek, Hyung-Goo;Min, Dugki
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.241-255
    • /
    • 2012
  • Recently, smart home environments which provide complex services through smart appliances are becoming realized, due to the advances in connected devices and network technologies. Current smart home environments are mostly restricted, because of difficultly of integration of heterogeneous smart appliances. Therefore radical service integration is impracticable. In this paper, we analyze and implement Machine-to-Machine (M2M) standards which are established by European Telecommunications Standards Institute (ETSI) for integrating heterogeneous devices and services. Smart Home is one of the areas covered by ETSI M2M standards, however these standards are just standardized, so adaption and assessment in smart home are not proved yet. Therefore, this paper analyze ETSI M2M standards by focusing the data transport model and evaluate by selecting the most commonly used smart home scenarios and by implementing ETSI M2M standards compatible smart metering system. In some points ETSI M2M standards are not efficient because of its complexity of structure, however ETSI M2M provides sophisticated features for integrating M2M which are appropriate to adopt diverse smart home environments.

A Recent Trends of PSOs and Our Future Plan for the GII Standardization (글로벌 정보기반구조(GII) 구축을 위한 표준화 기관의 활동 및 우리의 대응방안)

  • Kim, Hyeong-Jun;Lee, Yeong-Hui
    • Electronics and Telecommunications Trends
    • /
    • v.11 no.2 s.40
    • /
    • pp.99-118
    • /
    • 1996
  • 전세계는 소위 21세기 정보사회 진입을 향한 각종의 정보 기반구조 건설을 추진중에 있으며 국제표준화 기구를 비롯한 지역별, 국가별 표준화 기관들은 상호 연동환경 보장 및 적기 표준 공급을 위한 GII(Global Information Infrastructure) 표준화 추진계획을 발표하고 있다. 본 고에서는 ITU-T를 비롯한 ETSI(European Telecommunication Standards Institute), T1 Committee, TTC(Telecommunication Technology Council), GSC(Global Standards Collaboration) 등의 GII 표준화 활동현황을 기술하고, 초고속 정보통신 기반구축을 위한 표준화의 중요성 및 우리의 대응방안을 살펴보고자 한다.

Building IEC 61850 SCADA system based on TETRA (TETRA 기반 IEC 61850 SCADA 시스템 구축)

  • Song, Byung-Kwen;Jeong, Tae-Ui
    • Journal of IKEEE
    • /
    • v.13 no.3
    • /
    • pp.87-94
    • /
    • 2009
  • TETRA(TErrestrial Trunked RAdio) is the wireless communication system generally adopted to public network and backbone network, as the technology of Trunked Radio System specified by ETSI(European Telecommunications Standards Institute) and currently adopted to the Electric Power IT Backbone Network in Korea. IEC 61850 is the protocol proposed for SAS(Substation Automation System) of SCADA(Supervisory Control And Data Acquisition) system. In this paper, IEC 61850 Server and Client simulator are used based on Linux operating system. The multi-functional gateway, which transforms the communication based on TCP/IP between IEC 61850 Server Simulator and Client Simulator to the one based on TETRA Packet Data Service, is developed such that IEC 61850 SCADA system is constructed based on TETRA.

  • PDF

Techniques study of IMS/SIP based Lawful Interception in 3G networks (3G 네트워크에서의 IMS/SIP 기반 합법적 감청 기법)

  • Lee, Myoung-rak;Pyo, Sang-Ho;In, Hoh Peter
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1411-1420
    • /
    • 2015
  • Lawful interception(LI) standard of telephone networks has technical limitations to lawfully intercept IMS/SIP-based mobile communication network subscriber who using Android and iPhone device. In addition, the technical standards related to legal interception of the IMS/SIP of the wireless network is insufficient compared to the systematic study of the development of a wireless network infrastructure. The architecture proposed in the standard of ETSI(European Telecommunications Standards Institute) for the seamless LI is insufficient to overcome the limitations of traditional voice-centric LI techniques. This paper proposes an IMS/SIP-based architecture to perform LI under 3G networks that focuses on mobility-supported environments with merging cellular networks and the Internet. We implemented the simulation to verify the efficiency of the proposed architecture, and the experimental results show that our method achieves higher lawful interception rate than that of existing interception methods.