• Title/Summary/Keyword: Ip convergence

Search Result 425, Processing Time 0.03 seconds

Unified Access Network (UAN) for Fixed Wireless Convergence (유무선 통합 액세스 네트워크)

  • Lee Sang-Seop;Song Myeong-Hun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2003.08a
    • /
    • pp.325-326
    • /
    • 2003
  • 본 논문에서는 기존의 이동통신 네트워크에 IP 네트워크를 융합할 수 있는 통합광 액세스 네트워크, UAN을 제안한다. 그리고 UAN 확장장치의 구조와 규격을 제안하고 제작, 시험함으로써 UAN이 성능과 경제적 효과에서 우수한 구조임을 보였다.

  • PDF

5G mobile network and ATSC 3.0 broadcasting network interworking trend and plan (5G 이동망과 ATSC 3.0 방송망 연동 동향 및 방안)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.47-52
    • /
    • 2020
  • The introduction of virtualization technology in the broadcasting field is actively progressing broadcasting service automation and intelligence based on the effective operation of IT resources throughout the broadcasting industry ecosystem. In recent years, there is increasing interest in increasing the flexibility of various broadcasting resources and increasing the efficiency of interworking with other networks through network virtualization of the broadcasting network infrastructure. The fundamental transformation from the broadcasting network to the IP paradigm is facing a situation where it is necessary to solve various problems for the effective interworking of Internet-based service platforms and 5G networks and the development of new convergence services. In other words, for organic and effective interworking with the next-generation broadcasting network represented by ATSC 3.0, a mobile communication network represented by 5G, and the Internet, a number of difficulties must be solved. In this paper, the basic technology and status for the convergence of ATSC 3.0 broadcasting network and mobile communication network represented by 5G was examined, and a plan for the ATSC 3.0 broadcasting network and 5G network to interwork with each other as a network was described.

The Development of Scalable Video Coding Server Management Controller (SVC 서버 관리 제어기 개발)

  • Kim, Kwang-Yong;Park, Sang-Taek;Jeong, Won-Ho;Ryu, Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.11a
    • /
    • pp.270-273
    • /
    • 2010
  • 스케일러블 비디오 부호화(SVC: Scalable Video Coding)는 하나의 비트스트림 결과물로부터 둘 이상의 다중 비트율 및 해상도, 프레임율을 추출할 수 있도록 MPEG의 스케일러블 비디오 코딩 국제 표준을 준수하여 부호화한 비디오 비트스트림을 의미한다. 우리는 SVC(Scalable Video Coding)기반기술을 이용하여 하나의 콘텐츠를 통해 소비환경에 적응적인 비디오 스트리밍 서비스를 IP망을 기반으로 적용하기 위한 응용기술을 개발하고 있다. 본 논문에서는 단말로 부터 전송채널에 대한 상태를 전송받아 이에 맞게 콘텐츠를 적응변환 하고 다양한 품질의 단말에서의 스트리밍을 제공하는 SVC 미디어 서버를 관리하는 SVC 서버 관리 제어기의 설계 및 그 구현에 관한 내용이다. 이와 같이 SVC 서버 관리 제어기의 개발을 통해서 SVC의 다양한 콘텐츠 적응레벨을 설정하고 관리할 수 있다.

  • PDF

A Digital Convergence Platform based on the MPEG-21 Multimedia Framework (MPEG-21기반 디지털 컨버젼스 플랫폼 기술)

  • Oh, Hwa-Yong;Kim, Dong-Hwan;Lee, Eun-Seo;Chang, Tae-Gyu
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.5
    • /
    • pp.987-989
    • /
    • 2007
  • This paper describes a digital convergence platform(DCP) which is implemented based on the MPEG-21 multimedia framework. DCP is a newly proposed solution in this research for the convergence service of future home multimedia environment. DCP is a common platform designed to have the feature of reconfigurability, by means of S/W. which supports to run diverse digital multimedia services. A distributed peer to peer service and transaction model is also a new feature realized in DCP using the MPEG-21 multimedia framework. A prototype DCP is implemented to verify its functions of multimedia service and transactions. The developed DCPs are networked with IP clustering storage systems for the distributed service of multimedia. Successful streaming services of the MPEG-2/4 video and audio are verified with the implemented test-bed system of DCP.

Design of SPS Model using Mobile Agent System (이동 에이전트 시스템을 이용한 SPS 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.19-24
    • /
    • 2003
  • This research presents the development of a certain highly efficient model for group security policy negotiation using mobile agents in the IPSec environment. The conventional IP security systems has some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through the same path by both directions and is protected by the same policy due to the topology of the network. Unlike conventional systems, the model developed herein can be resolved by using a mobile agent technology. If each domain needs a negotiation of security policy, a mobile agent manages the result of the negotiation in the form of a passport and guarantees the authentication and reliability each other by using the passport.

  • PDF

Multicast Extension to Proxy Mobile IPv6 for Mobile Multicast Services

  • Kim, Dae-Hyeok;Lim, Wan-Seon;Suh, Young-Joo
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.316-323
    • /
    • 2011
  • Recently, Proxy Mobile IPv6 (PMIPv6) has received much attention as a mobility management protocol in next-generation all-IP mobile networks. While the current research related to PMIPv6 mainly focuses on providing efficient handovers for unicast-based applications, there has been relatively little interest in supporting multicast services with PMIPv6. To provide support for multicast services with PMIPv6, there are two alternative approaches called Mobile Access Gateway (MAG)-based subscription and Local Mobility Anchor (LMA)-based subscription. However, MAG-based subscription causes a large overhead for multicast joining and LMA-based subscription provides non-optimal multicast routing paths. The two approaches may also cause a high packet loss rate. In this paper, we propose an efficient PMIPv6-based multicast protocol that aims to provide an optimal delivery path for multicast data and to reduce handover delay and packet loss rate. Through simulation studies, we found that the proposed protocol outperforms existing multicast solutions for PMIPv6 in terms of end-to-end delay, service disruption period, and the number of lost packets during handovers.

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

Traffic Extraction and Verification for Attack Detection Experimentation (공격탐지 실험을 위한 네트워크 트래픽 추출 및 검증)

  • Park, In-Sung;Lee, Eun-Young;Oh, Hyung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.49-57
    • /
    • 2006
  • Firewall to block a network access of unauthorized IP system and IDS (Intrusion Detection System) to detect malicious code pattern to be known consisted the main current of the information security system at the past. But, with rapid growth the diffusion speed and damage of malicious code like the worm, study of the unknown attack traffic is processed actively. One of such method is detection technique using traffic statistics information on the network viewpoint not to be an individual system. But, it is very difficult but to reserve traffic raw data or statistics information. Therefore, we present extraction technique of a network traffic Raw data and a statistics information like the time series. Also, We confirm the validity of a mixing traffic and show the evidence which is suitable to the experiment.

  • PDF

Analytical Approach of New Random-walk Based Mobility Management Scheme in IP-based Mobile Networks

  • Song, Myungseok;Cho, Jun-Dong;Jeong, Jongpil
    • International Journal of Advanced Culture Technology
    • /
    • v.2 no.1
    • /
    • pp.1-13
    • /
    • 2014
  • In next-generation wireless networks, provisioning of IP-based network architecture and seamless transmission services are very important issues for mobile nodes. For this reason, a mobility management mechanism to support global roaming is highly regarded. These technologies bring a broader life by using a global roaming account through the connection of multiple devices or technology to mobile users; they also provide real-time multimedia services. This paper presents a comprehensive performance analysis of fast handover for hierarchical mobile IPv6 (F-HMIPv6), hierarchical mobile IPv6 (HMIPv6), Proxy Mobile IPv6 (PMIPv6), and fast Proxy Mobile IPv6 (FPMIPv6) using the fluid-flow model and random-walk model. As a result, the location update cost of the PMIPv6 and FPMIPv6 is better than that of HMIPv6 and F-HMIPv6. These results suggest that the network-based mobility management technology is superior to the hierarchical mobility management technology in the mobility environment.

Study On Integrating Internet and Intranet based on IPSec and IMA Technology (IPSec과 IMA를 이용한 인터넷과 내부 망 통합에 관한 연구)

  • Cho, Yong-Gun
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.71-78
    • /
    • 2008
  • This research is on the study of integrating internet and intranet that was built for their own enterprise into one network system that promises a more economic and secure use. Compared to this system, the traditional network conversion device not only has its mechanical limits, but also requires a separate network set up. This raises both interoperability and security problems and results in a higher cost. Therefore, I propose dual defence system based on the inverse multiplexing of ATM Forum and IPSec to improve network ability and deliver enhanced system reliability while reducing cost. Furthermore, I also addressed some of the weaknesses of the Scanning Attacking Method, SNMP and Spooler Port and proposed counter measures that will deal with these weakness at the dual defence system.

  • PDF