• Title/Summary/Keyword: Ip convergence

Search Result 423, Processing Time 0.022 seconds

Development of the Security Platform Using 3D GIS Connection (3차원 GIS 연계를 통한 보안 플랫폼 개발)

  • Hong, seong-pyo;Kim, sung-hwan;Oh, ji-hun;Kim, jin-hyuk;Cho, young-ju
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2018.05a
    • /
    • pp.435-436
    • /
    • 2018
  • 3차원 GIS연계를 통한 보안 플랫폼개발은 3차원 공간정보가 가진 융합의 특성을 잘 활용하여 개별적인 IT기반 물리 보안시스템을 통합관리 하고 미래의 기술변동 흐름을 잘 반영할 뿐만 아니라 보안요원의 개입을 줄이는 것을 목적으로 시스템 자체가 판단하고 관리할 수 있는 능동형 보안 플랫폼 기술이다. 개발 플랫폼은 IP카메라 기반 영상데이터 위에 GIS 기반 좌표 값이 부여된 형태의 기술로, 증강현실 기반의 보안관제 서비스 제공 기반을 마련하는데 효과가 기대된다.

  • PDF

Optimization of a Composite Laminated Structure by Network-Based Genetic Algorithm

  • Park, Jung-Sun;Song, Seok-Bong
    • Journal of Mechanical Science and Technology
    • /
    • v.16 no.8
    • /
    • pp.1033-1038
    • /
    • 2002
  • Genetic alsorithm (GA) , compared to the gradient-based optimization, has advantages of convergence to a global optimized solution. The genetic algorithm requires so many number of analyses that may cause high computational cost for genetic search. This paper proposes a personal computer network programming based on TCP/IP protocol and client-server model using socket, to improve processing speed of the genetic algorithm for optimization of composite laminated structures. By distributed processing for the generated population, improvement in processing speed has been obtained. Consequently, usage of network-based genetic algorithm with the faster network communication speed will be a very valuable tool for the discrete optimization of large scale and complex structures requiring high computational cost.

Analytical Approach of Proxy-LMA Mobility System in Heterogeneous IP-based Mobile Networks

  • Cho, Chulhee;Choi, Jae-Young;Jeong, Jongpil
    • International journal of advanced smart convergence
    • /
    • v.4 no.1
    • /
    • pp.71-87
    • /
    • 2015
  • Mobile users want to be provided with undisrupted network services when they navigate on the Next-Generation (NG) wireless networks. For that, interlocking with a heterogeneous network is important, but there have been few studies on the method for guaranteeing global mobility. Thus, this paper proposes the Proxy-LMA technique, the mobile IP-based global inter-networking system, to enhance global mobility and interoperability within the Next-Generation (NG) network environment. The purpose of the proposed Proxy-LMA system is to expand the boundary of the mobility with regards to the existing mobility management protocol (PMIPv6 and MIPv6) in order to guarantee global mobility and interoperability within the heterogeneous network environment. The results of the performance evaluation showed that the proposed Proxy-LMA system was more efficient than other methods from the standpoint of signaling cost and delay in the heterogeneous network environment.

FTTH FOR APARTMENT COMPLEXES USING CWDM-PON SYSTEM (공동주택에 대한 FTTH OSP 구축과 CWDM-PON 을 이용한 서비스 제공)

  • Kim, Bo-Gyum;Koh, Seok-Bong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.289-292
    • /
    • 2007
  • FTTH (Fiber to the Home) is constructed with optical devices and optical cables from central office (CO) to subscribers. With FTTH, it is possible to provide service platform in order to meet the customers' emerging demands for more bandwidth/security and diverse IP multimedia applications including high definition (HD) video streaming service. FTTH can provide enough bandwidth from 100Mbps to several Gbps per subscriber. It is also most appropriate network architecture for convergence of communication and broadcasting. So, FTTH is thought the final destination of telecom operators, since it is the fastest and most reliable solution so far and various IP multimedia services are possible through it. In this paper, newly attempted technologies of FTTH construction for apartment complexes using CWDM-PON system are discussed.

  • PDF

액세스 스위치단에서의 Triple Play Service 를 위한 멀티캐스팅 라우팅과 QoS 기능 구현에 관한 연구

  • Lee, Jeoung-Ok;Choi, Jee-Yeoun;Beom, Soon-Kyun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.92-99
    • /
    • 2007
  • 현재 통신 시장은 보다 편리하고 다양한 서비스를 찾는 소비자의 욕구와 맞물려 TPS(Triple Play Service) 방향으로 급속히 나아가고 있다. 인터넷 전화의 보급은 이미 보편적 서비스가 된 초고속인터넷 서비스와 연계하여 빠르게 확산되고 있으며, 2007년 들어 방송서비스까지 결합한 TPS에 대한 통신사업자간 경쟁이 본격화되고 있는 추세이다. 트리플 플레이 서비스(Triple Play Service;이하 TPS)는 초고속 인터넷과 인터넷 전화와 방송 서비스를 하나의 회선으로 제공하는 종합 인터넷 서비스로, 광대역 통합망(BcN; Broadband Convergence Network)의 핵심 서비스이다. 액세스 스위치(Access Switch) 단은 TPS로 인해 더욱 많은 역할을 담당할 것으로 전망되는데, 디지털 방송을 인터넷 프로토콜을 통해 전송하기 위한 멀티캐스트 기능과 혼재된 이종간의 디지털 신호를 각 서비스의 품질에 맞게 보장해 주는 QoS(Quality of Service) 기능이 무엇보다 중요하게 고려 되어야 한다. 본 논문에서는 TPS의 핵심일 수 있는 방송 서비스를 위해 액세스 스위치 단에서 제공해야 할 멀티캐스트와 QoS 기능 구현 방안에 대해 제시한다

  • PDF

A study on Improvement of Bandwidth Efficiency to FSS Internet with Spoofing and Cash Function

  • Hong Wan-Pyo
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.3
    • /
    • pp.123-130
    • /
    • 2005
  • This study performed five methods of tests and measurements to verify the improvement of connection time and bandwidth efficient of FSS (fixed satellite service) TCP/IP network by means of the cash function and the spoofing function. Tests and measurements are performed with; 1. Not to apply the cash and spoofing function 2. Apply the cash function 4. Apply both cash and spoofing function in HUB station and VSAT 5. In a typical commercial terrestrial Internet with LAN. The study results in this paper show that application of the spoofing and cash function greatly improves the bandwidth efficiency to FSS TCP/IP Internet service.

Securing Mobile IP Registration Messages in Residential Networks

  • Kim, Young-Bai;Han, Seung-Jo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.77-82
    • /
    • 2010
  • Residential network is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home to facilitate the convenient, safe and pleasant daily lives of home user with various home network services regardless of device, time and place. For ubiquitous development more devices will be wireless and most of them will be roaming. Since these roaming devices carry private information of daily life of residential users, the interaction among the roaming devices of residential network must be secure. This paper presents to secure registration of roaming devices using IP Security (IPSec) Protocol Suite without the need to trust foreign agents.

The Effects of CEO's Leadership on the Organiational Effectiveness (CEO의 리더십이 조직유효성에 미치는 영향)

  • Shin, Yong-Se;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.165-175
    • /
    • 2013
  • This study identifies the empirical effects of CEO's transactional leadership & transformational leadership(LEADERSHIP) on organizational effectiveness(OE) in the consulting industry. Next, this study identifies that if there are any differences on understanding on LEADERSHIP and OE depending on consulting organizations with a propensity for individualism. The analysis of the data shows LEADERSHIP is positively related to OE. Finally it is shown in this study that the consulting organizations with a high individualistic propensity(IP) show perception differences on charismatic leadership, compared to those with a low IP.

Prevention of DDoS Attacks for Enterprise Network Based on Traceback and Network Traffic Analysis

  • Ma, Yun-Ji;Baek, Hyun-Chul;Kim, Chang-Geun;Kim, Sang-Bok
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2009
  • With the wide usage of internet in many fields, networks are being exposed to many security threats, such as DDoS attack and worm/virus. For enterprise network, prevention failure of network security causes the revealing of commercial information or interruption of network services. In this paper, we propose a method of prevention of DDoS attacks for enterprise network based on traceback and network traffic analysis. The model of traceback implements the detection of IP spoofing attacks by the cooperation of trusted adjacent host, and the method of network traffic analysis implements the detection of DDoS attacks by analyzing the traffic characteristic. Moreover, we present the result of the experiments, and compare the method with other methods. The result demonstrates that the method can effectively detect and block DDoS attacks and IP spoofing attacks.

Pipelined Implementation of JPEG Baseline Encoder IP

  • Kim, Kyung-Hyun;Sonh, Seung-Il
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.1
    • /
    • pp.29-33
    • /
    • 2008
  • This paper presents the proposal and hardware design of JPEG baseline encoder. The JPEG encoder system consists of line buffer, 2-D DCT, quantization, entropy encoding, and packer. A fully pipelined scheme for JPEG encoder is adopted to speed-up an image compression. The proposed architecture was described in VHDL and synthesized in Xilinx ISE 7.1i and simulated by modelsim 6.1i. The results showed that the performance of the designed JPEG baseline encoder is higher than that demanded by real-time applications for $1024{\times}768$ image size. The designed JPEG encoder IP can be easily integrated into various application systems, such as scanner, PC camera, color FAX, and network camera, etc.