• Title/Summary/Keyword: Ip convergence

Search Result 425, Processing Time 0.022 seconds

Polling Method based on Weight Table for Efficient Monitoring (효율적인 모니터링을 위한 가중치 테이블 기반의 폴링기법)

  • Mun, Hyung-Jin
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.5-10
    • /
    • 2015
  • With the advance of ICT, understanding the condition of network and analysing network monitoring have become an important issue. On the TCP/IP network, SNMP is the typical protocol that catches the condition of network by using polling method. If polling method is implemented for a long period, to catch the change of the condition of the network is not easy. On the other hand, in case of short-term polling, even if it could catch the condition of the network in real time, responsive messages to results of the polling cause the increase of traffic and therefore burden the network. There have been studies to control the overhead of responsive messages by controlling the polling period. However, not considering the characteristics of an agent, and running randomly, they cannot decrease the overhead although they would have an instant effect. This paper suggests an efficient polling method that decreases the traffic overhead of polling and catches the condition of the network in real time. Proposed method an polling for a short period and gave weight based on the characteristics of agents to catch the network condition, and a manager decided polling differentially based on the weight so that it decreased the overhead of polling traffic.

  • PDF

A Handover Scheme based on Partial Encrypton Method to Support Security and Rapidity of Mobile WiMAX (Mobile WiMAX에서 부분암호화 방식을 적용한 안전하고 신속한 핸드오버 기법)

  • Kim, Ki-Su;Kim, Yon-Cheol;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.67-73
    • /
    • 2011
  • Handover in high speed mobile communication service, in particulary mobile WiMAX is supported efficiency mobility to 120km/h speed. But, in order to accommodate number of user increment in a cell, wireless network is increment to microcell and picocell by allocate bandwidth and by decrease cell size. handover is occurrent and increment connection failure ratio In this result. IEEE 802.16 standard is support seamless connection through handover optimization scheme. But because authentication process is abbreviate, network weakness is exposure. In this paper, we propose handover scheme for support realtime service as VoIP, Picure communication, Streaming Data Service in order to support partially encryption method. In experiment, proposed scheme is proof which process time is increment 20% more than previous scheme.

  • PDF

The Performance Analysis for Call Processing of the IMS Based Multimedia Service In BcN (BcN에서 IMS기반 멀티미디어 서비스의 호 처리 성능 분석)

  • Lee, Dong-Hyeon;Kim, Hyun-Jong;Choi, Seong-Gon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.117-124
    • /
    • 2008
  • In this paper, the call setup performance of the CSCF(Call Session Control function) that manages the session control in providing the IMS(IP Multimedia subsystem)-based multimedia service in the BcN(Broadband convergence Network) is analyzed. While the performance related with the call/session of the SIP-Based voice service is analysed, the study for the call recessing performance of the IMS-based multimedia service is insufficient. In this paper, as, the processing capacity and subscriber number of CSCF were changed, the call setup delay time according to the session setup procedure of IMS was measured using the M/M/1 queuing model and OPNET simulation. The experimental results show that the sudden increased delay showed up in case the session establishment requirement ratio of total users over 13% of the CSCF processing capacity. Therefore, the user number and capacity of CSCF suitable for the session establishment delay threshold can be calculated or estimated.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

Effect of pregabalin on nociceptive thresholds and immune responses in a mouse model of incisional pain

  • Park, Jung Hyun;Cho, Seung Hee;Kim, Rip;Na, Sang Hoon;Kang, Eun-sun;Yeom, Mi-young;Jang, Yeon
    • The Korean Journal of Pain
    • /
    • v.34 no.2
    • /
    • pp.185-192
    • /
    • 2021
  • Background: It is known that some analgesics as well as pain can affect the immune system. The aim of this study was to investigate the analgesic effect and immunomodulation of pregabalin (PGB) in a mouse incisional pain model. Methods: A postoperative pain model was induced by hind paw plantar incision in male BALB/c mice. Mice were randomly divided into four groups (n = 8): a saline-treated incision (incision), PGB-treated incision (PGB-incision), sham controls without incision or drug treatment (control), and a PGB-treated control (PGB-control). In the PGB treated groups, PGB was administered intraperitoneally (IP) 30 minutes before and 1 hour after the plantar incision. Changes of the mechanical nociceptive thresholds following incision were investigated. Mice were euthanized for spleen harvesting 12 hours after the plantar incision, and natural killer (NK) cytotoxicity to YAC 1 cells and lymphocyte proliferation responses to phytohemagglutinin were compared among these four groups. Results: Mechanical nociceptive thresholds were decreased after plantar incision and IP PGB administration recovered these decreased mechanical nociceptive thresholds (P < 0.001). NK activity was increased by foot incision, but NK activity in the PGB-incision group was significantly lower than that in the Incision group (P < 0.001). Incisional pain increased splenic lymphocyte proliferation, but PGB did not alter this response. Conclusions: Incisional pain alters cell immunity of the spleen in BALB/c mice. PGB showed antinocieptive effect on mouse incisional pain and attenuates the activation of NK cells in this painful condition. These results suggest that PGB treatment prevents increases in pain induced NK cell activity.

Policy-based In-Network Security Management using P4 Network DataPlane Programmability (P4 프로그래머블 네트워크를 통한 정책 기반 인-네트워크 보안 관리 방법)

  • Cho, Buseung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.3-10
    • /
    • 2020
  • Recently, the Internet and networks are regarded as essential infrastructures that constitute society, and security threats have been constantly increased. However, the network switch that actually transmits packets in the network can cope with security threats only through firewall or network access control based on fixed rules, so the effective defense for the security threats is extremely limited in the network itself and not actively responding as well. In this paper, we propose an in-network security framework using the high-level data plane programming language, P4 (Programming Protocol-independent Packet Processor), to deal with DDoS attacks and IP spoofing attacks at the network level by monitoring all flows in the network in real time and processing specific security attack packets at the P4 switch. In addition, by allowing the P4 switch to apply the network user's or administrator's policy through the SDN (Software-Defined Network) controller, various security requirements in the network application environment can be reflected.

Realization of Service Conversion Automation through Disaster Recovery System integrated Server Redundancy Test (재해복구시스템 통합 서버 이중화 테스트를 통한 서비스 전환 자동화 구현)

  • Young-Gee Min
    • Journal of Advanced Technology Convergence
    • /
    • v.2 no.3
    • /
    • pp.9-15
    • /
    • 2023
  • Recently, various public services are being performed based on information systems as the informatization business spreads. Public administration services based on these information systems provide internal and external services. In recent years, as the construction of cloud-based public services has been expanded, the advancement of information systems has attracted attention. In particular, as the dependence on information systems increases, the establishment of a response system to prevent dangerous situations such as interruption and paralysis of information systems in advance has become a hot topic not only in companies but also in public institutions. Therefore, in this paper, a disaster recovery system was designed and built to maximize the efficiency of system operation and shorten recovery time through service conversion automation of the disaster recovery system. The integrated DR server redundancy test, web server redundancy test, FC-IP redundancy test, and SAN switch redundancy test were performed respectively by applying the disaster recovery system designed and built according to the method proposed in the paper.

A Study on The Network Design of Smart Village to Provide Wired and Wireless Convergence Services on IoT (IoT기반의 유무선 융복합 서비스 제공을 위한 스마트빌리지의 네트워크 구성방안에 관한 연구)

  • Kim, Yun-ha;Jeong, Jae-woong;Kim, Young-sung;Choi, Hyun-ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.296-299
    • /
    • 2022
  • The rapid urban expansion and the increase in natural disasters due to the increase of population after industrialization and climate change are causing numerous urban management problems. The IP based hyper-connectivity caused by the initiation of the 4th industrial revolution enables a variety of technologies and services that produce vast amounts of data and solve urban management problems based on this. Especially, the quality of life is improved by providing the necessary information for life that are produced through a sensor network on wired and wireless communication. In this study, we intend to propose the method of optimal communcation network composition for innovative and futuristic city management technology through the case of K-water Smart Village Communication System

  • PDF

Design and Implementation of Ubiquitous Sensor Network System for Monitoring the Bio-information and Emergency of the Elderly in Silver Town

  • Choi, Seong-Ho;Park, Hyung-Kun;Yu, Yun-Seop
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.219-222
    • /
    • 2010
  • An ubiquitous sensor network (USN) system to monitor the bio information and the emergency of the elderly in the silver town is presented. The USN system consists of the sensor node platforms based on MCU of Atmage128L and RF Chip of CC2420 satisfying IEEE 802.15.4, which includes the bios sensor module such as the electrocardiogram (ECG) sensor and the temperature sensor. Additionally, when an emergency of the elderly is occurred in the silver town, the routing algorithm suitable to find and inform the location of the elderly is proposed, and the proposed routing algorithm is applied to the USN. To collect and manage the ECG data at the PC connected to the sink node, LabView software is used. The bio information and the emergency of the elderly can also be monitored at the client PC by TCP/IP networks in the USN system.

Networking Technologies for IPTV2.0 Service (IPTV2.0 서비스를 위한 네트워킹 기술)

  • Lee, Kyounghee;Yoon, Changwoo;Ryu, Won;Kim, Bongtae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.4
    • /
    • pp.218-228
    • /
    • 2008
  • The convergence of broadcasting and telecommunication services is being accelerated by broadband networks, digital broadcasting and Web2.0. This paper describes the definition and service characteristics of IPTV as a representative of broadcasting and telecommunication convergence services. Especially, the changes of infrastructure and technology for IPTV2.0 are addressed in terms of the service features of mobility, intelligence and participation. IPTV2.0 shall be characterized by the open IPTV service based on Web2.0 and the mobile IPTV service over the heterogeneous networks employing various wireless/wired access technologies. The IP Multimedia Subsystem (IMS) and Service Delivery Platform (SDP) technologies are increasingly considered to support the personalization and openness. The mobility management technology is being evolved to provide QoS-guaranteed mobile communication services to users at anytime and anywhere. IPTV2.0 services and platforms are also anticipated to be core components to achieve knowledge-based ubiquitous society. IPTV2.0 contents are required to be integrated with the enhanced metadata to efficiently support search, selection, convergence and delivery of the contents. Moreover, those contents shall be enhanced to provide the scalable services which is adaptable to the network status and user preferences. Therefore, the networking technologies for IPTV2.0 should tightly cooperate with application services and adaptive contents. Those technologies will be developed to construct the ubiquitous content service platform considering the evolution of networks and various converged services.

  • PDF