• Title/Summary/Keyword: Network Convergence IP

Search Result 218, Processing Time 0.023 seconds

The Design of the Container Logistics Information System Reflects the Port Logistics Environment (항만물류 특성을 반영한 컨테이너 정보시스템 설계)

  • Park, Young-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.159-167
    • /
    • 2015
  • The nature of port logistics requires global visibility and traceability. However, the traditional RFID technology still applied cannot meet these demands. IP-USN and M2M in port logistics have faced challenges of the prerequisite of network composition and immense communications at the base where a grand number of containers are installed. To resolve the issue, this study suggests an IP-RFID-based smart port logistics service platform. The IP-RFID-based port logistics service system resolved the communication problem by separating the RFID tag and AP, which allows internet connection, from the tag. The tags connected with thermo-sensors, humidity sensors, pressure sensors, GPS, etc. are attached to the containers insuring global visibility and traceability, key factors in logistics, by obtaining desired real-time information regardless of time and location.

Research for measuring degradation of IPTV-serviced videos (IPTV 서비스 영상에 대한 객관적 품질측정 방안 연구)

  • Kim, Won-Jun;Kim, Chang-Ick;Kim, Jin-Sul;Lee, Hyun-Woo;Ryu, Won
    • Journal of Broadcast Engineering
    • /
    • v.13 no.4
    • /
    • pp.440-451
    • /
    • 2008
  • With the advent of IP-based multimedia service based on IP network, there is a rapidly increasing demand for IPTV. Unlike the previous coaxial cable based TV, IPTV provides a variety of convergence services based on IP newark. However, since the IPTV service quality is a lot affected by the network degradation such as packet loss and jitter, it may not be guaranteed. In this paper, we propose an objective measure for various degradations of IPTV-based videos considering subjective assessment. To this end, we first determine QoE(Quality of Experience) indicators, which can affect human visual perception. Then we develop the video quality metric for each QoE indicator. Subjective assessment based on MOS is conducted and used to construct mapping relationship between each measure and perceived visual quality. Experiments are performed on various videos to confirm the efficiency and robustness of the proposed method and show high correlation with subjective assessment.

Unified Access Network (UAN) for Fixed Wireless Convergence (유무선 통합 액세스 네트워크)

  • Lee Sang-Seop;Song Myeong-Hun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2003.08a
    • /
    • pp.325-326
    • /
    • 2003
  • 본 논문에서는 기존의 이동통신 네트워크에 IP 네트워크를 융합할 수 있는 통합광 액세스 네트워크, UAN을 제안한다. 그리고 UAN 확장장치의 구조와 규격을 제안하고 제작, 시험함으로써 UAN이 성능과 경제적 효과에서 우수한 구조임을 보였다.

  • PDF

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1360-1364
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LGU+) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.197-200
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LG) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

  • PDF

Fast Channel Changing Technique to Deliver Enhanced IPTV User Experience (IPTV 사용자를 위한 빠른 채널 변경 기법)

  • Song, Young-Ho;Kwon, Taeck-Geun
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1201-1209
    • /
    • 2009
  • Recently, the convergence of the telecommunications industry through the development of network media has brought along interactive data services in addition to the traditional broadcast services by providing direct connections between the users and the broadcasters. This can be easily achieved by the combination of existing network technology and multimedia technology, but in reality, as seen in the actual implementation of IPVT, it's difficult to provide satisfactory levels of service to users due to issues of network bandwidth and problems of streaming system. In particular, a network which is able to fully support Qos/QoE, and also a fast enough channel changing technology that is satisfactory to the user, are prerequisites for IPTV success. Therefore this thesis proposes a fast channel changing technique to delivery enhanced IPTV user experience. Recent IP set-top-boxes use only a small portion of the CPU to feed Ethernet packets to the hardware decoder and play them. Thus, by making IP set-top-boxes share cached channel information and content with each other, reducing the load on the server and enhancing the channel changing time is made possible.

  • PDF

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

A study on the audio/video integrated control system based on network

  • Lee, Seungwon;Kwon, Soonchul;Lee, Seunghyun
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.1-9
    • /
    • 2022
  • The recent development of information and communication technology is also affecting audio/video systems used in industry. The audio/video device configuration system changes from analog to digital, and the network-based audio/video system control has the advantage of reducing costs in accordance with system operation. However, audio/video systems released on the market have limitations in that they can only control their own products or can only be performed on specific platforms (Windows, Mac, Linux). This paper is a study on a device (Network Audio Video Integrated Control: NAVICS) that can integrate and control multiple audio / video devices with different functions, and can control digitalized audio / video devices through network and serial communication. As a result of the study, it was confirmed that individual control and integrated control were possible through the protocol provided by each audio/video device by NAVICS, and that even non-experts could easily control the audio/video system. In the future, it is expected that network-based audio/video integrated control technology will become the technical standard for complex audio/video system control.

A PRECISE AUDIO/VIDEO SYNCHRONIZATION SCHEME FOR MULTIMEDIA STREAMING

  • Chi, Won-Sup;Jung, Soon-Heung;Yoo, Jeong-Ju;Seo, Kwang-Deok
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.49-54
    • /
    • 2009
  • Synchronization between media is an important aspect in the design of multimedia streaming system. This paper proposes a precise media synchronization mechanism for digital video and audio transport over IP networks. To support synchronization between video and audio bitstreams transported over IP networks, RTP/RTCP protocol suite is usually employed. To provide a precise mechanism for media synchronization between video and audio, we suggest an efficient media synchronization algorithm based on NPT (Normal Play Time) which can be derivable from the timestamp information in the header part of RTP packet generated for the transport of video and audio streams. With the proposed method, we do not need to send and process any RTCP SR (sender report) packet which is required for conventional media synchronization scheme, and accordingly could reduce the number of required UDP ports and the amount of control traffic injected into the network.

  • PDF

A Research on Gender Analysis of BGP Security (BGP의 보안성에 대한 기존 연구 분석)

  • Sun, Jae-Hoon;Kim, Yong-Ho;Sun, Yong-Bin
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.35-41
    • /
    • 2009
  • Internet routing protocols currently in use in the typical protocol of the existing BGP protocol to strengthen the security of the BGP protocol by comparison with research on emerging issues of the AS-Path, IP Fake, DRDoS BGP protocol must be used when such the information you need, but due to malicious attack, or an incorrect setting can prevent the global Internet network operating in an security to threat information are analyzed.

  • PDF