• Title/Summary/Keyword: Next Generation Convergence Network

Search Result 115, Processing Time 0.023 seconds

Differential Bandwidth Allocation Method using Upstream Bandwidth Wavelength Division of EPON (상향트래픽 파장분할 EPON에서 우선순위 큐를 고려한 차등대역폭 할당방법)

  • Seo, Chang-Jin;Jang, Yong-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.265-270
    • /
    • 2012
  • The subscriber access network is cause of the bottleneck phenomenon because equipment and infrastructure were not originally designed for busty high-bandwidth traffic between MAN(Metro Area Network) and LAN(Local Area Network). Whether riding on shorter copper drops or optical fiber, Ethernet is emerging as the future broadband protocol of choice, offering plug and play simplicity, and low cost. EPON(Ethernet Passive Optical Network) combines point-to-multipoint optical infrastructure with low-cost high-bandwidth Ethernet. The future broadband access network will be a combination of point-to-point and point-to-multipoint Ethernet, optimized for transporting IP data, as well as time critical voice and video. EPON is being considered as a novel communications infrastructure for next-generation broadband access network for the convergence of low-cost Ethernet equipment and low-cost fiber infrastructure. But, EPON has a problem with duplex multimedia services. It is the insufficiency of bandwidth for upstream. Because all ONUs use a shared transmission media for upstream. In this paper, we addressed the problem of upstream bandwidth in EPONs. We presented a wavelength division EPON supporting QoS in the differentiated services framework.

Study on the Internet Industry Structure under the NgN Regime-Competitive Landscape of ISPs, CPs, and CDNs (디지털 컨버전스 인프라로서의 NgN 환경에서 인터넷 산업구조 : ISP, CP, CDN 사업자간 경쟁을 중심으로)

  • Kim, Do-Hoon
    • Korean Management Science Review
    • /
    • v.23 no.3
    • /
    • pp.243-257
    • /
    • 2006
  • ITU-T's NgN(Next generation Network) architecture is expected to offer a new Internet platforms such as QoS(Quality of Service) guaranteed services as it overcame the limitations of the existing best-effort Internet architecture. However, policy development crucial for the NgN framework(e.g., interconnections and billing) is lagging far behind technology development. For example, arguments over network neutrality clearly indicate little understanding of the Internet industry structure where diverse providers including ISP and CP coexist. This study employs a network economics approach to predict how the competitive landscape involving various providers will evolve under the traffic-based billing system under the NgN environment. Applied is the non-cooperative game theory, in particular, Stackelberg's repeated game in order to build and analyze model for competition among those providers. We also studied possible impacts that CPs would have on the competitive landscape if they have an option to replace ISP: i.e., CDN(Content Delivery Network) provider. Lastly, based on the model analysis and experiments, presented are their implications to policy development and tile future prospect.

Management and Control Scheme for Next Generation Packet-Optical Transport Network (차세대 패킷광 통합망 관리 및 제어기술 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.35-42
    • /
    • 2012
  • Increase of data traffic and the advent of new real-time services require to change from the traditional TDM-based (Time Division Multiplexing) networks to the optical networks that soft and dynamic configuration. Voice and lease line services are main service area of the traditional TDM-based networks. This optical network became main infrastructure that offer many channel that can convey data, video, and voice. To provide high resilience against failures, Packet-optical networks must have an ability to maintain an acceptable level of service during network failures. Fast and resource optimized lightpath restoration strategies are urgent requirements for the near future Packet-optical networks with a Generalized Multi-Protocol Label Switching(GMPLS) control plane. The goal of this paper is to provide packet-optical network with a hierarchical multi-layer recovery in order to fast and coordinated restoration in packet-optical network/GMPLS, focusing on new implementation information. The proposed schemes do not need an extension of optical network signaling (routing) protocols for support.

A Cooperative Security Gateway cooperating with 5G+ network for next generation mBcN (차세대 mBcN을 위한 5G+ 연동보안게이트웨이)

  • Nam, Gu-Min;Kim, Hyoungshick;Lee, Hyun-Jin;Cho, Hark-Su
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.129-140
    • /
    • 2021
  • The next generation mBcN should be built to cooperate with the wireless network to support hyper-speed and hyper-connectivity. In this paper, we propose a network architecture for the cooperation mBcN and 5G commercial network and architecture of the cooperative security gateway required for the cooperation. The proposed cooperative security gateway is between gNB and UPF to support LBO, SFC, and security. Our analysis shows that the proposed architecture has several advantages. First of all, user equipment connected with the mBcN can be easily connected through the 5G commercial radio network to the mBcN. Second, the military application traffic can be transmitted to mBcN without going through the 5G core network, reducing the end-to-end transmission delay without causing the traffic load on the 5G core network. In addition, the security level of the military application can effectively be maintained because the user equipment can be connected to the cooperative security gateway, and the traffic generated by the user equipment is transmitted to the mBcN without going through the 5G core network. Finally, we demonstrate that LBO, SFC, and security modules are essential functions of the proposed gateway in the 5G test-bed environment.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Study of Policy on Seowon's Preservation·Support : Focusing on Big Data Analysis on Laws (한국 서원의 보존·지원 정책에 관한 연구 : 법률에 대한 빅데이터 분석을 중심으로)

  • Bang, Mee Young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.875-883
    • /
    • 2023
  • In Korea, the number of preservation and management entities to connect the traditional cultural heritage to next generations is rapidly decreasing. Building an infrastructure to pass on traditional cultural heritage to the next generation and to pay attention to the preservation and management of the next generation is important including the 'Seowon', a World Cultural Heritage listed by UNESCO. This study is based on the laws that regulates the preservation and support of traditional cultural assets and 'Seowon, through Big Data analysis techniques. The main keywords in each law were extracted, schematized, and a mutual Word Network was constructed and policy advice was derived. As policy advice, it is necessary to establish and implement policies to nurture and support businesses specialized in the region for the preservation·utilization, preservation·management and preservation·support of Seowons.

Status of ICT Convergence Smart Quality Distribution Technology for Food Quality and Safety Management

  • Kim, Jong Hoon;Kim, Ji Young;Kim, Byeong Sam
    • Agribusiness and Information Management
    • /
    • v.6 no.2
    • /
    • pp.13-23
    • /
    • 2014
  • The world is in the process of a structural change related to ICT convergence knowledge industries. ICT is leading to the creation of new products and services, and is making our lives more convenient, safer, and more efficient. In advanced countries, many studies have been conducted with the goal of developing new business models converged with ICT, and this is also the case in the food industry. Korea possesses world-leading ICT, and if this ICT is applied to the food industry, a world-class new business model can be developed. The u-Food System, which is in the process of development in Korea, is a next-generation food system that can allow food providers, consumers, and distributors to access various types of information about food products, including traceability, distribution, safety, quality, and freshness, and manage this information. It is a future food system that converges ICT, biotechnology and sensing technology with food. Based on the u-Food System, this paper will introduce the status of current smart quality distribution technologies that converge ICT (such as sensor tag, sensor network, LBS, GIS, and CDMA) with food technologies (such as traceability, quality, distribution management) to manage the safety and quality of fresh food in the distribution process.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

A Study for Promotion Strategies of the Smart Grid in Convergence technology (융합기술을 활용한 스마트그리드 촉진전략에 관한 연구)

  • Mun, Jeong-Min;Leem, Wook-Bin;Cho, Sae-Hong
    • Journal of Digital Contents Society
    • /
    • v.15 no.4
    • /
    • pp.513-520
    • /
    • 2014
  • The Smart Grid is next-generation power system materialized Convergence and Integration of power technologies and Information Technologies. And this system is the next generation power system optimizing energy efficiency via real-time information exchanges grafting the information technologies upon present power networks which are web-net. The introduction of smart grid can be embodied for latitude, distributed and cooperated network by inter-active exchange of energy information between electrical power provider and consumer previous uni-directional electrical power supplement. Therefore in this paper, we proposed Convergence technologies - Smart power grid, Smart Place, Smart Renewable and Smart Electricity Service - to make smart-grid succeed via analyzing the datum. And we scoped on Convergence and Integration technologies, which could be used for smart-power-grid that is most important factor to replace previous power industries. And we brought out the expecting industrialize timing and interesting aspects and analyzed the result with survey of professional worker from institute, research center, power plant and business of power industries. And proposed the essential policies for the government and power-control-business companies based on the datum and survey output.

PCISS Scheme for Minimize Prove Delay in Wireless Mesh Networks (무선 메쉬 네트워크 환경에서 프로브 지연을 최소화한 PCISS 기법)

  • Cho, Young-Bok;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.25-31
    • /
    • 2012
  • Recently Wireless Communication technologies are widely used in Small And Medium Business fields. Wireless mesh networks have been studied as the next generation technology to solve problem of conventional wireless networks. Wireless mesh network uses a 802.11 when make up of network. mesh clients occurs Hard handover moving between ones. This increases the handover latency of the network mobility is a very great issues. Consequently, this paper propose a channel information previously methods to reduce the handover latency selective channels. Proposed scheme accounts for more than 90% of the probe delay to minimize the client had to move the mesh based on the old channel to retrieve information. Through simulation, the proposed scheme had shorter handover delay time than transitional full scan and selective scan. Through results of evaluation, the suggest PCISS scheme more fast 6.5% than transitional scheme.

  • PDF