• Title/Summary/Keyword: Protocol Design

Search Result 2,595, Processing Time 0.022 seconds

Design and Implementation of POI Service based on Terrestrial-DMB (지상파 DMB 기반의 POI 서비스 설계 및 구현)

  • Jeong, Young-Ho;Kim, Soon-Choul;Cho, Sam-Mo;Kim, Geon;Ahn, Chung-Hyun;Kim, Whan-Woo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2005.11a
    • /
    • pp.127-130
    • /
    • 2005
  • 우수한 이동수신 성능을 지닌 지상파 DMB(T-DMB: Terrestrial-Digital Multimedia Broadcasting)의 킬러앱(Killer App)이라 불리는 교통 및 여행정보(TTI: Traffic and Travel Information) 서비스는 주 5일 근무제 실시와 지속적인 자동차수 증가로 인해 그 중요성이 부각되고 있다. 지상파 DMB 기반의 TTI 서비스 전송을 위한 프로토콜로 국제 표준인 TPEG(Transport Protocol Expert Group)이 유력시 되고 있으나, 현재 국제 표준화가 완료된 서비스 규격으로는 속도 ${\cdot}$ 유고정보 및 대중교통수단 관련 정보 전송이 가능한 RTM(Raod Traffic Message)과 PTI(Public Transport Information) 뿐이다. 국내의 경우, 속도 정보 제공을 위한 새로운 서비스 규격으로 CTT(Congestion and Travel Time Information)에 대한 표준화 작업이 진행 중에 있다. 최근 이동통신 인프라 대신 지상파 DMB를 기반으로 한 새로운 위치기반서비스의 규격 제정의 필요성이 대두되었으며, 이에 따라 이를 위한 국내 표준화 활동이 본격적으로 추진될 예정이다. 본 논문에서는 기존 TPEG 규격과 완벽히 호환되는 위치기반서비스 전송을 위한 새로운 POI(Point Of Interest) 프로토콜을 제안하였다. 이의 검증을 위해 POI 데이터 서비스 저작 및 전송서버 및 POI 수신 플랫폼을 설계 ${\cdot}$ 구현하여 송수신 플랫폼을 구성하였으며, 구축된 플랫폼을 이용한 방송실험을 통해 제안된 POI 서비스 응용 프로토콜의 안정성 및 전송 효율성을 확인하였다.

  • PDF

Implementation of Mobile IPv6 Fast Authorization for Real-time Prepaid Service (실시간 선불 서비스를 위한 모바일 IPv6 권한검증 구현)

  • Kim Hyun-Gon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.121-130
    • /
    • 2006
  • In next generation wireless networks, an application must be capable of rating service information in real-time and prior to initiation of the service it is necessary to check whether the end user's account provides coverage for the requested service. However, to provide prepaid services effectively, credit-control should have minimal latency. In an endeavor to support real-time credit-control for Mobile IPv6 (MIPv6), we design an implementation architecture model of credit-control authorization. The proposed integrated model combines a typical credit-control authorization procedure into the MIPv6 authentication procedure. We implement it on a single server for minimal latency. Thus, the server can perform credit-control authorization and MIPv6 authentication simultaneously. Implementation details are described as software blocks and units. In order to verify the feasibility of the proposed model. latency of credit-control authorization is measured according to various Extensible Authentication Protocol (EAP) authentication mechanisms. The performance results indicate that the proposed approach has considerably low latency compared with the existing separated models, in which credit-control authorization is separated from the MIPv6 authentication.

  • PDF

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.

Design of Intrusion Responsible System For Enterprise Security Management (통합보안 관리를 위한 침입대응 시스템 설계)

  • Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.51-56
    • /
    • 2005
  • Service operating management to keep stable and effective environment according as user increase and network environment of the Internet become complex gradually and requirements of offered service and user become various is felt constraint gradually. To solve this problem, invasion confrontation system through proposed this log analysis can be consisted as search of log file that is XML's advantage storing log file by XML form is easy and fast, and can have advantage log files of system analyze unification and manages according to structure anger of data. Also, created log file by Internet Protocol Address sort by do log and by Port number sort do log, invasion type sort log file and comparative analysis created in other invasion feeler system because change sort to various form such as do log by do logarithm, feeler time possible.

  • PDF

Design of QoS-based Routing Algorithm for Internet Services on Large Scale ATM Networks (광역 ATM 망 적용을 위한 QoS 보장형 라우팅 알고리즘 설계)

  • 손승원;장종수;정연서;오창석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1517-1531
    • /
    • 1999
  • The Internet is recently evolving into the directions which is capable of incorporating stream-type services such as voice and video services. However, the existing Internet can only support a best-effort delivery model and thus it is difficult to satisfy these requirements as well as to provide the QoS beyond a certain degree. Accordingly, it is imperative to develop QoS based routing algorithm in order to allow the routing by the user's QoS demand and to be applied into wide area networks. In this thesis, we presented new routing algorithms and made performance evaluations. The proposed algorithms allow the routing by the user’s QoS demand level in order to provide the diverse Internet application services based on ATM network environment that is expected to play a role as an infrastructure of high-speed communication network. They also have a feature of shortening the waiting time for address analysis and have a quality-proven characteristics with enhanced network scalability.

  • PDF

Study on Design of IP PBX of Distribute Base on SIP Protocol Stack (SIP프로토콜 스텍을 기반으로 하는 분산형 IP PBX 단말기 설계)

  • Yoo Seung-Sun;Yoo Gi-Hyoung;Lim Pyung-Jong;Hyun Chul-Ju;Kwak Hoon-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4A
    • /
    • pp.377-384
    • /
    • 2006
  • According to fast VoIP technology development, more and more companies change voice network into IP based network among branch offices. IP PBX, which is deployed up to now, composed of IP phone and VoIP Gateway. Every telphone has replaced with If phone which support VoIP and VoIP gateway is installed in PBTN connection point to relay voice data. It can reduce the communication expense of International call, long distance call and call between a headquater and a trance because it uses internet line. In this paper, IP PBX is implemented that can distribute call using PBX network only usig personal terminal without Proxy Server. Depending on Role, terminal can be registered Master, Server and Client and it is verified in terms of performance and validation.

Medium Access Control Protocols for Full-Duplex Communications in WLAN Systems: Approaches and Challenges (무선랜 시스템에서 전이중 통신을 위한 MAC 프로토콜 분석)

  • Kim, Wonjung;Song, Taewon;Kim, Taeyoon;Pack, Sangheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1276-1285
    • /
    • 2015
  • Full-duplex communications have emerged as a key technology for next-generation wireless local area networks (WLANs). Although the key enabling technology for full-duplex communications is the self-interference cancellation (SIC) technique in the physical layer, the employment of full-duplex communications has huge potentials to substantially increase the throughput at the medium access control (MAC) layer. At the same time, full-duplex communications pose non-trivial challenges to the MAC protocol design. In this article, we first identify salient problems in supporting full-duplex communications in WLAN MAC protocols. After that, we survey the state-of-the art to address those problems and analyze their pros and cons. Finally, we present open research challenges to improve the effectiveness of full-duplex communications in WLANs.

Design and Implementation of Mechanism for Effectively Exchanging Cybersecurity Information between Independent Security Management Domains (독립적인 보안관리 도메인간 효과적인 사이버보안정보 교환 방법의 설계 및 구현)

  • An, Gae-Il;Seo, Dae-Hee;Lim, Sun-Hee;Kim, Jong-Hyun;Seo, Dong-Il;Cho, Hyun-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1489-1497
    • /
    • 2011
  • As a way for defending against cyber security threats, there has been a research on cybersecurity information exchange between security management domains in order to raise security performance of the whole network. One of the hottest issues in exchanging cybersecurity information between security management domains is that the requirements of those domains on information sharing are different with each other because each is autonomous domain. This paper proposes a mechanism for effective cybersecurity Information exchange between independent security management domains, which can satisfy their requirements on information sharing through sharing policy and sharing policy control protocol, proposed in this paper. In this paper we have developed an integrated security control system that supports the proposed mechanism. Through the system the performance of the proposed mechanism is measured and evaluated.

Propagation and Crosstalk Characteristic Analysis of Pulse Shaped Signals on the Coupled Microstrip Lines (결합 마이크로스트립 선로상의 펄스형태 신호의 전파 및 누화 특성 해석)

  • Park, Sun-Keun;Kim, Nam;Rhee, Sung-Yup;Jang, Woo-Hyun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.5
    • /
    • pp.516-524
    • /
    • 1997
  • The propagation properties of various pulse signal types(square pulse, Gaussian pulse, trapezoid pulse, RF pulse) on coupled microstrip lines are investigated. Numerical integration technique which has its accuracy and is easily simulated, is used to obtain the time domain response of pulse signals. Frequency-dependent characteristics of coupled microstrip line is obtained using Jansen's approximate equation. The propagation properties of pulse signal on coupled microstrip lines is analyzed regarding to its geometric structure (relative permittivity ${varepsilon}_r$ substrate height h, strip width w of the microstrip line) and pulse width ${\tau}$ of signal pulse. The simulation results show that space between two lines is very significant parameter in pulse distortion in comparison of any other parameters. The results of this paper are compatible to the trade-off determination of relative permittivity, substrate height, strip width and pulse width of signal pulse when a design of MIC and MMIC is necessary.

  • PDF

A Robot End-effector for Biopsy Procedure Automation with Spring-Triggered Biopsy Gun Mechanism (스프링 격발형 생검총 구조를 가진 생검 시술 자동화 로봇 말단장치)

  • Won, Jong-Seok;Moon, Youngjin;Park, Sang Hoon;Choi, Jaesoon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.8
    • /
    • pp.590-596
    • /
    • 2016
  • Biopsy is a typical needle type intervention procedure performed under radiographic image equipment such as computed tomography (CT) and cone-beam CT. This minimal invasive procedure is a simple and effective way for identifying cancerous condition of a suspicious tissue but radiation exposure for the patients and interventional radiologists is a critical problem. In order to overcome such trouble and improve accuracy in targeting of the needle, there have been various attempts using robot technology. Those devices and systems, however, are not for full procedure automation in biopsy without consideration for tissue sampling task. A robotic end-effector of a master-slave tele-operated needle type intervention robot system has been proposed to perform entire biopsy procedure by the authors. However, motorized sampling adopted in the device has different cutting speed from that of biopsy guns used in the conventional way. This paper presents the design of a novel robotic mechanism and protocol for the automation of biopsy procedure using spring-triggered biopsy gun mechanism. An experimental prototype has been successfully fabricated and shown its feasibility of the automated biopsy sequence.