• Title/Summary/Keyword: Service Deploy

Search Result 115, Processing Time 0.027 seconds

An Implementation of IMS Based PoC Service Deployment (IMS 기반의 PoC 서비스 전개 구현)

  • Lee, Jae-Oh;Lee, Hong-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4878-4883
    • /
    • 2015
  • The IP Multimedia Subsystem(IMS) is a framework that provides access to the content of Internet and Telecom services anytime and anywhere with guaranteed Quality of Service(QoS) and manageability by separating control functions from bearer and services. The Service Delivery Platform(SDP) provides common interfaces and protocols to deploy existing or new services in an efficient way. Therefore SDP over IMS plays a role of bridge between established network and new IMS network by simplifying the interaction among application services. In order to enrich the multimedia network communication, we try to deploy the Push-to-talk over Cellular(PoC) service which is considered as the outstanding and distinguished half-duplex Voice over IP(VoIP) application service among deployable candidate services over mobile network. In this paper we investigate the advantages of PoC service and PoC architecture firstly, and then focus on the its practical implementation for the prototype to validate the feasibility of its deployment and realization.

Multi-Service Multi-Plug-In Switching System (멀티서비스 멀티플러그인 교환 시스템)

  • 이정규;김영부
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.145-148
    • /
    • 1999
  • The ability to rapidly create and deploy new and novel services in response to market demands will be the key factor in determining the success of the future service provider. This goal may be approached from different directions. One of them is an open interface making the functionalities of a network element programmable and usable by outside entities. In this paper, we describe several aspects of this new, hot technical area and introduce related standard activities. In addition, we present a new switching system called MSMP (Multi-Service Multi-Plug-In), which is based on the open programmable interface concept, and describe its architecture and main functionalities of its components.

  • PDF

An Interface Sharing Service based on Jini (Jini 기반의 인터페이스 공유 서비스)

  • 문창주;문석현;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.227-240
    • /
    • 2003
  • When we develop and use the java-based distributed object system, the system developer must deploy distributed object, which is implemented to predefined interface, to network and the system user acquires reference about distributed object and changes reference to interface type. Sharing of interface is essential for these works In this paper, we propose the IRSJ(interface repository service based on jim) to improve efficiency of interface sharing at the JINI system development. the IRSJ is consisted of the java classes for JINI system and interface sharing service. If development teams perform collaborative work in short distance, the IRSJ can search interface file without information of lookup server or interface writer If development teams perform collaborative work in long distance, the IRJS can search interface with only an address of server that executes lookup service. Although the interface object not requires additional search, the interface object that failed search interface can download interface and use interface using remote event model. When the message service fails in interface search, the message service sends interface request message to a development team member who use the IRSJ automatically, so that interface sharing may be possible in short time.

A Deployment Strategy for ISP's Active Response Service (ISP의 능동 대응 서비스 제공 방안)

  • 이승민;남택용
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.391-394
    • /
    • 2002
  • Because of great damages by illegal hacking, demand for security of the public network as well as the private is seemingly limitless. This critic리 requirement is leading ISPS to deploy new security services for their customers. In this paper, we present active responses for the security of a ISP's network, and describe the deployment of a new security service using the network secured by that responses.

  • PDF

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

A Study on the deployment of IPv6 based VoIP trial service provided by LG Dacom (LG 데이콤의 차세대인터넷(IPv6) 기반 VoIP 시범서비스에 대한 연구)

  • Lee, Dong-Yeal;Kim, Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.163-166
    • /
    • 2007
  • This paper describes a IPv6 trial service provided by LG DACOM and discusses about the output of trial service. MIC has urged public organizations to introduce IPv6 technology into their network. As one of propelling policies, MIC and NIA launched some IPv6 trial project. LG DACOM, MIC's agent in doing IPv6 trial project, has selected three public organizations in order to deploy IPv6 based VoIP trial service. KMA, KISITI and MND gave out their different service requirements. In achieve this project we developed IPv6 supported voice IP phone, video IP phone, media gateway and IP-PBX. Furthermore, two KMA provincial offices adopted trial IP phone as working phone and replaced legacy PBX with IP-PBX. At the same time, public organizations introduced IPv6 technology into their local networks.

  • PDF

Wavelength Division Multiplexing-Passive Optical Network Based FTTH Field Trial Test

  • Kim, Geun-Young;Kim, Jin-Hee
    • Journal of the Optical Society of Korea
    • /
    • v.11 no.3
    • /
    • pp.101-107
    • /
    • 2007
  • In this paper, we have presented the results of Wavelength Division Multiplexing-Passive Optical Network (WDM-PON) based fiber-to-the-home (FTTH) field trial test which was held in the city of Gwangju. We have implemented an injection locked Fabry-Perot Laser Diode (FP-LD) based WDM-PON system and reliably delivered Internet Protocol TV (IP-TV), networked Personal Video Recorder (N-PVR), High-Definition Video on Demand (HD-VoD), Education on Demand (EoD) and Internet service as FTTH service through the system during the field trial test. We have also verified that the WDM-PON system worked well to provide quality of service (QoS) guaranteed 100Mbps bandwidth per subscriber. Furthermore, we have presented network designing issues in Outside Plant (OSP) and Customer Premises Network (CPN) that should be overcome to efficiently deploy FTTH service. Finally, based on the field trial test results, we proposed FTTH service deployment strategies.

Replication of blockchain application services using kubernetes and blockchain service registry (쿠버네티스와 블록체인 서비스 레지스트리를 이용한 블록체인 서비스 중복실행기법)

  • Kwon, Min-Ho;Lee, Myung-Joon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.363-364
    • /
    • 2020
  • 본 논문에서는 쿠버네티스와 블록체인 서비스 레지스트리를 이용한 블록체인 서비스 중복실행 기법을 제안한다. 이 기법은 컨테이너 관리 도구인 쿠버네티스를 이용하여 중복 실행 기법이 적용된 블록체인 서비스를 신속하게 실행할 수 있다. 또한 이 기법은 서비스 접근 위치, 복구를 위한 정보 등을 저장하는 블록체인 서비스 레지스트리를 이용하여 서비스 장애가 발생할 경우에 블록체인 서비스를 견고하게 실행할 수 있다.

  • PDF

Efficient management of zoonoses (인수공통전염병의 효율적인 관리 방안)

  • Park, Jae-Myoung;Ryu, Jae-Yoon;Song, Hee-Jong
    • Korean Journal of Veterinary Service
    • /
    • v.31 no.3
    • /
    • pp.425-431
    • /
    • 2008
  • A strategic national plan to control of zoonoses is currently somewhat insufficient. Government should extensively assign all case reports of zoonotic disease outbreaks and needs to control them in the context of other decrees. Additionally capacity of veterinarian needs to he increased to control zoonotic diseases efficiently. Namely, veterinarian is responsible for reporting to health authorities if any of zoonotic diseases are diagnosed. Furthermore, government should deploy the veterinarian's resources for prompt epidemiological investigation and for taking countermeasures against zoonotic diseases.