• Title/Summary/Keyword: Virtual Network Environment

Search Result 414, Processing Time 0.031 seconds

A Design and Implementation of a Home Gateway based on the RTC Technology Supporting Live Video Streaming (라이브 비디오 스트리밍을 지원하는 RTC 기반 홈 게이트웨이의 설계 및 구현)

  • Kim, Hye-Sun;Hwang, Ki-Tae
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.589-596
    • /
    • 2005
  • The objective of this paper lies in the design and implementation of a home gateway supporting live video streaming which flows from the Non-SIP video camera in home to the mobile SIP device outside. We developed the home gateway on the OSGi framework and employed the RTC technology which embeds an SIP stack so that the multimedia session can be established from the home device to the mobile user outside. And also we developed an RTC bundle to manage the session and a virtual capture device driver to read the video stream from the Non-SIP video camera in the home network, and installed them on the home gateway. Finally, we constructed the experimental environment that has the windows messenger as the SIP mobile device and an AXIS 2100 UPnP video camera as a video source, and then tested if the session establishment to the mobile user from the camera and live video streaming work well between them.

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments (클라우드 컴퓨팅 환경에서 가상화 관리 융합접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • The purpose of access control is to prevent computing resources from illegal behavior such as leakage, modification, and destruction by unauthorized users. As the cloud computing environment is expanded to resource sharing services using virtualization technology, a new security model and access control technique are required to provide dynamic and secure cloud-based computing services. The virtualization management convergence access control model provides a flexible user authorization function by applying the dynamic privilege assignment function to the role based access control mechanism. In addition, by applying access control mechanism based on security level and rules, we solve the conflict problem in virtual machine system and guarantee the safeness of physical resources. This model will help to build a secure and efficient cloud-based virtualization management system and will be expanded to a mechanism that reflects the multi-level characteristics.

On-line Motion Control of Avatar Using Hand Gesture Recognition (손 제스터 인식을 이용한 실시간 아바타 자세 제어)

  • Kim, Jong-Sung;Kim, Jung-Bae;Song, Kyung-Joon;Min, Byung-Eui;Bien, Zeung-Nam
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.6
    • /
    • pp.52-62
    • /
    • 1999
  • This paper presents a system which recognizes dynamic hand gestures on-line for controlling motion of numan avatar in virtual environment(VF). A dynamic hand gesture is a method of communication between a computer and a human being who uses gestures, especially both hands and fingers. A human avatar consists of 32 degree of freedom(DOF) for natural motion in VE and navigates by 8 pre-defined dynamic hand gestures. Inverse kinematics and dynamic kinematics are applied for real-time motion control of human avatar. In this paper, we apply a fuzzy min-max neural network and feature analysis method using fuzzy logic for on-line dynamic hand gesture recognition.

  • PDF

Design and Implementation of a Framework for Collaboration Systems in the Shipbuilding and Marine Industry (조선해양 설계분야에서 협업시스템을 위한 프레임워크의 설계 및 구현)

  • Yun, Moon-Kyeong;Kim, Hyun-Ju;Park, Min-Gil;Han, Myeong-Ki;Kim, Wan-Kyoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.270-273
    • /
    • 2015
  • In shipbuilding and marine industry, engineering and design software solutions have upgraded from the original 2D schematic data based CAD system to a modern 3D drawing-based system. Due to the fact that the massive amount of data usage in real time and data volumes of various engineering models including graphic data have increased, several problems such as lack of server resources and improper handling of 3D drawings have been raised. Besides, increasing the number of session connections per server can cause deterioration of server performance. Recently, increasing the yard's sophisticated design capabilities highlighted the need to develop engineering and design system which would not only overcome the network performance issues, but would provide efficient collaborative design environment. This paper presents an overview of the framework for collaborative engineering design system based on the virtual application (Citrix XenApp 6.5)and acceleration hardware technology of 3D graphics (NVIDIA GRID K2 solution).

  • PDF

An Efficient Authentication Protocol Using Single Bit Synchronization for Wireless LAN Environment (단일 Bit 동기화를 이용한 무선 LAN 환경에서의 효율적인 인증 프로토콜)

  • Jo Hea Suk;Youn Hee Yong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.747-754
    • /
    • 2004
  • Today, wireless LANs are widely deployed in various places such as corporate office conference rooms, industrial warehouses, Internet-ready classrooms, etc. However, new concerns have been raised regarding suity. Currently, both virtual private network(VPN) and WEP are used together as a strong authentication mechanism. While security is increased by using VPN and WEP together, unnecessary redundancy occurs causing power consumption increase and authentication speed decrease in the authentication process. In this paper a new synchronization protocol for authentication is proposed which allows simple authentication, minimal power consumption at the mobile station, and high utilization of authentication stream. This is achieved by using one bit per a frame authentication, while main authentication process including synchronization is handled by access points. Computer simulation reveals that the proposed scheme significantly improves the authentication efficiency in terms of the number of authenticated frames and authentication speed compared with an earlier protocol employing a similar authentication approach.

A Study on the V2G Application using the Battery of Electric Vehicles under Smart Grid Environment (스마트그리드 환경에서 전기자동차 배터리를 이용한 V2G의 활용방안에 관한 연구)

  • Choi, Jin-Young;Park, Eun-Sung
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.1
    • /
    • pp.40-45
    • /
    • 2014
  • This study examines the system and process of battery stored energy in vehicles and suggest the effective area for the use of V2G(vehicle-to-grid) from Jeju Smart Grid Demonstration Project. V2G means technology of electric power transmission from the battery of electric-drive vehicles to state grid. As for the increasing of effectiveness for demand-side control, V2G is a very good alternative. In the U.S., the utilization of electric vehicles is under 40% on average. In this case, we can use he battery of electric vehicle as role of frequency regulation or generator of demand-side resource. V2G, which is the element of Smart Transportation, consists of electric vehicle battery, BMS(battery management system), OBC(on-board charger), charging infrastructure, NOC(network operating center) and TOC(total operation center). V2G application has been tested for frequency regulation to secure the economical efficiency in the United States. In this case, the battery cycle life is not verified its disadvantage. On the other hand, Demand Response is required by low c-rate of battery in electric vehicle and It can be small impact on the battery cycle life. This paper concludes business area of demand response is more useful than frequency regulation in V2G application of electric vehicles in Korea. This provides the opportunity to create a new business for power grid administrator with VPP(virtual power plant).

Concept Design of Download Over-the-Air functions for IoF-Cloud based distributed IoT device (IoF-Cloud 기반 분산된 IoT 장비들을 위한 Download Over-the-Air 기능의 개념 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, HyeongGyun;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.9-17
    • /
    • 2016
  • Over the next 20 years it will begin the exodus from the Internet and smart phones to the Internet of Things. The heart of IoT gives new utility and value with connectivity among things around people to the human. In future, Industrial environment will be intimately connect all among machines and machines or factories and factories in all processing, and by digitizing of all goods and production life-cycle, which is a combination of virtual world and real world, the digital factory will become reality eventually. The proposed IoT or IIoT based Download OTA (Over-the-Air) provides a flexible mechanism for downloading Media objects of any type and size from a network. Moreover, proposed IoT based DLOTA provides a part of security by lightweight encryption, OTP, and CapBAC technique.

Relay of Remote Control Signal for Spacecraft in Deep Space via FHLH (FHLH를 매개로 한 심우주 우주선 원격 제어 신호 중계)

  • Koo, Cheol Hea;Kim, Hyungshin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.4
    • /
    • pp.295-301
    • /
    • 2020
  • When a spacecraft in deep space falls into an abnormal state, an emergency communication channel between ground and the spacecraft is essential in order to perform analysis to the cause of the anomaly, and to remedy the spacecraft from the distressed state. Because the recovery actions generally comprises of long and complicated sequences of commands, the transmission of the recovery commands may require a reliable and a delay tolerant networking technology based on bundle routing. While the delay tolerant networking protocol becomes a prominent method interfacing ground and space into a internet-like Solar system network because it can address the issues of the severe communication problems in deep space, the communication system on the spacecraft which based on space packet protocol cannot use the delay tolerant networking technology directly. So a community of the consultative committee for space data systems starts a discussion of the first-hop last-hop mechanism to establish a feasible concept and standardization. This paper presents an enhanced concept of the first-hop last-hop by applying it a virtual cislunar communication environment, and we believe this contributes to make a way applicable to an interoperable relay concept of the first hop last hop between the delay tolerant networking and space packet protocol standard.

P2P Systems based on Cloud Computing for Scalability of MMOG (MMOG의 확장성을 위한 클라우드 컴퓨팅 기반의 P2P 시스템)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.1-8
    • /
    • 2021
  • In this paper, we propose an approach that combines the technological advantages of P2P and cloud computing to support MMOGs that allowing a huge amount of users worldwide to share a real-time virtual environment. The proposed P2P system based on cloud computing can provide a greater level of scalability because their more resources are added to the infrastructure even when the amount of users grows rapidly. This system also relieves a lot of computational power and network traffic, the load on the servers in the cloud by exploiting the capacity of the peers. In this paper, we describe the concept and basic architecture of cloud computing-based P2P Systems for scalability of MMOGs. An efficient and effective provisioning of resources and mapping of load are mandatory to realize this architecture that scales in economical cost and quality of service to large communities of users. Simulation results show that by controlling the amount of cloud and user-provided resource, the proposed P2P system can reduce the bandwidth at the server while utilizing their enough bandwidth when the number of simultaneous users keeps growing.

A Study on Operational Element Identification and Integrated Time Series Analysis for Cyber Battlefield Recognition (사이버 전장인식을 위한 작전상태 요소 식별 및 통합 시계열 분석 연구)

  • Son-yong Kim;Koo-hyung Kwon;Hyun-jin Lee;Jae-yeon Lee;Jang-hyuk Kauh;Haeng-rok Oh
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.65-73
    • /
    • 2022
  • Since cyber operations are performed in a virtual cyber battlefield, the measurement indicators that can evaluate and visualize the current state of the cyber environment in a consistent form are required for the commander to effectively support the decision-making of cyber operations. In this paper, we propose a method to define various evaluation indicators that can be collected on the cyber battlefield, normalized them, and evaluate the cyber status in a consistent form. The proposed cyber battlefield status element consists of cyber asset-related indicators, target network-related indicators, and cyber threat-related indicators. Each indicator has 6 sub-indicators and can be used by assigning weights according to the commander's interests. The overall status of the cyber battlefield can be easily recognized because the measured indicators are visualized in time series on a single screen. Therefore, the proposed method can be used for the situational awareness required to effectively conduct cyber warfare.