• Title/Summary/Keyword: Wireless Internet

Search Result 3,089, Processing Time 0.031 seconds

Design and Implementation of JAIN SIP-based Softphone Client (JAIN SIP 기반 소프트폰 클라이언트의 설계 및 구현)

  • Kim, Byung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2301-2306
    • /
    • 2008
  • SIP(Session Initiation Protocol) has become an universal standard for multimedia communications for both wired and wireless networks since it has been adopted as a standard protocol for IMS platform in 3GPP standardization organization at November 2000. In this paper, we design and implement a SIP-based softphone client program which provides telephony service between internet users and a call center equipped with VoIP gateway. A softphone client based on PC-to-phone connection should guarantee to provide interoperability with various VoIP gateways and higher portability to be able to operate on different PC environments. The softphone client program in this paper has been developed with SIP 2.0 standard protocol to support interoperability and with JAIN SIP and JMF package to achieve higher portability.

A Study of Efficient Transmission of SVG File using SMETA (SMETA를 이용한 효과적인 SVG 파일 전송에 관한 연구)

  • Yoo, Nam-Hyun;Son, Cheol-Su;Kim, Won-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.14-19
    • /
    • 2007
  • As XML is used by standard format for information expression and information exchange in various field, Many Company began to use SVG by user interface or information expression tool of embedded system such as mobile phone based wireless internet. Because SVG has many additional information to keep structure of SVG document exception real data, there is a problem that transfer time of SVG file is so cost for quantity of transmitted data actually. To solve this problem, many researches using compression conception have been conducted for applying to an embedded system. This paper proposes SMETA that can use existing researches using compression concept at once. SMETA divides SVG file to each part that can allocate meaning, and gives semantic metadata to each part without alteration of SVG structure. SMETA can reduce site of transmitted SVG file actually by transmitting specification part of SVG file that metadata does not agree or has unlisted part in an embedded system between an embedded system and server, before transmit whole SVG file. By size of transmitting SVG file is decreasing, transfer time can be shortened accordingly.

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node (MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구)

  • Lee, Dae-Young;Song, Sang-Hoon;Bae, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.

A Method of Improving Plan for The Local City Competitive Power Utilizing by Private Communication Networks in An Ubiquitous-City RFID Wireless Infra (U-City RFID무선인프라 자가통신네트워크를 연계한 지방자치 도시경쟁력 제고방안)

  • Lee, Bong-Choon;Ha, Deock-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.657-662
    • /
    • 2009
  • The international society under the internet technology have been declining boundaries of the global economy. After this step, a social revolution will be happen from the ubiquitous technology which gives objects intelligence to serve people. And then it is expected that every part of a city competitive power is defined by both in quality and in quantity of the ubiquitous information unit in the future. On this score, now each nation is trying to set relative services and broadband networks to lead the ubiquitous industry. Therefore this paper analyzed about the progress and prospect of a local U-city plan in our nation. And than we propose a method of configurating broadband self-communication network on the base of cost and utilization Especially we propose a new city development model which use U-city and self-communication network to improve a city competitive power.

  • PDF

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant (정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례)

  • Kim, Yunha;Yu, Chool;Oh, Eun;Kim, Chanmoon;Park, Ikdong;Kim, Yongseong;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.329-339
    • /
    • 2019
  • Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.

Long Distance Transmission System of Tag's ID in RFID System (전자인식 시스템에서 택 ID의 원거리 전송 시스템)

  • Kim, Dong-Hun;Jo, Hyeong-Guk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.63-67
    • /
    • 2009
  • In RFID system, Tag's Identification data is processed in host computer by application program. Example of application program is parking administration program, library state program etc.. Tag's ID that is recognized in reader is inputted to the Host computer. Application program of computer searches data in DB of computer such as Tag ID. After finding the same ID, host computer send to control command to driver H/W in accordance with application purpose. But, It need to confirm in long distance whether achievement process is acted normally. There will be the 2 methods, when we monitors the process in long distance. One is wired monitoring system, another is wireless monitoring system. Among wire method, internet communication network is useful. RFID system manufacture first in this treatise. RFID system Embody using EM4095 chip that is doing 125KHz by carrier wave. Tag's characteristic ID is sent in remote place through module that use W3100A chip. This system Manufacture, and data send-receive confirmed using simple application program. Reception confirm by result, and pictures show by whole system and each part. And a control program explained of each part.

  • PDF

PMIP-based Distributed Mobility Management for Tactical Network (전술 기동망의 이동성 지원을 위한 PMIP기반 분산 이동성 관리 적용방안)

  • Sun, Kyoungjae;Kim, Younghan;Noh, Hongjun;Park, Hyungwon;Han, Myounghun;Kwon, Daehoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.5
    • /
    • pp.654-666
    • /
    • 2019
  • The tactical network has several different characteristics compared with commercial internet network such as hierarchical topology, dynamic topology changing and wireless link based connectivity. For considering IP mobility management in the tactical network, current mobility management using Mobile IP(MIP) is not suitable with some reasons such as non-optimal routing paths and single point of failure. Proxy Mobile IP(PMIP) which supporting network-based mobility in hierarchical manner can provide optimal routing path in the tactical network environment, but centralized anchor is still remained a threat to the stability of the tactical network which changes its topology dynamically. In this paper, we propose PMIP-based distributed mobility management for the tactical network environment. From our design, routing paths are always configured in optimized way, as well as path is recovered quickly when the mobility anchor of user is failed. From numerical analysis, comparing to other mobility scheme, result shows that the proposed scheme can reduce packet transmission cost and latency in tactical network model.

A Blocking Algorithm of a Target Object with Exposed Privacy Information (개인 정보가 노출된 목표 객체의 블로킹 알고리즘)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.43-49
    • /
    • 2019
  • The wired and wireless Internet is a useful window to easily acquire various types of media data. On the other hand, the public can easily get the media data including the object to which the personal information is exposed, which is a social problem. In this paper, we propose a method to robustly detect a target object that has exposed personal information using a learning algorithm and effectively block the detected target object area. In the proposed method, only the target object containing the personal information is detected using a neural network-based learning algorithm. Then, a grid-like mosaic is created and overlapped on the target object area detected in the previous step, thereby effectively blocking the object area containing the personal information. Experimental results show that the proposed algorithm robustly detects the object area in which personal information is exposed and effectively blocks the detected area through mosaic processing. The object blocking method presented in this paper is expected to be useful in many applications related to computer vision.

Design of Tourist Information System based on the Current Location using Merged Reality (MR을 이용한 현재 위치 기반 관광 안내 시스템 설계)

  • Cho, Kyoung-Woo;Jeon, Min-Ho;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.843-845
    • /
    • 2016
  • Concomitant with development of AR(Augmented Reality) and VR(Virtual Reality), interest in location based games and augmented reality have increased and various services have been developed. Due to this, AR, VR, MR(Merged Reality) techniques are considered one of fourth industrial revolution techniques. Oculus Rift which is representative of VR technology, and HTC VIVE need separate controllers, and don't offer service such as receiving external video information when users are using devices. In the case of project Alloy, which is a MR device of Intel, this has advantages such as controlling devices through hand signals and facial expressions, and receiving external video information. In this paper, we propose tourist guide system based on current position using MR. This system makes economical tour possible by arranging tourist attraction information which is from current position of tourists in correct places through external video information using MR, location determination using GPS, tourism information search using wireless internet.

  • PDF

Measurement of Communication Performance for Application of LPWA in Industrial Field (산업현장의 LPWA 적용을 위한 건물 내부 통신 성능 측정)

  • Kwon, Hyuk;Jin, Kyoung-Bog;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.1
    • /
    • pp.90-96
    • /
    • 2019
  • LPWA is a cost-effective and time-saving technology with wide coverage. However, the LPWA is an ISM band that uses UHF radio waves, and its performance is very poor indoors because of its strong linearity. But, because of the possibility of achieving high performance compared to other communication in the room, this paper has studied the indoor communication performance by applying LoRa in LPWA technologies. After installing the data receiving module on the 4th floor, the transmission module was placed at the end of the building from the same floor to the 1st floor, and the data was collected. As a results, it installed on the 1st floor can be collected data with 98 ~ 99% probability, and the lowest RSSI is about -116dBm. Thus, considering the specification of LoRa with a maximum reception sensitivity -136dBm when the spreading factor is 12, the application of LPWA in the industrial field can be fully considered.