• Title/Summary/Keyword: broadband communication network

Search Result 243, Processing Time 0.036 seconds

Adaptive Input Traffic Prediction Scheme for Absolute and Proportional Delay Differentiated Services in Broadband Convergence Network

  • Paik, Jung-Hoon;Ryoo, Jeong-Dong;Joo, Bheom-Soon
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.227-237
    • /
    • 2008
  • In this paper, an algorithm that provides absolute and proportional differentiation of packet delays is proposed with the objective of enhancing quality of service in future packet networks. It features an adaptive scheme that adjusts the target delay for every time slot to compensate the deviation from the target delay, which is caused by prediction error on the traffic to arrive at the next time slot. It predicts the traffic to arrive at the beginning of a time slot and measures the actual arrived traffic at the end of the time slot. The difference between them is utilized by the delay control operation for the next time slot to offset it. Because the proposed algorithm compensates the prediction error continuously, it shows superior adaptability to bursty traffic and exponential traffic. Through simulations we demonstrate that the algorithm meets the quantitative delay bounds and is robust to traffic fluctuation in comparison with the conventional non-adaptive mechanism. The algorithm is implemented with VHDL on a Xilinx Spartan XC3S1500 FPGA, and the performance is verified under the test board based on the XPC860P CPU.

  • PDF

A Study of Subjective Speech Quality Measurement in VoIP (VoIP 음질의 주관적 평가에 관한 연구)

  • 강영도;강진석;최연성;김장형
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.279-287
    • /
    • 2001
  • In this paper, we discuss the scale of subjective speech quality measurement over VoIP(Voice over IP) network which is a component of broadband networks. Objective parameters of multimedia services like PSNR or jitter can easily measured and defined, but these factors are not easily meet the user's perceptual recognition. We suggest the speech quality measurement scale through the subjective measurement for end-to-end speech quality composed of sender-side quality, transmission quality, receiver-side quality, which provide the degree of correctness of representation of speaker, the degree of impairment caused by various factors, the degree of recognition of processed speech, respectively. Also, we examined the proposed method and verify it's availability.

  • PDF

The Congestion Control using Multiple Time Scale under Self-Similar Traffic of TCP (TCP의 자기 유사성 트래픽 조건하에서 다중 시간 간격을 이용한 혼잡 제어)

  • 김광준;윤찬호;김천석
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.310-323
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to window-based congestion control, in particular, TCP This is performed by interfacing TCP with a large tine scale control nodule which adjusts the aggressiveness of bandwidth consumption behavior exhibited by TCP as a function of "large time scale" network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by RTT Our contribution is threefold. First, we define a modular extension of TCP-a function call with a simple interface-that applies to various flavors of TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that multiple time scale TCP endows the underlying feedback control with preactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of three traffic control dimensions-tracking ability, connection duration, and fairness-on performance. Performance evaluation of multiple time scale TCP is facilitated by a simulation bench-mark environment which is based on physical modeling of self-similar traffic.

Design and Implementation of the Channel Adaptive Broadband MODEM (채널 적응형 광대역 모뎀 설계 및 구현)

  • Chang, Dae-Ig;Kim, Nae-Soo
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.141-148
    • /
    • 2004
  • Recently, the demand of broadband communications such as high-speed internet, HDTV, 3D-HDTV and ATM backbone network has been increased drastically. For transmitting the broad-bandwidth data using wireless network, it is needed to use ka-band frequency. However, the use of this ka-band frequency is seriously affected to the received data performance by rain fading and atmospheric propagation loss at the Ka-band satellite communication link. So, we need adaptive MODEM to endure the degraded performance by channel environment. In this paper, we will present the structure and design of the 155Mbps adaptive Modem adaptively compensated against channel environment. In order to compensate the rain attenuation over the ka-band wireless channel link, the adaptive coding schemes with variable coding rates and the multiple modulation schemes such as trellis coded 8-PSK, QPSK, and BPSK are adopted. And the blind demodulation scheme is proposed to demodulate without Information of modulation mode at the multi-mode demodulator, and the fast phase ambiguity resolving scheme is proposed. The design and simulation results of adaptive Modem by SPW model are provided. This 155Mbps adaptive MODEM was designed and implemented by single ASIC chip with the $0.25\mu{m}$ CMOS standard cell technology and 950 thousand gates.

A Study on the Development Plan to Increase Supplement of Voice over Internet Protocol (인터넷전화의 보급 확산을 위한 발전방안에 관한 연구)

  • Park, Jae-Yong
    • Management & Information Systems Review
    • /
    • v.28 no.3
    • /
    • pp.191-210
    • /
    • 2009
  • Internet was first designed only for sending data, but as the time passed, internet started to evolve into a broadband multi-media web that is capable of transmitting sound, video, high-capacity data and more due to the demands of internet users and the rapid changing internet-communication technology. Domestically, in January, 2000 Saerom C&T, launched a free VoIP, but due to limited ways of conversation(PC to PC) and absence of a revenue model, and bad speech quality, it had hit it's growth limit. This research studied VoIP based on technological enhancement in super-speed internet. According to IDC, domestic internet market's size was 80,800 million in 2008, and it formed a percentage of 12.5% out of the whole sound-communication market. in case of VoIP, it is able to maximize it's profit by connecting cable and wireless network, also it has a chance of becoming firm-concentrated monopoly market by fusing with IPTV. Considering the fact that our country is insignificant in MVNO revitalization, regulating organizations will play a significant roll on regulating profit between large and small businesses. Further research should be done to give VoIP a secure footing to prosper and become popularized.

  • PDF

Congestion Control with Multiple Time Scale under Self-Similar Traffic (자기유사성 트래픽 조건에서 다중 시간 간격을 이용한 혼잡제어)

  • Park, Dong-Suk;Ra, Sang-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.65-75
    • /
    • 2005
  • Measurement of network traffic have shown that the self-similarity is a ubiquitous phenomenon spanning across diverse network environments. In previous work, we have explored the feasibility of exploiting the long-range correlation structure in a self-similar traffic for the congestion control. We have advanced the framework of the multiple time scale congestion control and showed its effectiveness at enhancing performance for the rate-based feedback control. Our contribution is threefold. First, we define a modular extension of the TCP-a function called with a simple interface-that applies to various flavours of the TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that a multiple time scale TCP endows the underlying feedback control with proactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of the three traffic control dimensions-tracking ability, connection duration, and fairness-on performance.

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.197-200
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LG) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

  • PDF

A Coexistence Study of Low-power Short-range Wireless Network and Incumbent Service in the 6GHz band (6GHz 비면허 대역의 저전력 근접 무선통신과 기존 무선업무와의 공존 연구)

  • Kim, Seung-Nam;Lee, Il-Kyoo;Sung, Joo-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1074-1081
    • /
    • 2021
  • It has recently been noticed that the headway of unlicensed wireless technology is necessary as user's demands of wireless tech increase and the development of high-speed data service by using low-power short-range wireless network is needed. Hence, it is inevitable to study sharing and coexistence for broadband spectrum of diverse unlicensed application with wide bandwidth. In this paper, an interference examination between unlicensed WiFi (Wireless Fidelity) in the 6GHz and OB (Outside Broadcasting) system which is an incumbent service in the same frequency band was conducted and it suggests separation distance for the coexistence. Thus, MCL (Minimum Coupling Loss) and MC (Monte Carlo) methods were used to set up interference scenarios for the interference analysis and compute the separation distance between two systems according to the same frequency band and frequency separation.

A Method of Improving Plan for The City Competitive Power Utilizing by Private Communication Networks in An Ubiquitous-City (U-City와 자가통신네트워크를 연계한 도시경쟁력 제고방안)

  • Lee, Bong-Choon;Ha, Deock-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.611-615
    • /
    • 2008
  • The international society under the internet technology have been declining boundaries of the global economy. After this step, a social revolution will be happen from the ubiquitous technology which fives objects intelligence to serve people. And then it is expected that every part of a city competitive power is defined by both in qualify and in quantify of the ubiquitous information unit in the future. On this score, now each nation is trying to set relative services and broadband networks to lead the ubiquitous industry. Therefore this paper analyzed about the progress and prospect of a local U-city plan in our nation Especially we propose a new city development model which use U-city and self-communication network to Improve a city competitive power.

  • PDF

Authenticated Key Exchange Protocol for the Secure and Efficient (안전하고 효율적으로 인증된 키 교환 프로토콜)

  • Park, Jong-Min;Park, Byung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1843-1848
    • /
    • 2010
  • The Key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, Key confirmation, and Key freshness. In this paper, we propose Two authenticated key exchange protocols Two Pass EKE-E(Encrypted Key Exchange-Efficient) and Two Pass EKE-S(Encrypted Key Exchange-Secure) are introduced. A basic idea of the protocols is that a password can be represented by modular addition N, and the number of possible modular addition N representing the password is $2^N$ The Two Pass EKE-E is secure against the attacks including main-in-the-middle attack and off-line dictionary attack, and the performance is excellent so as beyond to comparison with other authenticated key exchange protocols. The Two Pass EKE-S is a slight modification of the Two Pass EKE-E. The Two Pass EKE-S provides computational in feasibility for learning the password without having performed off line dictionary attack while preserving the performance of the Two Pass EKE-E.