• Title/Summary/Keyword: home network technology

Search Result 551, Processing Time 0.029 seconds

Software Release Management System : ThinkSync DM-SoftMan for Wireless Device based on OMA DM (OMA DM 기반의 무선 단말기 소프트웨어 배포 관리 시스템 ThinkSync DM-SoftMan 개발)

  • Ju, Hong-Taek;Park, Kee-Hyun;Bang, Dae-Wook
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.641-650
    • /
    • 2006
  • There has been a continued increase in the complexity of software equipped with wireless mobile devices, due to the introduction of new device functionality and services via network connection. The increasement expected to be accelerated by convergence of telecommunication and broadcasting, and proliferation of telematics and home networking services using wireless mobile devices. The higher the complexity of mobile device software, the higher the necessity of management for the software. As for the global standard of mobile device management technology, OMA DM has been widely adopted by device manufacture and expected to be accelerated its adoption. In this paper, we present a development result of mobile device software release management system ThinkSync DM SoftMan. The implementation details of ThinkSync DM SoftMan are provided in implementation architecture and its working scenario based on the design of ThinkSync DM SoftMan that is summarized in this paper as our previous work. The conformance and performance test of the system are presented.

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

A Study on Health Check Solution using Indoor Air Purifier (실내 내장형 공기순환기를 이용한 헬스 체크 솔루션에 관한 연구)

  • Yang, Hee-Tak;Oh, Ji-Su;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.3 no.1
    • /
    • pp.25-31
    • /
    • 2017
  • In the future a future type new city and the latest apartment will be built, and the IoT technology will be constructed and combined in large numbers indoors of ordinary households. An air cleaner that makes people in it comfortable is built in, and the suction port that sucks in the air of the air purifier and the discharge port that discharges it are set up around the room and come out. However, this is impossible to adjust because there is only a central switch on / off. Also, consuming a lot of electricity so that many electricity charges are caused by huge electricity consumption will eventually be a waste of resources. This would like to be adjusted and driven through the fine dust detection device to the room built-in air purifier and that has provided a solution to save electricity. In addition, since it exists in and around the room, you can grasp the position of the person and connect to the home network to enhance the convenience. Also, through analysis of the air, we provide a health-check solution that checks the user's health and adjusts it appropriately.

Distributed processing for the Load Minimization of an SIP Proxy Server (SIP 프록시 서버의 부하 최소화를 위한 분산 처리)

  • Lee, Young-Min;Roh, Young-Sup;Cho, Yong-Karp;Oh, Sam-Kweon;Hwang, Hee-Yeung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.929-935
    • /
    • 2008
  • As internet telephony services based on Session initiation Protocol (SIP) enter the spotlight as marketable technology, many products based on SIPs have been developed and utilized for home and office telephony services. The call connection of an internet phone is classified into specific call connections and group call connections. Group call connections have a forking function which delivers the message to all of the group members. This function requires excessive message control for a call connection and creates heavy traffic in the network. In the internet cail system model. most of the call-setup messages are directed to the proxy server during a short time period. This heavy message load brings an unwanted delay in message processing and. as a result, call setup can not be made. To solve the delay problem, we simplified the analysis of the call-setup message in the proxy server, and processed the forking function distributed for the group call-setup message. In this thesis, a new system model to minimize the load is proposed and the subsequent implementation of this model demonstrates the performance improvement.

Implementation of Leakage Monitoring System Using ZigBee (ZigBee를 적용한 누전상태 모니터링시스템 구현)

  • Ju, Jae-han;Na, Seung-kwon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.107-112
    • /
    • 2017
  • In recent years, electric shock accidents due to electric leakage currents of household appliances such as computers, TVs, refrigerators, and LED lights are continuously occurring in homes and industrial buildings. And it is not easy to check the leakage current of each household appliances connected in parallel at the rear end of the module. In addition, the leakage current flowing through the path of the normal current other than the existing current leakage circuit breakers are installed in the distribution box, only the function to cut off the power when the leakage. Therefore, there are various disasters such as electric shock and fire caused by short circuit of household appliances, and the risk of such leakage current is seriously presented. In this paper, we propose a method to implement a leakage monitoring system that can be monitored at all times using Zigbee communication based on IEEE 80215.4, which has advantages in low power and low cost among short range wireless communication systems.

A Security Level Decision Method for Multimedia System (멀티미디어 시스템 정보보호수준 결정 기법)

  • Kim, Tai-Hoon;Lee, Deok-Gyu;Yeo, Sang-Soo;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.61-67
    • /
    • 2008
  • Each organization installing and operating multimedia system, to achieve the goal of organization, should decide security level, implement security countermeasure, and manage these countermeasures to keep the effects. To decide and manage security level of multimedia system, the first, organizations must be able to decide security level, and then, organizations must establish procedures for building security countermeasures according to security level. For the next step, organizations must be able to select areas where security countermeasures should be applied, and the last, organizations must be able to evaluate and improve the effect of security countermeasures. In this paper, based on the analysis of threat to multimedia system and the consideration for multimedia assets, we propose a method for deciding security level of multimedia system.

  • PDF

Analysis of Keyword Trend for ICT Convergence Services (ICT 융합 서비스의 키워드 트렌드 분석)

  • Jang, HeeSeon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • With ubiquitous computing and network, the concern of government, business and academy for IT or ICT convergence has been increased. In this paper, through the analysis of keyword trend for ICT convergence services from 2000's mid, the efficient policy is proposed by estimating the understanding and concern of common people. In addition to, the concept and development step of convergence are analyzed, and the keyword analysis for the ICT convergence services defined in TTA is performed. The services are classified into smart home work transportation, Health ICT, RFID USN, M2M IoT, e-Navigation, intelligent robot, and the keywords for each service are analyzed. The analytic results indicate that the keyword trend varies in the time, and highly indexing keywords and new trend are defined. To provide the efficient ICT services, the new ICT convergence services needed for customer will be proposed with new IT technology development, IT standard, law management, and policy provisioining.

Performance Analysis using Markov chain in WiBro (WiBro에서 마코프 체인을 이용한 성능분석)

  • Park, Won-Gil;Kim, Hyoung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.190-197
    • /
    • 2010
  • The ACR (Access Control Router) of WiBro processes location registration of the Correspondent Node and Home Agent as the Correspondent Node moves between ACRs. Therefore, the location update cost is low compared with MIPv6. However, all packets which are sent and received are sent through the ACR, so as the number of mobile nodes that are managed by the ACR increases, the cost of packet delivery also increases. Therefore, the communication state of the ACR domain remains smooth when the ACR which manages the mobile node in the ACR domain has good performance. However, network delays occur unless the ACR performs well, so the role of the ACR is important. In this paper, we analysis performance of the ACR for efficient realization of the WiBro standard. By using the Deny Probability and the Total Profit of ACR performance and apply it to the Random Walk Mobility model as the mobility model.

IoT-based D2D relation algorithms utilizing a Wi-Fi (Wi-Fi를 활용한 IoT기반 D2D 릴레이션 알고리즘)

  • Lim, Hyeok;Kim, Wung-Jun;Hwang, Jong-Sun;Jung, Dae-Jin;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.645-647
    • /
    • 2015
  • IoT (Internet of Things) technology has immense potential in our modern society. Generally when used in a consumer electronics environment, the IoT can continue to work more efficiently than the conventional method of home appliances. In order to use the IOT device's effectively in the environment, we need to determine the relationship between all device's based on their state and priority and compare it to find the suitable device based on the state and priority. In this paper I have done research on Wi-Fi devices in a network environment and I have observed relationships between them. Also I have proposed an algorithm to determine the device status and priority. This determines high-priority devices and they are identified on the basis of the state of the device associated with a particular operation and proceeds further.

  • PDF

An Active Buffer Management Mechanism to Guarantee the Qos of the Streaming Service in IEEE 802.11e EDCA (IEEE 802.11e EDCA에서 스트리밍 서비스의 QoS 보장을 위한 동적버퍼관리 기술)

  • Lee, Kyu-Hwan;Lee, Hyun-Jin;Kim, Jae-Hyun;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.751-759
    • /
    • 2009
  • Due to the advance of WLAN technology, the use of the multimedia service such as the video streaming service has been increased in the home network. However, we need to study the method which decreases the transmission delay and the frame loss rate to provide QoS of the video streaming service. Therefore, this paper proposes an active buffer management mechanism to guarantee QoS of the streaming service in IEEE 802.11e EDCA. The proposed protocol discards the frame in the HoL of the buffer based on the importance of each frame and the virtual transmission delay of frame newly arriving at the buffer. In the simulation results, the proposed algorithm not only decreases the frame loss probability of important I and P frames but also stabilizes the transmission delay. It may increase the QoS of video streaming services.