• Title/Summary/Keyword: mobile IP

Search Result 1,160, Processing Time 0.029 seconds

Development of 2.4GHz ISM Band Wireless Communication Platform based on Embedded Linux (임베디드 리눅스 기반의 2.4GHz ISM 밴드 무선 통신 플랫폼 개발)

  • Ohm, Woo-Yong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.175-181
    • /
    • 2015
  • In this paper, we develop a 2.4GHz ISM band wireless communication platform prototype based on embedded linux which support can be u-Hospital service. The developed system is available connecting between ARM920T processor board and FPGA board and linking IEEE 802.11b PHY board, AD/DA(10Bit) and RF(2.4GHz) board for wireless access. It is also can be utilized for the embedded system design with IEEE 802.11b/g Access Point(Option: IEEE 802.11a/b/g) test due to the Embedded Linux. Also, the developed system is possible to test and verify the radio access technology, Modem(OFDM etc) and IP(Intellectual Property) circuit. And make the most use of the system, we search for a expansion to that home and mobile healthcare, wellness service application.

Implementation & Performance Analysis of Virtual Storage System Based on iSCSI Protocol in Wireless Networks (iSCSI 기반의 무선 네트워크 연결형 가상 저장장치 드라이버 구현 및 성능 분석)

  • Choi Sae-bom;Lim Hyotaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6A
    • /
    • pp.517-525
    • /
    • 2005
  • iSCSI(Internet Small Computer System Interface) is a block-oriented storage access protocol that enables a user to recognize a remote storage as their own local block device through general TCP/IP networks. Since iSCSI uses a standard ethernet switch and router for this kind of access, it can not only be applied to ethernet technologies, but can also be used to create a storage networking system without any distance restrictions that can equally be applied to a wireless network environment. Accordingly, focusing on this applicability, this paper presents an alternative approach to overcome the limited storage space of mobile devices based on the iSCSI initiator driver, which was originally designed for wired networks. Additionally, its potential with a wireless network is also evaluated.

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.

Using OpenWRT-based Router to Build a Multi-function Web Server (OpenWRT기반의 유무선 공유기를 활용한 다기능 웹 서버 구축)

  • Ban, Tae-Hak;Ha, Seung-Eup;Min, Jun-Ki;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.833-838
    • /
    • 2014
  • Recently the use router is to allow multiple computers by one IP can be connect to the Internet. Also, the PC or server in order to use a Web server or a print server, Web Hard, P2P should be settings. In this paper, we are building a multi-functional Web server that using a router supported OpenWRT based on network settings and firewall settings and a variety of services. A web server can be provided the Internet phone and secure multimedia service Web server router based OpenWRT may be provided through a mobile app and the PC application service.

A Bus Data Compression Method for High Resolution Mobile Multimedia SoC (고해상 모바일 멀티미디어 SoC를 위한 온칩 버스 데이터 압축 방법)

  • Lee, Jin;Lee, Jaesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.345-348
    • /
    • 2013
  • This paper provides a method for compression and transmission of on-chip bus data. As the data traffic on on-chip buses is rapidly increasing with enlarged video resolutions, many video processor chips suffer from a lack of bus bandwidth and their IP cores have to wait for a longer time to get a bus grant. In multimedia data such as images and video, the adjacent data signals very often have little or no difference between them. Taking advantage of this point, this paper develops a simple bus data compression method to improve the chip performance and presents its hardware implementation. The method is applied to a Video Codec - 1 (VC-1) decoder chip and reduces the processing time of one macro-block by 13.6% and 10.3% for SD and HD videos, respectively.

  • PDF

Fast Handoff through Minimizing L2 Delay in Next Generation Mobile System (차세대 이동통신 시스템에서 L2 지연 감소를 통한 빠른 핸드오프)

  • Choi Hye-Eun;Kim Namgi;Yoon Hyunsoo
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.1023-1032
    • /
    • 2004
  • It is generally known that handoff delay degrades the QoS by packet drop, packet delay and jitter. Moreover. handoff highly effects on QoS in beyond 3G system because not only micro cells for achieving high capacity and fast moving nodes induce the frequent handoff but also hard handoff must be carried out in OFDM system. Therefore, study on a handoff algorithm for guaranteeing QoS is required. Related works on handoff for beyond 3G system mainly focused on reducing the L3 handoff delay or packet loss. That is, these schemes try to compensate L2 delay rather directly eliminate it. However, remained 1.2 delay degrades QoS, especially delay-sensitive realtime traffic. Therefore, we proposed the seamless handoff algorithmwhich can minimize the L2 handoff delay.

A Study on Interconnection Regime: Core Issues and Alternatives (국내 상호접속제도 연구: 핵심이슈와 대안 발굴)

  • Kim, Il-Jung;Shin, Minsoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.678-691
    • /
    • 2015
  • Internet and mobile traffic continues to surge exponentially in recent years due to popularization of smart devices, the appearance of various internet services carrying large amount of traffic from richer content and applications. This phenomenon leaded to various network problems such as the congestion delay, the non-balanced traffic ratio between ISPs, the continuous network investment cost and the Internet access problems. In light of changed data-driven communication ecosystem, There are growing concerns by both academia and industry that settlement-free peering and full transit regime have the limitations such as not only difficulties in maintaining mutual benefits but also difficulties in securing investment incentives for upgrading network performance and quality. Thus, it becomes more necessary for introducing the evolved internet interconnection regime which can fulfill the All-IP network environment. This study derives core issues regarding internet interconnection regime in Korea and suggest new evolved alternatives based on three point of view(traffic optimization, cost optimization, network investment optimization) through the empirical analysis.

A Converged Profile and Authentication Control Scheme for Supporting Converged Media Service (융합 미디어 서비스 제공을 위한 통합 프로파일 및 인증제어 기술 연구)

  • Lee, Hyun-Woo;Kim, Kwi-Hoon;Ryu, Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.503-516
    • /
    • 2010
  • In this paper, we propose the converged profile and authentication scheme for supporting converged media services of broadcasting & communications convergence in fixed mobile convergence networks. The proposed scheme supports the management of access, service, mobility and IPTV profiles on subscriber and a function of open API(Application Program Interface) for providing the subscriber profile for the third party service provider with the PUSH/PULL method. The open API is based on a web service and a REST(Representational State Transfer) and provides various services for the third party service provider with ease. In addition, the proposed scheme supports a function of SSO(Single Sign-on). After user succeeded in establishing an access connection, user can sustain the same authentication state with this function although connected access network is changed or IMS(IP Multimedia Subsystem) service network is attached. We evaluate and analyze the performance of the proposed scheme through the implementation of CUPS(Converged User Profile Server) system test-bed.

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Security Vulnerability and Countermeasures in Smart Farm (스마트 팜에서의 보안 취약점 및 대응 방안에 관한 연구)

  • Chae, Cheol-Joo;Han, Sang-Kyun;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.313-318
    • /
    • 2016
  • Recently, the smart farm development using a PC and smart phone to manag the farm for improving competitiveness is in progress. In the smart farm, by using the various ICT technology including RFID, Wi-Fi, ZigBee, Wireless LAN, and etc., the growing environment of the crop and animals can be managed with the remote. By using the network including not only the TCP/IP based wired network but also ZigBee, Wireless LAN, and etc., each of the devices installed in the smart farm transmits the growing environment data to the server. So, smart farms have information and network security vulnerability. Therefore, we propose the method that analyzes the security vulnerability which can begenerated in the smart farm and user authentication method.