• Title/Summary/Keyword: packet data

Search Result 1,637, Processing Time 0.026 seconds

Latest Trends of ISDN (ISDN의 최근동향)

  • Park, Hang-Gu
    • Electronics and Telecommunications Trends
    • /
    • v.4 no.1
    • /
    • pp.35-43
    • /
    • 1989
  • The evolution of telecommunications has raised the profile of many segments of the network that were not previously considered important. Until recently, basic telephony existed with the extension of passive cables without any particular user network interface. In the area of data communications, the introduction of flexible packet switching has allowed the network to evolve in a far more efficient manner. To overcome such separated network problems and business needs of both users and network providers, the integrated narrowband ISDN concept is being developed in most countries for implementation in the public switched telephone network (PSTN). The targets of ISDN, in my opinion, can be explained as follows : To the user, ISDN should provide the services at any time, at any place, through any media. To the business customer using PABX or LAN applications, ISDN should introduce customized services rapidly and also, ISDN should be developed by the modular hardware and software design approach in order for new services to be introduced rapidly and effectively. Software can be also developed by non-expert local staff to cater for adopting new user's service requirements immediately. Finally, ISDN will be able to increase business chances and benefit both users and operating companies.

Design of Network Topology for voice/data integrated Services to Computer Network (컴퓨터 네트워크 망에서 음성/데이터 통합 서데스를 위한 네트워크 망 설계)

  • Eom, Ki-Bok;Cho, Kyung-Ryong;Yoe, Hyun
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2000.11a
    • /
    • pp.20-24
    • /
    • 2000
  • VoIP는 Packet Netwark(ATM, xDSL, Frame Relay, Cable Network)망을 이용하여 음성데이터를 전송 하는 기술로서 PSTN을 통해 음성데이터를 전송하는 것보다 비용절감의 효과가 크다. 본 연구에서는 최적의 VoIP 서비스 제공을 위한 음성/데이터 통합 네트워크 망을 설계하기 위하여 IP와 ATM을 이용한 서로 다른 2개의 망을 설계하여 지연과 Routing 정책, Traffic 추가 후 지연현상에 대하여 살펴보았다. 지연은 순수한 VoIP 망을 구성 할 경우 8-10ms. VoIP+ATM으로 망을 구성 할 경우 2ms로 나타났고, 라우팅 정책(RIP, IGRP, OSPF 적용)에서는 IP 또는 IP+ATM으로 망을 구성 할 경우 RIP는 25ms, IGRP는 22ms로 나타났고, OSPF를 이용할 경우 14ms로 평가되어 OSPF를 이용한 라우팅 정책을 설정하는 것이 바람직하다고 볼 수 있다. 결론적으로 본 연구의 결과 VoIP망을 구성 할 경우 IP+ATM을 기반으로 구축하면 보다 더 효과적인 인터넷 망을 구성할 수 있음을 확인하였다.

  • PDF

An Intrusion Detection System Using Pattern Classification (패턴 분류를 이용한 침입탐지 시스템 모델)

  • 윤은준;김현성;부기동
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.59-65
    • /
    • 2002
  • Recently, lots of researchers work focused on the intrusion detection system. Pattern matching technique is commonly used to detect the intrusion in the system, However, the method requires a lot of time to match between systems rule and inputted packet data. This paper proposes a new intrusion detection system based on the pattern matching technique. Proposed system reduces the required time for pattern matching by using classified system rule. The classified rule is implemented with a general tree for efficient pattern matching. Thereby, proposed system could perform network intrusion detection efficiently.

  • PDF

Secure Transmission for Interactive Three-Dimensional Visualization System

  • Yun, H.Y.;Yoo, Sun Kook
    • Journal of International Society for Simulation Surgery
    • /
    • v.4 no.1
    • /
    • pp.17-20
    • /
    • 2017
  • Purpose Interactive 3D visualization system through remote data transmission over heterogeneous network is growing due to the improvement of internet based real time streaming technology. Materials and Methods The current internet's IP layer has several weaknesses against IP spoofing or IP sniffing type of network attacks since it was developed for reliable packet exchange. In order to compensate the security issues with normal IP layer, we designed a remote medical visualization system, based on Virtual Private Network. Results Particularly in hospital, if there are many surgeons that need to receive the streaming information, too much load on the gateway can results in deficit of processing power and cause the delay. Conclusion End to end security through the network method would be required.

Performance Evaluation of AAL-2 by using voice CODEC Standard (음성 부호화 표준안에 따른 AAL-2의 성능 분석)

  • 김상모;추봉진;김장복
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.97-100
    • /
    • 1999
  • Mobile network applications are growing and this requires a fast and efficient transport method between the BS(Base Station) and the MSC(Mobile Switching Center). One possible solution is to use ATM and a voice CODEC standard which compresses 64kbps voice data to less than 8kbps. The low bit tate and small-sized packets made by the voice CODEC imply that significant amount of link bandwidth would be wasted, if this small-sized packet is carried by one ATM cell. The cell assembly delay increases if one ATM cell is fully filled with the small-sized packets. For the bandwidth-efficient transmission of low-rate, short, and variable length packets in delay sensitive applications, AAL-2 was standardized. This paper evaluates performance of AAL-2 by using voice CODEC standard.

  • PDF

Servie Integration via PSTN-PSDN Interworking System (PSTN-PSDN 연동장치 서비스)

  • Sin, Yeong-Seok;Jin, Byeong-Mun;Im, Ju-Hwan;Choe, Yang-Hui
    • ETRI Journal
    • /
    • v.10 no.2
    • /
    • pp.13-19
    • /
    • 1988
  • This paper describes on the interworking services. interworking issues and the design concepts in the Interworking System (IWS) between Pubilc Switched Telephone Network (PSTN) and Packet Switched Data Network (PSDN), which has been developed at the Electronics and Tedecommunications Research Institute (ETRI). As a gateway between PSTN and PSDN, IWS provides the interconnection between PSTN and PSDN. In addition to the provision of basic interconnection services (i.e. dial-in/dial-out services), IWS provides the Maintenance and Administration (M&A) services for system itself and the supplementary services such as the call barring, direct call and closed user group. The architecture of IWS is based on the multiprocessor system with single system bus. And a multiprocessor real time kernel is used to support the inter-board communication as well as the inter-process commmunications. Especially, the operation and maintenance functions of IWS are treated in detail.

  • PDF

Application of watermarking to error concealment in video communications (영상통신에서의 패킷 오류 은닉에 활용되는 워터마킹 기법)

  • Oh, Tae-Suk;Kim, Yong-Cheol
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.84-86
    • /
    • 2006
  • An informed watermarking algorithm is proposed in this work that aids in concealing packet loss errors in video communications. This watermark-based error concealment(WEC) method embeds a low resolution version of the video frame inside itself as watermark data. At the receiver, the extracted watermark is used as a reference for error concealment. The proposed DCT-based algorithm has features of informed watermarking in order to minimize the distortion of the host frame. At the encoder, a predictive feedback loop Is employed which helps to adjusts the strength of the scale factor Furthermore, some of the modified coefficients of the DCT signal are virtually free from distortion by employing bit- sign adaptivity. The performance of the detector is Qualitatively analyzed for error concealment applications where full-frame DCT embedding proved to be more advantageous.

  • PDF

Subchannel State Estimation and Scheduling for Wireless Multimedia Services (무선 멀티미디어 서비스를 위한 서브채널 상태 추정과 스케줄링)

  • Jang Bong-Seog;Koh Hyung-Dae
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.340-344
    • /
    • 2005
  • For the next generation wireless systems, multimedia services will be highly demanded and needed to transmit the cost-efficient packet data. With this regard, the adaptive resource management methods are preferable to optimally control the various traffic classes in OFDMA (WiBro) systems. We have developed a sub-channel state prediction method based on the past sub-channel state dependency. Using the method, we are developed a scheduling algorithm that can efficiently control multimedia traffic downlink transmissions.

  • PDF

A study on the formation of parental beliefs of the unmarried : Focused on the internal representation of childhood and communication of one's parents (미혼 성인의 부모신념형성에 관한 연구: 아동기 내적 표상과 부모와의 의사소통을 중심으로)

  • Kim, Yeon-Ha;Jung, Min-Ja;Kim, Yang-Eun
    • Korean Journal of Human Ecology
    • /
    • v.13 no.4
    • /
    • pp.521-535
    • /
    • 2004
  • The purpose of this study is to investigate the formation of parental beliefs. For this study, 154 unmarried university students were asked to fill in a packet of survey questionnaire about parental beliefs, the internal representation of childhood, and communication with their parents. Data collected were analyzed using correlation and multiple regression by SPSS PC program. It was reported that the internal representation of parenting formed in childhood influences the development of rational authoritative beliefs, distancing beliefs, and direct authoritative beliefs. Also, the open communication with parents affected the distancing beliefs and rational authoritative beliefs.

  • PDF

A Precursor Phenomena Analysis of APT Hacking Attack and IP Traceback (APT 해킹 공격에 대한 전조현상 분석 및 IP역추적)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.275-278
    • /
    • 2013
  • Log is a file system, a system that uses all remaining data. Want situation now being issued in the IT, media Nate on information disclosure, the press agency server hack by numbness crime occurred. Hacking crisis that's going through this log analysis software professionally for professional analysis is needed. The present study, about APT attacks happening intelligently Log In case of more than traceback in advance to prevent the technology to analyze the pattern for log analysis techniques.

  • PDF