• Title/Summary/Keyword: wired and wireless convergence

Search Result 99, Processing Time 0.028 seconds

Development of SDN-based Network Platform for Mobility Support (이동성 지원을 위한 SDN 기반의 네트워크 플랫폼 개발)

  • Lee, Wan-Jik;Lee, Ho-Young;Heo, Seok-Yeol
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.401-407
    • /
    • 2019
  • SDN(Softeware Defined Networking) has emerged to address the rapidly growing demand for cloud computing and to support network virtualization services. Therefor many companies and organizations have taken SDN as a next-generation network technology. However, unlike the wired network where the SDN is originally designed, the SDN in the wireless network has a restriction that it can not provide the mobility of the node. In this paper, we extended existing openflow protocol of SDN and developed SDN-based network platform, which enables the SDN controller to manage the radio resources of its network and support the mobility of the nodes. The mobility support function of this paper has the advantage that a node in the network can move using its two or more wireless interfaces by using the radio resource management function of the SDN controller. In order to test the functions implemented in this paper, we measured parameters related to various transmission performance according to various mobile experiments, and compared parameters related to performance using one wireless interface and two interfaces. The SDN-based network platform proposed in this paper is expected to be able to monitor the resources of wireless networks and support the mobility of nodes in the SDN environment.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

A Study on the Relationship between Digital Informatization Level and Policy Activity Satisfaction Level of Disabled Persons (장애인들의 디지털정보화 수준과 정책활동 만족도 수준과의 관계에 대한 연구)

  • Lee, Hyangsoo;Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.16 no.4
    • /
    • pp.23-28
    • /
    • 2018
  • In recent years, activities have become more important in political activities and participation in policies. Therefore, the level of digital informatization can affect the participation in policy in the online environment. In this study, we examined how the policy activities of the disabled have a relationship with the informatization level. To this end, we analyzed the relationship between the level of digital informatization and the level of satisfaction with policy activities based on the results of the digital divide survey of 2017. The results of this study are as follows: First, it shows that the disabled people have a positive relationship with the digital access and policy activity satisfaction levels such as the possession of wired / wireless information devices and Internet accessibility. Second, it is found that digital information capacity level and income level such as PC utilization ability and mobile digital device utilization ability have a positive (+) relationship. Third, as the level of digital information utilization such as wired and mobile Internet usage increased, the level of satisfaction with policy activities also increased positively. This suggests that the government needs various information policy to increase the level of digital informatization of the disabled.

A Study on the Relationship between Level of Digital Informatization and Satisfaction Level of Elderly People: Focusing on community, meeting, and community involvement activities (장노년층의 디지털정보화 수준과 사회활동 만족도 수준과의 관계에 대한 연구: 커뮤니티, 모임, 공동체에의 참여활동을 중심으로)

  • Lee, Hyangsoo;Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.1-7
    • /
    • 2019
  • Our society is evolving into an aging society. The purpose of this study is to investigate how digital informatization capacity of elderly people, one of the so - called information - neglected people, affects social activities. To this end, we analyzed the relationship between digital informatization level and social activity satisfaction level of old elderly people based on the results of the digital information gap survey in 2017. As a result, it was found that there was a positive relationship between digital access and satisfaction level of social activities, such as whether elderly people have wired / wireless information devices and internet accessibility. Second, it was found that digital information capacity level such as PC usage ability and mobile digital device utilization ability had a positive (+) relationship with only social activities. Third, the level of satisfaction with social activities increased as the level of digital information utilization increased, such as whether they were using wired and mobile Internet. This suggests that the government needs a policy to resolve various information gaps that can enhance the level of digital informatization of elderly people.

Vehicle control system base on the low power long distance communication technology(NB-IoT)

  • Kim, Sam-Taek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.117-122
    • /
    • 2022
  • In this paper, we developed a vehicle control terminal using IoT and low-power long-distance communication (NB-IoT) technology. This system collects information on the location and status of a parked vehicle, and transmits the vehicle status to the vehicle owner's terminal in real time with low power to prevent vehicle theft, and in the case of a vehicle in motion, When primary information about the vehicle, such as an impact, is collected and transmitted to the server, the server analyzes the relevant data to generate secondary information on traffic congestion, road damage, and safety accidents. By sending it, you can know the exact arrival time of the vehicle at its destination. This terminal device is an IoT gateway for a vehicle and can be connected to various wired and wireless sensors inside the vehicle. In addition, the data collected from vehicle maintenance, efficient operation, and vehicles can be usefully used in the private or public sector.

A study for the reduction of network traffic through an efficient processing of the trend analysis information (경향분석 정보의 효율적인 처리를 통한 네트워크 트래픽 감소 방안에 대한 연구)

  • Youn, Chun-Kyun
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.323-333
    • /
    • 2012
  • Network traffic demand is increasing explosively because of various smart equipment and services on smart era. It causes of traffic overload for wireless and wired network. Network management system is very important to control the explosion of data traffic. It uses SNMP to communicate with various network resources for management functions and creates lots of management traffic. Those are can be serious traffic congestion on a network. I propose an improving function of SNMP to minimize unnecessary traffics between manager and agent for collecting the Trend Analysis Information which is mainly used to monitor and accumulate for a specific time period in this paper. The results of test show it has compatibility with the existing SNMP and greatly decreases the amount of network traffic and response time.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Performance Analysis of Policy-based QoS Algorithm in the IMS (IMS에서 정책기반 QoS 알고리즘의 성능 분석)

  • Han, Seok-Jun;Shon, Hyung-Doh;Kang, Seung-Chan
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.133-141
    • /
    • 2015
  • The IMS is an architectural control framework for delivering IP multimedia services such as voice, video, audio and data, the IMS supports not only the mobile communication system but also the existing wired and wireless network based on IP. The network that is integrated by the IMS needs policy-based network management protocol for managing the limited network resources to provide efficient multimedia service. The IMS use additional device called PDF for efficient resource management, but the PDF only uses diameter which is one of the network management protocol such as SNMP and COPS. Many devices use various protocol to manage the limited network resources. There is an algorithm using a variety of protocols such as Diameter, COPS and SNMP to handle the resources management efficiently. We also analyze the performance using the proposed algorithm in the implemented IMS environment.

Anomaly Detection Mechanism against DDoS on BcN (BcN 상에서의 DDoS에 대한 Anomaly Detection 연구)

  • Song, Byung-Hak;Lee, Seung-Yeon;Hong, Choong-Seon;Huh, Eui-Nam;Sohn, Seong-Won
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.55-65
    • /
    • 2007
  • BcN is a high-quality broadband network for multimedia services integrating telecommunication, broadcasting, and Internet seamlessly at anywhere, anytime, and using any device. BcN is Particularly vulnerable to intrusion because it merges various traditional networks, wired, wireless and data networks. Because of this, one of the most important aspects in BcN is security in terms of reliability. So, in this paper, we suggest the sharing mechanism of security data among various service networks on the BcN. This distributed, hierarchical architecture enables BcN to be robust of attacks and failures, controls data traffic going in and out the backbone core through IP edge routers integrated with IDRS. Our proposed anomaly detection scheme on IDRS for BcN service also improves detection rate compared to the previous conventional approaches.

  • PDF

Smart Touch Screen Output System Based on ICT (ICT 기반 스마트 멀티터치 영상 출력 시스템)

  • Park, Yu-Jin;Choi, Si-Woong;Hwang, Seung-Gook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.27 no.2
    • /
    • pp.138-143
    • /
    • 2017
  • The purpose of this paper is to implement a smart touch image output system based on ICT. The image output system here uses a pen-touch type screen coordinate recognition type to minimize the error because there is a difference in the resolution of the motion pattern between the image screen and the actual image using the image sensing reaction sensor. To do so, we built a smart image output system that can output image data by using ICT based technology and can be operated remotely without a PC, laptop, monitor, keyboard and mouse by using wireless method and smart touch function instead of the existing wired method. The result of this study is that the image can be output only if there is a wall, and the pen can be operated on the output image without the screen.