• Title/Summary/Keyword: wired-wireless integrated networks

Search Result 41, Processing Time 0.022 seconds

Group Key Agreement Protocol Considering Computational Efficiency of Mobile Devices for Integrated Wired/Wireless Networks (무선 단말기의 계산 효율성을 고려한 유.무선 통합 네트워크 환경에 적합한 그룹 키 동의 프로토콜)

  • Chang Woo-Suk;Kim Hyun-Jue;Nam Jung-Hyun;Cho Seok-Hyang;Won Dong-Ho;Kim Seong-Joo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.322-325
    • /
    • 2006
  • 그룹 키 동의 프로토콜에 관한 연구는 그동안 많은 연구자들에 의해 다양한 관점에서 진행되어왔으며, 최근 Nam 등이 유 무선 통합 네트워크 환경에서 효율적이면서도 안전한 그룹 키 동의 프로토콜을 제안하였다. 유 무선 통합 네트워크 환경에 적합한 그룹 키 동의 프로토콜을 설계하기 위해서는 고성능 연산 능력을 가진 유선 단말기의 특성과 상대적으로 계산능력이 떨어지는 무선 단말기의 특성이 함께 고려되어야 한다. 특히, 시스템자원의 제한성을 갖는 무선 단말기에서의 계산량을 최소화하는 문제는 그룹 키 동의 프로토콜 설계에 있어서 무엇보다 중요하다. 따라서, 본 논문에서는 무선 단말기의 계산량을 최소화하면서 유 무선 통합 네트워크 환경에 적합한 효율적인 그룹 키 동의 프로토콜을 제안하고자 한다.

  • PDF

A Study on SSDP protocol based IoT / IoL Device Discovery Algorithm for Energy Harvesting Interworking Smart Home

  • Lee, Jonghyeok;Han, Jungdo;Cha, Jaesang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.7-12
    • /
    • 2018
  • The spread of IoT (Internet of Things) technology that connects objects based on wired / wireless networks is accelerating, and IoT-based smart home technology that constitutes a super connected network connecting sensors and home appliances existing inside and outside the home is getting popular. In addition, demand for alternative energy technologies such as photovoltaic power generation is rapidly increasing due to rapid increase of consumption of energy resources. Recently, small solar power systems for general households as well as large solar power systems for installation in large buildings are being introduced, but they are effectively implemented due to limitations of small solar panels and lack of power management technology. In this paper, we have studied smart home structure and IoT / IoL device discovery algorithm for energy harvesting system based on photovoltaic power generation, It is possible to construct an efficient smart home system for device control.

A DASH System Using the A3C-based Deep Reinforcement Learning (A3C 기반의 강화학습을 사용한 DASH 시스템)

  • Choi, Minje;Lim, Kyungshik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.17 no.5
    • /
    • pp.297-307
    • /
    • 2022
  • The simple procedural segment selection algorithm commonly used in Dynamic Adaptive Streaming over HTTP (DASH) reveals severe weakness to provide high-quality streaming services in the integrated mobile networks of various wired and wireless links. A major issue could be how to properly cope with dynamically changing underlying network conditions. The key to meet it should be to make the segment selection algorithm much more adaptive to fluctuation of network traffics. This paper presents a system architecture that replaces the existing procedural segment selection algorithm with a deep reinforcement learning algorithm based on the Asynchronous Advantage Actor-Critic (A3C). The distributed A3C-based deep learning server is designed and implemented to allow multiple clients in different network conditions to stream videos simultaneously, collect learning data quickly, and learn asynchronously, resulting in greatly improved learning speed as the number of video clients increases. The performance analysis shows that the proposed algorithm outperforms both the conventional DASH algorithm and the Deep Q-Network algorithm in terms of the user's quality of experience and the speed of deep learning.

Anomaly Detection Mechanism against DDoS on BcN (BcN 상에서의 DDoS에 대한 Anomaly Detection 연구)

  • Song, Byung-Hak;Lee, Seung-Yeon;Hong, Choong-Seon;Huh, Eui-Nam;Sohn, Seong-Won
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.55-65
    • /
    • 2007
  • BcN is a high-quality broadband network for multimedia services integrating telecommunication, broadcasting, and Internet seamlessly at anywhere, anytime, and using any device. BcN is Particularly vulnerable to intrusion because it merges various traditional networks, wired, wireless and data networks. Because of this, one of the most important aspects in BcN is security in terms of reliability. So, in this paper, we suggest the sharing mechanism of security data among various service networks on the BcN. This distributed, hierarchical architecture enables BcN to be robust of attacks and failures, controls data traffic going in and out the backbone core through IP edge routers integrated with IDRS. Our proposed anomaly detection scheme on IDRS for BcN service also improves detection rate compared to the previous conventional approaches.

  • PDF

A Protocol Compression Scheme for Improving Call Processing of Push-To-Talk Service over IMS (IMS망에서 PTT서비스의 통화 처리 성능 향상을 위한 프로토콜 압축 기법)

  • Jung, In-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.257-271
    • /
    • 2009
  • In this paper, we propose a protocol compression scheme for enhancing the performance of call processing of PTT(Push-to-Talk) which is one of the important services in IMS(IP Multimedia Subsystem), a next generation integrated wired/wireless packet communication network. To service the PTT on an IMS network, it should use the same call setup procedure as legacy Mobile and TRS(Trunked Radio System) networks and have a fast call setup time and enough communication bandwidth because a number of terminals should be able to exchange same data in real time. The proposed A+SigComp scheme reduces the initial call setup delay of SIP by about 10%, which is used by PTT service for call setup. In addition, the A+ROHC scheme is proposed to compress the header of RTP packets transferred during PTT voice transmission and, as a result, about 5% of increase in communication efficiency is observed.

  • PDF

Performance Analysis on Link Quality of Handover Mechanism based on the Terminal Mobility in Wired and Wireless Integrated Networks (유무선 복합망에서 이동 단말 기반 핸드오버의 링크 품질에 관한 성능 분석)

  • Park, Nam-Hun;Gwon, O-Jun;Kim, Yeong-Seon;Gam, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8S
    • /
    • pp.2608-2619
    • /
    • 2000
  • This paper proposes the Handover Scheme for the mobile and describes the result of the performance analysis. In the conventional scheme of handover request, the withdrawal of terminal may occur because handover request is performed based on fixed signal level without considering network load and terminal mobility. The proposed scheme offers the minimization of withdrawal and handover blocking probability by means of the handover request of terminal based on the network load and terminal mobility. Conventional handover scheme has the sequential procedure that network performs resource check and path rerouting on the handover by MT(Mobile Terminal). Proposed handover scheme pre-processes the resource check before the handover request by predicting the handover request timo so that handover latency can be reduced. Moreover, path optimization is executed after the completion of handover in order to reduce handover latency. The rdduction of handover latency prevents the dropping of service by minimizing backward handover blocking. In summary, we propose the prediction of handover request time and decision method based on terminal, validating the performance of proposed scheme considering various cases of simulation.

  • PDF

Advanced Protocols and Methods of Robot Collision Avoidance for Social Network Service (로봇의 소셜 네트워크 서비스를 위한 프로토콜 및 충돌회피 방법)

  • Shin, Seok-Hoon;Hwang, Tae-Hyun;Shin, Seung-A;No, In-Ho;Shim, Joo-Bo;Oh, Mi-Sun;Ko, Joo-Young;Shim, Jae-Chang
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.931-940
    • /
    • 2012
  • Social networking services which spreading rapidly is a system using interrelationship of people by internet or mobile. SNS is a network system of the human-centered. In this paper, in order to make robot become a member of social networks we studied the necessary elements and formation. For robot with communication function and sensing, autonomous, collision avoidance method and communication protocol is needed to let Robot share the present conditions dangerous or special situation. We realized this after investigating necessary sensor for SNS, studying robot's collision-avoidance method, and defining protocol of robot for SNS. Also, we suggested and implemented the wired and wireless integrated communications method.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

The Trend of Integrated Solution Service Based on VoIP and Voice Recognition (VoIP와 음석인식에 기반한 통합솔루션 서비스 동향)

  • Oh, Jae-Sam;Yoon, Young-Keun
    • Journal of Information Technology Services
    • /
    • v.1 no.1
    • /
    • pp.57-66
    • /
    • 2002
  • We are looking at the two different kinds of IT on this paper. One is VoIP and the other is VR (voice recognition). We are more interesting at the evolving techniques and services produced by combining the two techniques mentioned above. Recently, there are so many services and products appeared in the market using voice recognition technique. Now the technique has progressed on the level that can even replace the user interfaces using the QUI or general DTMF. Therefore, we are expecting so many various new services showed UP In the market which is combination of the VoIP and VR. Up until now, three models are available in the field which are wired telephone, wireless telephone, and wireless internet. We know the effectiveness of the VoIP is maximized more when this technique is combined with others rather than used alone without other techniques.