• Title/Summary/Keyword: 동적연결

Search Result 697, Processing Time 0.029 seconds

Design and Fabrication of the Ka-Band Receive Module for Millimeter Wave Seeker (밀리미터파 탐색기를 위한 Ka-대역 수신기 모듈의 설계 및 제작)

  • Yang, Seong-Sik;Lim, Ju-Hyun;Song, Sung-Chan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.1
    • /
    • pp.78-84
    • /
    • 2012
  • In this paper, we introduced the design technique about a Ka band receive module for millimeter wave seekers. The receiver module consists of a waveguide, circulator and transition for antenna connection, and a limiter and gain control amplifier for receiver protection. This module is comprised of a sum, azimuth and elevation channel for receiving monopules signal, and a SLB channel for the acquisition of jamming signal. In this paper, receiver gain and range of gain control dependent on ADC nonlinear characteristic was analyzed and designed for wide dynamic range receive. In the test result of the fabricated Ka-band receive, the frequency band is 1 GHz, the noise figure is as low as 8.2 dB, the gain is $56{\pm}2dB$, the dynamic range is 135 dB, the gain congtrol is more than 86 dB, the channel isolation is more than 35 dB.

Bit-Map Based Hybrid Fast IP Lookup Technique (비트-맵 기반의 혼합형 고속 IP 검색 기법)

  • Oh Seung-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.2
    • /
    • pp.244-254
    • /
    • 2006
  • This paper presents an efficient hybrid technique to compact the trie indexing the huge forward table small enough to be stored into cache for speeding up IP lookup. It combines two techniques, an encoding scheme called bit-map and a controlled-prefix expanding scheme to replace slow memory search with few fast-memory accesses and computations. For compaction, the bit-map represents each index and child pointer with one bit respectively. For example, when one node denotes n bits, the bit-map gives a high compression rate by consumes $2^{n-1}$ bits for $2^n$ index and child link pointers branched out of the node. The controlled-prefix expanding scheme determines the number of address bits represented by all root node of each trie's level. At this time, controlled-prefix scheme use a dynamic programming technique to get a smallest trie memory size with given number of trie's level. This paper proposes standard that can choose suitable trie structure depending on memory size of system and the required IP lookup speed presenting optimal memory size and the lookup speed according to trie level number.

  • PDF

Design and Implementation of Index for RFID Tag Objects (RFID 태그 객체를 위한 구간 색인 구조의 설계 및 구현)

  • Ban, Chae-Hoon;Hong, Bong-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.143-146
    • /
    • 2008
  • For tracing tag locations, a trajectories should be modeled and indexed in radio frequency identification (RFID) systems. The trajectory of a tag can be represented as a line that connects two spatiotemporal locations captured when the tag enters and leaves the vicinity of a reader. If a tag enters but does not leave a reader, its trajectory is represented only as a point captured at entry and we should extend the region of a query to find the tag that remains in a reader. In this paper, we propose an interval data model of tag's trajectory in order to solve the problem. For the interval data model. we propose a new index scheme called the IR-tree(Interval R-tree) and algorithms of insert and split for processing query efficiently. We also evaluate the performance of the proposed index scheme and compare it with the previous indexes.

  • PDF

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

An Interval Data Model for Tracing RFID Tag Objects (RFID 태그 객체의 위치 추적을 위한 구간 데이터 모델)

  • Ban, Chae-Hoon;Hong, Bong-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.578-581
    • /
    • 2007
  • For tracing tag locations, a trajectories should be modeled and indexed in radio frequency identification (RFID) systems. The trajectory of a tag can be represented as a line that connects two spatiotemporal locations captured when the tag enters and leaves the vicinity of a reader. If a tag enters but does not leave a reader, its trajectory is represented only as a point captured at entry. Because the information that the tag stays in the reader is missing from the trajectory represented only as a point, we should extend the region of a query to find the tag that remains in a reader. In this paper, we propose an interval data model of tag's trajectory in order to solve the problem. Trajectories of tags are represented as two kinds of intervals; dynamic intervals which are time-dependent lines and static intervals which are fixed lines. We also show that the interval data model has better performance than others with a cost model

  • PDF

The DSTM TEP for IPv4 and IPv6 Interoperability (IPv4/IPv6의 연동을 위한 DSTM TEP의 기능)

  • 진재경;최영지;민상원
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.578-587
    • /
    • 2003
  • The DSTM (Dual Stack Transition Mechanism), one of tunneling mechanism, is considered as the best solution in IPv4/IPv6 transition recently. The DSTM provides a method to assure IPv4/v6 connectivity based on 4over6 (IPv4-over-IPv6) tunneling and temporal allocation of a global IPv4 address to a host requiring such communication. A TEP (Tunnel End Point) operates as a border router between IPv6 domain and IPv4 Internet, which performs encapsulation and decapsulation of 4over6 tunneling packets to assure hi-directional forwarding between both networks. In this paper, we analyze basic standards of the IPv6 protocol. And, we design and implement a DSTM TEP daemon block. The TEP daemon analyzes a fevers tunneling packet that is forwarded by the DSTM node, establishes the TEP's 4over6 interface, and supplies communication between a DSTM and a IPv4-only node. Finally, we construct a DSTM testbed and measure performance of the DSTM TEP. Our observation results show that performance of TEP supports the DSTM service.

A Feedback Control Model for ABR Traffic with Long Delays (긴 지연시간을 갖는 ABR 트래픽에 대한 피드백제어 모델)

  • O, Chang-Yun;Bae, Sang-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1211-1216
    • /
    • 2000
  • Asynchronous transfer mode (ATM) can be efficiently used to transport packet data services. The switching system will support voice and packet data services simultaneously from end to end applications. To guarantee quality of service (QoS) of the offered services, source rateot send packet data is needed to control the network overload condition. Most existing control algorithms are shown to provide the threshold-based feedback control technique. However, real-time voice calls can be dynamically connected and released during data services in the network. If the feedback control information delays, quality of the serviced voice can be degraded due to a time delay between source and destination in the high speed link. An adaptive algorithm based on the optimal least mean square error technique is presented for the predictive feedback control technique. The algorithm attempts to predict a future buffer size from weight (slope) adaptation of unknown functions, which are used fro feedback control. Simulation results are presented, which show the effectiveness of the algorithm.

  • PDF

Service Function Chaining Architecture for Distributed 5G Mobile Core Networks (분산 모바일 코어기반 5G 네트워크에서의 Service Function Chaining 적용구조)

  • Sun, Kyoungjae;Kim, Younghan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1914-1924
    • /
    • 2016
  • In this paper, considering virtualized Evolved Packet Core(vEPC) network for 5G mobile network, we propose architecture for supporting Service Function Chaining(SFC) in 5G mobile network. Using SFC in 5G network, dynamic path configuration and providing network services based on subscriber and traffic information. SFC technology provides logical ordered set of network functions and delivers packet through providing logical path over the physical network. Based on the perspective of 5G core network in distributed manner, we design hierarchical SFC architecture to manage SFC for global path including vEPC and SGi-LAN network, and internal path between virtualized network functions in each cloud. In this paper, we define architecture and call flow for establishing data path using SFC. Finally, we design testbed architecture for real implementation based on open source software.

Design and Implementation of SIP-based Multi-party Conference System Including Presence Service (Presence 서비스를 포함한 SIP 기반의 다자간 컨퍼런스 시스템의 설계 및 구현)

  • Jung Young-Myun;Ko Se-Lyung;Jang Choon-Seo;Jo Hyun-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.257-266
    • /
    • 2005
  • As developing of the internet and computer technology, more interests are gathered to the conference service which provides capability of multi-party real-time visual conference. In this paper, we have designed and implemented a SIP-based visual conference system which includes Presence service. The elements of this conference system are user system, which has conference UA(User Agent) capability, presence seuer and conference server. For the presence service, we have adapted publication method which uses SIP PUBLISH message, and with this service various status informations of users are easily acquired. Also invitations and involvements to the conference are easily made through this service. For the conference server which controls establishment and management of multi-party connections, we have included conference event package. This package provides dynamically changing conference informations and users informations through SIP subscription and notification functions.

  • PDF

Evolution of Context Aware Services in Next Generation Mobile Service Environment (차세대 이동통신 서비스 환경에서의 상황 인식 서비스 진화)

  • Bae, Jung-Sook;Sihn, Gyung-Chul;Lee, Jae-Yong;Kim, Byung-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10A
    • /
    • pp.960-967
    • /
    • 2006
  • Mobile communication is evolving toward next generation system that is capable to provide ubiquitous human-centric services with giving no restriction on time and location. In particular, context-awareness will be realized using various sensors and devices and related technologies under the ubiquitous Next Generation (NG) mobile communications environment where user's demand and surrounding context are changing dynamically. By such context awareness, context aware service which provides best suitable services for a user by analyzing user's needs and situational information, will be one of the promising NG mobile services. In this article, we propose NG mobile service environment with focusing on generic service traffic flows supported by the NG service platform which gives various means of connecting users and service providers. Then, we propose evolutional phases of context-aware services based on ranges of context information and evolutional trend of telecommunication technologies and networking environment in NG mobile service environment.