• Title/Summary/Keyword: 라우팅시스템

Search Result 483, Processing Time 0.031 seconds

A Lighting Control System of Underground Parking Lot Based on Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 기반 지하주차장 조명제어시스템)

  • Son, Byung-Rak;Kim, Jung-Gyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.125-135
    • /
    • 2010
  • Recently, the problem of global warming has issued seriously, so Green IT(Information Technology) using RFID/USN is concerned in order to solve environmental problems. In this paper, we implemented that public area like an underground parking lot could reduce unnecessary energy consumption used by lighting control system based on Ubiquitous Sensor Networks. The lighting control system for underground parking lot is comprised of intersection nodes for watching cars enter and leave, and light node for controlling light. It applies the routing protocol based on hierarchical cluster, hierarchical addressing method, and probability filtering method for the specific place like an underground parking lot. The result after experiments shows that the lighting control system could decrease electrical energy consumption to around 61.7%.

A Design for Unified Web Authentication at Network Service Foundation (네트워크 서비스 기반의 단일 웹 인증설계)

  • Ban, Kyung-Sig;Lee, Jae-Wan;Kim, Hyoung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2171-2178
    • /
    • 2008
  • Recently, Network companies have introduced security solutions to protect the network from intrusions, attacks and viruses but the network has still weakness and vulnerability. It is time to bring more stable and reliable authentication system that would meet the Internet user's need. In this study, Current broadband networks don't have hierarchic and stable authentication solutions. And so, an integrated and hierarchic system is needed to provide a various kinds of application services. I'd like to present a new authentication system which is based on unified web authentication design. It will unit various authentication systems that have been deployed in various network environment and reinforce network security to provice a various kinds of application services in a stable and safe environment. that is a simple and more secure method for fighting a rise in card-not-present fraud.

An Interface Agent Generation for Hardware Components in a NoC System (NoC 시스템을 위한 하드웨어 컴포넌트를 위한 인터페이스 에이전트의 자동 생성)

  • Park, Jung-Tae;Jhang, Kyoung-Son;Franco-Pirri, Franco-Pirri
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.195-199
    • /
    • 2009
  • NoC 시스템은 기본적으로 서로 다른 클럭 도메인에서 동작하는 여러 버스 시스템들이 NoC를 통해서 연결되는 것으로 간주할 수 있다. NoC에 다른 버스 인터페이스 IP를 부착하려면 별도의 래퍼를 사용해야 하며, 면적과 지연시간이 추가되는 것이 일반적이다. 본 논문에서는, 추가적인 래퍼의 필요성을 제거하기 위하여, 주어진 버스 인터페이스에 맞는 인터페이스 에이전트 또는 네트워크 인터페이스를 자동 생성하는 방법을 제안한다. 이를 위하여, 한가지 NoC 시스템을 위해 표준적인 패킷 포맷을 정의하였으며, 거기에는 패킷에 대한 라우팅 정보 뿐 아니라, 여러 종류의 버스 프로토콜의 데이터, 주소, 제어 정보도 포함될 수 있도록 정의되었다. 그리고, 인터페이스 에이전트는 표준 패킷 포맷과 특정 버스 인터페이스 프로토콜 간의 변환 작업을 수행한다. 실험을 통해서, PVCI, WISHBONE, AHB, OCP와 같은 몇 가지 버스 인터페이스에 대해 자동생성된 네트워크 인터페이스들 간에, 표준 패킷 포맷을 이용한 데이터 통신이 중요 정보의 손실 없이 잘 이루어짐을 보인다.

TP2P: Topology-based Peer-to-Peer System for Efficient Resources Lookup (TP2P: 효율적인 자원탐색을 위한 토폴로지 기반의 P2P 시스템)

  • Cha, Bong-Kwan;Han, Dong-Yun;Son, Young-Song;Kim, Kyong-Sok
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.88-99
    • /
    • 2007
  • P2P systems are distributed data sharing systems, and each node in them plays the role of client as well as server. There are several studies using Distributed Hash Table, such as Chord, CAN, Tapestry, Pastry, but these systems don't consider the physical latency, therefore they have a weakness of difficulty to guarantee stable performance. To improve this problem, we present the TP2P system. This system is a self-organizing hierarchical overlay system and it uses Chord routing mechanism for lookup data. This system is organized by several subnets, each subnet is organized by physically close nodes, and global network organized by all nodes. In each subnet, one node finds a data, it saves in a node in the subnet, therefore it has higher probability to reduce physical lookup latency than Chord system. And each node has global information of some nodes in its subnet, and it is used to lookup data, therefore the number of hops decrease about 25% as well as the physical lookup latecy are reduced.

A Design for Single Web Authentication at Network Service Foundation (네트워크 서비스 기반의 단일 웹 인증 설계)

  • Lee, Jae-Wan;Ban, Kyung-Sig;Kim, Hyoung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.457-460
    • /
    • 2007
  • Recently, Network companies have introduced security solutions to protect the network from intrusions, attacks and viruses but the network has still weakness and vulnerability. It is time to bring more stable and reliable authentication system that would meet the Internet user's need. In this study, Current broadband networks don't have hierarchic and stable authentication solutions. And so, an integrated and hierarchic system is needed to provide a various kinds of application services.

  • PDF

A Design of Device Management System for Factories using Wireless Sensor Network (무선 센서 망을 이용한 공장 내 장치 관리 시스템 설계)

  • Moon, Sung-Nam;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.233-240
    • /
    • 2012
  • Unlike traditional factory environment, in an industrial factory network applied wireless sensor network technologies, all procedures of discovery, identification and verification of devices should be performed in an automatic fashion. To address these challenges, we design a management system using the device registry server that we propose in this paper. In the phase of device discovery, the proposed system utilizes properties of routing protocol running in factories. Also, in the phase of identification and verification, the system uses unique and general information of a device stored within the device registration server. Such a way allows management system to reduce implementation complexity and to easily manage devices in a factory applied with a wireless network consisting of heterogeneous devices.

u-IT Based Plant Growth Environment Management System (u-IT 기반의 생장환경 관리 시스템)

  • Cho, Seung-Il;Kim, Jong-Chan;Ban, Kyeong-Jin;Kim, Chee-Yong;Kim, Eung-Kon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.362-364
    • /
    • 2011
  • To build ubiquitous agriculture environment successfully, development of core technology for agriculture, such as sensor node H/W, sensor node middleware platform, routing protocol and agricultural environment application service is essential. With the application of u-IT technologies to traditional agriculture area, fusion complex technologies become a source to raise value-added agriculture product and its productivity. However, it is imperative to expand horticulture industry area and improve infrastructure for utility-based horticulture. This paper proposes an agriculture product growth environment management system that utilizes environmental factor monitoring sensors and biological information sensors in greenhouse to specifically manage botany growth environment management.

  • PDF

Design and Implementation of a Hybrid-type Video Conference System using SIP Protocol (SIP 프로토콜을 이용한 하이브리드형 화상회의 시스템의 설계 및 구현)

  • Jung TaeUn;Kim YoungHan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.51-59
    • /
    • 2005
  • In this paper, we propose and implement a hybrid-type video conference system using SIP protocol proposed in IEFT. This conference system, all signaling is controled by the server, while the media communication can be managed either by UAs or by the server. as a result, the complexity of its routing and user state management is reduced and it is applicable to the mobile environment of the ad-hoc models. The implemented server is scale enough to be used in a large conference because it only takes charge of signaling part. And also we see that UAs are only suitable in the small conference where less than ten people can join.

Performance Evaluation for IEEE 802.15.4 Based Telematics Transportation Safety System (IEEE 802.15.4 기반 텔레매틱스 교통안전시스템 성능 평가)

  • Kim, Young-Man;Eom, Doo-Seop;Kim, Min-Soo;Kim, Hwan-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1303-1306
    • /
    • 2005
  • 최근 차량에 설치된 단말기를 통해 길안내 서비스, 교통정보 서비스 등 다양한 정보를 제공하는 텔레매틱스 서비스가 활발하게 연구되고 있다. 하지만 현재 대다수의 텔레매틱스 서비스는 최대 15m의 공간 오차를 가진 GPS 기술을 이용하기 때문에 차량의 정확한 위치정보를 파악하기는 힘들다. 따라서 본 연구에서는 무선 센서 노드를 이용해 GPS보다 정확한 차량의 위치정보와 속도를 감지해 교차로에서 발생할 수 있는 차량 충돌을 예측하고 충돌 위험 정보를 교차로에 근접한 자동차에게 알려주는 텔레매틱스 교통안전시스템을 구성하고 노드 간 통신 프로토콜로서 IEEE 802.15.4[1]를 채택한 후 고정 라우팅 방식으로 차량정보를 베이스 스테이션까지 보내어 교차로 주변차량 전체에 브로드캐스트하는 방식을 취하도록 한다. 빠르게 이동하는 차량의 특성상 교차로 차량 충돌 방지 서비스 구현에 있어서 높은 실시간성과 신뢰성을 갖춘 프로토콜이 요구된다. 따라서 본 차량 충돌 예측을 위한 교통안전시스템의 신뢰성과 실시간성을 평가하기 위하여 Network Simulator 2 (NS/2)[2]를 이용하여 시뮬레이션 한다.

  • PDF

Design and Implementation of Linear Protection Switching for Fast Restoration in Carrier-class Ethernet Networks (캐리어 이더넷 망에서 빠른 절체를 위한 선형 프로텍션 스위칭 기능 설계 및 구현)

  • Ahn, Kye-Hyun;Kim, Kwang-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.883-891
    • /
    • 2009
  • This paper proposes Ethernet linear protection switching technology in order to provide the SONET/SDH-like resiliency over Metro Ethernet Networks. The proposed design is made of an architecture with a control processor board and several data processing boards, where the control processor board is independent of data processing board, providing a flexible solution for carrier Ethernet system. However, it leads an increasing message delay between inter-processors. In this paper, we implement and confirm a restoration of failed transport connections withing 50 millisecond in spite of increasing message delay between the control processing board and data processing board providing carrier-class network survivability.