• Title/Summary/Keyword: 이동-IP

Search Result 1,040, Processing Time 0.03 seconds

A Study on the control of lights for BEMS using Adaptive GMM (Adaptive GMM을 활용한 BEMS용 조명제어 연구)

  • Ko, Kwangseok;Lee, Juyoung;Kang, Yongsik;Shim, Dongha;Kim, Jaemoon;Kim, Eunsoo;Lee, Jongsung;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.116-120
    • /
    • 2012
  • There has been increased interest for building energy-saving for worldwide. There is continuing research on IT technology for efficient management of BEMS. Recently, It be able to control of LED and to maximize energy savings to the development of LED lighting technology. We propose the security image processing system to improve efficiency and we implement the real-time status monitoring system to surveil the object in the building energy management system. In this paper, we proposed the system of LED control using IP camera and Adaptive Gaussian Mixture Model for BEMS. We implement LED light control software on the based of the security camera image processing so the reliable controling based on the security camera is possible efficiently.

Hybrid Scheduling Algorithm for Guaranteeing QoS of Real-time Traffic in WCDMA Enhanced Uplink (WCDMA 개선된 상향링크에서 실시간 트래픽의 서비스 품질을 보장하는 하이브리드 스케줄링 알고리즘)

  • Kang, You-Jin;Kim, Jun-Su;Sung, Dan-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1106-1112
    • /
    • 2007
  • As a demand for high speed uplink packet services increases, the WCDMA enhanced uplink, also known as high speed uplink packet access (HSUPA), has been specified in release 6 by 3GPP. This HSUPA will provide various types of multimedia services, such as real-time video streaming, gaming, VoIP, and FTP. Generally, the performance of HSUPA is dominated by scheduling policy. Therefore, it is required to design a scheduling algorithm considering the traffic characteristics to provide QoS guaranteed services in various traffic environments. In this paper, we propose a scheduling algorithm considering the traffic characteristics to guarantee QoS in a mixed traffic environment. Finally, the performance of the proposed scheduling algorithm is evaluated in terms of average packet delay, packet delay jitter, and system throughput using a system level simulator.

The Flexible Design Architecture for a Continuous Packet Connectivity Protocol on High Speed Packet Access Platform (고속 패킷 접속 규격 플랫폼 기반 연속적인 패킷 연결 프로토콜의 유연한 구조 설계)

  • Kwon, Hyun-Il;Kim, Kyung-Ho;Lee, Chung-Yong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.12
    • /
    • pp.30-35
    • /
    • 2009
  • In this paper, we propose the flexible design architecture for a continuous packet connectivity (CPC) Protocol among additional features of 3GPP HSPA+. In order to meet a practical intellectual property (IP) reuse and the developing time reduction design goals, we utterly take a CPC protocol into account to be realized by reusing digital signal processor (DSP) IP of the proven high speed packet access (HSPA) platform with the minimum hardware modification and addition. Based on the Teak series DSP, the proposed CPC protocol is divided into discontinuous transmit and receive mode, CPC manager, and interface with the proven HSPA platform. According to the regularized verification flow for wireless cellular communication applications, the proposed CPC protocol has been verified in various test scenarios.

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.

A Inter-layer Path Provisioning System Architecture in Multi-layer Networks (다계층 광네트워크에서 계층간 경로설정 시스템 구조 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.25-31
    • /
    • 2013
  • Looking at the recent value change of users and the usage pattern of network users, it is changing from simple web information, one-way information acquisition and data transmission to increase of usage of multimedia, increasing demand for security and customization, and increasing demands for free mobility. Due to this change of demand, the services which were provided individually, developed into a form which is merged, the network also seems to develop into the combined network from the individual network for individual service, and the communication network control technology which is the core technology is also rapidly developing. To reflect the users' demands, the next generation network created the multi-layer network which is based on the WDM/IP transmission system and added the to make it easy to restructure. P-OTS (Packet-Optical Transport System) can be defined as a platform that combines SONET/SDH, Ethernet, DWDM, optical transport network (OTN) switching and reconfigurable optical add-drop multiplexers (ROADMs). In this paper, we suggested that the optimum path choice be performed through diversification of the PCE-based path selection using the information of various layers altogether in the multi-layer environment, compared with the established path selection method when the path was selected using the information of each layers.

Enhancing Performance of Multicast over Push-to-Talk over Cellular (PoC 멀티캐스트 성능향상 방안)

  • Kim, Ki-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1602-1608
    • /
    • 2013
  • PoC (Push-to-Talk over Cellular) provides one-to-one as well as one-to-many communications with VoIP technology based on SIP over cellular networks. According to above property, PoC is considered as perscrptive technology for public protection for disaster relief networks. For this networks, group communication is the essential function. However, since current standardization process takes into general scenarios account without any consideration for mentioned networks, it have some problems in the point of adaptability. To solve above problem, in this paper, we propose how to reduce the overhead on the PoC server to reduce the transmission delay. Simulation results are shown to evaluate the improved performance.

Separation and Determination of Acteoside in Pedicularis resupinata var. oppositifolia by Ion Pair Liquid Chromatography (이온쌍 액체 크로마토그래피에 의한 마주송이풀 중의 Acteoside의 분리와 정량)

  • Yun, Young Ja;Yu, Gu Yong
    • Analytical Science and Technology
    • /
    • v.8 no.2
    • /
    • pp.161-166
    • /
    • 1995
  • Determination of acteoside in Pedicularis resupinata var. oppositifolia has been studied using ion pair liquid chromatography. Sample was extracted with 40mL methanol for 4 hrs. The extract was cleaned up by using Sep-Pak $C_{18}$ catridge and 8mL aqueous methanol eluent(methanol 50%, water 50%, phosphate buffer pH=8.0). Its determination was performed by means of IP-HPLC with a Hamilton PRP-1 polystyrene-divinylbenzene reversed phase column($15cm{\times}4.6mm$ i. d., $5{\mu}m$) and an aqueous methanol eluent(methanol 60%, water 40% phosphate buffer pH=8.2) containing of $5.0{\times}10^{-3}M$ tetrabutylammonium bromide. The established method was applied to the sample that was collected in area of Pyung Chang gun. As a result, its content ranges showed to be 0.062~0.076%.

  • PDF

Ethernet Topology Transformation and Throughput Analysis (이더넷 위상 변환과 성능 분석)

  • 권정국;백의현;이동길;이상호
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.77-85
    • /
    • 2003
  • The conversion into a new Local Area Network (LAN) environment without clear analysis of the problems with the conventional LAN environment nay bring about some improvement of performance, but in general, the result would not be as good as expected. Besides, in case new traffic or application programs are added In the near future, traffic overload similar to the past may incur. Therefore, the conversion into a new LAN environment should not only relieve the problems with the conventional environment but also be able to cope with future expansion of the network flexibly. In the present paper, in view of the above, the problems with protocols and traffic that may occur in the Bus-structured 10/100 Mbps shared Ethernet that has been widely used by many institutions are reviewed, and as a case study whether such conversion into a new LAN environment in order to increase the efficiency in the operation, management, and utilization of the network would be proper for the actual operational environment is implemented, and the results are analyzed.

Authentication of Hierarchical Mobile IPv6 Handover Using Modified Return Rotability (Modified Return Routability를 이용한 Hierarchical Mobile IPv6 Handover 인증 기법)

  • Kim, Jung-Hwan;Yu, Ki-Sung;Park, Byung-Yeon;Noh, Min-Ki;Mun, Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.21-28
    • /
    • 2007
  • Hierarchical Mobile IPv6 improves performance of Mobile IPv6 by managing Binding Update in terms of location, With improved handover delay, realization of delay-sensitive services (e,g, VoIP or video streaming) has become more persuadable, Comparing with Mobile IPv6, however, Hierarchical Mobile IPv6 brings security threats related to Local Binding Update to mobile network, In the RFC 4140, specific methods to authenticate Local Binding Update message are not explicitly presented. It is essential that design secure architecture to address problems related to authenticating Local Binding Update, Many secure suggestions for Local Binding Update, however, concentrate on infrastructure-based solutions such as AAA PKI. These approaches may cause scalability problem when the suggested solutions are applied to real network. Therefore we suggest authentication method that doesn't require infrastructure, In addition to authentication of Local Binding Update, our method also provides mobile node with power saving ability.

  • PDF

A Converged Profile and Authentication Control Scheme for Supporting Converged Media Service (융합 미디어 서비스 제공을 위한 통합 프로파일 및 인증제어 기술 연구)

  • Lee, Hyun-Woo;Kim, Kwi-Hoon;Ryu, Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.503-516
    • /
    • 2010
  • In this paper, we propose the converged profile and authentication scheme for supporting converged media services of broadcasting & communications convergence in fixed mobile convergence networks. The proposed scheme supports the management of access, service, mobility and IPTV profiles on subscriber and a function of open API(Application Program Interface) for providing the subscriber profile for the third party service provider with the PUSH/PULL method. The open API is based on a web service and a REST(Representational State Transfer) and provides various services for the third party service provider with ease. In addition, the proposed scheme supports a function of SSO(Single Sign-on). After user succeeded in establishing an access connection, user can sustain the same authentication state with this function although connected access network is changed or IMS(IP Multimedia Subsystem) service network is attached. We evaluate and analyze the performance of the proposed scheme through the implementation of CUPS(Converged User Profile Server) system test-bed.