• Title/Summary/Keyword: 인터넷프로토콜

Search Result 2,042, Processing Time 0.024 seconds

6TALK : Implementation of NAT-PT/SIIT and enhanced ALG

  • 이주철;호용근;신명기;김형준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.701-705
    • /
    • 2002
  • This paper describes implementation of IPv6-IPv4 transition toolbox named as 6TALK(IPv6 TrAansLator of Krv6) and some scenarios using 6TALK which enables IPv6 island to connect other IPv6 island or IPv4 island seamlessly. 6TALK implements some transition mechanisms suggested in NGTrans Working Group of IETF. Those mechanisms are composed of basic mechanism, tunneling, and applied mechanism such as DSTM. 6TALK provides functions which enable IPv6 network at the edge of existing network to communicate with IPv4 network by using these transition mechanisms. As major transition mechanisms in 6TALK we adopt NAT-PT/SIIT and DSTM/DSTM options and as implementation environment we use Linux Kernel 2.4.18 and Netfilter framework. Software modules implemented in Linux kernel was ported to hardware box using Motorola MPC 8260 processor. The transition mechanisms used in 6TALK are the ones predicted to be used in initial transition step to IPv6.

  • PDF

Power efficiency research for application of IoT technology (사물인터넷 기술 적용을 위한 소비전력 효율화 연구)

  • Seo, Younghoon;Park, Eun-Cheol;Kang, Sunghwan;Hwang, Jae-Mun;Yun, Junghwan;Eom, Junyoung;Gwon, Hyeong-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.669-672
    • /
    • 2015
  • Recent Internet of Things (IoT, Internet of Things) that can be applied to various fields as the development of technology has been developed a lot of service and has been developed with the service also for crop management. To manage the essential elements of soil moisture in the crop growth but existing a direct person measuring the fluid point to carry the measuring instrument, if you take advantage of the WPAN (Wireless Personal Area Network) in this paper to manage sensor data, a fixed 3 points (30, 60, 90 cm) and can be managed can be scientifically analyzed the state of growth of the crop. Open field environment is utilized as it is less disturbance of the interference and the frequency of the radio frequency signal of the structure provides a relatively comfortable environment. Therefore, WPAN building and data transmission scheme of the minimum cost is to be developed. In addition, the operation to enter low power mode, the algorithm is necessary because a lot of restrictions on the power supply applied to the sensor nodes and the gateway is constructed in the open field. In the experiment, verifying the effectiveness by using a network configuration of each of the sensor nodes and the gateway, and provides a method for time synchronization of the operation and a low power mode. The study protocol for the RF communication with the LoRa and to enhance communication efficiency is needed in the future.

  • PDF

Manipulation of the Compressed Video for Multimedia Networking : A Bit rate Shaping of the Compressed Video (멀티미디어 네트워킹을 위한 압축 신호상에서 동영상 처리 : 압축 동영상 비트율 변환)

  • 황대환;조규섭;황수용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11A
    • /
    • pp.1908-1924
    • /
    • 2001
  • Interoperability and inter-working in the various network and media environment with different technology background is very important to enlarge the opportunity of service access and to increase the competitive power of service. The ITU-T and advanced counties are planning ahead for provision of GII enabling user to access advanced global communication services supporting multimedia communication applications, embracing all modes of information. In this paper, we especially forced the heterogeneity of end user applications for multimedia networking. The heterogeneity has several technical aspects, like different medium access methods, heterogeneous coding algorithms for audio-visual data and so on. Among these elements, we have been itemized bit rate shaping algorithm on the compressed moving video. Previous manipulations of video has been done on the uncompressed signal domain. That is, compressed video should be converted to linear PCM signal. To do such a procedures, we should decode, manipulate and then encode the video to compressed signal once again. The traditional approach for processing the video signa1 has several critical weak points, requiring complexity to implement, degradation of image quality and large processing delay. The bit rate shaping algorithm proposed in this paper process the manipulation of moving video on the completely compressed domain to cope with above deficit. With this algorithms. we could realized efficient video bit rate shaping and the result of software simulation shows that this method has significant advantage than that of pixel oriented algorithms.

  • PDF

A CNRP Server/Client System (CNRP 서버/클라이언트 시스템)

  • Yu, Young-Ho;Lee, Jong-Hwan;Lee, Jung-Hwa;Kim, Kyong-Sok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.5
    • /
    • pp.607-617
    • /
    • 2002
  • IETF has proposed CNRP that is a protocol exchanging CNRP objects between server and client for resolving a common name to URIs of the desired Internet resouces. CNRP enables users to access various services via the integrated interface, to easily get the desired resources, and to reuse the results not as the data but as the information. Whereby these advantages, CNRP will be generally used for the integration of the various Internet services or the applications where the resolution of common name is needed. But, CNRP specification doesn't describes the practical implementation method for server and client. Though a few prototype systems are developed in some researches using CNRP, they are not enough to be generally used for the various Internet applications because they doesn't include all objects specified in CNRP specification or they construct systems with one server. So, this Paper proposes the practical implementation method for CNRP server/client through analyzing and solving the problems occurred when implementing them, and implements all objects specified in CNRP specification. This paper also verifies the feasibility of the proposed method by developing the prototype system of the company name resolution service using the CNRP server/client implemented in this study. The CNRP server/client implemented in this paper are used to develop various CNRP application systems.

A Node Mobility-based Adaptive Route Optimization Scheme for Hierarchical Mobile IPv6 Networks (노드 이동성을 고려한 계층적 이동 IPv6 네트워크에서의 적응적 경로 최적화 방안)

  • 황승희;이보경;황종선;한연희
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.474-483
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs O($n^2$) modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less that ${\frac}\frac{1}{2}n-1$ adversaries exist and they static adversary.

Design and Implementation of a Virtual MCU Based on SystemC to Provide the Implementation Environment of MAC Layer Software (MAC 계층 소프트웨어의 구현 환경을 제공하기 위한 SystemC 기반의 가상 MCU 모듈의 설계 및 구현)

  • Jeong, Yoo-Jin;Park, Soo-Jin;Lee, Ho-Eung;Park, Hyun-Ju
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.7-17
    • /
    • 2009
  • The development of wireless communication MAC layer is usually released as SoC which is a combination in hardware and software. In this system development environment, an environment for software development and verification is necessary because the hardware development takes a lot of time priori to completion. In integrated development of hardware and software, simulation environment of hardware and software provided by hardware modeling using HDL at RTL and ISS respectively. By increasing the development complexity of system, ESL design modeling systems at higher abstraction level than RTL has already prompted. The ESL design is divided untime model and time model. This paper present design and implementation of MCU for untime model simulation, not time model. Proposed MCU can optimize the system at early step of system development and move up the development completion time by verifying the system function easily and rapidly than part required exact time in untime model. In this paper, we present an MCU module based on SystemC and UC/OS-II Module providing real-time operate system.

  • PDF

An Energy-Balancing Technique using Spatial Autocorrelation for Wireless Sensor Networks (공간적 자기상관성을 이용한 무선 센서 네트워크 에너지 균등화 기법)

  • Jeong, Hyo-nam;Hwang, Jun
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.33-39
    • /
    • 2016
  • With recent advances in sensor technology, CMOS-based semiconductor devices and networking protocol, the areas for application of wireless sensor networks greatly expanded and diversified. Such diversification of uses for wireless sensor networks creates a multitude of beneficial possibilities for several industries. In the application of wireless sensor networks for monitoring systems' data transmission process from the sensor node to the sink node, transmission through multi-hop paths have been used. Also mobile sink techniques have been applied. However, high energy costs, unbalanced energy consumption of nodes and time gaps between the measured data values and the actual value have created a need for advancement. Therefore, this thesis proposes a new model which alleviates these problems. To reduce the communication costs due to frequent data exchange, a State Prediction Model has been developed to predict the situation of the peripheral node using a geographic autocorrelation of sensor nodes constituting the wireless sensor networks. Also, a Risk Analysis Model has developed to quickly alert the monitoring system of any fatal abnormalities when they occur. Simulation results have shown, in the case of applying the State Prediction Model, errors were smaller than otherwise. When the Risk Analysis Model is applied, the data transfer latency was reduced. The results of this study are expected to be utilized in any efficient communication method for wireless sensor network monitoring systems where all nodes are able to identify their geographic location.

Design of IoT Gateway based Event-Driven Architecture for Intelligent Buildings. (IoT 게이트웨이 기반 지능형 건물의 이벤트 중심 아키텍쳐 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.256-259
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The gateway based RESTful technology responsible for handling clients' requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in intelligent building IoT environment.

  • PDF

Multi-blockchain model ensures scalability and reliability based on intelligent Internet of Things (지능형 사물인터넷 기반의 확장성과 신뢰성을 보장하는 다중 블록체인 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.140-146
    • /
    • 2021
  • As the environment using intelligent IoT devices increases, various studies are underway to ensure the integrity of information sent and received from intelligent IoT devices. However, all IoT information generated in heterogeneous environments is not fully provided with reliable protocols and services. In this paper, we propose an intelligent-based multi-blockchain model that can extract only critical information among various information processed by intelligent IoT devices. In the proposed model, blockchain is used to ensure the integrity of IoT information sent and received from IoT devices. The proposed model uses the correlation index of the collected information to trust a large number of IoT information to extract only the information with a high correlation index and bind it with blockchain. This is because the collected information can be extended to the n-tier structure as well as guaranteed reliability. Furthermore, since the proposed model can give weight information to the collection information based on blockchain, similar information can be selected (or bound) according to priority. The proposed model is able to extend the collection information to the n-layer structure while maintaining the data processing cost processed in real time regardless of the number of IoT devices.

Study on Threshold Scheme based Secure Secret Sharing P2P System (임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.21-33
    • /
    • 2022
  • This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.