• Title/Summary/Keyword: 인터넷프로토콜

Search Result 2,042, Processing Time 0.031 seconds

P2P DRM Algorithm for the protection of contents copyright (콘텐츠 저작권 보호를 위한 P2P DRM 알고리즘)

  • Ha Tae-Jin;Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1783-1789
    • /
    • 2004
  • It is evaluated that there is infinit capability of creating new e business using P2P program. but the research for the method to protect the copyright of digital contents is urgent even for development of the p2p service because the problem of copyright protection for digital contents is not solved. Though this article, it can be induced that reliable contents sharing use to a flow fund by secure settlement architecture, user authentication and contents encryption and then it as the problem of copyright fee is solved, it is able to discontinue which trouble with a creation work for copyright fee and protection it's once again as growth of p2p market, p2p protocal is will be grow into a important protocal of advanced network. In this article, When users send digital contants to each other in internet, we proposed the P2P DRM algorism to offer a security function which using the technology of copyright management to use a AES Algorithm based on PKI.

A Load-Sharing Scheme using SCTP Multi-homing (SCTP 멀티호밍 특성을 활용한 부하 분산 기법)

  • Song Jeonghwa;Lee Meejeong
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.595-607
    • /
    • 2004
  • Networks often evolve to provide a host with multiple access points to the Internet. In this paper, we propose a transport layer load distribution mechanism utilizing the multiple network interfaces simultaneously. We specifically propose an extension of Stream Control Transmission Protoco1 (SCTP) to have load sharing over multiple network interfaces. We named the particular service provided by the Proposed load sharing mechanism to be LS (Load Sharing) mode service. LS mode service is based on the following four key elements: (i) the separation of flow control and congestion control, (ii) congestion window based striping, (iii) redundant packet retransmission for fast packet loss recovery, (iv) a novel mechanism to keep track of the receiver window size with the SACKS even if they arrive out-of-order. Through simulations, it is shown that the proposed LS mode service can aggregate the bandwidth of multiple paths almost ideally despite of the disparity in their bandwidth. When a path with a delay of 100% greater is utilized as the second path, the throughput is enhanced about 20%.

A Java Group Communication System supporting Extended Virtual Synchrony (Extended Virtual Synchrony를 지원하는 자바 그룹통신 시스템)

  • 문남두;이명준
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.1
    • /
    • pp.37-48
    • /
    • 2004
  • Important Java network application services have been rapidly increased along with the growth of the Internet. So, it is desirable for such applications to serve transparently, continuously and safely even if the network is temporally partitioned or certain hosts running those services are crashed down. To satisfy such requirements, many group communication systems have been developed. However, existing Java-based group communication systems do not support both the extended virtual synchrony and various types of message delivery such as FIFO, causal, total and safe delivery service. In this paper, we present the design and implementation of a Java group communication system, named JACE, supporting various types of message delivery between group members and the extended virtual synchrony model. The JACE system consists of a number of protocol modules which can be stacked on top of each other in a variety of ways. In addition, using the JACE system, we have developed an experimental UDDI registry for discovering and publishing information about Web services.

Performance Analysis on Delay- and Disruption-Tolerant Network in Interplanetary Network (행성 간 통신에서의 지연/분열 허용 네트워크 성능 분석)

  • Baek, Jaeuk;Han, Sang Ik;Kim, In-kyu
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.42-49
    • /
    • 2017
  • Delay- and Disruption-Tolerant Network (DTN) has been considered as a key technology to overcome main challenges in interplanetary communications such as an intermittent connectivity and high bit error rates. The lack of end-to-end connectivity between source and destination results in long and variable delays and data loss, hence the Internet Protocols cannot operate properly in such environments because it requires an end-to-end connectivity. The DTN, which utilizes 'store-and-forward' message passing scheme between nodes, can overcome the lack of end-to-end connectivity in Interplanetary Network (IPN). In this paper, DTN is applied to 3-hop relay IPN, where messages are transmitted from Earth ground station to Lunar lander through Earth satellite and Lunar orbiter. ONE simulator is used to reflect the real environment of IPN and an efficient resource management method are analyzed to guarantee the message delivery by optimizing a message TTL (Time to Live), buffer size and message fragmentation.

Mtigating the IGMP Flooding Attacks for the IPTV Access Network (IPTV 접속망에서의 IGMP 플러딩 공격 효과 감소 기법)

  • Kim, Sung-Jin;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.998-1002
    • /
    • 2009
  • In IPTV multicast architecture, the IGMP(Internet Group Management Protocol) is used for access networks. This protocol supports the functionality of join or leave for a specific multicast channel group. But, malicious attackers can disturb legitimate users being served appropriately. By using spoofed IGMP messages, attackers can hi-jack the premium channel, wasting bandwidth and exhausting the IGMP router's resources. To prevent the message spoofing, we can introduce the packet-level authentication methods. But, it causes the additional processing overhead to an IGMP processing router, so that the router is more susceptible to the flooding attacks. In this paper, we propose the two-level authentication scheme in order to mitigate the IGMP flooding attack.

Performance Analysis of WAP Packet Considering WTP SAR Algorithm and RLP in Wireless CDMA Network (무선 CDMA 망에서 WTP SAR 알고리즘과 RLP를 고려한 WAP 패킷의 성능 분석)

  • Moon, Il-Young;Roh, Jae-Sung;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.1
    • /
    • pp.69-76
    • /
    • 2002
  • With the growth of data communication service by mobile devices, WAP is proposed to efficiently access the Internet contents by user request through wireless condition that has a high error rate and mobility. But, because a transmission speed of WAP is limited, it takes many times to transmit and to receive the data. This paper has studied the WAP packet transmission time using WTP-SAR algorithm. As a method that is to improve transfer capability of WAP, using SAR function in WTP, total message down from upper layer has been fragmented and packet is transmitted through RLP frame time slot. Then, we have analyzed the transmission time of WAP packet with variable RLP layer size on the wireless CDMA network for next generation systems. From the results, we could obtain the WAP packet transmission time and optimal WTP packet size.

  • PDF

Home Screen Adaptive Next Generation Broadcasting Service using MSA-ABR (MSA-ABR을 이용한 홈 스크린 적응형 차세대 방송 서비스 연구)

  • Mariappan, Vinayagam;Lee, Minwoo;Lee, Seungyoun;Lee, Junghoon;Lee, Juyoung;Lim, Yunsik;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.37-42
    • /
    • 2016
  • In this paper, in today's highly complex video and broadcast operations, broadcasters are constantly challenged to reliably deliver low-latency, high-quality video to multiscreen audiences on-air and online. The Adaptive Bit Rate (ABR) protocols enable internet video to a wide range of multiscreen devices. However, video quality is often marginal and would prove unacceptable for valued linear broadcast content delivered to the Big Screen today. The Media information processing technology advances in ABR enables service providers to take control and offer quality managed linear video services to ALL screens in the home, including the Big Screen, with a single unified IP Video infrastructure. The New Multiscreen-Assisted ABR (MSA-ABR) delivery management system proposed using Cloud based multicast-assisted ABR for a broadcast facility that performs routing of contribution content and online publishing services within a virtual, centralized cloud infrastructure.

Information Right Management System using Secret Splitting of Hardware Dependent Encryption Keys (하드웨어에 종속된 암호키 비밀 분할을 이용한 정보권한관리 시스템)

  • Doo, So-Young;Kong, Eun-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.345-351
    • /
    • 2000
  • This paper presents a right management scheme using secret splitting protocol. Right management schemes combat piracy of proprietary data (such as digital music). In these schemes, encryption has been used and it is essential to protect the keys used in encryption. We introduce a new key protection method in which a secret encryption key is generated using both user's hardware-dependent unique information (such as MAC address) and cryptographically secure random bit strings provided by data owner. This scheme prevents piracy by checking hardware-dependent information during rendering and improves the secrecy of the data by individualizing the encryption key for each data.

  • PDF

Design and Implementation of IoT Terminal Equipment for Vessels using Thuraya Geo-stationary Orbit Satellite (Thuraya 정지궤도 위성을 이용한 선박용 IoT 단말 장치 설계 및 구현)

  • Jang, Won-Chang;Lee, Myung-Eui
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.2
    • /
    • pp.67-72
    • /
    • 2020
  • Satellite communication is not used by many people like mobile communication, but it is a necessary technology for public service and communication services, such as providing the Internet in military, disaster, remote education and medical services, island areas, and infrastructure vulnerable areas. However, on ships and aircraft, mobile communications requiring base stations are either unavailable or restricted in their use. In this paper, we used a Raspberry Pi board as the terminal device to communicate network through satellite modem and PPP protocol, and implemented two-way data link using the text message of the modem to connect to the Thuraya geo-stationary orbit network. In addition, I/O devices were connected to the controller of the terminal equipment to design and implement an IoT device system for ships that can remotely access the system under control and control I/Os and transmit measured data through various sensors.

Dynamic QoS Mechanism for supporting VoIP Service in Tactical Communication Environment (전술환경에서의 VoIP 서비스를 위한 Dynamic QoS 기법 연구)

  • Shin, Dong-Yun;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.2078-2083
    • /
    • 2012
  • Tactical communication environment evolving for the purpose of providing services such as voice, video and text based on ALL-IP. Therefore, To be able to guarantee QoS level which meets the required level of subscriber for these services in the constrained tactical communication infrastructure, it is required to take the characteristics such as wireless transmission link, mobility of troops or personal into service quality scheme. In this paper, to support differentiated QoS for each individual or mission in the tactical communication environment, we presents a technique that can provide same QoS level which was served originally regardless of the situation to user's move through dynamically determining the QoS level to be provided at the time of the service request on VoIP-Switch.