• Title/Summary/Keyword: IP(Mobile IP)

Search Result 1,162, Processing Time 0.029 seconds

A Study on the Performance of Multicast Transmission Protocol using FEC Method and Local Recovery Method based on Receiver in Mobile Host (이동 호스트에서 FEC기법과 수신자 기반 지역복극 방식의 멀티캐스트 전송 프로토콜 연구)

  • 김회옥;위승정;이웅기
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.1
    • /
    • pp.68-76
    • /
    • 2002
  • Multicast in mobile host has the problem of hast mobility, multicast decision, triangle routing, tunnel convergence, implosion of retransmission, and bandwidth waste. In particular, the bandwidth waste in radio is a definite factor that decreases transmission rate. To solve the problems, this paper proposes a new multicast transmission protocol called FIM(Forward Error Correction Integrated Multicast), which supports reliable packet recovery mechanism by integrating If Mobility Support for the host mobility, IGMP(Interned Group Management Protocol) for the group management, and DVMRP(Distance Vector Multicast Routing Protocol) for the multicast routing, and it also uses FEC and the local recovery method based on receiver. The performance measurement is performed by dividing the losses into the homogeneous independent loss, the heterogeneous independent loss, and the shared source link loss model.. The result shows that the performances improves in proportion to the size of local areal group when the size of transmission group exceeds designated size. This indicates FIM is effective in the environment where there are much of data and many receivers in the mobile host.

  • PDF

Consumer Associative Network Analysis on Device and Service Convergence

  • Han, Sangman;Lee, Janghyuk;Park, Sun-Young;Jo, Woonghyeon
    • Asia Marketing Journal
    • /
    • v.15 no.3
    • /
    • pp.1-14
    • /
    • 2013
  • Our research brings managerial insights for developing new digital convergence of devices and services. To explain the phenomenon of device and service convergence, we combine two different approaches from separate research fields: a perceptual mapping technique generally used for segmentation in marketing and associative network analysis mobilized to understanding network structure of core and peripheral as well as the information mediating role of nodes in network science. By combining these two approaches, we provide an in-depth analysis of the associations among devices and services by assessing the centrality of device and service nodes in an associative network. This is done by examining the connections between these services and devices as well as investigating the role of mediation in the combined device-service associative network. Our results based on bi-partite network analysis of survey responses from 250 Internet Protocol (IP) television viewers show which device and which service will play the major role in future device and service convergence as well as which characteristics and functionalities have to be incorporated into future convergence. Among the devices, the mobile handset with the betweenness centrality of 0.26 appears to be the device that would lead future device convergence. Among the services, wireless broadband with the betweenness centrality of 0.276 appears to be the service on which future service convergence needs to be developed. This result is quite unexpected, since wireless broadband has a lower penetration rate than other services, such as fixed broadband and cable TV. In addition, we indicate the possibility of converging devices, such as personal digital assistant (PDA) and mobile handset, and services, such as IPTV and mobile Internet, into wireless broadband services in the future.

  • PDF

A Secure Route Optimization Mechanism for Mobile VPN users in Foreign Networks (모바일 VPN 사용자를 위한 보안 강화 경로 최적화 방안)

  • Kim, Kyoung-Min;Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.348-359
    • /
    • 2007
  • The conventional mobile VPN services assumed the mobile communications occur between the MN in foreign networks and the CN in the home network. However, if a MN wants to communicate with another MN in a foreign network, it could degrade the performance of the mobile VPN service because of the triangular routing problem. In this paper, we propose a route optimization mechanism based on the mobile VPN using an x-HA allocated by diameter MIP in order to support the efficient communication between the mobile VPN users in foreign networks. The i-HA maintains the VPN-TIA as well as the x-HoA as the CoAs to solve the security problem and to provide an efficient route optimization simultaneously. Moreover, we proposed revised IPSec tunnel configuration to reduce the IPSec tunnel overheads at a MN when the MN communicates with several MNs in the foreign networks at the same time. The VPN server, a security management entity in the home network, notifies an additional IPSec tunnel establishment between the x-HAs where the communication peers are registered. The simulation result showed that the proposed scheme decreases the end-to-end packet delay time and improves the throughput after the handoff compared to the existing mechanism.

Implementation of WiFi-to-WiBro Access Point -WiMAX CPE (WiFi-to-WiBro Access Point 구현 -WiMAX CPE)

  • Park, Chun-Kwan;Song, Han-Young;Jeon, Byung-Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.53-63
    • /
    • 2009
  • This paper is to develop WiMAX CPE(wireless AP) that can provides Wi-Fi terminal with wireless Internet service by connecting to Wibro wireless network. This AP aims to support WiBro in upstream interface basically, and Wi-Fi and 100M Ethernet interface in downstream. So, we has developed the equipment for business that wireless ISP can provide many Internet customers with wireless Internet service by using Wi-Fi terminal in subway, car, ship, and so on, and the equipment for users that a user can purchase and then install in person. For the latter, multiple Wi-Fi terminals that be registered in WiBro service can be connected to Internet simultaneously.

  • PDF

Performance Analysis of Seamless Interworking Handover for Supporting MMS Continuity over WLAN and CDMA2000 Networks (WLAN과 CDMA2000 이종 네트워크에서 MMS 서비스의 연속성을 제공하기 위한 새로운 핸드오버의 성능 분석)

  • Kim, Su-Yong;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.2
    • /
    • pp.128-137
    • /
    • 2006
  • Recently, the combination of WLAN and 3G wireless technologies will make MMS service more ubiquitous, bringing benefits to both service providers and their customers. To realize seamless MMS service over WLAN and CDMA2000 networks, we design novel seamless interworking architecture by reusing the existing standards and network elements at the same time. Based on the proposed seamless interworking architecture, we also present seamless notification architecture and seamless handover architecture that can't be possible within current MMS reference architecture. This paper will make a contribution for service providers to provide their customers with seamless MMS service over WLAN and CDMA2000 networks.

  • PDF

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

EDS scenario Implementation for the Multiple Network and Multiple Service Environments

  • Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.135-140
    • /
    • 2009
  • The wide deployment of wireless access technologies and the integration of various access network interfaces into a single terminal, allows mobile end-users to be always connected to the IP network, and to use those interface simultaneously. In this paper the CTE provides various access network interfaces capabilities, allowing reception of data over multiple service providers with different characteristics. Considerations for multiple network and service provider environments are regarded as essential for the successful deployment of convergence services in Next Generation Network (NGN). Event Driven Service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers. This paper first describes the deployment model of NGN convergence services for multiple service provider environments. It also covers the service scenario of EDS, a convergence service for multiple service provider environments in NGN. Multiple provider environments stimulates the unified identifier management, namely ubiquitous identification (U-ID), to enable users to be provided convergence services without awareness of multiple provides. Then the designed structure and procedures of U-ID based EDS are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.

System Level Architecture Evaluation and Optimization: an Industrial Case Study with AMBA3 AXI

  • Lee, Jong-Eun;Kwon, Woo-Cheol;Kim, Tae-Hun;Chung, Eui-Young;Choi, Kyu-Myung;Kong, Jeong-Taek;Eo, Soo-Kwan;Gwilt, David
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.5 no.4
    • /
    • pp.229-236
    • /
    • 2005
  • This paper presents a system level architecture evaluation technique that leverages transaction level modeling but also significantly extends it to the realm of system level performance evaluation. A major issue lies with the modeling effort. To reduce the modeling effort the proposed technique develops the concept of worst case scenarios. Since the memory controller is often found to be an important component that critically affects the system performance and thus needs optimization, the paper further addresses how to evaluate and optimize the memory controllers, focusing on the test environment and the methodology. The paper also presents an industrial case study using a real state-of-the-art design. In the case study, it is reported that the proposed technique has helped successfully find the performance bottleneck and provide appropriate feedback on time.

A Study on Satellite Broadband Internet Services In High-Speed Vehicle (고속 이동체에서 위성 광대역 인터넷 서비스를 위한 Cross Layer 부호화 방식)

  • Park, Tae-Doo;Kim, Min-Hyuk;Kim, Nam-Soo;Kim, Chul-Sung;Jung, Ji-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5C
    • /
    • pp.485-497
    • /
    • 2009
  • In this paper, we described DVB-S2 system for mobility. cross layer coding technique are needed to maintain the performance in deep fading channel. Cross layer coding is divided into two kinds of level. First level is Physical layer coding and, second layer is link layer or upper layer coding. Fixed on DVB-S2 short frame coding method as a physical layer, we simulated the various coding method as an upper layer coding. Furthermore, we analyzed the performance of each coding method on according to mobile vehicle speed, data rate, interleaving memory size, and IP packet size.