• Title/Summary/Keyword: IP network system

Search Result 876, Processing Time 0.031 seconds

Design and Implementation of Point Measurement System and Integrated Quality Management System for IPTV Network (IPTV 망의 측정 포인트 시스템과 통합 품질 관리 시스템의 설계와 구현)

  • Hae-Hyun Kim;Choon-Hee Kim;Young-Wook Cha
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1288-1291
    • /
    • 2008
  • 최근 IPTV 사용자가 증가 하면서 품질에 대한 사용자들의 기대가 커지고 있다. 본 논문에서는 다양한 서비스 제공이 가능한 IPTV 서비스의 품질 측정을 위하여 IP 망의 도메인별로 성능 모니터링을 수행하는 시스템과 이를 통합적으로 관리 할 수 있는 시스템의 설계 및 구현에 대해 기술하였다. 구현된 성능 모니터링 및 통합관리 시스템의 시험을 위하여 IPTV 실험 환경을 구성하였으며, 실험 환경에서 IP 계층 및 MPEG-2 전송 스트림의 품질 파라미터를 측정 및 비교하였다.

Gateway System Implementation for heterogeneous Protocol relationship Data exchange (이기종 Protocol의 Data교환을 위한 Gateway System 구현)

  • Jung, Hyun-Sik;Kang, Dae-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.391-394
    • /
    • 2007
  • 상위(HOST)시스템은 TCP/IP 환경이 적용 되어야 하며, 하위(P/C)시스템은 BSC프로토콜을 그대로 사용가능 해야 한다. G/W시스템은 이 두가지 NETWORK환경을 모두 지원 해야 한다. LAN카드는 TCP/IP프로토콜을 지원할 것이며 BSC카드는 모뎀을 통해서 BSC 프로토콜을 지원할 것이다. 시스템은 산업용 PC보다 성능이 뛰어난 Unix시스템을 사용할것이다. G/W시스템의 역할은 각기 형태가 다른 전문을 재편성 하는 기능을 추가한다. 상위(HOST)시스템으로 부터 받는 지시 데이터의 SIZE를 하위(P/C)시스템에서 적용 가능한 수준으로 재조정 되어야 한다. 반대로 하위(P/C)시스템에서 송신되는 전문 형태를 상위(HOST)시스템에 맞게 재조정 되어야 한다.

태양광 발전 시스템을 위한 원격 통합 모니터링 시스템의 구축 및 운영분석

  • Hong, Seong-Min;Lee, Yong-Ho;Sim, Heon
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.182-190
    • /
    • 2005
  • This paper proposes central monitoring system(PVCMS) based on a TCP/IP network for effective integrating management about photovoltaic systems. We don't gain confidence the result of production simulation, because the output of PV system have many various environmental change factor. So if we can obtain real operated data about each sites and system types to use PVCMS, we can define the environment change factor to compare with simulation data. And this paper try to access about total management and data analysis methods of renewable energy through results analysis to synthesize of the operation.

  • PDF

Cost-effective Exchange Auto Back Monitoring in Mobile Communication System (교환기 장애 긴급 복구를 위한 중계선 절체 솔루션)

  • An, Jang-Hoon;Yoon, Dae-Hee;Kwon, June-Hyuk
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.242-245
    • /
    • 2008
  • Exchange System for mobile communication operator is very important for providing continuous services to customers. However traditional solution is too expensive for choosing in the real environment. In this paper, we suggest cost-effective auto backup monitoring solution, which is robust for system failure. And this suggested solution will also can be adopted to the $4^{th}$ generation of IP core network.

  • PDF

Efficient Intermediate Node mobility Management Technique in CCN Real-time Streaming Environment (CCN 실시간 스트리밍 환경에서 효율적인 중간노드 이동성 관리 기법)

  • Yoon-Young Kim;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1073-1080
    • /
    • 2023
  • The development and speed improvement of the Internet network, and the development of many platforms based on it, have brought about a rapid expansion of production and consumption of various contents. However, the existing IP-based Internet system cannot efficiently cope with such an urgent increase in data. Accordingly, an alternative called the CCN(Contents Centric Network) has emerged, enabling more efficient data transmission and reception centered on content rather than host. In this paper, we will deal with the mobility of intermediate nodes in CCN real-time streaming service, which is one of the major research fields of CCN, and minimize network overload through more efficient path switching through RSSI detection. In other words, by improving the method of selecting and switching a spare path when an intermediate node located between the requester(consumer) and the provider moves, a mechanism for managing data transmission is not interrupted and unnecessary load due to route switching does not occur in the network.

Security Method of Multimedia Data Characteristics on Video Conference System (영상회의 시스템에서 멀티미디어 데이터 특성에 따른 보안 방법)

  • Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.143-148
    • /
    • 2005
  • Video conference system it is various at internet and uses the reading is become accomplished. Research of like this portion synchronization of audio, the compression technique and multimedia data, supports the video conference the research of the Mbone of the IP multicast for being active. being become accomplished the multimedia service which is various an video from internet, the line speed of communication becomes high-speed anger and to follow leads is become accomplished. The video conference from opening elder brother dispersion internet network environment the problem against the image which is an image conference data and a voice security is serious and it raises its head. To sleep it presents the security method which from the video conference it follows in quality of multimedia data from the dissertation which it sees and it does.

  • PDF

Heterogeneous Sensor Data Analysis Using Efficient Adaptive Artificial Neural Network on FPGA Based Edge Gateway

  • Gaikwad, Nikhil B.;Tiwari, Varun;Keskar, Avinash;Shivaprakash, NC
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4865-4885
    • /
    • 2019
  • We propose a FPGA based design that performs real-time power-efficient analysis of heterogeneous sensor data using adaptive ANN on edge gateway of smart military wearables. In this work, four independent ANN classifiers are developed with optimum topologies. Out of which human activity, BP and toxic gas classifier are multiclass and ECG classifier is binary. These classifiers are later integrated into a single adaptive ANN hardware with a select line(s) that switches the hardware architecture as per the sensor type. Five versions of adaptive ANN with different precisions have been synthesized into IP cores. These IP cores are implemented and tested on Xilinx Artix-7 FPGA using Microblaze test system and LabVIEW based sensor simulators. The hardware analysis shows that the adaptive ANN even with 8-bit precision is the most efficient IP core in terms of hardware resource utilization and power consumption without compromising much on classification accuracy. This IP core requires only 31 microseconds for classification by consuming only 12 milliwatts of power. The proposed adaptive ANN design saves 61% to 97% of different FPGA resources and 44% of power as compared with the independent implementations. In addition, 96.87% to 98.75% of data throughput reduction is achieved by this edge gateway.

Forecasting Technique of Line Utilization based on SNMP MIB-II Using Time Series Analysis (시계열 분석을 이용한 SNMP MIB-II 기반의 회선 이용률 예측 기법)

  • Hong, Won-Taek;An, Seong-Jin;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2470-2478
    • /
    • 1999
  • In this paper, algorithm is proposed to forecast line utilization using SNMP MIB-II. We calculate line utilization using SNMP MIB-II on TCP/IP based Internet and suggest a method for forecasting a line utilization on the basis of past line utilization. We use a MA model taking difference transform among ARIMA methods. A system for orecasting is proposed. To show availability of this algorithm, some results are shown and analyzed about routers on real environments. We get a future line utilization using this algorithm and compare it ot real data. Correct results are obtained in case of being few data deviating from mean value. This algorithm for forecasting line utilization can give effect to line c-apacity plan for a manager by forecasting the future status of TCP/IP network. This will also help a network management of decision making of performance upgrade.

  • PDF

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

A LAN Protocol Analyzer including Simulation Function for PC Environment (PC 환경에서 시뮬레이션 기능을 포함한 LAN 프로토콜 분석장비)

  • Chung, Joong-Soo;Lee, Jun-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.5
    • /
    • pp.583-589
    • /
    • 2002
  • The Internet is absolutely contributed to information telecommunication revolution nowadays. Realizing local network at the various type of buildings such as a company and a university, ethernet is used for subnet and FDDI, ATM are used for backbone mainly in order to get internet services. Processing TCP/IP protocol suite and analyzing the protocol exactly is essential to detecting the problem occurring in the network and developing communication equipment. This paper presents implementation of ethernet LAN protocol analyser which monitors and simulates ICP/IP protocol suite carrying the Internet and non-Internet protocol such as Netware and NetBIOS. MS window98 and visual C are used for development environment and application program operates on the NDIS firmware. The performance analysis on the proposed system is carried out as monitoring and simulating the traffic over LAN of a university. In the result of monitoring the system, the processing time of a packet captured over the LAN is about 1.5ms. In case of simulating the system, the processing time to be taken carrying out TCP connection and disconnection once is packet is about 8.6ms. The performance analysis of monitoring and simulation results satisfies with 10 Mbps ethernet LAN environment.