• Title/Summary/Keyword: IP network system

Search Result 877, Processing Time 0.024 seconds

Implementation of Remote Control System using TeleRemote System (TeleRemote를 이용한 원격 제어 시스템 구현)

  • 김상복;한성호;진현준;박노경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1115-1123
    • /
    • 2003
  • In this paper, a remote control system called TeleRemote system which can be applied to existing wireless mobile networks or public telephone networks for remote control is designed and implemented. The proposed design employs program technology based on the theory of signal detect control and enables the EPG(Electronic Program Guide) functions such as recording reservation of bidirectional video signals with TV reception card on PC. It can also control recording reservation using remote control program through telecommunication network The PC-EPG system is implemented in Web programs with Server/Clinet architecture and the server system that provides EPG functionalities is in charge of recording reservations and data communications by means of the scheduler program. Data storing to client PCs is performed through TCP/IP and finished by client programs implemented using Visual C++/MFC programs. As remote control system, the developed system can be used for unmanned security system using the Web camera. Building intranet and making connection to internet, the TeleRemote system is believed to create potential for commercial communication system.

Improving the Performance of L3 Handover Mobility Management in Heterogeneous Wireless Network (이종 무선망에서 L3 핸드오버 이동성 관리 성능 향상)

  • Hong, Sung-Back;Lee, Kyeong-Ho;Kim, Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6B
    • /
    • pp.382-389
    • /
    • 2007
  • In this paper we report the development of mobility test bed, the realization of basic protocol that supports L3 mobility and the measurement of performance parameters that can affect handover performance. Previously proposed mobility management system, BBM (Break Before Make) method such as MIPV6 and Fast MIPV6, uses one interface in wireless network. In this method, to connect to new AP, it first disconnects existing AP and tries to connect to new AP. This can cause packet loss for the traffic vulnerable to delay such as VoIP. To provide seamless handover between different wireless networks, we propose MBB (Make Before Break) handover method having two network interfaces. Comparative study of previous method and proposed method on mobility and handover was conducted under simulated real environment on the test bed. Almost no packet loss was found with newly proposed method. In conclusion, it is shown that mobility protocol with proposed handover method can be applied to the application services sensitive to delay and packet loss.

Real-time Identification of Skype Application Traffic using Behavior Analysis (동작형태 분석을 통한 Skype 응용 트래픽의 실시간 탐지 방법)

  • Lee, Sang-Woo;Lee, Hyun-Shin;Choi, Mi-Jung;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2B
    • /
    • pp.131-140
    • /
    • 2011
  • As the number of Internet users and applications is increasing, the importance of application traffic classification is growing more and more for efficient network management. While a number of methods for traffic classification have been introduced, such as signature-based and machine learning-based methods, Skype application, which uses encrypted communication on its own P2P network, is known as one of the most difficult traffic to identify. In this paper we propose a novel method to identify Skype application traffic on the fly. The main idea is to setup a list of Skype host information {IP, port} by examining the packets generated in the Skype login process and utilizes the list to identify other Skype traffic. By implementing the identification system and deploying it on our campus network, we proved the performance and feasibility of the proposed method.

MPLS and Video Stream broadcast multicast transport optimization through convergence (MPLS와 멀티캐스트 융합을 통한 Video Stream 방송 전송 최적화)

  • Hwang, Seong-Kyu;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1330-1336
    • /
    • 2014
  • QoS techniques and transmitted in real-time communication with the advancement of technology a variety of applications and services are available these days, mobile devices bogeuphwa LTE technology to the development of multimedia services with high quality can be realized. In order to satisfy this condition simply with a router with an increased bandwidth expansion by considering the increase in the routing table of the network scalability problems included. Burst traffic data to be distributed according to the environment is to be centered. To do this, the destination -based routing method to transmit the current paper -based (Source routing) routing settings are required. In this paper, published by the IETF, IP switching system based on standardized protocol Label Switching Multi-Protocol Label Switching (MPLS) network by using the existing Best Effect is difficult to guarantee QoS for multimedia transmission in MPLS network environment using optimized QoS guarantees to transmit the multicast.

Load Balancing Scheme in Heterogeneous Multiple AS Environment based on IMS Network (IMS 네트워크 기반 이종 다중 AS 환경에서의 부하 분산 기법)

  • Yoo, Yung-Jun;Cho, Yoon-Sang;Song, Min-Do;Kim, Moo-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3A
    • /
    • pp.250-258
    • /
    • 2011
  • In this paper we propose a load balancing scheme for heterogeneous multiple AS's (Application Server) in IMS (IP Multimedia Subsystem) based network. In IMS network, to perform load balancing among multiple ASs with different registration pattern, different weight value should be set for each AS. In previous systems, there exists an inconvenience that the weight value should be set manually by the operator after monitoring the result. In this paper we propose a method to calculate optimal weight in automatic manner and to perform load balancing simultaneously. We also propose a simplified algorithm to reduce calculation in specific situation and present a way to apply our proposed scheme in adaptive manner according to the situation. Through simulation result, we verify that our proposing scheme outperforms previous schemes in load balancing and adjusts well to the change of the system in automatic manner with fast convergence.

Elevator error detecting Using Intelligence Algorithm (지능형 알고리즘을 이용한 엘리베이터의 에러검출)

  • Kang, Doo-Young;Kim, Hyung-Gwon;Javid, Hossain;Ahn, Tae-Chon
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2741-2743
    • /
    • 2005
  • In this paper, Elevator is designed for real time security & management. Security & Management System is designed for wireless communication between an Elevator and an manager, between Elevation and an manager. Also, to have remote control capability, embedded system platform with TCP/IP techniques are applied to process control system with independent open structure for the precise data transmission and without constraint of operating system. Security and Management system is designed to solve problem of network port by Bluetooth module. Moved recording, unworked table, life of device and replacement time of device are made database, database is applied to Fuzzy Rule for pre-detection unworked Elevator. Security & Management system is designed safety and convenience for customers using Elevator as well as rapidly treatment with unworked Elevator.

  • PDF

Conferencing Service Interworking in Peer-to-Peer and IMS Networks

  • Sim, Jinsub;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2136-2152
    • /
    • 2012
  • The growth of Internet technologies and the widespread use of mobile devices have been paving the way for the increasing use of conferencing services. Two types of systems have been designed to provide conferencing services: 1) a conferencing system using session control over a peer-to-peer (P2P) network and 2) an IP Multimedia Subsystem (IMS) conferencing system. The IMS conferencing system was developed to adapt to a server-based centralized system, whereas the benefits of the P2P operational model in providing such conference services are widely acknowledged. However, each system provides conferencing services only to its own users. Therefore, in this paper, we propose an interworking model to support multimedia conferencing service between the P2P environment and IMS networks. We also introduce protocol architecture and some service scenarios. To verify this system model and the design architecture, we perform an actual implementation and show experienced test results.

Development of Condition Monitering Technology for Railway Electrification System (철도 전기시설물의 상태진단 향상 기법)

  • Park, Young;Jung, Ho-Sung;Kim, Hyung-Chul;Kewon, Sam-Young;Park, Hyun-June
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2007.11a
    • /
    • pp.500-501
    • /
    • 2007
  • Automation systems for higher performance and efficiency in railway electrification systems are driving ever more demanding needs for new condition monitering systems which can consist of sensors connected to the substation and catenary systems. This paper reviews the recently developed condition monitering system, based on a IP network-based multi-agent system, wireless communications and sensor networks for railway electrification system. A new concept for information management, condition monitoring and control of power transmission are considered as railway automation in electrification system.

  • PDF

Mobile IPv6 Session Key Distribution Method At Radius-based AAAv6 System

  • Lee Hae Dong;Choi Doo Ho;Kim Hyun Gon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.581-584
    • /
    • 2004
  • Currently, there are many subscriber access networks: PSTN, ADSL, Cellular Network, IMT200 and so on. To these service providers that provide above network service, it is important that they authenticate and authorize legal subscribers and account for their usage. At present, There exist the several protocols that Support AAA(Authentication, Authorization and Accounting) service : RADIUS, Diameter, TACACS+. Nowadays, RADIUS has used for AAA service widely. It has been extended to support other access network environment. So, we extend RADIUS to support environment of Mobile IPv6. Mobile IPv6 uses IPsec as a security mechanism, basically. But, IPsec is a heavy security technology for small, portable, mobile device. Especially, it is serious at IKE, the subset of IPsec. IKE is a key distribution protocol that distributes the key to the endpoints of IPsec. In t:lis paper, we extend RADIUS to support environment of Mobile IPv6 and simplify the IKE phase of IPsec by AAA system distributing the keys by using its security communication channel. Namely, we propose the key distribution method for IPsec SA establishment between mobile node and home agent. The suggested method was anticipated to be effective at low-power, low computing deyice. Finally, end users feel the faster authentication.

  • PDF

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.