• Title/Summary/Keyword: IP network system

Search Result 876, Processing Time 0.021 seconds

Design of FPGA Camera Module with AVB based Multi-viewer for Bus-safety (AVB 기반의 버스안전용 멀티뷰어의 FPGA 카메라모듈 설계)

  • Kim, Dong-jin;Shin, Wan-soo;Park, Jong-bae;Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.11-17
    • /
    • 2016
  • In this paper, we proposed a multi-viewer system with multiple HD cameras based AVB(Audio Video Bridge) ethernet cable using IP networking, and FPGA(Xilinx Zynq 702) for bus safety systems. This AVB (IEEE802.1BA) system can be designed for the low latency based on FPGA, and transmit real-time with HD video and audio signals in a vehicle network. The proposed multi-viewer platform can multiplex H.264 video signals from 4 wide-angle HD cameras with existed ethernet 1Gbps. and 2-wire 100Mbps cables. The design of Zynq 702 based low latency to H.264 AVC CODEC was proposed for the minimization of time-delay in the HD video transmission of car area network, too. And the performance of PSNR(Peak Signal-to-noise-ratio) was analyzed with the reference model JM for encoding and decoding results in H.264 AVC CODEC. These PSNR values can be confirmed according the theoretical and HW result from the signal of H.264 AVC CODEC based on Zynq 702 the multi-viewer with multiple cameras. As a result, proposed AVB multi-viewer platform with multiple cameras can be used for the surveillance of audio and video around a bus for the safety due to the low latency of H.264 AVC CODEC design.

Efficient Real-time Multimedia Streaming System Using Partial Transport Stream for IPTV Services

  • Lee, Eun-Jo;Park, Sung-Kwon
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.2
    • /
    • pp.88-96
    • /
    • 2008
  • IPTV Content delivery systems over wired networks confront scalability problems due to their high network bandwidth requirement for real-time services. Especially, VoD service provides Trick Mode features such as pause, fast forward and similar operations. However, Trick Mode services are delivered by the method of unicast only for controlling of the stream. With a point of views, this paper propose a new real-time multimedia streaming architecture over IP Networks, which tries to achieve bandwidth efficiency and supporting for mass clients better than traditional unicast services. The proposed methods divide the Transport Stream into a series of segments. After that, this divided partial Transport Stream makes multicast streaming periodically. Meanwhile Set-top Box of a client makes a rearrangement orderly by using Presentation Time Stamp field from the served Transport Stream packets. While the current Transport Stream segment is playing, it should be guaranteed that the next segment is downloaded on time. Consequently, the original video content can be played out continuously. The detail introduction of a new real-time multimedia streaming system with analysis and simulation follows as below.

  • PDF

Development of Multi User Games using 3D Graphics and Multicasting (원격 다중 참여자 3차원 그래픽스 게임 개발)

  • Kim, JongSeong;Park, JiHun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.4 no.1
    • /
    • pp.67-77
    • /
    • 1998
  • In this paper we describe a development of a multi user game using 3D graphics and multicasting. First, we represent a virtual reality world by 3D graphics technology. Next, we use computer communication technology for the purpose of interaction among multi users. As a result, multi users share 3D graphics objects and play games. The goal of this paper is a development of a system that enables multi users to play games sharing a virtual world represented by 3D graphics. We use the OpenInventor library and C++ language for 3D graphics scene representation, and IP multicasting protocols for computer communication. The system allows to use Polhemus Fastrak 3D input device that recognizes the 3D position and 3D orientation. As an example we present a game that demonstrates the effect of piano concert by multi piano players who are distributed in a computer network.

  • PDF

Multimedia Data Security of Video Conferencing System (영상회의 시스템에서의 멀티미디어 데이터 보안)

  • 이원호;한군희
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.231-236
    • /
    • 2003
  • Video conferencing system it is various at internet and uses the reading is become accomplished. Research of like this portion synchronization of audio, the video compression technique and multimedia data, supports the video conference the research of the Mbone of the If multicast for being active, being become accomplished the multimedia service which is various an video from internet, the line speed of communication becomes high-speed anger and to follow leads is become accomplished. The video conference from opening elder brother dispersion internet network environment the problem against the image which is an image conference data and a voice security is serious and it raises its head. To sleep it presents the security method which from the video conference it follows in quality of multimedia data from the dissertation which it sees and it does.

  • PDF

Methods of DICOM and Non-DICOM Interfacing for various Radiological Equipments with PACS (방사선 검사 관련 의료장비와 PACS 간의 연동을 위한 DICOM 및 Non-DICOM 인터페이스 방안)

  • Kim, H.C.
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.6 no.1
    • /
    • pp.51-64
    • /
    • 2003
  • This thesis describes the effective interfacing methods of PACS Modality based on the system installation andoperating experiences. PACS(Picture Archiving and Communication Systems) is a system for medical image archiving and communication using large storage device and high-speed network. The standard communication protocol of PACS is DICOM(Digital Imaging and Communication in Medicine) based on TCP/IP and point-to-point protocol. However, there are many Non-DICOM Modalities and DICOM Modalities having problems. First, we had interfaced almost modalities. Fuji CR, GE CT, MRI, Angio, Fluoro, Phillips Angio, Shimadzu Fluoro. Ultrasound PACS, with the main PACS in the Seoul S Hospital as large scale hospital. And we manipulated the intelligent image distribution and the CT. MRI Interfaces never experienced beforein the Anyang J Hospital and the Chungju C Hospital as mid or small scale hospital. Technically, we developed both the DICOM Interface and the Non-DICOM Interface. At the last, the DICOM Worklist and the DICOM Print Interface were implemented in the Seoul B Hospital, the Bucheon SJ Hospital and the Seoul K Hospital independently with PACS. The Oracle, Sybase and MS-SQL are used as database, and UNIX, Macintosh, MS Windows as operating systems. And the Visual C++ and UNIX C are the main programming tools. We have used UTP, coaxial and fiber optic cable under 10/100 mbps LAN for networking.

  • PDF

Methods of DICOM and Non-DICOM Interfacing for various Radiological Equipments with PACS (방사선 검사 관련 의료장비와 PACS 간의 연동을 위한 DICOM 및 Non-DICOM 인터페이스 방안)

  • Kim, Hyeon-Cheol
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.5 no.1
    • /
    • pp.46-63
    • /
    • 2002
  • This thesis describes the effective interfacing methods of PACS Modality based on the system installation and operating experiences. PACS(Picture Archiving and Communication Systems) is a system for medical image archiving and communication using large storage device and high-speed network. The standard communication protocol of PACS is DICOM(Digital Imaging and Communication in Medicine) based on TCP/IP and point-to-point protocol. However, there are many Non-DICOM Modalities and DICOM Modalities having problems. First, we had interfaced almost modalities, Fuji CR, GE CT, MRI, Angio, Fluoro, Phillips Angio, Shimadzu Fluoro, Ultrasound PACS, with the main PACS in the Seoul S Hospital as large scale hospital. And we manipulated the intelligent image distribution and the CT, MRI Interfaces never experienced before in the Anyang J Hospital and the Chungju C Hospital as mid or small scale hospital. Technically, we developed both the DICOM Interface and the Non-DICOM Interface. At the last, the DICOM Worklist and the DICOM Print Interface were implemented in the Seoul B Hospital, the Bucheon SJ Hospital and the Seoul K Hospital independently with PACS. The Oracle, Sybase and MS-SQL are used as database, and UNIX, Macintosh, MS Windows as operating systems. And the Visual C++ and UNIX C are the main programming tools. We have used UTP, coaxial and fiber optic Gable under 10/100 mbps LAN for networking.

  • PDF

An Error Concealment Technique for MPEG-4 Video Transmission over Wireless Networks (무선 네트워크 환경에서의 MPEG-4 비디오 전송을 위한 에러 은닉 기법)

  • Park, Jeong-Beom;Eo, Jin-Woo
    • Journal of IKEEE
    • /
    • v.9 no.2 s.17
    • /
    • pp.170-178
    • /
    • 2005
  • The video data corrupted by the transmission error due to packet loss induce error propagation in decoded video data, and cause poor video quality. To remedy these corrupted video data, there have been introduced two types of error concealment techniques: spatial or temporal error concealment algorithm. Computational overhead by using spatial error concealment algorithm is a serious disadvantage in mobile video data streaming environment. In this paper, we propose hybrid type error concealment technique recovering video quality of mobile device using MPEG-4 video streaming on error-prone wireless network. Our algorithm is implemented in MPEG-4 decoder. The algorithm adopts Intel Wireless MMX technology to provide high performance of portable embedded multimedia mobile device. It is proven that the proposed algorithm shows expected performance for a mobile streaming system(PDA) on IP channels. Our approach showed better processing speed and better video quality comparing with traditional error concealment algorithm.

  • PDF

A Proactive Approach to Reconstructing Overlay Multicast Trees using Resource Reservation (자원 예약 방식을 사용한 오버레이 멀티캐스트 트리의 구성과 복구 방안)

  • Heo, Kwon;Son, Suung-Chul;Kim, Kyung-Hoon;Song, Ho-Young;Nam, Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1049-1057
    • /
    • 2006
  • Overlay Multicast is an effective method for efficient utilization of system resources and network bandwidth without using hardware customization. Unlike in IP multicast, multicast tree reconstruction is required when non-leaf node leaves or fails. In this paper, we propose a proactive approach to solve this defect by using a resource reservation of the out degrees. This allows children of non-leaf node to connect to its new parent node immediately when its parent node leaves or fails. In our proposal, a proactive route maintenance gives a fast recovery time and reduces a delay effect in the new route. The simulation results show that our proposal takes shorter period of time than the other algorithms to reconstruct a similar tree and that it is a more effective way to deal with a lot of nodes that have lost their parent nodes.

One-time Session Key based HTTP DDoS Defense Mechanisms (일회성 세션 키 기반 HTTP DDoS 공격 방어기법)

  • Choi, Sang-Yong;Kang, Ik-Seon;Kim, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.95-104
    • /
    • 2013
  • DDoS attacks have became as a social threat since 2009 7.7 DDoS turmoil. Even though defence techniques have been developing to provide against those threats, they become much more sophisticate. In recent years, the attack form of DDoS is changing from high amount of traffic attack of network layers to highly sophisticate small amount of application layers. To make matters worse, attack agent for the attack has became very intelligent so that it is difficult to be blocked since it can't be distinguished from normal PCs. In the user authentication system(such as CAPTCHA) User intervention is required to distinguish normal PCs and intelligent attack agents and in particular, in a NAT environment, IP-based blocking method can be cut off the normal users traffic at the same time. This research examined defense techniques which are able to distinguish between agent and normal PC and effectively block ways the HTTP DDoS offense applying one-time session key based authentication method using Cookie which is used in HTTP protocol to protect web sever from sophisticate application layer of DDoS.

Current Status and Challenges of BGP Hijacking Security Threat (BGP 하이재킹 보안 위협 대응 현황 및 과제)

  • Han, Wooyoung;Hong, Yunseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1525-1530
    • /
    • 2022
  • BGP(Border Gateway Protocol) is a routing protocol that is actively used in inter-AS routing on the Internet. However, BGP routing protocol is vulnerable to BGP hijacking attacks that hijack the network by impersonating normal BGP sessions. BGP Hijacking attacks can lead to causing intercept IP traffic or interference with the normal service operation. Recently, BGP hijacking attacks, which have often occurred overseas, have also occurred in Korea. It means threatening the security of the Internet. In this paper, we analyze the overall process of attack through representative attack cases and virtual scenarios of BGP hijacking and based on the results of analyzing the application status of security technology to prevent BGP hijacking attacks by Korea and global major ISPs. It covers the technical proposal of ISPs and autonomous system operators should take to defend against BGP hijacking attacks.