• Title/Summary/Keyword: Internet Broadcasting Service

Search Result 844, Processing Time 0.032 seconds

Analysis for Channel Change Minimization Scheme of Mobile IPTV Service in LTE-Advanced Systems (LTE-Advanced 시스템에서 모바일 IPTV 서비스 채널 변경 최소화 방법에 대한 분석)

  • Lee, HyeungWoo;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.77-85
    • /
    • 2015
  • This paper presents our performance evaluation after the way of minimizing waiting times between channel switching for eMBMS(evolved Multimedia Broadcast/Multicast Services) technique in LTE-Advanced systems. Existing composition of MBMS using IGMP(Internet Group Management Protocol) transfers the data with Multicast from BM-SC(Broadcast Multicast Service Center) to eNB(evolevd Node B) and with Broadcast from eNB to UE(User Equipment). Therefore, in case of channel switching, IGMP Join report should be transferred to BM-SC and then wait user's contents to be retransferred from eNB. To achieve this, Subscriber Channel technique of priorities is used for minimizing waiting times between channel switching as UE broadcasts favorite channels in advance.

Service Technology Prospect for Next Generation Smart TV (차세대 스마트TV 서비스 기술 전망)

  • Hong, Jin-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.368-371
    • /
    • 2012
  • Smart TV is approaching as a new media service to integrate the broadcasting and the internet according to the technology evaluation of convergence to broadcasting, telecommunication, and computing. Therefore, This paper looks out the next generation smart TV(Smart TV 2.0) technology based on CPNT which supports those services such as the broadcasting, telecommunication, a convergence of broadcasting & communication, and computer service through multi-screen.

  • PDF

Internet Personal Broadcasting Service Quality Impact on Continuous Use Intention : Focused on YouTube (1인 미디어 서비스품질이 사용자 만족과 지속사용의도에 미치는 영향 : YouTube를 중심으로)

  • Lee, Youn Sun;Suh, Chang Juck;Lee, Hay Jung
    • Journal of Information Technology Services
    • /
    • v.18 no.5
    • /
    • pp.99-117
    • /
    • 2019
  • In recent years, the one-person media has increasingly gained popularity. The purpose of this study is to investigate the relationship among the service quality, satisfaction and intention of continuous use of one-person media service and to further examine the mediating effect of satisfaction operating on the relationship between the service quality and intention of continuous use. Based on the literature review, hypotheses were developed and the research model was built for testing. The sample of 358 users was selected to achieve these objectives. From the analysis of PLS(Partial Lease Square Path Analysis), key research findings are summarized as follows. First, relationships among the service quality, satisfaction, and intention of continuous use were all positively correlated each other. Second, the effect of service quality on intention of continuous use was mediated by satisfaction. Third, the content quality of one-person media has the higher effectiveness than platform quality to satisfaction and intention of continuous use. Results of this paper are expected not only to emphasize the importance of satisfaction based on the service quality, but also to provide multifaceted implications and directions for the management of one-person media service effectively.

Implementation of an Efficient Service Discovery Protocol for Directory Facilitator Based on CALM Agent (CLAM 에이전트 기반 Directory Facilitator를 위한 효율적인 서비스 디스커버리 프로토콜 구현)

  • Lee, Seung-Hyun;Shin, Dong-Ryeol;Jang, Kyung-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.275-282
    • /
    • 2011
  • Current service discovery protocols such as UPnP, Jini, SLP provide the basic function which is message exchange pattern, service representation and description, in service discovery. They does not guarantee service interoperability among service discovery. Therefore, in this paper, we design and implement CLAM (Component-based Autonomic Layered Middleware) agent platform to enable an efficient service discovery through extension of DF agent function in FIPA-compliant specification. Also, we propose an efficient service discovery mechanism using DHT-Chord algorithm to guarantee scalability and interoperability in DF agent.

A Study of WiMAX Security threats and Their Solution

  • Woo, Seon-mi;Jeong, Gisung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.66-74
    • /
    • 2016
  • In this study, we have discussed and illustrated the security issues of WiMAX technology including vulnerabilities, threats and some security solution. Both physical layer and data link layer have been considered. Jamming is a major threat in physical layer, and in data link layer we study an authentication problem and see the problem of some unencrypted messages leading to lack of confidentiality. Some of these vulnerabilities have been solved in the recent amendment of 802.16 and some still remain. Moreover WiMax is a new technology yet.

Private Music on Demand Service in Wireless/Wired Networks (유무선망에서의 개인 주문형 음악서비스 시스템 구현)

  • Kim, Seung-Cheon;Hwang, Ho-Young;Ro, Kwang-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.195-200
    • /
    • 2010
  • This paper introduces a new mobile music service, private music on demand (PMOD), which is implemented by mobile DJ in wireless and wired networks. The newly introduced PMOD service is based on the concept that users can have music services at anytime and by any form they want. The mobile DJ implementing PMOD services, therefore, enables users to do more than simply listening music through networks.

A Case Study on Partnership Types between Network Operators & Netflix: Based on Corporate Investment Model

  • Minzheong, Song
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.14-26
    • /
    • 2020
  • We categorize partnership types between network operators and a global video streaming or over-the-top service provider, Netflix from 2011 to the first quarter 2018. The options are based on the integration of over-the-top (OTT), Netflix with pay TV and telecommunication operators in the form of carrier billing, access to over-the-top (OTT) via devices or the development of their tariff plans. Options of the Type 3, 'cooperation' or the Type 4, 'agreement' entails a kind of the technical involvement between two partners and commercial agreement. The types of partnership are evolving from one to others. Some partnerships have characteristics of more than one type. The majority of technical or service integration cooperation of Type 3 entail bundling and marketing promotion of Type 2 and Type 1. Similarly, the 'agreement' of Type 4, co-branded or white-label service initiative entail tariff or device user interface (UI) integration of the 'cooperation' of Type 3 and joint marketing initiatives of Type 1.

A STUDY OF DISTRIBUTED DENIAL OF SERVICE ATTACK ON GOVERNMENT INFRASTRUCTURE

  • Kim, Suk-Jin;Jeong, Gisung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.55-65
    • /
    • 2016
  • Distributed Denial of service attack is one of the major threats nowadays especially to the government infrastructure that give huge impact to the reputation and interrupt the services and resource. Our survey start with brief introduction about DDoS attacks, we illustrate the trends and incident happened at government from various countries. We then provide an extensive literature review on the existing research about implication, types of attacks and initiative to defence against the DDoS attacks. Our discussion aims to identify the trends in DDoS attacks, in depth impact of DDoS attacks to government infrastructure, classification of attacks and techniques against the attacks. And we will use for a fire fight safety and management.

A Study for methodology and argumented reality technology for social network analysis based on smart-phone environment (스마트폰 환경하에서 소셜 네트워크 분석을 위한 증강현실 기술과 방법론에 관한 연구)

  • Kang, Jang-Mook;Lee, Kyoung-Kun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.173-178
    • /
    • 2010
  • This Paper deals with Social Network Service for smart-phone environment. Mobile social network service will developed with augmented reality combined with SNS. Therefore, this research introduce methodology and augmented reality system for social network analysis based on smart-phone environment. Introducing methodology and item and augmented reality will help further smart-phone research.

Implementing Onetime Password based Access Control System for Secure Sharing Service

  • Kang, Namhi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.1-11
    • /
    • 2021
  • Development of ICT technologies leads exponential growth of various sharing economy over the last couple of years. The intuitive advantage of the sharing economy is efficient utilization of idle goods and services, but there are safety and security concerns. In this paper, we propose a onetime password based access control system to support secure accommodation sharing service and show the implementation results. To provide a secure service to both the provider and the user, the proposed system issues a onetime access password that is valid only during the sharing period reserved by the user, thereafter access returns to the accommodation owner. Especially, our system provides secure user access by merging the two elements of speaker recognition using voice and a one-time password to open and close the door lock. In this paper, we propose a secure system for accommodation sharing services as a use-case, but the proposed system can be applicable to various sharing services utilizing security-sensitive facilities.