• Title/Summary/Keyword: Internet Protocol(IP)

Search Result 716, Processing Time 0.032 seconds

Output Buffered ATM Switch based IP Switching System with Traffic Type Merging Function and Its Traffic Handling Characteristics (트래픽 유형별 VC-Merging 기능을 갖는 출력 버퍼형 ATM 스위치 기반 IP 교환 방식 및 특성)

  • Han, Chi-Moon;Lee, Sang-Hwa
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.10
    • /
    • pp.41-48
    • /
    • 2001
  • It is necessary to provide the QoS guaranteed end to-end routing services using the internet protocol through the connectionless network based on high speed network. From the above necessities, this paper classified the existing traffic into two type traffics such as real time traffics and non real time traffics and proposes the ATM based IP switching method with traffic type VC merging which allows many routes according to traffic type to be mapped to the same VC label. And this paper suggests the optimum switching architecture through simulation and performance analysis of proposed VC merging output module. From the simulation results, we confirmed the performance of the proposed method better than existing VC merging system under mixed traffic circumstances.

  • PDF

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

iVisher: Real-Time Detection of Caller ID Spoofing

  • Song, Jaeseung;Kim, Hyoungshick;Gkelias, Athanasios
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.865-875
    • /
    • 2014
  • Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol-based Voice-over-Internet Protocol initiated phone calls. Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.

Design for the Remote ECG Diagnosis System using LAN and MODEM (LAN 과 MODEM을 이용한 ECG 원격 진단 시스템 구현)

  • Ahn, S.H.;Yi, Y.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1997 no.05
    • /
    • pp.171-175
    • /
    • 1997
  • We have developed a remote diagnosis system using the LAN and MODEM which enables a routine check for a patient remotely. We used $LabVIEW^{TM}$ as the programing development tool and DAQ (Data Aquisition) board from National Instrument for data aquisition. The LAN card and MODEM are used for the transmission of patient's data. A patient data are aquired by DAQ board and signal processing is done by $LabVIEW^{TM}$, which is a graphical prgamming language. Two methods for the data of transmission. One is the Client-Server model using TCP/IP (Transmission Control Protocol / Internet Address) in the LAN (Local Area Network) Another is using MODEM to transmit the measured data from a patient. In this case, the data transmission is accomplished by the FTP (File Transfer Protocol).

  • PDF

Light-Adaptive Vision System for Remote Surveillance Using an Edge Detection Vision Chip

  • Choi, Kyung-Hwa;Jo, Sung-Hyun;Seo, Sang-Ho;Shin, Jang-Kyoo
    • Journal of Sensor Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.162-167
    • /
    • 2011
  • In this paper, we propose a vision system using a field programmable gate array(FPGA) and a smart vision chip. The output of the vision chip is varied by illumination conditions. This chip is suitable as a surveillance system in a dynamic environment. However, because the output swing of a smart vision chip is too small to definitely confirm the warning signal with the FPGA, a modification was needed for a reliable signal. The proposed system is based on a transmission control protocol/internet protocol(TCP/IP) that enables monitoring from a remote place. The warning signal indicates that some objects are too near.

Web based control modules Using LonWorks/Ethernet Server for Control a large Scale Renewable Energy System in Building (빌딩용 신.재생에너지시스템 제어를 위한 LonWorks기반 원격 제어모듈 개발)

  • Hong, Wonl-Pyo
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1706-1711
    • /
    • 2008
  • This paper proposes a new Web based-control concept & design method and implementation of LonWorks network system for a large scale renewable energy energy control and monitoring system in building. The Experimental LonWorks network system using LonWorks/Ethernet(Web) server is designed and fabricated. This article addresses issues in architecture of LonWorks/Ethernet sever, embedded processors architecture for converting LonTalks protocol to Modbus protocol and software, and Internet technologies. It is also verified that the multi-induction motor control and monitoring system using LonWorks/Ethernet server have available, interoperable, reliable performance characteristics from the experimental results, Especially, The seamless integration of TCP/IP networks with control networks allows access to any control point from anywhere. Thus, the results provide a available technical data for remote distributed control system of industrial and buildings field.

  • PDF

Implementation of CoAP/6LoWPAN over BLE Networks for IoT Services (BLE 네트워크 상에서 사물인터넷 서비스 제공을 위한 CoAP과 6LoWPAN 구현)

  • Kim, Cheol-Min;Kang, Hyung-Woo;Choi, Sang-Il;Koh, Seok-Joo
    • Journal of Broadcast Engineering
    • /
    • v.21 no.3
    • /
    • pp.298-306
    • /
    • 2016
  • With the advent of Internet of Things (IoT) technology that allows the communications between things and devices over the Internet, a lot of researches on the IoT services, such as smart home or healthcare, have been progressed. In the existing machine-to-machine (M2M) communications, however, since the underlying link-layer technologies, such as Bluetooth or ZigBee, do not use the Internet Protocol (IP) communication, those technologies are not suitable to provide the IoT services. Accordingly, this paper discusses how to provide the Internet services in the M2M communication, and propose an implementation of the Constrained Application Protocol (CoAP) over 6LoWPAN for providing IoT services in the BLE networks. Based on the implementation, we compared the performance between HTTP and CoAP for IoT communications. From the experimental results, we can see that the CoAP protocol gives better performance than the HTTP protocol with two times higher throughput, 21% faster transmission time, and 22% smaller amount of generated packets.

A Multibit Tree Bitmap based Packet Classification (멀티 비트 트리 비트맵 기반 패킷 분류)

  • 최병철;이정태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.339-348
    • /
    • 2004
  • Packet classification is an important factor to support various services such as QoS guarantee and VPN for users in Internet. Packet classification is a searching process for best matching rule on rule tables by employing multi-field such as source address, protocol, and port number as well as destination address in If header. In this paper, we propose hardware based packet classification algorithm by employing tree bitmap of multi-bit trio. We divided prefixes of searching fields and rule into multi-bit stride, and perform a rule searching with multi-bit of fixed size. The proposed scheme can reduce the access times taking for rule search by employing indexing key in a fixed size of upper bits of rule prefixes. We also employ a marker prefixes in order to remove backtracking during searching a rule. In this paper, we generate two dimensional random rule set of source address and destination address using routing tables provided by IPMA Project, and compare its memory usages and performance.

A Study on the Development of the SCADA System using the Internet (인터넷을 이용한 SCADA 시스템 구축에 관한 연구)

  • Park, I.K.;Yoon, K.K.;Kim, Y.S.;Lee, S.G.;Ahn, B.W.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2373-2376
    • /
    • 1998
  • This paper describes the development of the SCADA(Supervisory Control and Data Acquisition) system which can be controlled via the Internet. In this paper, the SCADA system is composed of a number of microprocessor-based RTU(Remote Terminal Unit)s, a MMI(Man Machine Interface) host, a SCADA server, and SCADA clients. There are two protocols used in the system. Each RTU and the MMI host are connected by a RS-485 line and CSMA/CD(Carrier Sense Multiple Access / Collision Detection) protocol is used to communicate with each other. TCP/IP(Transmission Control Protocol/Internet Protocol) is used among the MMI host, the SCADA server, and SCADA clients. The equipments installed in the field are controlled by a number of RTUs. The function of the MMI host is to acquire real-time data from RTUs and control them. The SCADA server supports data transfer between the networked MMI host and the SCADA client on the web-server through TCP/lP. Data transfer is possible regardless of the type of network only if there are TCP/lP Winsock-compatible stack driver. The SCADA client is implemented as the shape of web-page by means of JAVA language. Therefore, it runs on a web-browser such as Netscape and Explorer, and allows a number of users to access this SCADA system.

  • PDF

An Exploratory Study on the Economic Value of IPv6 Technology (IPv6 도입의 경제적 가치 산정에 대한 탐색적 연구)

  • Lee, Byung-Heon;Lee, Sang-Kon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1B
    • /
    • pp.56-70
    • /
    • 2006
  • This study attempts to estimate the size of economic value that could be created by the adoption of a new internet protocol, IPv6. The existence of externality and diffusion effects in the adoption of a new platform technology makes it difficult to capture the exact costs and benefits of IPv6 adoption. Hence, this study employed multiple evaluation methods rather than relying on single method to increase the validity of results by averaging the value of different methods. Futhermore, the proposed evaluation model includes qualitative variables such as expert opinions, as well as quantitative variables, to incorporate various stakeholders' perspectives. Finally, the policy implications for IPv6 adoption and the limitations of this study are discussed.