• Title/Summary/Keyword: Major information and communication infrastructure

Search Result 65, Processing Time 0.025 seconds

IP Studio Infrastructure intended for Modern Production and TV broadcasting Facilities

  • Mfitumukiza, Joseph;Mariappan, Vinayagam;Lee, Minwoo;Lee, Seungyoun;Lee, Junghoon;Lee, Juyoung;Lim, Yunsik;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.61-65
    • /
    • 2016
  • In the TV broadcasting, movie production and business the transportation of video between creators (programmers, studios) and distributors (broadcast and cable networks, cable and satellites companies) is still a mix of File Transfer Protocol (FTP), physical delivery, and expensive multicast satellite. Cloud-based file sync-and-share providers like Dropbox and box are playing an increasing role, but the industry's unique demands for speed and multicasting have fueled the growth of IP Video transport. This paper gives a solid grasp of the major elements of IP video technology, including content preparation, system architecture alternatives and network performance management.

CRL Distribution Method based on the T-DMB Data Service for Vehicular Networks (차량통신에서 T-DMB 데이터 서비스에 기반한 인증서 취소 목록 배포 기법)

  • Kim, Hyun-Gon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.161-169
    • /
    • 2011
  • There is a consensus in the field of vehicular network security that public key cryptography should be used to secure communications. A certificate revocation list (CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a CRL distribution method aided by terrestrial digital multimedia broadcasting (T-DMB). By using T-DMB data broadcasting channels as alternative communication channels, the proposed method can broaden the network coverage, achieve real-time delivery, and enhance transmission reliability. Even if roadside units are not deployed or only sparsely deployed, vehicles can obtain recent CRLs from the T-DMB infrastructure. A new transport protocol expert group (TPEG) CRL application was also designed for the purpose of broadcasting CRLs over the T-DMB infrastructure.

A study on Installation of Facility Monitoring System in Computer Room's (전산실 기반설비감시시스템 구축에 관한 연구)

  • Choi, Woo-hyoung;Kim, Chang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.159-161
    • /
    • 2013
  • Surveillance system that can respond quickly in case of failure to detect various disorders that can occur for a temperature chamber, and fire extinguishing equipment, such as UPS, communication room, and computer room of enterprises and institutions operating in infrastructure, and to systematically study. Major telecommunications equipment and computational facilities to manage, operating in an environment of air conditioners work status, distribution panel and the UPS status and fault status, rapid notification system in case of fire is needed. By identifying the status and problems of disability surveillance on the periphery of the existing computer room's infrastructure management guidelines presented in the next future Conception and systematic surveillance system for staff to refer to when designing considerations associated with data center monitoring system the necessity of the various studies are presented.

  • PDF

A Study on the Police Knowledge Management System based on the IntraNet (인트라넷기반의 경찰지식관리시스템에 관한 연구)

  • Choi, Eung-Ryul;Lim, Jae-Kang
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.273-305
    • /
    • 2000
  • The knowledge substitutes the traditional factors of production - land, labor, and capital - and has become one of the most important new resources. The Internet Knowledge Society is where the knowledge is the major source of development and competition. Now more than 350mi11ion computers are connected to internet servers and the internet users are more than 250mi11ion. The purpose of this paper is to propose some key factors for implementing the Police Knowledge Management System(PKMS) based on Intranet. With Information Technology(IT), the police administrative system will be much more efficient. Introducing the If into the system is critical for restructuring the police administrative system. This paper concludes as follows : ■ Knowledge is divided into tacit and explicit one. Knowledge process is divided into acquisition, accumulation, distribution and creation of knowledge. ■ The IntraNet is composed of Web server, FTP server, electric-mail server, and is constructed security system to safety. ■ All policemen are bound to serve as a new knowledge worker. ■ Police organization needs to operate data management system. The organization also needs to the Police Knowledge Management Center(PKMC). And the Police Chief Knowledge Officers(PCKO) needs to be appointed to manage the PKMC. ■ An information and knowledge infrastructure(various databases are the most important factor) should be established within the organization to promote the self-directed management, the interactive communication, and the learning ability of the members.

  • PDF

Methodology for Determining RSE Spacing for Vehicle-Infrastructure Integration(VII) Based Traffic Information System (Focused on Uninterrupted Traffic Flow) (차량-인프라 연계(VII) 기반 교통정보시스템의 RSE 설치간격 결정 방법론 (연속류를 중심으로))

  • Park, Jun-Hyeong;O, Cheol;Im, Hui-Seop;Gang, Gyeong-Pyo
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.6
    • /
    • pp.29-44
    • /
    • 2009
  • A variety of research efforts, using advanced wireless communication technologies, have been made to develop more reliable traffic information system. This study presents a novel decentralized traffic information system based on vehicle infrastructure integration (VII). A major objective of this study was also to devise a methodology for determining appropriate spacing of roadside equipment (RSE) to fully exploit the benefits of the proposed VII-based traffic information system. Evaluation of travel time estimation accuracy was conducted with various RSE spacings and the market penetration rates of equipped vehicle. A microscopic traffic simulator, VISSIM, was used to obtain individual vehicle travel information for the evaluation. In addition, the ANOVA tests were conducted to draw statistically significant results of simulation analyses in determining the RSE spacing. It is expected that the proposed methodology will be a valuable precursor to implementing capability-enhanced next generation traffic information systems under the forthcoming ubiquitous transportation environment.

The National Policy of Information Management in the U.K. (영국의 문헌정보관리 정책)

  • Han, S.W.
    • Journal of the Korean Society for information Management
    • /
    • v.4 no.2
    • /
    • pp.31-46
    • /
    • 1987
  • The United Kingdom has a well-developed and comprehensive information infrastructure which has grown up over many years, but in the strict sense it has no coherent body of policy relating to information collection, storage, provision and supply. However, each of the governmental, professional and other bodies which has any major involvement with information, has committees to run its affairs and develop its policies in relation to issues and problems in the field. In addition, a number of ad hoc committees and working parties, to discuss or deal with a current problem, or to monitor or advise on the conduct of a research or development project, show that there is a high degree of awareness. of what is happening in the field and that there are many opportunities for expressing any particular point of view. The need for good intelligence in business or industrial operations is now being more generally accepted, and in consequence the need for a director of intelligence is also seen. The director of information in an industrial setting is the information manager, who combines or has access to the skills of several disciplines, including library, data processing and communication skills as well as managerial. Recognition of the need for such persons has policy implications in terms of short-term training provision and long-term educational facilities for the emerging profession, as well as manpower planning implications.

  • PDF

Certificate Revocation in Connected Vehicles

  • Sami S. Albouq
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.13-20
    • /
    • 2023
  • In connected vehicles, drivers are exposed to attacks when they communicate with unauthenticated peers. This occurs when a vehicle relies on outdated information resulting in interactions with vehicles that have expired or revoked certificates claiming to be legitimate nodes. Vehicles must frequently receive or query an updated revoked certificate list to avoid communicating with suspicious vehicles to protect themselves. In this paper, we propose a scheme that works on a highway divided into clusters and managed by roadside units (RSUs) to ensure authenticity and preserve hidden identities of vehicles. The proposed scheme includes four main components each of which plays a major role. In the top hierarchy, we have the authority that is responsible for issuing long-term certificates and managing and controlling all descending intermediate authorities, which cover specific regions (e.g., RSUs) and provide vehicles with short-term pseudonyms certificates to hide their identity and avoid traceability. Every certificate-related operation is recorded in a blockchain storage to ensure integrity and transparency. To regulate communication among nodes, security managers were introduced to enable authorization and access right during communications. Together, these components provide vehicles with an immediately revoked certificate list through RSUs, which are provided with publish/subscribe brokers that enable a controlled messaging infrastructure. We validate our work in a simulated smart highway environment comprising interconnected RSUs to demonstrate our technique's effectiveness.

A Study on the Improvement of Security Vulnerabilities in Intelligent Transport Systems (지능형교통시스템의 보안취약점 개선방안에 관한 연구)

  • Jo, Pyoung Hyun;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.531-543
    • /
    • 2013
  • The destruction and prejudice of major infrastructure such as energy, broadcast, communication and transportation could result in a threat to individual rights and liberties, as well as social and economic losses. If a traffic signal control facilities have been violated, the lives of the citizens discomfort as well as causing social disruption such as traffic accident. Because the control system is operating as a closed network and you think it is safe, the information protection system has not been built or security patches and anti-virus updates do not work properly. So, cyber attacks by security vulnerabilities are exposed. Therefore, there is a need to identify the characteristics of the system, and develop appropriate countermeasures in order to prevent cyber attacks and prejudices incidents. This paper examines the vulnerabilities of Intelligent Transport Systems and proposes the improvement of security vulnerabilities.

Services analysis and improvement of MKE(Ministry of Knowledge Economy) Cyber Security Center (지식경제사이버안전센터의 대응활동분석과 개선방안)

  • Lee, Seung-Won;Roh, Young-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.249-258
    • /
    • 2012
  • Cyber attacks expose sensitive information and cause fatal damage in both the public and the private sectors. Therefore, MKE (Ministry of Knowledge Economy) Cyber Security Center was founded on July 25, 2008, to perform three major roles. First, it detects and analyzes cyber attacks for the both sectors. Second, its ISAC (Information Sharing & Analysis Center) service analyzes and evaluates the vulnerability of the communication and network infrastructure to security threats, including control systems. Third, it provides CERT/CC (Computer Emergency Response Team Coordination Center) service to prevent and to respond to computer security incidents. This study focuses on the MKE Cyber Security Center's service analysis, which is playing an increasingly larger role in the both sectors. Based on this analysis, after grasping the response services activity and pointing out the problems, this study suggests improvements to the MKE Cyber Security Center.

Proactive Network Optimizer for Critical Applications (크리티컬한 응용을 위한 능동형 네트워크 최적화기)

  • Park, Bongsang;Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1250-1256
    • /
    • 2018
  • Recently, wireless networks are becoming an important infrastructure for the critical large-scale applications such as cyber-physical systems and next generation industrial automations. However, the fundamental performance uncertainty of wireless networks may incur the serious instability problem of the overall systems. This paper proposes the proactive network optimizer to guarantee the application demands without any real-time link monitoring information of the networks. In particularly, the proposed proactive optimizer is the cross-layer approach to jointly optimize the routing path and traffic distribution in order to guarantee the performance demand within a maximum k number of link faults. Through the simulations, the proposed proactive network optimizer provides better robustness than the traditional existing reactive networks. Furthermore, the proactive network does not expose to the major weakness of the reactive networks such as the performance degradation due to the erroneous link monitoring information and the network reconfiguration cost.