• Title/Summary/Keyword: Mobile Broadcast

Search Result 530, Processing Time 0.028 seconds

Throughput Analysis of Network Coding in IEEE 802.11 Wireless LAN (IEEE 802.11 무선 랜에서의 네크워크 코딩 성능 분석)

  • Jang, Bo-Kyung;Song, Young-Ah;Kim, Jeong-Geun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.8
    • /
    • pp.797-804
    • /
    • 2011
  • Network coding has recently emerged as an effective solution for multicast and broadcast communications in wireless ad hoc networks. In this paper, we propose a throughput performance model for IEEE 802.11 wireless networks with network coding. Specifically, we consider IEEE 802.11 DCF protocol and linear topology in which traffic sources are located at both ends and intermediate nodes act as relays performing network coding. The proposed analytic model has the form of nonlinear equations in terms of throughput of each node. The solution of the nonliear equations thus correspond to the end-to-end throughput. Extensive simulation experiments have been performed to validate accuracy of the proposed model. Numerical results show that the results of the proposed analytic model agree fairly well with the corresponding simulation results.

An Internet Gateway Based Link State Routing for Infrastructure-Based Mobile Ad Hoc Networks (인프라구조 기반의 이동 애드혹 네트워크를 위한 인터넷 게이트웨이 중심의 링크상태 라우팅 프로토콜)

  • Lee, Sung Uk;Ngo, Chi-Trung;Han, Trung-Dinh;Kim, Je-Wook;Oh, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.10
    • /
    • pp.859-876
    • /
    • 2012
  • Since the existing protocols separated mobility management part and routing protocol part in their design and used a flooding, they suffer from the high control overhead, thereby limiting performance. In this paper, we use a tree-based mobility management method and present a simple and efficient routing protocol that exploits the topology information which is built additionally through mobility management. Thus, the mobility management and the routing protocol closely cooperate to optimize control overhead. Furthermore, we use a progressive path discovery method to alleviate traffic congestion around IG and a unicast-based broadcast method to increase the reliability of message delivery and to judge link validity promptly. The proposed protocol reduces control overhead greatly and works in a stable manner even with the large number of nodes and high mobility. This was proven by comparing with the AODV protocol that employs the hybrid mobility management protocol.

Learning based relay selection for reliable content distribution in smart class application

  • Kim, Taehong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2894-2909
    • /
    • 2015
  • As the number of mobile devices such as smart phones and tablets explodes, the need for new services or applications is also rapidly increasing. Smart class application is one of the emerging applications, in which most of contents are distributed to all members of a class simultaneously. It is highly required to select relay nodes to cover shadow area of radio as well as extend coverage, but existing algorithms in a smart class environment suffer from high control packet overhead and delay for exchanging topology information among all pairs of nodes to select relay nodes. In addition, the relay selection procedure should be repeated in order to adapt to the dynamic topology changes caused by link status changes or device's movement. This paper proposes the learning based relay selection algorithm to overcome aforementioned problems. The key idea is that every node keeps track of its relay quality in a fully distributed manner, where RQI (Relay Quality Indicator) is newly defined to measure both the ability of receiving packets from content source and the ability of successfully relaying them to successors. The RQI of each node is updated whenever it receives or relays broadcast packet, and the node having the higher RQI is selected as a relay node in a distributed and run-time manner. Thus, the proposed algorithm not only removes the overhead for obtaining prior knowledge to select relay nodes, but also provides the adaptability to the dynamic topology changes. The network simulation and experimental results prove that the proposed algorithm provides efficient and reliable content distribution to all members in a smart class as well adaptability against network dynamics.

A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment (안전한 유비쿼터스 환경을 위한 확장성 있는 블루투스 네트워크에 관한 연구)

  • Baek, Jang-Mi;Seo, Dae-Hee
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.159-170
    • /
    • 2008
  • The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.

  • PDF

MPLS and Video Stream broadcast multicast transport optimization through convergence (MPLS와 멀티캐스트 융합을 통한 Video Stream 방송 전송 최적화)

  • Hwang, Seong-Kyu;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1330-1336
    • /
    • 2014
  • QoS techniques and transmitted in real-time communication with the advancement of technology a variety of applications and services are available these days, mobile devices bogeuphwa LTE technology to the development of multimedia services with high quality can be realized. In order to satisfy this condition simply with a router with an increased bandwidth expansion by considering the increase in the routing table of the network scalability problems included. Burst traffic data to be distributed according to the environment is to be centered. To do this, the destination -based routing method to transmit the current paper -based (Source routing) routing settings are required. In this paper, published by the IETF, IP switching system based on standardized protocol Label Switching Multi-Protocol Label Switching (MPLS) network by using the existing Best Effect is difficult to guarantee QoS for multimedia transmission in MPLS network environment using optimized QoS guarantees to transmit the multicast.

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

Free Contents Aggregation System for IPTV Service (IPTV 서비스를 위한 프리콘텐츠 수집시스템)

  • Kang, Young-Man;Han, Soonhee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1361-1370
    • /
    • 2018
  • With the advent of OTT, the new concept of content delivery service is growing interest in the market, the development of appropriate equipment and application program is needed. In order to provide OTT service, a system to receive UHD broadcast to collect free content is needed. In this study, we designed an OTT service providing system that operates on 4K UHD video adapter hardware capable of IPTV service. First, we analyzed the situation to provide video free contents service and implemented a system to collect free contents. To validate the research and to make practical use of it, we have developed a mobile program for free content service and distributed it through the Google App Store. It is also installed in an OTT box with the ability to provide free content on the open market and is in service in several countries including Brazil.

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

A Study on Characteristics of the Type of Interactive Broadcast Program in Korea (국내 양방향 방송 프로그램 유형 특징에 관한 연구)

  • PARK, JIN SIK;KIM, SUNG HOON
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.4
    • /
    • pp.209-215
    • /
    • 2019
  • The purpose of this study is to suggest the development of interactive services and technologies in the media industry. Through the analysis of domestic two-way broadcasting contents service, this study analyzed platform and services type according to service type of terrestrial broadcasting, SO operator and Telco. Also, by identifying the characteristics of interactive programs(open, interactive, personalized, stereoscopic), this study propose important convergence possibilities of the future providers and development plans through supporting technologies and services for each characteristic. In the case of terrestrial broadcasters, ARS, web sites and mobile apps were mostly provided in both directions, and SO and satellite broadcasting operators were found to provide diversity in interactive service operation using data domain. In the case of IPTV companies, most of them provide interactive services with additional video or information service through adjustment button or app, and cable TV operators had more adjustment data broadcasting than exclusive use data broadcasts. Therefore, domestic interactive broadcasting service type needs convergence type of revenue model needs and needs to be converted into new competitive interactive broadcasting program service environment.

The Relationship between Cyberbullying Victimized Experience and Emotional Behavior of Middle School Students (중학생의 사이버불링 피해 경험과 정서행동과의 관계)

  • Oh, Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.207-215
    • /
    • 2013
  • The general opinion about the notion of cyberbullying hasn't existed yet, but in related laws it is defined as the entire behavior causing the counterpart to suffer the pain by continuously and repeatedly psychologic offending toward specific students with information and telecommunication products such as the Internet and mobile phones, and spreading the private information or false facts related with specific students. Recently a number of accidents related with abuse of cyberbullying are being broadcast on a variety of mass media, and the argument about the severity and countermeasures against cyberbullying is moving onward. This study has a purpose as suggesting the practical alternatives to prevent cyberbullying victim of middle school students by arguing cyberbullying of middle school students and analyzing the relationship between the general features such as victimized experience and frequency and the emotional behaviors according to victimized experience. As the result of this study, cyberbullying victimized experience has a significant effect on the emotional behavior such as depression, aggression, and academic stress. As political implication, this study suggests the practical alternatives to prevent cyberbullying of middle school students based on the analysis result.