• Title/Summary/Keyword: Multimedia Network

Search Result 2,730, Processing Time 0.038 seconds

Design and Performance Evaluation of OBP Satellite B-ISDN Transport Network Architecture (OBP 탑재 n이성 B-ISDN 중계망 구조 설계 및 성능 평가)

  • Park, Seok-Cheon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.901-908
    • /
    • 2000
  • Satellite communication in the 21 century's high tech information world is developing rapidly, marked by high levels of applications and functions. For example, satellite communication can process and switch the speed of the service provided by a broad and vast digital multimedia system such as a long-distance all between nations or broadcasting transfer service, which is supplied by a contemporary satellite system. So, it bring about problems which lack of satellite orbit and gibes out frequency resource by increment of satellite universally. To support this, an OBP satellite system is need, which includes an on-board IF/RF switch, baseband signal processing, multi-beam antenna technology, as well as a simple transponder system. In this paper, we have outlined the next generation of satellite communication; satellite OBP transport network architecture, which offers multimedia service and applied frequency reuse method for multi-spot beam. The satellite B-ISDN transport network architecture is also analyzed.

  • PDF

IP Assignment Analysis Based on DHCP at High-speed Network (초고속통신망에서 DHCP 기반의 IP 할당 분석)

  • Kim, Hyoung-Jin;Cho, Hyun-Seob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2300-2305
    • /
    • 2009
  • Recently, Telecommunication companies have introduced a new network architecture that assigns network resources consistent and protects their systems more secure. Now, they provide multimedia services through various types of access networks. In this study, I'd like to introduce IP address assignment method based on the Dynamic Host Configuration Protocol (DHCP) and find out how success or failure of Ip address assignment will be taken place according to the booting order of xDSL modem, AP and PC.

A Study on Security Mechanism for Routing Protocol in Ad hoc Network (Ad hoc Network에서 라우팅 프로토콜을 위한 보안 메커니즘에 관한 연구)

  • 양환석;김종민;위승정;최길환;이웅기
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.417-420
    • /
    • 2004
  • Ad hoc network는 유선 백본 없이 이동 노드들로만 구성된 네트워크로서 이동 노드들의 움직임이 빈번히 발생하기 때문에 네트워크의 안정성을 유지하기가 어렵다. 또한 중앙 집중화된 보안 기반구조가 아니기 때문에 보안 공격을 받기가 쉽고 노드들이 쉽게 손상될 수 있다. 기존의 보안 방법 중의 하나인 threshold cryptography는 키의 유지와 분배를 위한 효율적인 구조를 제공하였으나 라우팅의 오버헤드가 증가하였고, 네트워크 전역의 트래픽이 증가되었다. 게다가 서비스 거부 공격과 wormhole과 같은 공격은 ARP 또는 IP spoofing을 통하여 쉽게 받을 수 있다. 본 논문에서는 threshold cryptography에 의해 야기되는 오버헤드를 줄이고 노드간의 인증된 패킷 전달을 돕기 위한 새로운 접근 방법을 제안한다.

  • PDF

A Framework of Rate Control and Power Allocation in Multipath Lossy Wireless Networks

  • Radwan, Amr;Kim, Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1404-1414
    • /
    • 2016
  • Cross-layer design is a concept, which captures the dependencies and interactions and enables information sharing among layers in order to improve the network performance and security. There are two key challenges in wireless networks, lossy features of links and power assumption of network nodes. Cross-layer design of congestion control and power allocation in wireless lossy networks has been studied in the existing literature; however, there has been no contribution proposed in the literature that exploits the path diversity. In this paper, we are motivated to develop a cross-layer design of congestion control and power allocation, which takes into account lossy features of wireless links and transmission powers of network nodes and can be implemented in a distributed manner. Numerical simulation is conducted to illustrate the performance of our proposed algorithm and the comparison with current alternative approaches.

Traffic based Estimation of Optimal Number of Super-peers in Clustered P2P Environments

  • Kim, Ju-Gyun;Lee, Jun-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.12
    • /
    • pp.1706-1715
    • /
    • 2008
  • In a super-peer based P2P network, the network is clustered and each cluster is managed by a special peer, which is called a super-peer. A Super-peer has information of all the peers in its cluster. This type of clustered P2P model is known to have efficient information search and less traffic load than unclustered P2P model. In this paper, we compute the message traffic cost incurred by peers' query, join and update actions within a cluster as well as between the clusters. With these values, we estimate the optimal number of super-peers that minimizes the traffic cost for the various size of super-peer based P2P networks.

  • PDF

Single Image Depth Estimation With Integration of Parametric Learning and Non-Parametric Sampling

  • Jung, Hyungjoo;Sohn, Kwanghoon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.9
    • /
    • pp.1659-1668
    • /
    • 2016
  • Understanding 3D structure of scenes is of a great interest in various vision-related tasks. In this paper, we present a unified approach for estimating depth from a single monocular image. The key idea of our approach is to take advantages both of parametric learning and non-parametric sampling method. Using a parametric convolutional network, our approach learns the relation of various monocular cues, which make a coarse global prediction. We also leverage the local prediction to refine the global prediction. It is practically estimated in a non-parametric framework. The integration of local and global predictions is accomplished by concatenating the feature maps of the global prediction with those from local ones. Experimental results demonstrate that the proposed method outperforms state-of-the-art methods both qualitatively and quantitatively.

Design of Security Management System

  • Kim Seok-Soo;Soh Woo-Young
    • International Journal of Contents
    • /
    • v.1 no.2
    • /
    • pp.22-25
    • /
    • 2005
  • Enterprise security management system: Enterprise Security Management (EMS) is centralized integrated management of other kind of security solutions such as intrusion cutoff system, intrusion detection system and virtual private network. With the system, it is possible to establish security policies for entire IT system through interlocking of solutions. A security system of company network is progressing as a ESM(Enterprise Security Management) in existing security solution foundation. The establishment of the security policy is occupying very important area in ESM of the security system. We tried to analyze existing ESM system for this and designed security solution structure for enhancing the inside security. We applied implementing directly IDS system and tested. This test set the focus about inside security

  • PDF

An Energy Efficient Multi-Chaning Routing Protocol using Angle of Arrival for WSN (WSN 환경에서 AoA를 이용한 에너지 효율적 멀티체이닝 라우팅 프로토콜)

  • Chae, Ji-Hoon;Kwon, Tae-Wook
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.11
    • /
    • pp.1564-1571
    • /
    • 2022
  • Wireless sensor network(WSN) is being used in various fields such as reconnaissance, echelon scale identification, weather observation, etc. using small sensors in an environment without a network infrastructure environment. In addition, WSN uses limited battery power, so study on routing protocols to extend the lifetime of the network is important. PEGASIS, a hierarchical routing protocol, accounts for the majority of energy-efficient routing protocol studies and is well known as a representative protocol. In this study, based on PEGASIS, we propose a protocol that constructs multiple chains rather than one chain using the AoA of nodes. The proposed protocol has the advantage of reducing the transmission distance of nodes and eliminating unnecessary transmissions, thereby increasing energy efficiency compared to the existing protocols.

Analysis of a NEMO enabled PMIPv6 based Mobility Support for an Efficient Information Transmission

  • Caytiles, Ronnie D.;Park, Byungjoo
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.197-205
    • /
    • 2018
  • Nowadays, wireless sensor networks (WSNs) have been widely adopted in structural health monitoring (SHM) systems for social overhead capital (SOC) public infrastructures. Structural health information, environmental disturbances and sudden changes of weather conditions, damage detections, and external load quantizing are among the capabilities required of SHM systems. These information requires an efficient transmission with which an efficient mobility management support for wireless networks can provide. This paper deals with the analysis of mobility management schemes in order to address the real-time requirement of data traffic delivery for critical SHM information. The host-based and network-based mobility management protocols have been identified and the advantages of network mobility (NEMO) enabled Proxy Mobile Internet Protocol version 6 (PMIPv6) have been leveraged in order to address the SHM information transmission needs. The scheme allows an efficient information transmission as it improves the handover performance due to shortened handover latency as well as reduced signaling overhead.

Traffic Light Recognition Using a Deep Convolutional Neural Network (심층 합성곱 신경망을 이용한 교통신호등 인식)

  • Kim, Min-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.11
    • /
    • pp.1244-1253
    • /
    • 2018
  • The color of traffic light is sensitive to various illumination conditions. Especially it loses the hue information when oversaturation happens on the lighting area. This paper proposes a traffic light recognition method robust to these illumination variations. The method consists of two steps of traffic light detection and recognition. It just uses the intensity and saturation in the first step of traffic light detection. It delays the use of hue information until it reaches to the second step of recognizing the signal of traffic light. We utilized a deep learning technique in the second step. We designed a deep convolutional neural network(DCNN) which is composed of three convolutional networks and two fully connected networks. 12 video clips were used to evaluate the performance of the proposed method. Experimental results show the performance of traffic light detection reporting the precision of 93.9%, the recall of 91.6%, and the recognition accuracy of 89.4%. Considering that the maximum distance between the camera and traffic lights is 70m, the results shows that the proposed method is effective.