• Title/Summary/Keyword: Network communication area

Search Result 1,318, Processing Time 0.027 seconds

Scheme for Communication Service in Coastal Area Using Mobile IP Router with Multiple Interfaces (중인터페이스를 가진 이동 IP 라우터를 이용한 해안 지역 통신 서비스 방안)

  • Park, Chun-Kwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.177-182
    • /
    • 2011
  • These days as there are growing the number of vessel sailing, diverse aquaculture industries, fishing works, and leisure activities in coastal area, the diverse communication services have been required for secure voyage information. This paper addresses the scheme for costal area service using mobile IP router with multiple interfaces. For this, this system has the wireless interfaces, such as WiBro, HSDPA, and WLAN that can provides vessels with divers communication services, and can provide the vessels with the diverse information communication services in real-time through wireless communication network installed in costal area. So this can provide the infrastructure that supplies the authorized seamless information communication services.

QoS Packet-Scheduling Scheme for VoIP Services in IEEE 802.16e Systems

  • Jang, Jae-Shin;Lee, Jong-Hyup;Cheong, Seung-Kook;Kim, Young-Sun
    • Journal of Communications and Networks
    • /
    • v.11 no.1
    • /
    • pp.36-41
    • /
    • 2009
  • The IEEE 802.16 wireless metropolitan area network (WMAN) standard is designed to correct expensive communication costs in CDMA-based mobile communication systems and limited coverage problems in wireless LAN systems. Thus, the IEEE 802.16e standard can provide mobile high-speed packet access between mobile stations and the Internet service provider through the base station with cheap communication fees. To efficiently accommodate voice over IP (VoIP) services in IEEE 802.16 systems, an uplink quality of service packet-scheduling scheme is proposed, and its performance is evaluated with an NS-2 network simulator in this paper. Numerical results show that this proposed scheme can increase the system capacity by 100% more than in the unsolicited rand service (UGS) scheme and 30% more than the extended real-time polling service (ertPS) scheme, respectively.

Design and Implementation of Unified Hardware for 128-Bit Block Ciphers ARIA and AES

  • Koo, Bon-Seok;Ryu, Gwon-Ho;Chang, Tae-Joo;Lee, Sang-Jin
    • ETRI Journal
    • /
    • v.29 no.6
    • /
    • pp.820-822
    • /
    • 2007
  • ARIA and the Advanced Encryption Standard (AES) are next generation standard block cipher algorithms of Korea and the US, respectively. This letter presents an area-efficient unified hardware architecture of ARIA and AES. Both algorithms have 128-bit substitution permutation network (SPN) structures, and their substitution and permutation layers could be efficiently merged. Therefore, we propose a 128-bit processor architecture with resource sharing, which is capable of processing ARIA and AES. This is the first architecture which supports both algorithms. Furthermore, it requires only 19,056 logic gates and encrypts data at 720 Mbps and 1,047 Mbps for ARIA and AES, respectively.

  • PDF

Location Area Planning Using Ant Colony Optimization (개미군 최적화 방법을 이용한 Location Area Planning)

  • Kim, Sung-Soo;Kim, Hyung-Jun;Kim, Ki-Dong
    • Korean Management Science Review
    • /
    • v.25 no.2
    • /
    • pp.73-80
    • /
    • 2008
  • The location area planning is to assign cells to the location areas of a wireless communication network in an optimum manner. The two important cost components are cost of location update and cost of paging that are of conflicting in nature; i.e., minimizing the registration cost might increase the search cost. Hence, it is important to find a compromise between the location update and paging operations such that the cost of mobile terminal location tracking cost is a minimum. The complete mobile network is divided into location areas. Each location area consists of a group of cells. In fact this is shown to be an NP-complete problem in an earlier study. In this paper, we use an ant colony optimization method to obtain the best/optimal group of cells for a given a network.

NEMO Support Scheme within PMIPv6 for Supporting Network Mobility in Harbor Area (항만 내 네트워크의 이동성 지원을 위한 PMIPv6망의 NEMO 지원 기법)

  • Min, Sang-Won;Han, Kyeong-Il;Jeong, Min-A;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.674-680
    • /
    • 2014
  • In this paper, as one of the fusion of IT and ocean technology, we propose a scheme to support NEMO in a harbor area network to provide network mobility for passengers, distribution as well as give a connection to an MN from an outside network. In a harbor area under PMIPv6 with NEMO support, a problem could be occurred due to overlapping HA/LMA tunnels and duplicate BCE fields. To Solve these problems, we consider the existing mobility option and add an optional field in the PBU message, which can notify the LMA and HA for either an initial connection or handover request. This procedure can reduce some overlapped steps of binding procedure. Hence, our proposed scheme could reduce an amount of delay and save the processing resource in the harbor area under PMIPv6 with NEMO support.

Multidemia Communications System on the Ingernet

  • Kim, Hyun-Joon;Lee, Huen-Joo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1998.06b
    • /
    • pp.85-91
    • /
    • 1998
  • Many of the newest network suers are gaining their fist network experience as users of the Internet. Because of the universal nature of this exciting new experience, millions of new users are driving the demand for increasingly multimedia oriented applications, especially in communication area. Since the communication via the Internet can use various media forms including audio, video and graphics, it can e very efficient communication system on the Internet, which allows Internet users to communicate, collaborate, and associate with others. Webber provides various communication services, like ACS(Audio Conference System), VCS(Video Conference System) and Virtual Space, in an integrated environment. Webber consists of Service-PUBs(Processing Unit Plug-in), which process each service, and Framework, which manages these PUPs. PUP is so highly independent of each other that it's easy to add, maintain, delete services and also optimally configure the system to user's terminal performance or network status.

  • PDF

Implementation of Ship Area Network NMEA protocol Bridge Based on Power Line Communication (전력선통신 기반의 선박용 M모A 프로토콜 브릿지 구현)

  • Kim, Gwan-Hyung;Kang, Sung-In;Jeon, Jae-Hwan;Kwon, Oh-Hyun;Oh, Am-Suk;Cho, Hyun-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2419-2422
    • /
    • 2010
  • The current marine internal communication systems are usually composed of NMEA0183, NMEA2000, and MiTS protocols which are located on the physical layer based on RS-422, RS-485, CAN, and EtherNet. However, general vessel communication method have a weak point that must establish the extra private line. But, the power line communication has advantage over general vessel communication method as it uses AC220V/DC24V without changing line. Therefore, we will propose a new bridge based on the DC-PLC(power Line communication) technique which support the NMEA0183 protocol inside vessel network systems.

Performance Evaluation of a Enhanced Network Coding Scheme using NS2 (NS2를 이용한 향상된 네트워크 코딩 기법의 성능평가)

  • Kim, Kwan-Woong;Kim, Yong-Kab;Kim, Byun-Gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2281-2287
    • /
    • 2013
  • Network Coding(NC) is a new paradigm for network communication. In network coding, intermediate nodes create new packets by algebraically combining ingress packets and send it to its neighbor node by broadcast manner. Network Coding has rapidly emerged as a major research area in information theory due to its wide applicability to communication through real networks. Network coding is expected to improve throughput and channel efficiency in the wireless multi-hop network. Prior researches have been carried out to employ network coding to wireless ad-hoc network. In our study, intermediate nodes identify one-hop bidirectional flows for network coding decision. We expect that the proposed scheme shall improve decoding success rate of network coded packet. From the simulation, the proposed network coding scheme achieved better performance in terms of coding gain and packet delivery rate than traditional network coding scheme.

The case study on wireless lan design technique for Bansong purification plant using network integrated management system and security switch (네트워크 통합관리시스템과 보안스위치를 이용한 반송정수장 무선랜 구축사례)

  • Park, Eunchul;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.32 no.4
    • /
    • pp.309-315
    • /
    • 2018
  • Currently, the commercialization of the $5^{th}$ Generation (5G) service is becoming more prevalent in domestic communication network technology. This has reduced communication delay time and enabled large-capacity data transmission and video streaming services in real-time. In order to keep pace with these developments, K-water has introduced a smart process control system in water purification plants to monitor the status of the water purification process. However, since wireless networks are based on the public Long Term Evolution (LTE) network, communication delay time remains high, and high-resolution video services are limited. This is because communication networks still have a closed structure due to expense and security issues. Therefore, with 5G in its current form, it is very difficult to accommodate future services without improving the infrastructure of its communication networks. In recognition of these problems, this study implemented the authentication and management function of wireless networks on a wired network management system in the K-water Bansong water purification plant. The results confirmed that wired Local Area Network (LAN) services give a higher security performance than an expensive commercial wireless LAN system. This was achieved by using an Internet Protocol (IP) address management system of wired networks and the packet filtering function of the Layer2 (L2) switch. This study also confirmed that it is possible to create a wireless LAN service that is 3.7 times faster than the existing LTE communication network.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.