• Title/Summary/Keyword: Protocol Encapsulation

Search Result 29, Processing Time 0.029 seconds

IMT-2000 Network Architecture using MPLS for Mobile IP (Mobile IP를 수용하는 IMT-2000 교환망의 MPLS 구조)

  • Yoo, Jae-Pil;Kim, Kee-Cheon;Lee, Yeon-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.219-225
    • /
    • 2000
  • In order to provide a proper mobile internet service, Mobile IP is necessary to support IP mobility. Service network should be a backbone network among mobile agents which support mobility, and MPLS(Multi-protocol Label Switching) of IETF(Internet Engineering Task Force) is being considered as a backbone network because of its speed, scalability and the excellent service capability. MPLS, however, doesn't provide a way to support the mobility of the nodes. In this paper, we present an efficient IMT-2000 network architecture using MPLS to handle Mobile IP. The proposed architecture combines the MPLS label distribution and Mobile IP registration. It doesn't use the layer 3 encapsulation, instead it uses layer 2 for tunneling the data, reduces the size of the header, and it can tunnel the data without delay, which is needed to look up the mobility binding list, as a result.

  • PDF

Design of Building System with LED Lighting Control in Heterogeneous Networks (이종 네트워크 환경에서의 LED 조명 제어 기법을 이용한 빌딩 시스템의 설계)

  • Kong, In-Yeup;JaeGal, Han-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1053-1059
    • /
    • 2011
  • DMX512 protocol is a typical protocol which controls LED lighting system. It has a strong feature and can be used to a lot of lighting system. But LED control system with cable has a few problem because they have a lot of control cables. It is very difficult to set up the complex lighting. Furthermore if it is set up it is not easy to keep and recover the system from the out of order. So it is required Wireless Lighting Control System. This paper describes the proposal, design, and implementation of a novel method which can provide versatile light effects with the increased capability of the mobility and the number of universes for Wireless Lighting system. And then we implement experiment environment to control indoor lighting system controled by ZigBee and WLAN converter not having complicating control line. Data frames are transferred to DMX512 device by encapsulation and decapsulation to control color LED. In the same time give the method to solve the data bottleneck problem which can be comes out because of speed difference between Heterogeneous network and measure performance of control system.

Implementation of DEMUX Constructing IP Packet from MPEG-2 TS (MPEG-2 TS로부터 IP 패킷을 구성하는 역다중화기 구현)

  • Lee, Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.59-65
    • /
    • 2010
  • This paper proposes an implementation of a hardware module for transmitting MPEG-2 TS data over the internet protocol (IP)-based network. This implementation consists of two modules; one is an encapsulation module which bridges between n TS packets, where $1\;{\leq}\;n\;{\leq}\;7$, and an IP packets, the other is a packet conversion module which extracts an DSM-CC PS packet from consecutive TS packets and then reconstructing an IP packet. So, these IP packets are carried over 150 megabits per second. Although overall work flow of the proposed DeMUX is based on the reference design of ALTERA, the DeMUX is enhanced by modifying it and performs more functions by adding a packet conversion module. The DeMUX is described by Verilog-HDL (hardware description language) and shows the faithful functionality and throughput through the simulation.

Interactive Broadcasting System based on MPEG-4 (MPEG-4 기반 대화형 방송 시스템)

  • 안상우;조용주;신기선;최진수;김진웅
    • Journal of Broadcast Engineering
    • /
    • v.7 no.1
    • /
    • pp.28-36
    • /
    • 2002
  • In this paper. we propose an interactive broadcasting system based on MPEG-4 to provide Interactive services in digital TV broadcast. The proposed system is designed to support various functionalities such as authoringof MPEG-4. encapsulation of MPEG-4 Into MPEG-2 TS (Transport Stream) protocol, synchronization of MPEG-4 with MPEG-2 program. demultiplexing of MPEG-4 from MPEG-2 TS. decoding/rendering of MPEG-4 and interactivity through IP network on ATSC (Advanced Television Systems Committee) platform. The interactive broadcasting system based on MPEG-4 Is used to provide interactive functionality In full for user. and it has a particular advantage of substitution for the ATSC or DVB platform. as well.

Eliminating Potato Virus Y (PVY) and Potato Leaf Roll Virus (PLRV) Using Cryotherapy of in vitro-grown Potato Shoot Tips

  • Yi, Jung-Yoon;Lee, Gi-An;Jeong, Jong-Wook;Lee, Sok-Young;Lee, Young-Gyu
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.59 no.4
    • /
    • pp.498-504
    • /
    • 2014
  • Potato virus Y (PVY) and potato leafroll virus (PLRV) are among the most damaging potato viruses and prevalent in most potato growing areas. In this study, cryopreservation was used to eradicate PVY and PLRV using two cryogenic methods. Potato shoot tips proliferated in vitro were cryopreserved through droplet-vitrification and encapsulation-vitrification using plant vitrification solution 2 (PVS2; 30% glycerol + 15% dimethyl sulfoxide + 15.0% ethylene glycol + 13.7% sucrose) and modified PVS2. Both cryogenic procedures produced similar rates of survival and regrowth, which were lower than those from shoot tip culture alone. The health status of plantlets regenerated from shoot tip culture alone and cryopreservation was checked by reverse transcription-polymerase chain reaction. The frequency of virus-free plants regenerated directly from highly proliferating shoot tips reached 42.3% and 48.6% for PVY and PLRV, respectively. In comparison, the frequency of PVY and PLRV eradication after cryopreservation was 91.3~99.7% following shoot-tip culture. The highest cryopreserved shoot tip regeneration rate was observed when shoot tips were 1.0~1.5 mm in length, but virus eradication rates were very similar (96.4~99.7%), regardless of shoot tip size. This efficient cryotherapy protocol developed to eliminate viruses can also be used to prepare potato material for safe long-term preservation and the production of virus-free plants.

Convergence of MPLS applied SDN to Optimize IPTV Broadcast Transmission for IPv6 and IPv4 (IPv6와 IPv4 환경에서 IPTV 전송 최적화 위한 SDN을 응용한 MPLS)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.819-824
    • /
    • 2015
  • SDN (Software Defined Network) technology, hardware and network control functions should be separated independently of existing switches or routers and data transfer functions and are also refers to a separate network architecture that can develop and run. When planning a network and designed to reflect the network control function by applying the SDN may reflect the resources efficiently. In this study, one people suggest Applications SDN, which offer an absolutely necessary part of a coded program that combines the benefits of the existing IOS (Combined Benefits) applying the model to complete the Controller part through the MPLS IOS. The OpenFlow Controller is a command to the router LER(Label Edge Router), and transmits the packet in accordance with the command to the destination according to the EXP bit. To configure TCP / IP to the IOS through the optimized coding. Using the OpenFlow protocol controller transmits an encapsulation header as defined in the MPLS packet.

A New Rekeying Scheme for 802.11 Wireless Packets Transmission (802.11 무선패킷 전송을 위한 새로운 Rekeying 스킴)

  • Phang, Seong-Yee;They, Yu-Shu;Yang, Chi-Shian;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.274-277
    • /
    • 2008
  • Rekeying is the process of changing the encryption key of an ongoing communication. The main objective is to limit the amount of data encrypted with the same key. The IEEE 802.11 standard defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. MAC at sender encrypts the payload (frame body and CRC) of each 802.11 frame before transmission using RC4 stream cipher. MAC at receiver decrypts and passes data to higher level protocol. WEP uses symmetric key stream cipher (RC4) where same key will be used for data encryption and decryption at the sender and the receiver. WEP is not promising with the advancement of the wireless technology existing today. We propose to use the existing information to define the security attributes. This will eliminate the steps that regenerated keys have to be sent to each other over certain period. The rekeying scheme is according to the number of bytes transmitted. Therefore, even the attacker has recorded the packets, it will be insufficient information and time for the attacker to launch the attacks as the key is not deterministic. We develop a packet simulation software for packet transmission and simulate our propose scheme. From the simulation, our propose scheme will overcome the weak WEP key attack and provide an alternative solution to wireless packet transmission. Besides that, our solution appears to be a software approach where only driver updates are needed for the wireless client and server.

  • PDF

The DSTM TEP for IPv4 and IPv6 Interoperability (IPv4/IPv6의 연동을 위한 DSTM TEP의 기능)

  • 진재경;최영지;민상원
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.578-587
    • /
    • 2003
  • The DSTM (Dual Stack Transition Mechanism), one of tunneling mechanism, is considered as the best solution in IPv4/IPv6 transition recently. The DSTM provides a method to assure IPv4/v6 connectivity based on 4over6 (IPv4-over-IPv6) tunneling and temporal allocation of a global IPv4 address to a host requiring such communication. A TEP (Tunnel End Point) operates as a border router between IPv6 domain and IPv4 Internet, which performs encapsulation and decapsulation of 4over6 tunneling packets to assure hi-directional forwarding between both networks. In this paper, we analyze basic standards of the IPv6 protocol. And, we design and implement a DSTM TEP daemon block. The TEP daemon analyzes a fevers tunneling packet that is forwarded by the DSTM node, establishes the TEP's 4over6 interface, and supplies communication between a DSTM and a IPv4-only node. Finally, we construct a DSTM testbed and measure performance of the DSTM TEP. Our observation results show that performance of TEP supports the DSTM service.

A Link Protection Scheme with a Backup Link Spanning Tree for Provider Backbone Bridged Networks and Implementation (프로바이더 백본 브리지 망을 위한 백업링크 스패닝트리 기반 링크장애 복구기능과 구현)

  • Nam, Wie-Jung;Lee, Hyun-Joo;Yoon, Chong-Ho;Hong, Won-Taek;Moon, Jeong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.58-68
    • /
    • 2010
  • In this paper, we propose an efficient link protection switching scheme for provider backbone bridge systems with a spanning tree for backup links exclusively, and evaluate its performance. The proposed scheme offers guaranteed QoS flows even when a link fault occurrs in the primary link by flooding the flows over the profiled spanning tree. The flooding mechanism over the spanning tree can also provide low latency and remove the loopback flows. We also derive the efficiency of bandwidth usage for the normal flows and the number of lost frames during the link restoration. For evaluating its feasibility, we implement a prototype of PBB-TE systems based on the Linux bridge codes, which can support both link protection switching capability with CCM and MAC-in-MAC encapsulation. A related protocol analyzer is also developed. One can see that the proposed scheme and the prototype can be useful for developing carrier class Ethernet systems based on PBB-TE.