• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.034 seconds

Design and implementation of protocols for connecting communication networks with terrestrial DMB (지상파 DMB와 통신망 연동을 위한 프로토콜 설계 및 구현)

  • Park Sung-il;Kim Yong Han;Kwon O-hyung
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2003.11a
    • /
    • pp.111-114
    • /
    • 2003
  • 본 논문에서는 지상과 디지털 멀티미디어 방송(Digital Multimedia Broadcasting, DMB)에서 양방향 서비스를 제공하기 위한 네트워크 독립적인 프로토콜의 설계와 구현에 대해 서술한다. 양방향 서비스는 리턴 채널(return channel)이 가용한 DMB 수신기에서 가능하며 사용될 수 있는 리턴 채널로는 모바일 통신 네트워크, 무선 랜, PSTN 등이 있다. 양방향 서비스를 구성하는 서버와 수신 단말은 모두 PC 환경에서 구현하였고 간단한 양방향 서비스 예를 이용하여 네트워크 독립적인 프로토콜을 테스트하였다. 이 예에서, 수신 단말은 슬라이드 쇼가 포함된 기본 오디오 서비스를 수신하면서 실시간 설문조사와 같은 양방향 서비스를 제공받을 수 있다. 본 논문에서 개발된 프로토콜을 활용하면 DMB 전자상거래(DMB-commerce)와 같은 다양한 양방향 서비스를 구현할 수 있을 것이다.

  • PDF

Design of Secure Protocol based on trust model and trust values for Ubiquitous Sensor Networks (Ubiquitous Sensor Network에서 안전성 증가를 위한 신뢰모델과 신뢰값에 관한 프로토콜 설계)

  • Jang, Kun Won;Suh, Jang Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Mobile devices do not need the fixed network infrastructure in ad-hoc network, these devices communicate each other through the distributed control. Accordingly, mobile devices can discover several services using dynamic searching method and provide safely public ownership of these services. Ad-hoc network needs the distributed control and topology of dynamic network because the limited power for processing and network communication. This paper is devoted to provide the secure protocol that provides efficient services discovery using SDP(Service Discovery Protocol) and considers the security requirements. Proposed protocol provides the distributed control based on PKI without central server, the discovery of trusted service, secure telecommunication, the identification among mobile devices, and service access control by user authority.

A Nearly Optimal One-to-Many Routing Algorithm on k-ary n-cube Networks

  • Choi, Dongmin;Chung, Ilyong
    • Smart Media Journal
    • /
    • v.7 no.2
    • /
    • pp.9-14
    • /
    • 2018
  • The k-ary n-cube $Q^k_n$ is widely used in the design and implementation of parallel and distributed processing architectures. It consists of $k^n$ identical nodes, each node having degree 2n is connected through bidirectional, point-to-point communication channels to different neighbors. On $Q^k_n$ we would like to transmit packets from a source node to 2n destination nodes simultaneously along paths on this network, the $i^{th}$ packet will be transmitted along the $i^{th}$ path, where $0{\leq}i{\leq}2n-1$. In order for all packets to arrive at a destination node quickly and securely, we present an $O(n^3)$ routing algorithm on $Q^k_n$ for generating a set of one-to-many node-disjoint and nearly shortest paths, where each path is either shortest or nearly shortest and the total length of these paths is nearly minimum since the path is mainly determined by employing the Hungarian method.

Exact Modeling and Performance Analysis of Paging Schemes Using Paging Agents (페이징 에이전트를 이용한 페이징 방법의 정확한 모델링 및 성능 분석)

  • Moon, Yu-Ri;Lee, Tae-Han;Baek, Jang-Hyun
    • IE interfaces
    • /
    • v.24 no.1
    • /
    • pp.15-23
    • /
    • 2011
  • This study considers paging schemes that can page some cells or only one cell within the location area to reduce paging cost by using PAs (Paging Agents) and compares their performances by using a new analytic method. There are three ways of paging schemes using PAs; BSPA (Base Staton Paging Agent), 2SPA (2-Step Paging Agent), LAPA (Location Area Paging Agent). This study proposes exact performance of BSPA and 2SPA using a new analytic method based on Markov chain modeling to find the most efficient paging scheme. Numerical results for various circumstances are presented by using proposed analytic method to select a proper paging scheme in mobile communication networks.

A Study on the Useful QoS support Service in Mobile Ad Hoc Networks (MANET망에서 효율적인 QoS 서비스의 지원 방법에 관한 연구)

  • 정찬혁;김현욱;이광배;박경배;유충렬;오세덕;배진승;조영태
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.408-411
    • /
    • 2004
  • In this paper, we evalvated two main QoS supporting routing protorol on wireless ad hoc network. At Presence wireless mobile communication focuses on how to efficiently support mobility of users more than QoS guarantee. However, in order to satisfy requirement of various applications which have been or will be served, QoS support service between source and destination becoming a very important issue. Of all routing protocols, DSR and AOUV are very improtant routing protocol in MANET. So we simulated DSR and AODV QoS Routing Protocol Through simulation evaluation tool NS(Network Simulation) based on various environments.

  • PDF

Nonlinear Active Noise Control with On-Line Secondary Path Modeling (2차경로의 온라인 모델링이 포함된 비선형 능동소음제어기의 설계)

  • 오원근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.5
    • /
    • pp.667-675
    • /
    • 2002
  • In this Paper, we present a new nonlinear active noise control scheme using neural networks. Two neural network4 are used, one is for the active controller and another one is for the secondary path model. This scheme is suitable for the plant which has time-varing secondary path dynamics, because the secondary path modeling is performed via on-line fashion. Simulation results of active noise control with nonlinear primary/secondary path are presented. The results show that the new algorithm can reduce the noise level greatly.

Analysis for ER switch Algorithms on ATM Networks (ATM망에서의 ER스위치 알고리즘의 성능 분석)

  • 최삼길;김탁근;손준영;최부귀
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.4
    • /
    • pp.745-750
    • /
    • 2000
  • In ATM Network, many algorithms have been proposed for rate-based ABR flow control. The object of these Algorithms is to turn around from cell loss and to use the unused bandwidth by ABR Traffic. These Algorithms are applied to control ABR Traffic by EFCI and ER switches. In previous paper, we showed the using rate of bandwidth for the characteristic of each algorithm applied these algorithm network. In this paper, we will do that to apply these algorithms to a network and to make a graph of characteristic of each algorithm.

  • PDF

Study on Real-time Cooperation Protect System Against Hacking Attacks of WiBro Service

  • Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.353-357
    • /
    • 2011
  • U.S. Obama government is submit a motion to consider cyber attacks on State as a war. 7.7DDoS attack in Korea in 2009 and 3.4 DDoS attacks 2011, the country can be considered about cyber attacks. China hackers access a third country, bypassing South Korea IP by hacking the e-commerce sites with fake account, that incident was damaging finance. In this paper, for WiBro service, DDoS attacks, hackers, security incidents and vulnerabilities to the analysis. From hacker's attack, WiBro service's prognostic relevance by analyzing symptoms and attacks, in real time, Divide Red, Orange, Yellow, Green belonging to the risk rating. For hackers to create a blacklist, to defend against attacks in real-time air-conditioning system is the study of security. WiBro networks for incident tracking and detection after the packets through the national incident response should contribute to the development of technology.

A Study on the security improvement between different mobile terminal Using All-IP in Wireless Network (All-IP망에서 다기종 Mbile단말기 간 보안개선에 관한 연구)

  • Byun, Byung-Kil;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.730-733
    • /
    • 2010
  • Mobile handsets with all applicable Internet Protocol brought communication channels between the easy and rapid development. But this time that the security is part of the most vulnerable points. All IP-network currently being presented to analyze the current state of integration technology, and two kinds of terminal interworking between networks of different security systems are likely to occur in the course of the various security threats, vulnerabilities and expectations regarding possible measures to consider more stringent security technologies and performance analysis the present study.

  • PDF

Text Categorization with Improved Deep Learning Methods

  • Wang, Xingfeng;Kim, Hee-Cheol
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.2
    • /
    • pp.106-113
    • /
    • 2018
  • Although deep learning methods of convolutional neural networks (CNNs) and long-/short-term memory (LSTM) are widely used for text categorization, they still have certain shortcomings. CNNs require that the text retain some order, that the pooling lengths be identical, and that collateral analysis is impossible; In case of LSTM, it requires the unidirectional operation and the inputs/outputs are very complex. Against these problems, we thus improved these traditional deep learning methods in the following ways: We created collateral CNNs accepting disorder and variable-length pooling, and we removed the input/output gates when creating bidirectional LSTMs. We have used four benchmark datasets for topic and sentiment classification using the new methods that we propose. The best results were obtained by combining LTSM regional embeddings with data convolution. Our method is better than all previous methods (including deep learning methods) in terms of topic and sentiment classification.