• Title/Summary/Keyword: high-speed Internet

Search Result 836, Processing Time 0.032 seconds

A Design of the IP Lookup Architecture for High-Speed Internet Router (고속의 인터넷 라우터를 위한 IP 룩업구조 설계)

  • 서해준;안희일;조태원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7B
    • /
    • pp.647-659
    • /
    • 2003
  • LPM(Longest Prefix Matching)searching in If address lookup is a major bottleneck of IP packet processing in the high speed router. In the conventional lookup table for the LPM searching in CAM(Content Addressable Memory) the complexity of fast update take 0(1). In this paper, we designed pipeline architecture for fast update of 0(1) cycle of lookup table and high throughput and low area complexity on LPM searching. Lookup-table architecture was designed by CAM(Content Addressable Memory)away that uses 1bit RAM(Random Access Memory)cell. It has three pipeline stages. Its LPM searching rate is affected by both the number of key field blocks in stage 1 and stage 2, and distribution of matching Point. The RTL(Register Transistor Level) design is carried out using Verilog-HDL. The functional verification is thoroughly done at the gate level using 0.35${\mu}{\textrm}{m}$ CMOS SEC standard cell library.

Effects of Atmospheric Turbulence on the Optical Satcom Link between Stratospheric Sky Station and Earth Station (대기교란이 지구국과 성층권 위성간 광 위성통신시스템에 미치는 영향에 관한 연구)

  • Jung, Jin-Ho
    • Journal of IKEEE
    • /
    • v.1 no.1 s.1
    • /
    • pp.47-54
    • /
    • 1997
  • Today's communication needs the super high-speed data transmission system to send many data rapidly, correctly, and simultaneously because of the increase of internet use, the demand of multimedia service and so on. Before long, the super high data service will be offered us by a satellite called platform which will be located at stratosphere of 20[km]over earth. It is possible to build the optical wireless communication networks which have the high data-tarrying capacity because this system use a laser. But, there are many problems to overcome because it make use of the atmospheric space as transmission channel. In this paper, therefore, we study up on the relations of data rates, bit error rates, and turbulent effects of atmosphere to present the effects of atmosphere to present the effects of atmospheric turbulence on the optical satcom link.

  • PDF

Fiber-To-The-Pole(FTTP)-A NOVEL ACCESS NETWORK SOLUTION USING WDM-PON (WDM-PON기반 FTTP 광가입자망 시스템)

  • Kim, Bo-Gyeom;Park, Tae-Dong;Choe, Yeong-Bok;O, Ho-Seok;Lee, Won-Hyeong
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.107-108
    • /
    • 2006
  • In order to meet the customers'emerging demands for more bandwidth and diverse IP multimedia applications including high definition(HD) video streaming service, KT presents innovative FTTP solution using WDM-PON system. FTTP comprises an OLT inside the central office, a fiber optic distribution network including a passive remote node in the outside plant, and ONU installed on the pole or wall of customers premise. The passive remote node is located in a manhole near the subscribers and does not require any electrical power supply. And finally, UTP cable is connected from ONU to subscribers'IP appliances like PC or HGW or IP-STB. KT finished its FTTP trial service in 2004 and commercial deployment has begun since 2005. With this FTTP solution, each subscriber can enjoy high-speed internet service with speeds of up to symmetric 100 Mbit/s and various IP media applications including HD quality IP video streaming service and high quality video phone service.

  • PDF

Analysis and Implementation of Distance Video Lecturing System (초고속통신망환경에서의 원격화상강의시스템 구현 및 분석)

  • 안종민;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.90-95
    • /
    • 2002
  • This thesis is aiming at analysis and implementing Distance Video Lecturing System to guarantee the high quality in service through using less Network resource. Most of the usual Distance Video Lecturing System has been designed not in the system of Multiuser Conference but Point-to-Point. But from now on Distance Video Lecturing System is to be demanded on not only the expansion to Multiuser Distance Video Lecturing System, but high quality in service for users. To solve these problems, the Multicast Transmission Technology as the dimension of Network as well as highly efficient, advanced Compression Technology should be applied to Video Conference System in company with the expansion of Network bandwidth. The system suggested in this thesis is to help to offer an application service as Distance Video Lecturing System that will make popular on the basis of the character that the next generation Internet will be high speed Network.

  • PDF

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

A Study on The IPTV Quality Using FR or The NR Measurement (FR, NR 측정 방식을 이용한 IPTV 품질에 관한 연구)

  • Lee, Jae-Jeong;Nam, Ki-Dong;Kim, Chang-Bong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.8
    • /
    • pp.59-66
    • /
    • 2009
  • Recently, as the expectation about the IPTV (Internet Protocol TV) service quality is rapidly increased by the development of the national high-speed internet and TPS (the Triple Play Service : data + image + audio) service Therefore, the enactment of the national quality standards about the IPTV service quality guaranteeing the real time video quality of a subscriber and the international standards are hastily needed. This paper built a test bed with the network domain and the subscriber set-top box domain including the headend area and commercial network characteristic in order to test in the environment which is similar to the characteristic of the service business network. And by using the constructed environment, the characteristics required for SLA(service Level Agreement) of the IPTV service are presented as the quality test according to the service environment change.

Detection of Traffic Anomalities using Mining : An Empirical Approach (마이닝을 이용한 이상트래픽 탐지: 사례 분석을 통한 접근)

  • Kim Jung-Hyun;Ahn Soo-Han;Won You-Jip;Lee Jong-Moon;Lee Eun-Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.201-217
    • /
    • 2006
  • In this paper, we collected the physical traces from high speed Internet backbone traffic and analyze the various characteristics of the underlying packet traces. Particularly, our work is focused on analyzing the characteristics of an anomalous traffic. It is found that in our data, the anomalous traffic is caused by UDP session traffic and we determined that it was one of the Denial of Service attacks. In this work, we adopted the unsupervised machine learning algorithm to classify the network flows. We apply the k-means clustering algorithm to train the learner. Via the Cramer-Yon-Misses test, we confirmed that the proposed classification method which is able to detect anomalous traffic within 1 second can accurately predict the class of a flow and can be effectively used in determining the anomalous flows.

Design and Implementation of Raw File System for Web Cache Server (웹 캐시 서버를 위한 저수준 파일시스템 설계 및 구현)

  • Kim Seong-Rak;Koo Young-Wan
    • Journal of Internet Computing and Services
    • /
    • v.4 no.2
    • /
    • pp.11-19
    • /
    • 2003
  • The technique which stores cache data in EXT2 or UFS designed for general purpose is not suitable for satisfying the speed required for web cache due to the general purpose file system. This study shows that there is the better solution by optimizing the file system using the characteristics of web file. It is impossible that the suggested RawCFS changes the size of cached object and the access authentication, and this results from the existence of up-to-dated object in the original server. This file system is proved in the capability test that it is faster than the technique by 40% which stores in each file by object unit. This can be used in the design of high end web server such as shoppingmall or Internet Broadcasting station which should provide objects like image or HTML as well as cache server to the client for the fast service.

  • PDF

A Case on Taking back a Market Leader through Free Book Delivery Service of Interpark (도서무료배송을 통한 인터파크의 인터넷 도서시장 선점사례)

  • Park, Cheol
    • Journal of Global Scholars of Marketing Science
    • /
    • v.15 no.2
    • /
    • pp.227-244
    • /
    • 2005
  • This case examined the strategy of taking back a market leader in Korea Internet shopping mall through free book delivery service of Interpark. Although lnterpark was an oldest Internet shopping mall in Korea, its market position has been weaken and weaken due to strong challengers based on TV Home shopping companies. In order to overcome the difficult situation, Interpark chose the book division as a bowling alley. The company offered boldly a free delivery service of book for customers. The free delivery service was considered as a risky bating because it cost a lot. However, it led more customer traffic to Interpark and cross-selling of other categories. At last Interpark took back a market leader based on free book delivery service. The case showed it was very important for e-business company to analyze market and competitors and to implement bold strategies at high speed.

  • PDF

Analytical Approach of Cross-Layer-Based Handoff Scheme in Heterogeneous Mobile Networks (이종의 모바일 네트워크에서 크로스 레이어 기반 핸드오버 기법의 분석적 접근법)

  • Kim, DongHwi;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.1-16
    • /
    • 2013
  • Smartphones and tablets including phone, calendar are the necessities of modern man. They are one of the MN(Mobile Node), each with wireless network capabilities. Necessities of modern human MNs are almost included cellular module available in LTE/3G and Wi-Fi module for high-speed Internet. Until now, MN mobility management is handled, but using network-based mobility management in this paper. Then, carriers can manage and maintain the network for low-cost. In addition, it was considered that use a lot of modern people with Wi-Fi and LTE/3G, and using Cross-Layer-Based handoff.