• Title/Summary/Keyword: high-speed Internet

Search Result 836, Processing Time 0.027 seconds

Quality of Service Supporting MPLS Network using CR-LDP and qGSMP Protocols (CR-LDP와 qGSMP을 이용한 MPLS 망의 QoS 지원)

  • 김인재;이병수
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.4
    • /
    • pp.417-424
    • /
    • 2001
  • Internet networks consisting of existing routers show the limits in efficiency of traffic managements. In order to overcome the limits, MPLS System is high speed switching technology and is not based on IP address but based on label was designed. However MPLS system being based on ATM has the difficulties of supporting Qos(Quality of Service). This paper suggested the way to consist a service-assured-network using CR-LDP protocol which was designed for guaranteeing QoS in MPLS system being based on ATM switch and using qGSMP protocol, and the way to implicitly establish LSP by implementing QoS Translation and QoS Mapping in LER System.

  • PDF

A Study on the Implementation of WiBro/HSDPA Dual mode Access Point System (WiBro/HSDPA Dual mode AP 시스템 구현에 관한 연구)

  • Ha, Kwang-Jun;Kim, Sung-Ill;Oh, Young-Chul;Lee, Sang-Hong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.64-68
    • /
    • 2007
  • Commercial WiBro and 3G HSDPA services are launched last year in order to provide high speed wireless Internet access and multimedia service. Currently mobile communication service providers concentrate on the deployment of indoor mobile network since indoor traffic is remarkably increased. For fine indoor wireless communication, an installation of access point system via Public IP network which is called Femtocell is required. The development of indoor Femtocell system must be considered in the viewpoint of low hardware complexity, cost reduction, interlocking with WiBro/HSDPA network without change of network component and easy element management. In this paper, we review the implementation issue and technology of dual mode AP which provides WiBro and HSDPA signal to the user simultaneously. Especially, we describe on the HSDPA Femtocell standardization status and possible 3 types of HSDPA communication module development design. Furthermore we analyze the merits and demerits of each HSDPA Femtocell design type and propose a system which enables handover between indoor HSDPA Femtocell and outdoor commercial HSDPA mobile network.

  • PDF

The cost allocation of Voice and data traffic in Mobile Telephone Network (이동망 음성 및 데이터 공유설비 비용배분 방안)

  • Jung Choong-young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1802-1809
    • /
    • 2004
  • This paper discusses cost allocation model of common facilities in voice and data traffic of mobile telephone network. There are several methods to be considered including traffic, facility, revenue, Ramsey, and benchmarking in local loop unbundling for High Speed Internet. It is important to investigate the strength and weakness of each method. This paper reviews the theoretical literatures and compares the characteristics of each methodology. Also, case studies are employed to get the implications concerned. As a result, in the beginning, it is desirable to introduce 50:50 allocation method used in local loop unbundling in UK. Then, it is recommendable to apply the ratio allocation method as the quantities of voice and data traffic become equal.

Design and Implementation of a Security Program for Supersafe Document Using Ancient and Modern Cryptography (고대 및 현대 암호 방식을 결합한 초안전 문서 보안 프로그램의 설계 및 구현)

  • You, Yeonsoo;Lee, Samuel Sangkon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1913-1927
    • /
    • 2017
  • Encryption technology is to hide information in a cyberspace built using a computer and to prevent third parties from changing it. If a malicious user accesses unauthorized device or application services on the Internet of objects, it may be exposed to various security threats such as data leakage, denial of service, and privacy violation. One way to deal with these security threats is to encrypt and deliver the data generated by a user. Encrypting data must be referred to a technique of changing data using a complicated algorithm so that no one else knows the content except for those with special knowledge. As computers process computations that can be done at a very high speed, current cryptographic techniques are vulnerable to future computer performance improvements. We designed and implemented a new encryption program that combines ancient and modern cryptography so that the user never knows about data management, and transmission. The significance of this paper is that it is the safest method to combine various kinds of encryption methods to secure the weaknesses of the used cryptographic algorithms.

A Study on Moment of Truth of Household Telecommunication and Distribution Services in Korea

  • Choi, Hwa-Yeol;Lee, Hyuk-Jin
    • Journal of Distribution Science
    • /
    • v.16 no.6
    • /
    • pp.37-53
    • /
    • 2018
  • Purpose - There have been not enough studies on the ways customer Moment of Truth(MOT) activities are structured along with consumption chain and their influences as well as the relative influences of service quality at Moment of Truth on customer performance. Therefore, customer service needs needed at Moment of Truth may differ depending on whether these distribution services are at introduction-growth stages or maturity-decline stage already, but there is no study which illustrates this. Research design, data, and methodology - This study selects VoIP and IPTV as the household telecommunication and distribution services at introduction-growth stages as well as high speed internet and wire telephone as those at maturity-decline stages. Then it identifies which experiences that customers have at Moment of Truth by each service as well as the influences related to what the customers consider as important. Results - As the result of demonstration with the target of 858 respondents, customers' experiences and requests differ at Moment of Truth. For service quality, what takes the positive roles in customer performance includes corporeality and certainty for the services at introduction-growth stages as well as reliability, sympathy, and mutuality for those at maturity-decline stages. Conclusions - Implications of these results as well as further directions for study are suggested.

A Study on the Digital Divide of an Island (섬 지역의 정보격차에 관한 연구)

  • Noh Sun-Kuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.438-444
    • /
    • 2005
  • In Korea, the situation to use a Information Communication Technology(In) was rapidly developed that the subscriber using CDMA mobile phone are about 3,601 ten thousand and the subscriber of very high-speed service for Internet using ADSL etc., are about 1,161 ten thousand, the base June, 2004. However, nevertheless the development of In and more rapid increase of subscriber, a farming, finishing villages and an islands are being exist a sharp difference of digital divide compare with a big city because of geometrical, economical reasons. In this paper, to put empasis in an Islands that the alienation class of Information are many exist, relatively small opportunity of information access because of geometrical, economical reasons, 1 search a ICT for Information Communication Network and propose a plan for Solution of Digital Divide of an Islands.

Knowledge Evolution based Machine-Tool in M2M Environment-Analysis of Ping Agent Based on FIPA-OS and Design of Dialogue Agent Module (M2M환경에서의 지식진화형 지능공작기계-FIPA-OS를 사용하는 Ping Agent 분석 및 Dialogue Agent 모듈설계)

  • Kim, Dong-Hun;Song, Jun-Yeop
    • 연구논문집
    • /
    • s.34
    • /
    • pp.113-119
    • /
    • 2004
  • Recently, the conventional concept of a machine-tool in manufacturing systems is changing from the target of integration to the autonomous manufacturing device based on a knowledge evolution. Subsequently, a machine-tool has been the subject of a cooperation through an advanced environment where an open architecture controller, high speed network and internet technology are contained In the future, a machine-tool will be more improved in the form of a knowledge evolution based device. In order to develop the knowledge evolution based machine-tool, this paper proposes the structure of knowledge evolution and the scheme of a dialogue agent among agent-based modules such as a sensory module, a dialogue module, and an expert system. The dialogue agent has a role of interfacing with another machine for cooperation. To design of the dialogue agent module in M2M(Machine To Machine)environment, FIPA-OS and ping agent based on FIPA-OS are analyzed in this study. Through this, it is expected that the dialogue agent module can be more efficiently designed and the knowledge evolution based machine-tool can be hereafter more easily implemented.

  • PDF

Analysis of TCP NewReno using rapid loss detection (빠른 손실 감지를 이용한 TCP NewReno 분석)

  • Kim Dong min;Han Je chan;Kim Seog gyu;Leem Cha sik;Lee Jai yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3B
    • /
    • pp.130-137
    • /
    • 2005
  • Wireless communication environment is changing rapidly as we use new wireless communication technology such as WiBro to access high speed Internet. As a result, reliable data transmission using TCP is also expected to increase. Since TCP assumes that it is used in wired network, TCP suffers significant performance degradation over wireless network where packet losses are related to non-congestion loss. Especially RTO imposes a great performance degradation of TCP. In this paper, we analyze the loss recovery probabilities based on previous researches, and use simulation results of our algorithm to show that it prevents performance degradation by quickly detecting and recovery losses without RTO during fast recovery.

Intrusion Detection: Supervised Machine Learning

  • Fares, Ahmed H.;Sharawy, Mohamed I.;Zayed, Hala H.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.305-313
    • /
    • 2011
  • Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. The sophistication of network attacks, as well as their severity, has also increased recently. As such, more and more organizations are becoming vulnerable to attack. The aim of this research is to classify network attacks using neural networks (NN), which leads to a higher detection rate and a lower false alarm rate in a shorter time. This paper focuses on two classification types: a single class (normal, or attack), and a multi class (normal, DoS, PRB, R2L, U2R), where the category of attack is also detected by the NN. Extensive analysis is conducted in order to assess the translation of symbolic data, partitioning of the training data and the complexity of the architecture. This paper investigates two engines; the first engine is the back-propagation neural network intrusion detection system (BPNNIDS) and the second engine is the radial basis function neural network intrusion detection system (BPNNIDS). The two engines proposed in this paper are tested against traditional and other machine learning algorithms using a common dataset: the DARPA 98 KDD99 benchmark dataset from International Knowledge Discovery and Data Mining Tools. BPNNIDS shows a superior response compared to the other techniques reported in literature especially in terms of response time, detection rate and false positive rate.

A Study on the Technologies of Storage Management System for Digital Contents (디지털콘텐츠의 저장관리시스템 기술에 관한 연구)

  • 조윤희
    • Journal of Korean Library and Information Science Society
    • /
    • v.34 no.2
    • /
    • pp.187-207
    • /
    • 2003
  • With the rapidly evolving information technologies and the Internet, a network-based storage management system is required that can efficiently save, search, modify, and manage digital contents which are increasing by geometric progression. Recently, the SAN became highlighted as a solution to such issues as the integrated data management for heterogeneous systems, the effective utilization of storage systems, and the limitation of data transfer. SAN allows for effective management and sharing of bulk data by directly connecting the storage systems, which used to be independently connected to servers, to the high-speed networks such as optical channels. In this study, I researched on the technologies, standardization and market trends of storage management systems, and performed comparative analyses of the structures, components, and performances for achieving the integration of diverse system storage systems as well as the virtualization of storage systems.

  • PDF