Jin Ho Hahm
Electronics and Telecommunications Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jin Ho Hahm.
international conference on advanced communication technology | 2006
Joung-yeal Kim; Jin Ho Hahm; Young Sun Kim; Junkyun Choi
ITU-T FGNGN plans to complete NGN Release 1 scope at this year. It, thus, is the time to start NGN Release 2 scope, such as streaming service including IPTV, VoD, etc. This paper proposes new NGN architecture for IPTV services to progress NGN Release 2
next generation teletraffic and wired wireless advanced networking | 2006
Kyu Ouk Lee; Jin Ho Hahm; Young Sun Kim
Four methods of mobile IP (MIP) registration, call admission control (CAC), L2/L3 mobility and DiffServ mapping are mentioned for QoS assurance according to the admission of four classes of services as unsolicited grant service, real time polling service, non-real time poling service and best effort service in WiBro implementation. At operators first implementation stage, QoS assurance method of only L2 mobility is applied with QoS parameter and scheduling function of CAC, here CAC factors are maximum/minimum bandwidth and traffic priority. At operators second implementation stage, QoS assurance method of L2 and L3 mobility is applied with QoS parameter of CAC and scheduling function of its CAC. Here, CAC factors are maximum/minimum bandwidth, traffic priority, maximum delay and tolerated jitter. Finally, at the third implementation stage of operators, QoS assurance for nrtPS and rtPS rtPS service class are almost same as second implementation stage, but operator will strength QoS manager functions compare to previous stage for more accurate QoS assurance.
asia-pacific conference on communications | 2005
Kyu Ouk Lee; Jin Ho Hahm; Young Sun Kim
Four methods of mobile IP (MIP) registration; call admission control (CAC), L2/L3 mobility and DiffServ mapping are mentioned for QoS assurance in portable Internet networks. At operators first implementation stage, QoS assurance method of only L2 mobility is applied with QoS parameter of CAC and scheduling function of its CAC. The CAC is applied differently according to class of service, and CAC factors are maximum/minimum bandwidth and traffic priority. At operators second implementation stage, QoS assurance method of L2 and L3 mobility is applied with QoS parameter of CAC and scheduling function of its CAC. Here, CAC factors are maximum/minimum bandwidth, traffic priority, maximum delay and tolerated jitter. Finally, at the third implementation stage of operators, QoS assurance for nrtPS and rtPS rtPS service class are almost same as second implementation stage, but operator will strength QoS manager functions compare to previous stage for more accurate QoS assurance
international symposium on computers and communications | 2003
Jae-Sup Lee; Kyou-Ho Lee; Jong Hyup Lee; Jin Ho Hahm; Young Sun Kim
MPLS is high lightened as the most promising technology for the integrated IP-over ATM backbone network. Nowadays, one important practical issue in MPLS is how it is capable of providing differentiated services. For integrating IP with ATM capable of scalability, MPLS-based ATM switch network can be available, especially for the fast Internet services by adding a layer 3 routing module to the existing ATM network, and can provide scaleable Internet services to users with various service levels. In this paper, we establish a queuing model for FE (forwarding engine) including service differentiation, which performs IP address lookup in MPLS LER, and evaluate performance of FE with Internet traffic by statistical Internet protocol analysis. Also we take a closer look into our LC (label controlled)-ATM switch on which we implement an MPLS controller that can provide both user and provider with relative proportional differentiated service in a feasible and reliable manner.
mobility management and wireless access | 2006
Doan Huy Cuong; Jun Kyun Choi; Dipnarayan Guha; Jungsoo Park; Hyoung Jun Kim; Jin Ho Hahm
This paper presents an enhanced fast handover scheme in Mobile IPv6 named Cross based Fast handover Mobile IPv6 (X-FMIPv6). We propose Proactive Crossover Router Discovery scheme that allow us to locate Crossover Router in advance, before MN actually makes handover. Enhanced fast handover scheme based on FMIPv6 is proposed with tunnel establishment between Crossover Router and new Access Router to achieve the optimum routing and minimize network resource usage. The simulation of FMIPv6 and X-FMIPv6 is performed and the simulation results show that our proposed scheme give better performance compared with FMIPv6 in term of handover latency, transmission delay and number of out-of-order packets.
international conference on advanced communication technology | 2007
Kyu Ouk Lee; Jin Ho Hahm; Young Sun Kim
PSTN/ISDN evolution scenarios to broadband convergence network are shown with scenario 1, scenario 2, and scenario 3. Scenario 1 is divided into step 1 and step 2, scenario 2 is also divided into step 1 and step 2, and scenario 3 is a one step approach. While, xDSL evolution scenario to BcN is shown with step 1, step 2, and step 3. All of these evolution scenarios can be guided to operators and operators will implement these scenarios for legacy network evolution to BcN.
international conference on information networking | 2006
YoungHwan Kwon; Seong Gon Choi; Jun Kyun Choi; Jeong Yun Kim; Jin Ho Hahm
This paper proposes an efficient wireless resource management scheme using a Differential Received Signal Strength Indicator (DRSSI) in soft handoff DRSSI is the differential value of RSSIs, and can be used to monitor the movement of a Mobile Node (MN) For example, the DRSSI has a bigger value or changes its sign (+, -) if the MN changes its movement speed or direction A base station can determine the priority of a MN and can acknowledge the movement direction of a MN with these features By using the priority and movement direction of a MN, we can reduce the handoff blocking probability by reducing the unnecessary usage of wireless resource, which can be analyzed by numerical analysis.
international conference on advanced communication technology | 2006
Kyu Ouk Lee; Jin Ho Hahm; Young Sun Kim
Main service classes of WiBro are unsolicited grant service, real time polling service, non-real time poling service and best effort service. Concerning QoS assurance methods according to the class of service, L2 mobility with CAC factors of maximum/minimum bandwidth and traffic priority are applied at operators first implementation stage, and L2/L3 mobility with CAC parameters of maximum/minimum bandwidth, traffic priority, maximum delay and tolerated jitter are adjusted at the second implementation stage, along with more strengthen QoS manager functions at the third implementation stage. For IPv6 adaptation, dual stack of IPv4 and IPv6 is applied from terminals to subscriber networks, and gradually and partially IPv6 is applied from subscriber networks to public IP network at the first implementation stage, and dual stack for IPv4 and IPv6 with IPv6 header is applied in all networks at the second implementation stage, along with IPv6 in all networks at the third implementation stage. Finally, concerning security application, diameter based EAP-TLS and PKM are applied at the wireless region, and IDS/IPS is adapted at wired region during first implementation stage, and upgraded new PKM and link layer security are applied at the wireless region network, along with ISAC, IDS/IPS at the wired region during second and third implementation stage
asia-pacific conference on communications | 2006
Kyu Ouk Lee; Jin Ho Hahm; Young Sun Kim
Korean operators have started BcN implementation by replacement of old PSTN with access gateway. While, existing IP network has been expanded according to the increase of ADSL subscribers, metro Ethernet and various VoIP subscribers. New premium IP backbone for BcN and composite services has been installed and expanded based on MPLS functions, so one operator has two IP networks. Operator needs to have specific implementation plan for interoperation between new premium IP network and old best effort network and should consider many important issues. Here, traffic routing method is mentioned for route selection between premium IP network and best effort network from BcN and best effort subscribers according to the application services
Archive | 2004
Wang Bong Lee; Jin Ho Hahm; Young Sun Kim