Yool Kwon
Electronics and Telecommunications Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yool Kwon.
international symposium on computers and communications | 2006
Chan Kim; Tae-Whan Yoo; Yool Kwon; Bong-Tae Kim
An EPON(Ethernet Passive Optical Network) master, slave chipset was developed. In EPON, LLID(Logical Link ID) value in the Ethernet frame’s preamble is used to make the PON look like a point-topoint links seen from the OLT(Optical Line Termination) and ONUs. This paper describes the functions and implementation of an EPON bridge in the master chip which performs bridge function for the upper network port and many lower PON logical ports differentiated by LLID. This bridge also has VLAN(Virtual LAN)-LLID mapping function to make the PON appear as many VLANs seen from the network port. It is also possible to define many VLANs for each ONU. It also has multicast pruning function through which only registered multicast traffic is sent downstream to destined ONUs.
international conference on advanced communication technology | 2004
Jong-Yoon Shin; Yool Kwon; Je-Soo Ko
The optical supervisory channel (OSC) in WDM (Wavelength Division Multiplexing) transmission systems is used for OAM (Operations, Administrations and Management) function like overhead information in SOH (Synchronous Digital Hierarchy). We present supervisory information contents and alarm propagation procedure in our 1.6T WDM transmission system. Also, this paper describes the OSC frame structure and the OSC subsystem configuration that can provide reliable and effective operation and maintenance capability.
international conference on advanced communication technology | 2006
Jee-Sook Eun; Yool Kwon
This paper presents a method of key security in EPON. There are many keys between an OLT and many ONUs for encrypt and decrypt upstream/downstream data. To provide security in EPON, these keys should be make secure on generating, distributing, and updating. This paper designs a key security method that uses simple protocol without use of a secure channel and has no effect on normal data traffics
Japanese Journal of Applied Physics | 2002
Hyun-Jae Lee; Sang Soo Lee; Hyung Joo Kim; Yool Kwon; Chang-Bong Kim
We present a simple measurement technique of the cross phase modulation in optical fibers. A pump laser generates a new optical component (Stokes wave) in a probe optical wave with the modulation frequency of a pump laser. We investigated optical heterodyning between the probe optical wave and the Stokes wave, which allows one to generate and evaluate a beat signal in the lower frequency range. With the probe optical wave including the Stokes wave, the cross phase modulation signal can be measured in the pump laser modulation frequency to the tens of kHz range.
multimedia technology for asia pacific information infrastructure | 1999
Nam-Seok Ko; Dong-Yong Kwak; Yool Kwon; Hong-Shik Park
It is reasonable to restore the VP failures according to the VP priority level in respect of guaranteeing the QoS which is coupled with the VP priority. This paper proposes a new hybrid self-healing mechanism based on the VP priorities over the ATM networks. Backup VPs are assigned to restore the failures on the restoration domains such as the OAM segment or end-to-end VPC. Semi-dynamic VP restoration algorithms are used for the VPs which do not have backup VPs or whose backup VPs fail. The simulation results show that the proposed algorithm can restore higher priority VPs faster than the lower priority VPs.
international conference on communication technology | 1998
Dae-Woo Choi; Yoon-Young Ahn; Je-Chan Kim; Hong-Soon Nam; Yool Kwon; Hwa-Suk Kim
ATM switches should be able to control various kinds of traffic that require different levels of service quality. Generally, ATM switches prepare per-class buffers in line interface circuits or in the switch fabric, and schedule them to satisfy the service requirements. This paper proposes a traffic control algorithm for ATM switches that combines a rate-based cell-scheduler and switch load measurement. Our method generates test cells for each traffic connection, and measures the test cells entering interval and exiting interval to estimate the switch load. By estimation the switch load, we determine the scheduling rate of each connection. We also propose a rate-based cell-scheduling algorithm. Computer simulations have evaluated the proposed algorithms. Our method can be used to accommodate ABR, VBR, UBR, and future GFR services.
international conference on information and communication security | 1997
Dong-Yong Kwak; Yool Kwon; Hong-Shik Park
We propose a partial shaping mechanism (PSM) built upon the continuous-state leaky bucket (LB) mechanism which can control the shaping delay and the output buffer size. We assume that input traffic of the proposed shaping mechanism is the worst case traffic tolerated by the continuous-state LB mechanism and characterize traffic patterns that can depart from our shaping mechanism. We also compare shaping delay and output buffer size of the proposed shaping mechanism with the existing shaping mechanism which holds peak emission time strictly. Our results show that the proposed shaping mechanism can easily manage the shaping delay and the output buffer size than other mechanisms.
Archive | 2006
Chan Kim; Tae Whan Yoo; Yool Kwon; Bong-Tae Kim
Archive | 2006
Kwang Ok Kim; Yool Kwon; Bong Tae Kim
Archive | 2005
Dong Beom Shin; Yool Kwon; Bong Tae Kim