• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.032 seconds

The Study of the Improvement of Multicast in IPv6 (IPv6에서 멀티캐스트 성능 개선방안 연구)

  • Lim, Seung-Ho;Jung, Hoe-Kyung;Song, Jeong-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.159-162
    • /
    • 2005
  • Confusion of network traffic is increased by increasing of internet user and large of network. Specially olded one and one communication caused loss of bandwidth because redundant packet by increaseing video conference and internet broadcasting. Thereupon multicast technique, method reducing loss of bandwith, for multimedia data transmission was proposed. This paper verify efficiency after analysis about seperated tree management and multicast traffic transmission method for removing complexity of multicast protocal.

  • PDF

A Study of Protocol comparison Analysis for MPLS Traffic Engineering (MPLS 트래픽 엔지니어링을 위한 프로토콜 비교 분석에 관한 연구)

  • Ha, Yun-Sik;Kim, Dong-Il;Choi, Sam-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.105-108
    • /
    • 2005
  • To support abruptly increasing data traffic in these days. network management is needed. And also to maintain the steady infra, there is MPLS need which can support traffic engineering. It's necessary that MPLS doesn't only manage network to support recently booming data traffic, but has capacity to support traffic engineering to keep static infrastructure. Traffic engineering, method that a large-scale user shifts traffic to the beforehand designated routes that pass through specific nodes on network, is operation that is mapping traffic flow to the physical network topology. In this paper, we supplement the defect of the traditional RSVP traffic engineering and to construct far more steady infra, we suggest the way of its development of ERSVP signaling protocol.

  • PDF

The design of authentication mechanism using kerberos and X.509 protocol in distributed environment (분산환경에서 Kerberos와 X.509 Protocol을 이용한 인증 메카니즘의 설계)

  • 김성진;정일용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2860-2866
    • /
    • 1997
  • Kerberos is the most used example of authentication technology in distributed environment. In this paper, based on this method, a new authentication mechanism associated with X.509 protocol that authenticates services between regions is presented. Since any suggestions to regional services are not described in Kerberos, the authentication between regiona is performed via the connected chain obtained from x.509. These two protocols have distinguished key management systems -X.509 is designed using an asymmetric method, while Kerberos using a symmetric method. In order to provide regional services, X.509 is employed on connection part and Kerberos on actual authetication part.

  • PDF

A Disk based Backup Software using NDMP (NDMP를 사용한 디스크 기반 백업 소프트웨어)

  • Yun, Jong-Hyeon;Bok, Kyoung-Soo;Yoo, Jae-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.6
    • /
    • pp.488-502
    • /
    • 2005
  • Recently, with the development of data communication techniques and storage devices, many researches have been done to process a large amount of data. As the size of storage media has been increased because of the storage technologies such as NAS and SAN, the efficient backup for a large amount of data is required. In this paper, we design and implement a disk based backup software that fully supports NDMP(Network Data Management Protocol) which is an open standard protocol for network based backup. The proposed backup software supports various types of backup and restore. In addition, it manages multiple network connected devices and supports a disk based backup by extending the NDMP protocol.

Performance Comparison of Transport vs. Network Layer Mobility Management Mechanisms (트랜스포트 계층과 네트워크 계층 이동성 관리 방안들의 성능비고)

  • Chang, Moon-Jeong;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.28-37
    • /
    • 2006
  • Recently, transport layer mobility supporting approaches based on SCTP, which is a new standard transport layer protocol, are proposed. In this paper, the handover performance and overheads of these transport layer mobility supporting approaches are compared to those of the traditional network layer mobility supporting approaches. Through the simulation results, it is shown that the handover performance of the transport layer mobility supporting approaches is better or at least similar to that of the plain MIPv6, which is the representative network layer mobility supporting approach. With respect to the amount of control packet, the transport layer approaches impose less overhead than any of the network layer approaches.

Developing XML Hub System based on SOAP (SOAP을 기반으로 한 XML Hub 시스템 개발)

  • Kim, Yong-Soo;Joo, Kyung-Soo
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.351-358
    • /
    • 2003
  • SOAP is a protocol used for information exchange in distributed computing environment and defines mechanisms for message transferring between distributed system and remote procedure cai]/response process. This SOAP is able to be used independently on operating systems and program languages because it is a protocol using text-based XML. Therefore ebXML that is a standard for I-Commerce adopts SOAP for message exchange. In this paper, we developed XML Hub System based on SOAP By this in Hub System we can more easily exchange messages for B2B. Accordingly we can manage and integrate a lots of business partners.

Integrated NEMO Route Optimization to Improve Security and Communication Path (보안성과 전송 경로를 함께 개선한 NEMO의 통합적인 경로 최적화)

  • Cho, Kyung-San;Shin, Duk-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.203-210
    • /
    • 2008
  • Because BSP(Basic Support Protocol) of NEMO(Network Mobility) has important limitation of not providing route optimization, several route optimization schemes have been proposed. By analyzing and improving the limitations of the existing schemes. we Propose an advanced integrated route optimization scheme for the communication through both the internal and external routing of nested NEMO. Our proposal includes a secure route optimization protocol which connects TLMR directly to an external node CN without passing through any HAs. and allows TLMR to control the internal path without passing through the internet. Thus, our scheme can strengthen the security as well as improve the path and delay of NEMO communication.

  • PDF

Consideration of Performance Evaluation for Various Data Synchronization Gateways (다양한 자료 동기화 게이트웨이의 성능 평가에 관한 고찰)

  • Pak, Ju-Geon;Lim, Seung-Hyun;Lee, Hyun-Uk;Lee, Guin Jin;Park, Kee-Hyun
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1518-1521
    • /
    • 2010
  • 현재 모바일 환경에서 다양한 자료 동기화 프로토콜 및 솔루션이 개발되었지만 이들 간의 상호호환성은 보장되고 있지 않은 실정이어서 관리의 어려움이 따르고 있다. 이에 본 연구팀은 통합된 자료 동기화 서버를 운용하기 위한 방안으로 서로 다른 자료 동기화 프로토콜 기반의 동기화 메시지 또는 자료를 통일된 형식으로 변환하기 위한 스탠드 얼론 (Stand alone) 자료 동기화 게이트웨이와 임베디드 자료 동기화 게이트웨이를 개발하였다. 하지만 두 게이트웨이는 규모의 확장성 (Scalability)과 자료 변환 성능 측면에서 상반된 장단점을 가지므로 두 게이트웨이의 성능을 비교/분석하여 전체 자료 동기화 시스템의 특성에 따라 상대적으로 효율적인 게이트웨이를 선택 운용하여야 할 필요성이 발생하였다. 게이트웨이 시스템의 특성상 성능 평가를 위해서는 다수의 모바일 단말기를 운용하여야 한다는 어려움이 있으므로 본 논문에서는 성능 분석을 위한 시뮬레이션 모델을 설계하였다. 시뮬레이션 모델을 통해 전체 단말기의 수와 동기화 요청 빈도에 따른 두 게이트웨이의 성능의 팔꿈치 지점을 파악할 수 있을 것이며, 이를 통해 각 자료 동기화 시스템 별 적합한 게이트웨이를 선택 운용하는데 도움이 될 것이다. 또한 병목현상이 발생하는 팔꿈치 지점을 개선함으로써, 전체 자료 동기화 시스템의 성능 향상에도 기여할 수 있을 것이다.

A Study on the Fingerprinting scheme without Trusted Third Party (신뢰기관 비참여의 핑커프린팅 기법에 관한 연구)

  • Yong, Seung-Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.81-88
    • /
    • 2009
  • Fingerprinting scheme is a technique which supports the copyright protection to track redistributors of digital content using cryptographic techniques. These schemes enable the original merchant to identify the original buyer of the digital data by embedding fingerprints into digital contents. Asymmetric property of fingerprinting schemes is important to keep the buyer's privacy. In this paper, we propose a symmetric encryption based fingerprinting protocol without trusted third party. Our scheme enables the reduction of computational costs for the encryption using symmetric key encryption scheme. Since a trusted third party doesn't take part in making the fingerprint of each buyer, the protocol doesn't need to control the trusted third party and it is more secure against collusion attack.

Flow Protocol based Flow Entry Eviction Strategy for Software Defined Networking (소프트웨어 정의 네트워킹에서 플로우 프로토콜을 고려한 플로우 엔트리 방출 전략)

  • Choi, Hanhimnara;Raza, Syed Muhammad;Kim, Moonseong;Choo, Hyunseung
    • Annual Conference of KIPS
    • /
    • 2020.11a
    • /
    • pp.128-130
    • /
    • 2020
  • 소프트웨어 정의 네트워킹(SDN)은 기존 네트워크의 컨트롤 기능을 컨트롤러에 중앙 집중화하여 프로그램 가능하며 유연한 네트워크 관리 방식을 제공한다. 컨트롤러-스위치 간 인터페이스 표준 기술인 OpenFlow에서는 스위치 내부의 플로우 테이블을 이용하여 네트워크에 접근하는 패킷을 처리한다. 하지만 OpenFlow 스위치에 주로 사용되는 TCAM의 부족한 용량으로 인해, 많은 트래픽이 발생하는 환경에서 플로우 테이블에 충분한 양의 플로우 엔트리를 설치하지 못하는 문제가 발생한다. 이 경우 플로우 테이블 오버플로우가 발생하는데, 네트워크에 새로이 진입하는 플로우를 위하여 기존의 플로우 엔트리를 방출시킬 필요가 있다. 이때, 활성화된 플로우 엔트리를 방출하게 되면 네트워크 컨트롤 오버헤드가 크게 증가할 위험이 있다. 따라서 오버플로우가 발생했을 때 어떤 플로우 엔트리를 방출시킬지 정하는 것이 중요하다. 이에 본 논문은 플로우 프로토콜 타입에 기반한 플로우 엔트리 방출 정책을 제안하여 효율적인 플로우 테이블 사용을 목표로 한다.