• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.027 seconds

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

An Effective Management Technique of Domain FA using Load Balancing in Mobile Computing Environment (부하 분산을 적용한 효율적인 Domain FA 관리 기법)

  • Kim Yong-Chul;Kim Yoon-jeong;Chung Min-Gyo;Lee Woong-Jae
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.25-32
    • /
    • 2004
  • Mobile computing environment makes it possible for computing activities to be maintained during movement even if a user changes its network point of attachment. Mobile IP is a standard protocol designed to be used in such mobile computing environment. However, Mobile IP has a drawback to incur a lot of handoff delays and waste network resources, since CoA(Care of Address) registration packets need to go through a HA(Home Agent) first whenever a mobile node moves. To solve this long-standing problem, this paper proposes a new scheme that, for infra-domain movement, efficiently performs local handoff without notifying the HA Specifically, based on the notion of load balance, the proposed scheme allows every FA(Foreign Agent) in a domain to become the root FA(also known as domain FA) dynamically, thus distributing the registration task into many other foreign agents. The dynamic root assignment through load balancing ultimately leads to fast network response due to less frequent transmission of registration packets.

  • PDF

Ethernet Topology Transformation and Throughput Analysis (이더넷 위상 변환과 성능 분석)

  • 권정국;백의현;이동길;이상호
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.77-85
    • /
    • 2003
  • The conversion into a new Local Area Network (LAN) environment without clear analysis of the problems with the conventional LAN environment nay bring about some improvement of performance, but in general, the result would not be as good as expected. Besides, in case new traffic or application programs are added In the near future, traffic overload similar to the past may incur. Therefore, the conversion into a new LAN environment should not only relieve the problems with the conventional environment but also be able to cope with future expansion of the network flexibly. In the present paper, in view of the above, the problems with protocols and traffic that may occur in the Bus-structured 10/100 Mbps shared Ethernet that has been widely used by many institutions are reviewed, and as a case study whether such conversion into a new LAN environment in order to increase the efficiency in the operation, management, and utilization of the network would be proper for the actual operational environment is implemented, and the results are analyzed.

Design and Implementation of IoT Middleware Using Data Refinement Scheme based on IETF CoAP (IETF CoAP 기반의 데이터 정제 기법을 이용한 IoT 미들웨어 설계 및 구현)

  • Wang, Jian;SaKong, June;Kwak, Ho-Young;Kim, DoHyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.123-128
    • /
    • 2015
  • Recently, a communication protocol for connectivity between various sensors and actuators is issue the key technology in IoT(Internet of Things). IETF(Internet Engineering Task Force) CoAP(Constrained Application Protocol) protocol supports the communication between things like sensors and actuator nodes in a limited environment. Smart-phone will work for the data processing of the sensors and the management of IoT nodes at the next generation communication environment. In this paper, we design the connection for smart-phone and IoT node based using IETF CoAP protocol, and implement the middleware with the proposed data refinement on smart-phone. The middleware detects and eliminates a error data and duplicated data using the proposed data refinement. The proposed data refinement scheme supports to transfer a reliability information in the constrained environment.

Development and Evaluation of an Evidence-based Nursing Protocol for Postoperative Nausea and Vomiting (근거기반의 수술 후 오심·구토 관리 프로토콜의 개발 및 임상적 평가)

  • Oh, In Ohg;Yoo, Jae Yong;Oh, Eui Geum
    • Journal of Korean Biological Nursing Science
    • /
    • v.19 no.2
    • /
    • pp.86-97
    • /
    • 2017
  • Purpose: Postoperative nausea and vomiting (PONV) is very common among postoperative orthopedic surgical patients with patient-controlled analgesia (PCA), especially for narcotics. Therefore, the purpose of this study was to investigate the effects of an evidence-based PONV management protocol on nursing and patient outcomes. Methods: A methodological study was conducted to develop PONV protocol and a quasi-experimental study to evaluate the effectiveness of protocol. The preliminary PONV protocol was drawn by conducting a systematic review and by reviewing clinical guidelines and best practice recommendations. Validation of the content was done by expert clinicians, and the clinical applicability was evaluated by staff nurses and patients. The effect was evaluated in clinical outcomes associated with PONV and nursing outcomes. Results: In the experimental group, the occurrence of vomiting (z= 2.147) was significantly decreased, the maintenance PCA (${\chi}^2=4.212$) and the satisfaction of patients (z= 5.007) were significantly higher. In the outcomes of nurses, the PONV knowledge of nursing care (z = 3.791), awareness (z = 2.982) and self-efficacy (z= 2.745) were higher in the experimental group. The attitude towards evidence-based nursing practice (z= 2.446) was significantly positive. Conclusion: The results show that an evidence-based approach to the implementation of PONV care is effective in improving patient clinical outcomes and quality of care.

Data Interworking Model Between DLMS and LwM2M Protocol (DLMS와 LwM2M 프로토콜 간 데이터 연동 모델 연구)

  • Myoung, Nogil;Park, Myunghye;Kim, Younghyun;Kang, Donghoon;Eun, Changsoo
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.1
    • /
    • pp.29-33
    • /
    • 2020
  • Despite the same system architecture and operation principle, Advanced Metering Infrastructure (AMI) and Internet of Things (IoT) are recognized as a heterogeneous system. This is due to the different object modeling and communication protocols used in smart meters and sensors. However, data interworking between AMI and IoT is expected to be inevitable in the future. In this paper, we propose Device Language Message Specification (DLMS) to Lightweight Machine to Machine (LwM2M) conversion model. The proposed interworking model can reduce the packet size by 46.5% compared to that of the encapsulation method.

Hybrid Priority Medium Access Control Scheme for Wireless Body Area Networks (무선 인체통신 네트워크를 위한 복합 우선순위 MAC 기법)

  • Lee, In-Hwan;Lee, Gun-Woo;Cho, Sung-Ho;Choo, Sung-Rae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1305-1313
    • /
    • 2010
  • Last few years, wireless personal area network (WPAN) has been widely researched for various healthcare applications. Due to restriction of device hardware (e.g., energy and memory), we need to design a highly-versatile MAC layer protocol for WBAN (Wireless Body Area Network). In addition, when an emergency occurs to a patient, a priority mechanism is necessitated for a urgent message to get through to the final destination. This paper presents a priority mechanism referred to as hybrid priority MAC for WBAN. Through extensive simulation, we show the proposed MAC protocol can minimize the average packet latency for urgent data. Thus, when patients have an emergency situation, our MAC allows adequate assistance time and medical treatment for patients. The simulation based on NS-2 shows that our Hybrid Priority MAC has the good performance and usability.

An RFID Tag Anti-Collision Protocol for Port Logistics Systems (항만 물류 시스템을 위한 RFID 태그 충돌 방지 프로토콜)

  • Lee, Seong Ro;Lee, Yeonwoo;Joo, Yang-Ick
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.202-207
    • /
    • 2013
  • RFID technology is applied to port logistics applications since it monitors objects wirelessly without line of sight and constructs ubiquitous system with low cost. Changes of stock status in the warehouse environment make the technology more important for managing such frequent storing and un-storing. Although the RFID has beneficial characteristics of low cost and low complexity, simultaneous responses of RFID tags cause tag identification collision due to absence of elaborate medium access control scheme. Several algorithms have been proposed to overcome the tag collision problem. However, it is difficult to adopt the methods to the logistics systems that has varying loads since there was no consideration on RFID tag's mobility. Therefore, we propose an efficient RFID tag anti-collision protocol, and simulation results demonstrate performance improvement by using the proposed scheme.

Smart Outlet System for Single-person Household based on IoT (Internet of Things) (사물 인터넷 기반의 1인 가구를 위한 스마트 콘센트 시스템)

  • Kim, Hye-Suk;Park, Byeong-Ju;Cho, Young-Ju
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.895-904
    • /
    • 2017
  • In this paper, we propose an IoT based smart outlet system for one-person household with electric safety, electric energy consumption management and transmission of messages to the reserved contacts by connecting the emergency network. The proposed smart outlet system is implemented by parsing packet data and protocol between server, module, application and WiFi AP receiver. The WiFi AP built for communication can be used not only for the outlet but also for the gas barrier, the door lock and the like. In addition, the proposed method can provide the remote monitoring function by receiving the amount of power of the receptacle received through the AC current sensor (SCT-013) in real time. The smart outlet system is expected to be capable of automatically shutting off the power in case of emergency through automatic power use analysis in addition to the standby power cutoff function.

Design and Implementation of MAC Engine for Next-Generation WLAN (차세대 무선랜 구현을 위한 MAC 엔진 설계 및 구현)

  • Lee, Yeong-Gon;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.6
    • /
    • pp.39-47
    • /
    • 2009
  • This paper presents implementation of two types of the 802.11 MAC engine for the next generation WLAN, 802.11n. The first version of MAC engine consists of hardwired logic and embedded firmware. Hardwired logic includes Tx block, Rx block, Backoff block, and ChannelManage block. Embedded firmware contains Protocol Control block, MLME block, and MSDU processing block. The first version has a time-critical fault during the atomic transmission caused by software overhead, so it can not be applied to 802.11n MAC. For that reason, the second version has additional blocks with hardwired logic modules to reduce software overhead of the first version. This enhanced version has 73Mbps throughput and it is expected to be further improved up to 129 Mbps with frame aggregation which is one of the key additional features of 802.11n. As a result, the second version of MAC engine can be applied to 802.11n MAC.