• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.025 seconds

Tracking and Tracing the Status Changes of Sensor Tags based on the SIP Presence Model (SIP 프레즌스 모델 기반 센서 태그의 상태이력 추적)

  • Kim, Dong-Uk;Hong, Jin-Pyo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.231-242
    • /
    • 2009
  • The EPC-Discovery Service (EPC-DS) is a good representative of the RFID Track & Trace. But this mechanism has several problems. EPC-DS uses centralized server scheme which may arise bottle-neck state and that cannot provide detail trace information of a RFID object. In addition, a trace node requires direct access method to a RFID object or an element which has information of the RFID object for Track & Trace. In this paper, we propose a novel RFID Track & Trace mechanism which based on the SIP presence model and SIP event notification. This mechanism can provide detail trace information and monitoring function, and also can rid the bottle-neck section by combination of SIP methods instead of centralized element.

A Design and Implementation of a Remote Status Monitor and Control System for an ADS-B System (ADS-B 시스템 상태 감시 및 원격 제어 시스템의 설계와 구현)

  • Jang, Eunmee;Song, Inseong;Yoon, Wanoh;Choi, Sangbang
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.4
    • /
    • pp.325-333
    • /
    • 2014
  • An ADS-B system, which is a critical technology in surveillance area of the CNS/ATM, can replace or compensate a conventional radar based surveillance system through the communications among aircrafts. An ADS-B ground system which is to use the ADS-B on the ground air traffic management system consists of various subsystem devices such as ground stations that communicate with the aircrafts, and ADS-B/TIS-B/FIS-B servers. The ADS-B ground system has a form of distributed system and is interconnected through the network. Therefore, a system which can monitor and control the status of the multiple subsystem devices of the ADS-B ground system is essential. In this paper, we designed and implemented a remote status monitor and control system for the ADS-B system that can monitor and control the subsystem devices of the ADS-B system in remote place via SNMP protocol.

Design of Shipboard integrated network platform for Digital-ship (디지털 선박을 위한 선박 통합화 네트워크 설계 및 구현)

  • Kim Jae-Yang;Chung Sun-Tae;Ieem Jun-Seok;Park Jong-Won;Hong Key-Yong;Lim Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1202-1210
    • /
    • 2005
  • For the efficient and safe navigation management of ships cruising across oceans, international maritime law environments have been reinforced and the demand of information sharing between ships and shore has also been increasing. According to these environments and demand. researches about digital ships, ship integration, and ship integration networks have been active recently in US and Europe. In this raper, we first investigate about the proper ship integration platform, and then design and implement a ship integration network based upon the ship integration platform. We construct networks connecting various devices and systems into a layered architecture, and design an integration protocols. Based upon this architecture and protocols, we implement an ship integration system which manages all data and information of ship in a standardized platform and support ship-shore information sharing through which the more efficient and safer ship navigation management are supported with help from shore. We test our ship integration system by applying it to real operating ships and we find our system reliability and verify the efficiency of ship-shore information sharing and management.

Design and Implementation of Flying-object Tracking Management System by using Radar Data (레이더 자료를 이용한 항적추적관리시스템 설계 및 구현)

  • Lee Moo-Eun;Ryu Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.175-182
    • /
    • 2006
  • Radars are used to detect the motion of the low flying enemy planes in the military. Radar-detected raw data are first processed and then inserted into the ground tactical C4I system. Next, these data we analyzed and broadcasted to the Shooter system in real time. But the accuracy of information and time spent on the displaying and graphical computation are dependent on the operator's capability. In this paper, we propose the Flying Object Tracking Management System that allows the displaying of the objects' trails in real time by using data received from the radars. We apply the coordinate system translation algorithm, existing communication protocol improvements with communication equipment, and signal and information computation process. Especially, radar signal duplication computation and synchronization algorithm is developed to display the objects' coordinates and thus we can improve the Tactical Air control system's reliability, efficiency, and easy-of-usage.

Influence of Micro-Structural Characteristics of Concrete on Electrical Resistivity (콘크리트의 미세구조 특성이 전기저항에 미치는 영향)

  • Yoon, In-Seok
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.6
    • /
    • pp.122-129
    • /
    • 2013
  • Since electrical resistivity of concrete can be measured in a more rapid and simple way than chloride diffusivity, it should be primarily regular quality control of the electrical resistivity of concrete which provides the basis for indirect of quality control of chloride diffusivity during concrete construction. If this is realized, the electrical resistivity of concrete can be a crucial parameter to establish maintenance strategy for marine concrete structures. The purpose of this study is to develop, design and test a surface electrical resistivity measurement protocol. Microstructural affecting factors such as capillary water, porosity, tourtousity, and so on, on the electrical resistivity of concrete were examined taking into account for mixing proportion properties, and hydration stage. This study can provide a non-destructive approach for durability design of marine concrete. From the relationship between electrical resistivity and chloride diffusivity, it is expected that the result is subsequently used as a calibration curve for an indirect control of the chloride diffusivity based on regular measurements of the electrical resistivity during concrete construction.

A Job Allocation Manager for Dynamic Remote Execution of Distributed Jobs in P2P Network (분산처리 작업의 동적 원격실행을 위한 P2P 기반 작업 할당 관리자)

  • Lee, Seung-Ha;Kim, Yang-Woo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.87-103
    • /
    • 2006
  • Advances in computer and network technology provide new computing environment that were only possible with supercomputers before. In order to provide the environment, a distributed runtime system has to be provided, but most of the conventional distributed runtime systems lack in providing dynamic and flexible system reconfiguration depending on workload variance, due to a static architecture of fixed master node and slave working nodes. This paper proposes and implements a new model for distributed job allocation and management which is a distributed runtime system is P2P environment for flexible and dynamic system reconfiguration. The implemented systems enables job program transfer and management, remote compile and execution among cooperative developers based on P2P standard protocol Jxta platform. Since it makes dynamic and flexible system reconfiguration possible, the proposed method has some advantages in that it can collect and utilize idle computing resources immediately at a needed time for distributed job processing. Moreover, the implemented system's effectiveness and performance increase are shown by applying and processing the crawler jobs, in a distributed way, for collecting a large amount of data needed for internet search.

  • PDF

Design and Implementation of Mechanism for Effectively Exchanging Cybersecurity Information between Independent Security Management Domains (독립적인 보안관리 도메인간 효과적인 사이버보안정보 교환 방법의 설계 및 구현)

  • An, Gae-Il;Seo, Dae-Hee;Lim, Sun-Hee;Kim, Jong-Hyun;Seo, Dong-Il;Cho, Hyun-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1489-1497
    • /
    • 2011
  • As a way for defending against cyber security threats, there has been a research on cybersecurity information exchange between security management domains in order to raise security performance of the whole network. One of the hottest issues in exchanging cybersecurity information between security management domains is that the requirements of those domains on information sharing are different with each other because each is autonomous domain. This paper proposes a mechanism for effective cybersecurity Information exchange between independent security management domains, which can satisfy their requirements on information sharing through sharing policy and sharing policy control protocol, proposed in this paper. In this paper we have developed an integrated security control system that supports the proposed mechanism. Through the system the performance of the proposed mechanism is measured and evaluated.

Web Resources Based Collection Development for Digital Libraries (디지털 도서관의 웹자원 기반 장서개발)

  • Lee, Jee-Yeon;Kim, Sung-Un
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.111-127
    • /
    • 2003
  • Web-based information resources should be managed and used methodically in the same manner as the paper-based resources are managed and used. It is necessitated by the prevalence of web-based delivery of a variety of information. To develop a web-based digital collection, it is critical to establish a set of standardized evaluation criteria for web-resources. The evaluation criteria needs to include authority, trustworthy, reliability, functionality, relatedness, accessibility, structure, design, user support, and security related matters. However, it is also necessary to have certain flexibility to either emphasize or include particular evaluation criteria to reflect varying characteristics of the web resources especially for the purpose of developing an effective digital collection. In addition, it is essential to review the evaluation criteria with respect to value, demand, duplication prevention, and intellectual property, which are relevant to the web-based digital collection development. Finally, various strategies were suggested as means to develop more effective web-based digital resource collection. These strategies include organizing a selection committee to ensure the objectivity and consistency in web-resource evaluation; developing a model for web-based digital resource collection; sharing new standards, protocols, markups, and metadata with other digital libraries; and developing user-centered digital resource collection.

Provable Security of PRF-based Key Derivation Functions according to Input Types of Counters (PRF-기반 키유도함수에서 카운터 입력 형태에 따른 증명가능 안전성)

  • Kim, Nayoung;Kang, Ju-Sung;Yeom, Yongjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.547-557
    • /
    • 2015
  • The security of all cryptographic algorithms and protocols is based on the confidentiality of secret keys. Key management mechanism is an indispensable part of the cryptographic system and this deals with the generation, exchange, storage, use, and replacement of keys. Within the key management mechanism there are key derivation functions (KDFs) which derive one or more keys from a master key. NIST specifies three families of PRF-based KDFs in SP 800-108. In this paper, we examine the difference of security models between the KDFs and the encryption modes of operations. Moreover we focus on the provable security of PRF-based KDFs according to input types of counters, and show that the counter and feedback modes of KDFs using XOR of counters are insecure, while these modes using concatenation of counters are secure.

A Study of Logical Network Monitoring System Architecture for Research Group (응용연구 그룹별 논리 네트워크 모니터링 시스템 구조 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.75-83
    • /
    • 2012
  • Recent science technology research network moves to establish logical private network among specific research groups such as high energy physics and climate, requiring to implement private network by group for each purpose. Up to now, national research networks such as KREONET service high capacity logical private networks. Therefore standardized configuration and management scheme is essential for the deployment of logical private network. In this study, we propose the core service element and protocols for the logical networks over Layer 2 networks. We also propose system architecture that make monitoring and management easier. After that we design and implement monitoring map for logical network based on scheme. For this purpose, we also propose the description system for logical research network to provide data such as operation information, formation information, performance information and failure information of network infrastructure resource.