• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.033 seconds

A study on the Comstruction of CCS OMAP for THN (THN을 위한 CCS OMAP의 구성 방안)

  • 신기웅
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1991.10a
    • /
    • pp.159-162
    • /
    • 1991
  • 본 논문에서는 한국전기통신공사에서 도입 추진하고 있는 No.7 공통선 신호방식의 망관리를 위하여 사용될 OMAP의 구성과 기능에 대하여 소개하였다. 국내에서는 아직 공통선 신호방식이 상용화 되지않았으며, 그 관련 기준들도 확정되지 않았으며, 더구나 운용유지보수관리를 위한 OMAP에 대해서는 프로토콜 범위조차 확고히 정립되지 않은 상태이다. 따라서 본 고에서는 THN과 OMAP의 관계를 살펴봄으로써 THN을 구성하기 위하여 필요한 국내의 OMAP 구성방안을 제시하여, OMAP의 프로토콜 정립과 OMAP을 이용한 관련 시스팀들의 구현에 방향을 제시하고자 한다.

Fuzzer for Private MIB in SNMP (SNMP 대상 퍼징기술 개발)

  • Soohun Kim;Brent ByungHoon Kang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.405-406
    • /
    • 2023
  • 일반적으로 네트워크 장비는 원활한 장비 관리를 위해 SNMP라는 프로토콜을 활용한다. SNMP를 활용함에 있어, 각 장비 제조사에서는 고유 기능을 정의하여 사용하기도 하는데 이를 Private MIB이라고 한다. 본 연구에서는 이러한 Private MIB을 대상으로 하는 퍼징(Fuzzing) 기술을 고안하였다. 본 논문에서는 특정 제조사의 Private MIB에 대해 페이로드를 만드는 전략과 실제 페이로드의 생성을 보인다. 이는 수많은 소프트웨어 혹은 장비들의 초기 안전성 평가를 수행하는 데 응용될 수 있을 것으로 기대한다.

  • PDF

SIP-based mobility management protocol to support computing environment mobility (컴퓨팅 환경의 이동성 지원을 위한 SIP 기반의 이동성 관리 프로토콜)

  • Hyungsik Moon;Choonhwa Lee
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.1001-1003
    • /
    • 2008
  • 유비쿼터스 환경을 위해 개별 서비스의 집합으로 정의할 수 있는 컴퓨팅 환경의 이동을 필요로 하고 있다. 이러한 컴퓨팅 환경의 이동을 지원하기 위해 텍스트 기반으로 확장성이 좋고 이동성에도 유용한 SIP 을 이용하였다. 확장된 SIP 을 이용하여 컴퓨팅 환경의 이동을 관리하는 프로토콜을 제안하였다.

Effective group key management protocol for secure multicast communication (안전한 멀티캐스트 통신을 위한 효율적인 그룹키 관리 프로토콜)

  • 이현종;김진철;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.733-742
    • /
    • 2003
  • Unlikely unicast transmission, there are many elements that threaten security. Thus, key management of creating and distributing group keys to authorized group members is a critical aspect of secure multicast operations. To offer security in multicast environment, the recent researches are related to most group key distribution. In this thesis, we propose a group key management protocol for efficient, scalable, and multicast operation. This proposed protocol architecture can distribute traffic centralized to the key server. since the group key rekeyed by sub-group manager. The detailed simulation compared with other group key management protocol show that the proposed group key management protocol is better for join, leave, and data latency.

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

An Embedded Multi-Agent Based Healthcare Service with Two-way Handshaking Mode (무선 및 유선환경에서 임베디드 멀티에이전트 기반의 쌍방향 건강관리 서비스)

  • Md, Amiruzzaman;Kim, Hyoung-Joong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.155-161
    • /
    • 2008
  • An automated healthcare monitoring is demand of time, lot of problems occurring just because of less monitoring of patients health condition on time. In this paper an embedded healthcare service is proposed by an iSCSI protocol on an automated multi-agent coordination by resource-constrained devices controlled system for healthcare service. The coordination between the resource constrained devices (e.g. PDA, SmartPhone, Tablet PC), and automated agents are maintained by a two-way handshaking mode iSCSI protocol. The automated health care control could be useable, and beneficial in the repetitive way. A fully centralized control is not applicable for this kind of approach.

A Study on the Design of Proxy for Integrated Network Management (통합 망관리를 위한 Proxy 설계에 관한 연구)

  • 박주희;박승균;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.174-180
    • /
    • 2001
  • The technology to efficiently manage computer communication network is in need as the computer communication network becomes more complicated and users want services more diversified. This has brought industries, research institutes and standadization organizations to consider an effective network management protocol. CMIP and the SNMP have considerable differences in structure and capacity Therefore, it is essential to have enables differences between network management protocol to gear for the two communication management system which is the most widely used and will be continuously used. In this thesis we suggest an interworking function Integrated Network Management for the Design of Proxy. According to the suggest algorithm, by using scoping, it stores the management information, so that it may pass the related information at the inner cash efficiently. Therefore, we can not only reduce some unnecessary management operation considerably but also bring some efficiency of saving the total management system response time.

  • PDF

Performance Improvement of Systems and Network Configuration Management Based on NETCONF (NETCONF 기반의 시스템 및 네트워크 구성관리 성능 향상)

  • Lee, Myung-Suk;Yoo, Sun-Mi;Ju, Hong-Taek;Hong, Jemes W.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9B
    • /
    • pp.786-794
    • /
    • 2008
  • IETF's NETCONF WG has taken efforts in standardizing configuration management protocol, which allows high interoperability of configuration management. In addition to interoperability, high performance is also required in configuration management, but many researches have often discarded the performance aspect of it. In order to fill that void, this paper proposes methods to improve performance with layers of NETCONF. It demonstrates and compares the performance evaluations to verify the efficiency of the proposed methods.

Power Management for Ad hoc Networks (Ad Hoc 네트워크에서의 전력관리기술)

  • Han, Sang-Bum;Suh, Heyi-Sook;Lee, Keun-Ho;Hwang, Chong-Sun
    • Annual Conference of KIPS
    • /
    • 2003.05b
    • /
    • pp.1329-1332
    • /
    • 2003
  • Ad Hoc 네트워크를 구성하는 노드들은 대부분 소형의 휴대용 기기이며 축전지를 전원으로 사용함에 따라 가용 전력에 한계를 가지고 있다. 따라서 축전지의 사용방법에 따라 망의 성능과 노드의 이동성이 영향을 받게 되므로 전력의 관리는 매우 중요한 이슈이다. 본 논문에서는 전력관리 방안을 그 접근방법에 따라 하드웨어와 네트워킹 프로토콜 측면으로 나누어 분석하였다 하드웨어 측면에서는 Ad Hoc을 구성하는 장치들의 전력사용 형태와 전력관리 기술, 사용되는 축전지의 성능에 대하여 기술하였으며 네트워킹 프로토콜 측면에서는 계층별 적용 가능한 전력관리 기술을 논의하고 향후 연구되어야 할 과제와 발전방향을 결론으로 제시하였다.

  • PDF

A Study On Management Protocol For Distributed Systems Management (분산시스템관리를 위한 관리 프로토콜에 관한연구)

  • 박승섭
    • Journal of Korean Port Research
    • /
    • v.13 no.2
    • /
    • pp.289-302
    • /
    • 1999
  • As the size and complexity of network increase Distributed System Management (DSM) will be significant issue within information network in order to increase the high reliability and to improve the flexibility of network management. The OSI management model has several problems. The key problems are that it does not fully address the problem of how to develop communication protocol in support of DSM and how to classify the management connection criteria. In this paper to solve first problem described above this paper propose the connectionless CMIP to accomplish for effectively managing the distributed management managing systems to handle the dynamic informations. To work out second problem we introduce the connection criteria in the hierarchy of management system and finally evaluate the efficiency of a suggested protocol during cooperative negotiation among the managing system.

  • PDF