• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.033 seconds

A Mechanism for Policy-based QoS Control on COPS Interface in NGN (NGN 에서 COPS 를 이용한 정책(Policy) 기반 QoS 제어 메커니즘)

  • Song, Sung-Han;Kim, Yang-Jung;Lee, Dong-Kyu;Chong, Il-Young
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.1342-1345
    • /
    • 2007
  • 현재 NGN 망에서 강조되는 QoS 보장 기술은 인터넷에서 QoS(Quality of Service) 제공을 위해 해당 응용 서비스 마다 자원을 예약하거나 할당하는 기능을 수행하며, 이 때, 효율적인 종단간의 QoS 보장을 위해서는 전체적으로 자원관리를 할 필요가 생긴다. 정책(Policy) 기반 QoS 기술 관리는 이 경우에 수행이 된다. NGN 망에서의 정책 기반 QoS 기술을 위해서는 정책 기반 QoS 관리 기술 구조 및 프로토콜에 대한 총괄적인 이해가 우선되어야 한다. 즉, 정책 결정 및 정책 실행과 관련한 정책 기반 QoS 관리 기술 구조와 프로토콜 관련한 COPS(Common Open Policy Service)와 LDAP(Light Weight Directory Access Protocol)을 중심으로 이해가 되어야 하고, 이를 토대로 해서 정책 기반 QoS 관리 기술 서비스가 제공 될 수 있다.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

An Efficient Key Management Protocol for Wireless Sensor and Actor Networks (무선 센서 및 액터 네트워크를 위한 효율적인 키관리 프로토콜)

  • Kim, Wan-Ju;Nam, Kil-Hyun;Lee, Soo-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.540-544
    • /
    • 2007
  • Researches on Sensor Network has become much more active and is currently being applied to many different fields. However since sensor network is limited to only collecting and reporting information regarding a certain event, and requires human intervention with that given information, it is often difficult to react to an event or situation immediately and proactively. To overcome this kind of limitation, Wireless Sensor and Actor Networks (WSANs) with immediate-response Actor Nodes has been proposed which adds greater mobility and activity to exisiting sensor networks. Although WSANs shares many common grounds with sensor networks, it is difficult to apply exisiting security technologies due to the fact that WSAN contains Actor Nodes that are resource-independent and mobile. This research therefore seeks to demonstrate ways to provide security, integrity and authentication services for WSAN's secure operation, by separating networks into hierarchcial structure by each node's abilities and providing different encryption key-based secure protocols for each level of hierarchy: Pair-wise Key, Node Key, and Region Key for sensor levels, and Public Key for actor levels.

An Extension of SNMP function for efficient control in Embedded System (Embedded System상에서의 효율적 제어를 위한 SNMP 기능 확장)

  • 임동화;이성준;금유환;안광선
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.487-489
    • /
    • 2001
  • 인터넷을 기반으로 하는 전산망은 관련기술의 발달로 다양한 기능과 서비스를 제공한다 이러한 전산망 구성 요소를 효과적으로 감시하고 통제할 수 있는 전산망 관리의 필요성은 높아가고 있다. 본 논문에서는 단순한 네트워크 관리 프로토콜인 SNMP를 임베디드 리눅스 시스템상에서 구현하여 효율적인 네트워크 관리를 위한 추가적인 기능을 제안한다. 본 시스템은 SNMP 에이전트와 SNMP 매니저간의 상호작용을 통해 네트워크 장비들을 효율적으로 관리하고 제어할 수 있어서 효과적인 네트워크 관리가 예상된다.

  • PDF

CORBA based Isochronous Connect ion Management Architecture for IEEE1394 based Multimedia Home Network (IEEE1394기반의 멀티미디어 홈 네트웍을 위한 코바 기반의 등시성 연결 관리 구조)

  • 이동규;오주용;정기훈;이명진;강순주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.634-636
    • /
    • 2004
  • 멀티미디어 홈 네트웍 환경에서 IEEE1394는 멀티미디어 데이터 전송을 위한 대표적인 네트웍 프로토콜로 사용되고 있으나, 멀티미디어 데이터 전송을 위한 등시성 연결의 관리에 어려움이 많다. 이와 관련하여 본 논문에서는 IEEE1394 네트웍의 등시성 연결 관리 구조를 제안한다. 또한 제안되는 구조상에서 IEEE1394의 비동기 전송을 이용하여 등시성 전송을 관리함과 더불어 코바 API를 통하여 멀티미디어 전송을 위한 등시성 연결을 관리하는 방법에 대하여 다루고 있다.

  • PDF

Evaluation on Effect of Message Overhead for Implementing a Scalable RSVP-TE Protocol in MPLS Networks (MPLS 망에서 확장성을 갖는 RSVP-TE 프로토콜 구현을 위한 메시지 부하의 영향 분석)

  • Lee Young-Woo;Park Jaehyung;Kim Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.815-820
    • /
    • 2004
  • For providing high quality-guaranteed service over Internet, traffic engineering based on an MPLS technology is being introduced. MPLS traffic engineering performs the computation on the path guaranteeing service`s quality and the reservation on network resources by an MPLS signaling protocol. As one of MPLS signaling protocol, RSVP-TE protocol transmits and receives periodic refresh messages for maintaining the path of a traffic flow. Such characteristic gives a heavy processing overhead to routers for maintaining states of large number of paths. In this paper, we propose a scalable implementation approach for RSVP-TE without dramatically increasing processing overhead. And we eval-uate the processing overhead on periodic messages by implementing the RSVP-TE protocol and the reduction mechanism of periodic messages.

Modified LEACH Protocol improving the Stabilization of Topology in Metal Obstacle Environment (금속 장애물 환경에서 토폴로지 안정성을 개선한 변형 LEACH 프로토콜)

  • Yi, Ki-One;Lee, Jae-Kee;Kwark, Gwang-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1349-1358
    • /
    • 2009
  • Because of the limitation of supporting power, the current WSN(Wireless Sensor Network) Technologies whose one of the core attributes is low power consumption are the best solution for shipping container networking in stack environment such as on vessel. So it is effective to use the Wireless Sensor Network Technology. In this case, many nodes join in the network through a sink node because there are difficulties to get big money and efforts to set up a lot of sink node. It needs clustering-based proactive protocol to manage many nodes. But it shows low reliability because they have effect on radio frequency in metal obstacle environments(interference, distortion, reflection, and etc) like the intelligent container. In this paper, we proposed an improved Modified LEACH Protocol for stableness radio frequency environment. In the proposed protocol, we tried to join the network and derived stable topology composition after the measuring of link quality. Finally, we verified that the proposed protocol is composing more stable topology than previously protocol in metal obstacle environment.

WDMA protocol with collision avidance for high speed optical networks (고속 광통신망에서 충돌 회피를 위한 파장 분할 다중 액세스 프로토콜)

  • 이호숙;최형원;박성우;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.3
    • /
    • pp.664-674
    • /
    • 1996
  • In high speed multi-wavelength networks, retransmission overhead due to desination conflict or control packet collision is one factor of performance degration because signal prpagation delay is much larger than the transmission time of data packet. In this paper, an efficient WDMA protocol with a collision avoidance mechanism is proposed for high speed WDM single-hop network with a passive star topology. In proposed protocol, each node has cource queues and routing table to store souting informatio. This architecture makes is possible to avoid any kind of collision when a node reserves the channel to transmit a data packet. High system thoughput and channel utilization can be achieved by proposed protocol since there are no discarded packets caused by any collision at transmission time. The performance of proposed protocol is evaluated in term of throughput and delay with variations in offered load. Simulation results show that the proposed protocol has superior performance to convertional protocols under nonuniform traffic as well as uniform traffic.

  • PDF

RFID Tag Ownership Relocation Protocol Based on Trusted Third Party (신뢰받는 제3자 기반의 RFID 태그 소유권 이전 프로토콜)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.568-574
    • /
    • 2015
  • Recently RFID not only is widely utilized in various fields such as inventory management, merchandize logistics, etc., but also, has evolved as an important component of the Internet of Things (IoT). According to increasing the utilization field of RIFD, studies for security and privacy for RFID system have been made diverse. Among them, the ownership transfer protocols for RFID tags have also been proposed in connection with the purchase of products embedded with RFID tag. Recently, Kapoor and Piramuthu proposed a RFID ownership transfer protocol to solve the problems of security weakness of the previous RFID ownership transfer protocols. In this paper, we show that Kapoor-Piramuthu's protocol also has security problems and provide a new protocol to resolve them. Security analysis of newly proposed protocol shows the security concerns are resolved.

A Study on the Inference of Detailed Protocol Structure in Protocol Reverse Engineering (상세한 프로토콜 구조를 추론하는 프로토콜 리버스 엔지니어링 방법에 대한 연구)

  • Chae, Byeong-Min;Moon, Ho-Won;Goo, Young-Hoon;Shim, Kyu-Seok;Lee, Min-Seob;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.42-51
    • /
    • 2019
  • Recently, the amount of internet traffic is increasing due to the increase in speed and capacity of the network environment, and protocol data is increasing due to mobile, IoT, application, and malicious behavior. Most of these private protocols are unknown in structure. For efficient network management and security, analysis of the structure of private protocols must be performed. Many protocol reverse engineering methodologies have been proposed for this purpose, but there are disadvantages to applying them. In this paper, we propose a methodology for inferring a detailed protocol structure based on network trace analysis by hierarchically combining CSP (Contiguous Sequential Pattern) and SP (Sequential Pattern) Algorithm. The proposed methodology is designed and implemented in a way that improves the preceeding study, A2PRE, We describe performance index for comparing methodologies and demonstrate the superiority of the proposed methodology through the example of HTTP, DNS protocol.