• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.04 seconds

Network Management Model for QoS-enabled Internet (QoS 인터넷 망에서의 망관리 모델)

  • 권영미;이극
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.549-552
    • /
    • 2002
  • 복잡하고 거대한 통신망을 효율적으로 구성하고 운용 관리하기 위해 ITU-T에서는 TMN 망관리 국제표준을 정하고 있다. 그러나 TCP/IP 기반의 인터넷 망에서는 TMN보다 간단하게 정의되어 있는 SNMP를 이용해 MIB를 기반으로 망 요소(network element) 제어만을 하고 있다. 인터넷 망에서 멀티미디어 데이터 교환 서비스를 수용하면서, IP 망 설계 초기에 고려하지 않았던 서비스품질(QoS)을 제공하기 위해 IntServ, DiffServ 프로토콜 등을 정의하고 있다. 이렇게 QoS를 제공하기 위한 인터넷 망은 단순한 SNMP 만으로는 관리될 수 없다. 그러나 아직까지 이에 적합한 망관리 모델이 정립되지 못한 상태인 바, 본 논문에서는 정책을 기반(policy-based)으로 하여 QoS 서비스를 위한 자원 할당을 dynamic하게 제공할 수 있도록 하는 QoS 인터넷 망관리 모델을 제안한다. 이 모델은 TMN의 관리계층 구조에 맞도록 구성되어 있다.

  • PDF

Resource Adaptive QoS Management for Q-MOTP in MPLS Network (MPLS망에서 Q-MOTP를 위한 자원 적응적 QoS 관리)

  • Choi, Won-Keun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.204-209
    • /
    • 2014
  • This paper has described a QoS mechanism and management for multimedia object transport protocol. Resource manager reports the system resource information to the QoS manager. Based on the combination of two informations, the more effective QoS management can be achieved by organic combination between them on the protocol time domain. Therefore, it is possible for QoS manager to decide call admission control quickly and detect and react the performance fluctuations in protocol time domain.

(Design of Group Key Management Protocol for Information Security in Multicast) (멀티캐스트 정보 보호를 위한 그룰 키 관리 프로토콜의 설계)

  • 홍종준
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1235-1244
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication. With prosed architect, subgroups for multicast secure group management will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. Each subgroup manager gives a secure key to it's own transmitter md the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepare to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after choking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the data transmition is possible without new key distribution at path change to SPT (Shortest Path Tree) of the router characteristic. Additionally, the whole architecture size is samller than the other multicast secure architecture by using the conventional PIM-SIM routing structure without any additional equipment.

  • PDF

Development of BEMS linked Demand Response System for Building Energy Demand Management (건물 에너지 수요관리를 위한 BEMS 연계형 수요반응 시스템 개발)

  • Lee, Sanghak
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.2
    • /
    • pp.36-41
    • /
    • 2016
  • In order to take advantage of the building as an energy demand resources, it requires automated systems that can respond to the demand response event. Load aggregator has been started business in Korea, research and development of building energy management and demand response systems that can support them has been active recently. However, the ratio of introducing automated real-time demand response systems is insufficient and the cost is also high. In this research, we developed a building energy management system and OpenADR protocol to participate in a demand response and then evaluated them in real building. OpenADR is a standard protocol for automated system through the event and reporting between load aggregator and demand-side. In addition, we also developed a web-based building control system to embrace different control systems and to reduce the peak load during demand response event. We verified that the result systems are working in a building and the reduced load is measured to confirm the demand response.

Analytical Approach of Global Mobility Support Schemes in IP-based Heterogeneous Mobile Networks (IP기반 이종 모바일 네트워크에서 글로벌 이동성 지원기법의 분석적 접근법)

  • Won, Younghoon;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.205-218
    • /
    • 2012
  • Mobility management of the mobile nodes and provision of seamless handover is crucial to an efficient support for the global roaming of the mobile nodes in next-generation wireless networks. Mobile IPv6 and mobility management in extended IP layer, which highly depend on traffic characteristics and user mobility models, were proposed by the IETF. Therefore, to evaluate the in-depth performance about these factors is important. Generally, the performance of IPv6-based mobility management protocol is evaluated through simulation. This paper shows the correlation between network parameters and performance metrics through numerical results, which is investigated how influence handoff latency and packet loss. And this paper uses mathematical analysis of the system parameters, such as the subnet residence time, the packet arrival rate and delay in wireless connection through the analytical framework which evaluate the performance of IPv6-based mobility management protocol.

Network Management for the GSMP Open Interface in the MPLS (MPLS의 GSMP 개방형 인터페이스를 위한 망 관리)

  • Cha, Yeong-Uk;Kim, Jin-Nyeon;Kim, Chun-Hui
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.227-234
    • /
    • 2002
  • MPLS which integrates routing of layer 3 and switching of layer 2, enables support for fast forwarding, traffic engineering and virtual private network services. GSMP is open interface protocol between a label switch and a controller, and it provides connection, configuration, event, performance management and synchronization. In the GSMP open interface, the functions of network management can be located either in the controller or in the label switch. To simplify the label switch and enhance the efficiency of resources, we adopt the network management model, in which the SNMP agent is located in the controller and is interworked with the GSMP. We presented the interworking scenrios between the GSMP and the network management of MPLS. We implemented the controller to verify the realization of our adopted network management model, and measured the connection setup delay of the provisioned connection.

Architecture of Policy-Based Network Management for Providing Internet Differentiated Service on Mobile IP Environment (이동 IP 환경에서 인터넷 차별화 서비스 제공을 위한 정책기반 네트워크 관리 구조)

  • 강승완;김태경;유상조
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.721-736
    • /
    • 2004
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. Today users want to be provided suitable QoS in the internet since demand of services is variety. The policy-based network management is method which can solve various problems of QoS, security, and complication of management in IP networks. This paper presents the network topology constitution, operation procedure and architecture of policy-based network management for providing internet DiffServ on mobile IP environment. In this paper we propose policy classes of policy-based DiffServ network management on mobile environment and create policy scenarios using the proposed policy description language to represent the policy classes. Finally, we implemented a policy-based DiffServ network management system on mobile IP environment.

  • PDF

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

Media Access Control Protocol Considering MANET of Underwater Environment (수중 환경의 MANET을 고려한 매체 접근 제어 프로토콜)

  • Shin, Seung-Won;Yun, Nam-Yeol;Lee, Jin-Young;Lee, Seung-Joo;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.97-107
    • /
    • 2013
  • Underwater wireless communication systems can be useful for underwater environment observation, catastrophe prevention, ocean resources exploration, ocean organism research, vessel sinking exploration, and so on. However, unlike terrestrial wireless communication, underwater wireless communication should consider factors such as long propagation delay, limited transmission capacity, high bit-error rate due to potential loss in power, ambient noise, man-made noise, multi-path, etc., because of the inherent characteristics of water. Thus, in this paper, we propose a suitable media access control(MAC) protocol that applies a combination of the ALOHA MAC protocol and the CSMA/CA MAC protocol to underwater environment. We further propose a mathematical analysis model to evaluate performance. We also verify performance improvement in the proposed scheme in comparison with existing MAC protocols.

Protocol converting method for the Real-time Safety Supervision System in Railway (실시간 철도안전 관제를 위한 프로토콜 변환 방안 연구)

  • Ahn, Jin;Kim, Sung-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1335-1341
    • /
    • 2016
  • For the safety of train operation, monitoring & supervisory systems for train, signal, power, communication and facilities is operating independently in another place, so, its sensors are interdependently connected from each other to transfer gathering datas of sensing to control center. A Goal of Real-time railway safety supervision system is to improve the safety oversight efficiency and to prevent accidents by means of hazard prediction based on big data by integrating all of safety sensing data in wayside of railway, and the System is requested acquisition of all of sensing data of safety. So, we need special method of protocol converting for the purpose of integrating all of detecting data concerning safety without any changing application. In this paper we investigate the existing converting method in communication field, and propose a new progress to converting protocol adding function of transfer using XML file, and implemented this algorithm, and tested with example packets, finally.