• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.03 seconds

The Design and Implementation of the Shuttle Protocol for Gathering Management Information Periodically (주기성을 갖는 네트워크 관리 정보 수집을 위한 셔틀 프로토콜의 설계 및 구현)

  • Gang, Hyeon-Jung;Lee, Sang-Il;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.6
    • /
    • pp.879-890
    • /
    • 1995
  • This paper proposes the shuttle protocol that can gather management information from managed systems in an efficient way. In this paper, we implement the protocol and evaluate the performance by simulation. The major feature of the shuttle protocol is a chained logical connection through managed systems, and management informations to be collected are circulated among specified managed systems in circular order on a logical ring connection. The data generated by an managed system are relayed to a neighbor managed system and the system sends its data which has additional management information to received data. Finally, a manager stationman get all of data generated by every managed system. we will show the analysis of management traffic patterns using conventional polling schemes and the shuttle protocol implementation viable to TCP/IP network and improving existing polling mechansims. Additionally, it is performed to evaluate the packet processing time and its distribution of a manager system and a gateway, and the queue length of packet and bit length of gateway against conventional polling schemes by simulation using OPNRT, a simulation-dedicated package.

  • PDF

ALMSock : A Framework for Application Layer Multicast Protocols (ALMSock :응용 계층 멀티캐스트 프로토콜의 개발 및 지원 프레임워크)

  • Lee, Young-Hee;Lee, Joong-Soo;Lee, Kyoung-Yong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.419-428
    • /
    • 2004
  • Due to the deployment problem of the IP Multicast service, the Application Layer Multicast (or Overlay Multicast) has appeared as an alter-native of the If Multicast. However, even though plenty of the Application Layer Multicast (ALM) Protocols were designed and their applications were developed according to the diverse requirements of each multicast service, researches on the ALM Protocols are focused on only a protocol design or an efficient multicast group management algorithm. And there is little effort to provide a unified guideline for development of the ALM Protocols and provide an environment for running multiple protocols simultaneously in a system. In this paper, we propose socket APIs to be a reference in developing new ALM Protocols which enables a system to support multiple protocols in a system with other ALM Protocols and which gives an environment to support efficient protocol management.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

An Internet Gateway Based Link State Routing for Infrastructure-Based Mobile Ad Hoc Networks (인프라구조 기반의 이동 애드혹 네트워크를 위한 인터넷 게이트웨이 중심의 링크상태 라우팅 프로토콜)

  • Lee, Sung Uk;Ngo, Chi-Trung;Han, Trung-Dinh;Kim, Je-Wook;Oh, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.10
    • /
    • pp.859-876
    • /
    • 2012
  • Since the existing protocols separated mobility management part and routing protocol part in their design and used a flooding, they suffer from the high control overhead, thereby limiting performance. In this paper, we use a tree-based mobility management method and present a simple and efficient routing protocol that exploits the topology information which is built additionally through mobility management. Thus, the mobility management and the routing protocol closely cooperate to optimize control overhead. Furthermore, we use a progressive path discovery method to alleviate traffic congestion around IG and a unicast-based broadcast method to increase the reliability of message delivery and to judge link validity promptly. The proposed protocol reduces control overhead greatly and works in a stable manner even with the large number of nodes and high mobility. This was proven by comparing with the AODV protocol that employs the hybrid mobility management protocol.

The Gas Analyzers Monitoring System (가스분석기 모니터링 시스템)

  • Kim, Gwan-Hyung;Oh, Am-Suk;Kong, Suk-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.739-740
    • /
    • 2016
  • 본 연구는 2륜자동차용 가스분석기 벤치보드와 "교통안전공단" 서버와의 데이터를 전송할 수 있는 중간 미들웨어와 통신 프로토콜 분석에 관하여 연구하였다. "교통안전공단" 서버로의 데이터 전송은 향후에 구축된 2륜자동차 관리 서버와의 통신과 벤치보드와의 통신 내용을 관리할 수 있는 브릿지를 설계하여 벤치보드와 "교통안전공단" 서버와의 데이터 정송 결함 유무를 모니터링 할 수 있는 시스템에 관하여 연구하였다. 또한, 2륜자동차용 배출가스 검사기의 내부 데이터를 원격에서 관리할 수 있도록 이더넷(TCP/IP) 기반의 데이터 통신 프로토콜도 분석하고 설계하였다. 본 연구를 통하여 설계된 가스분석기 통신 프로토콜을 통하여 2륜자동차 검사소에서 계측된 데이터와 "교통안전공단" 서버와의 데이터의 무결점을 제공하기 위한 통신 프로토콜에 대한 데이터 모니터링 기능과 간단한 표시기능을 제공하는 모듈을 제시하고자 한다.

  • PDF

Development of GARP/GVRP for network switches based on Linux (리눅스 기반 네트워크 스위치를 위한 GARP/GVRP 개발)

  • 노윤정;이원석;김준우;강경태;김지현;신현식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.211-213
    • /
    • 2003
  • 가상랜(VLAN:Virtual LAN) 기술은 멀티 캐스트 트래픽의 감소 효과가 크고, 효율적인 네트워크 보안 및 관리를 지원하므로, 대부분 최근의 상용 스위치는 가상랜 환경에서의 동작을 지원하고 있다. 가상랜 환경에서 동작하는 스위치에서 가상랜 정보를 주고받기 위하여 사용하는 프로토콜이 GARP/ GVRP(Generic Attribute Registration Protocol/GARP VALN Registration Protocol)이다. 이 프로토콜은 네트워크 환경에서 가상랜 정보가 바뀔 때마다 동적으로 각 스위치의 가상랜 정보를 설정해 줌으로써 네트워크 관리자의 수고를 덜어주며, 효율적으로 가상랜을 관리하는 방법을 지원하는 것이다. 따라서 가상랜 환경에서 동작하는 스위치는 대부분 GARP/GVRP를 내장하고 있으나, 범용 소스가 없이 생산업체 별로 자체 구현한 GARP/GVRP를 각각의 스위치에 탑재하고 있다. 본 논문은 이렇게 가상랜 환경을 지원하는 스위치에 필수적인 프로토콜인 GARP/GVRP를 리눅스 커널에 삽입 가능한 모듈 형태로 개발하였다. 또 개발한 모듈을 기가빗 이더넷 스위치(Gigabit Ethernet Switch)에 이식된 리눅스 커널에 삽입. 동작시키고 공인된 테스트 집합을 이용하여 프로토콜이 정확하게 동작함을 검증하였다.

  • PDF

A Zigbee Profile based Management Protocol (Zigbee Profile기반 관리 프로토콜)

  • Kim, Gangseok;Song, Wang-Cheol
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.965-967
    • /
    • 2009
  • 정보통신 기술의 발전과 사용자들의 다양한 요구들을 충족시키기 위해 유비쿼터스 환경을 기반으로 하는 응용서비스들에 대한 연구가 활발히 연구되고 있다. 이러한 응용들에 사용될 디바이스들에 대한 서비스규격이 표준화되지 않아 상호 호환성을 저해하고 있다. 본 논문에서는 프로토콜 구조가 전혀 다른 무선 센서 네트워크와 외부 네트워크와의 메시지 변환을 위해 또한 이질적인 지그비 디바이스들의 상호 호환성을 높이고 메시지 변환 게이트웨이와 외부네트워크 사이의 관리, 제어, 데이터 입출력의 일관성을 위해 제안하는 프로토콜을 Zigbee Alliance의 지그비 디바이스 프로파일 기반 관리 프로토콜을 제안한다.

TCP Performance Analysis Over IP Mobility Management Protocols (IP 이동성관리 프로토콜에 따른 TCP 성능 변화 분석)

  • Park, Chang-Min;Chae, Young-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6B
    • /
    • pp.411-419
    • /
    • 2008
  • As the set of new mobile data networking service technologies, such as WiBro, mobile WiMAX and WCDMA-HSDPA, have been introduced in recent years, IP mobility management protocols which aim to provide seamless IP service over the mobile networking environment become one of the important building blocks for the successful mobile networks. IETF has introduced a basic mobility management protocol over IPv6 (MIPv6) and a set of enhanced protocols such as FMIPv6 and HMIPv6, followed by FHMIPv6, S-MIPv6 and HIMIPv6 which combine the benefits of the basic protocols. We have studied the impact of the various IP mobility management protocols over TCP sessions through extensive simulations with ns-2. Our simulation results show that TCP performance with the HIMIPv6 outperforms MIPv6, FMIPv6 and HMIPv6 over the various TCP protocols, due to its efficient combination of the hierarchical mobility management scheme of the HMIPv6, the predictive handover scheme of the FMIPv6 and the fast simulcasting scheme of the S-MIP.

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

Development of an IoT System Based on the oneM2M Communication Protocol (oneM2M 통신 프로토콜 기반 사물인터넷 시스템 개발)

  • Park, Kee-Hyun;Lee, Jong-Hwi;Woo, Min-Woo;Park, Joon-Suu
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.41-49
    • /
    • 2016
  • In this paper, an IoT system which is increasingly popular in these days is developed. Among various international standards on the area, one M2M communication protocol is used in the system. The 0neM2M-based IoT system consists of ADN-AE modules and CSE modules. The ADN-AE module provides applications of various services. It also monitors a CSE module. The CES module is a platform that provides common services which should be provided to various AEs in an IoT system. The CSE module consists of a Network Manager module, a Message Handler module, and a Resource Manager module. The Network Manager module controls oneM2M communication and data flow in the system. The Message Handler module processes transmitted messages and the Resource Manager module manages the Resource Tree. The resource tree stores information of the objects to be managed in the system. Also, internal data flow and protocol mapping in the modules are explained.