• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.031 seconds

Design and Implementation of a Management Framework for Ubiquitous Home Networks (유비쿼터스 홈 네트워크를 위한 JMX 기반 관리 프레임워크의 설계 및 구현)

  • Kim, Dae-Young;Lee, Jong-Eon;Cha, Si-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.275-284
    • /
    • 2008
  • In this paper we design and implement a management framework base on JMX to control and manage ubiquitous home networks. To do this, we organize the ubiquitous home network test-bed that consists of information electronics and sensor devices. In the test-bed network, we implement the management framework which can control and manage various applications and devices in home network environment. In addition, it can also define and add new services easily. Moreover, it is possible to provide various management interfaces with multi-protocols. The framework is formed to integrate legacy management systems readily.

A study of the implementation of an OTA Provisioning System in WiBro (와이브로에서의 OTA Provisioning 시스템 구축 방안에 관한 연구)

  • Sohn, Young-Seol;Ok, Chang-Seok
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.355-359
    • /
    • 2008
  • 와이브로(WiBro), 3G 무선인터넷(HSDPA), 3G LTE 등과 같은 와이어리스 브로드밴드(Wireless Broand) 기술이 점차 성숙됨에 따라 이들 망을 활용한 다양한 무선인터넷 서비스를 제공하려는 사업자들이 증가하고 있다. 기존의 WLAN, 2G/3G 회선망에서의 제한된 이동성 및 네트워크 전송 속도를 개선한 와이어리스 브로드밴드 서비스 시장은 국내에서도 2006년부터 WiBro 및 HSDPA가 사용됨에 따라 사업자간의 경쟁도 본격화되고 있다. 이러한 환경 속에서 사업자들은 신속하고 편리한 서비스 개통과 스마트폰, USB모뎀, 노트북, UMPC, PMP등 다양한 단말들의 펌웨어 업그레이드, A/S 처리 방안에 대해 고심을 하고 있으며, 이들 문제점은 막대한 비용과 고객 민원을 야기시키는 요인이기도 하다. 따라서 경제적인 관리비용으로 동적인 서비스/펌웨어 업그레이드 및 A/S에 대한 고객 만족도를 높이기 위한 단말 원격 관리 필요성이 절실히 요구된다. WiBro 단말의 안전하고 효율적으로 관리하기 위해서는 단말과 기지국사이의 무선구간에 대한 보안(security)을 강화시켜 줄 수 있으면서 이동성(mobility)을 고려한 OMA DM프로토콜을 이용하는 것이 적합하다. 또한, WiBro에서 가입자 인증을 채택하고 있는 UICC의 관리를 위해서 3GPP에서 정의하는 SMS/MMS기반의 또는 BIP(Bear Independent Protocol)기반의 OTA기술을 병행하여 사용하여야 한다. 본 논문에서는 Wi-MAX단말 관리를 위한 OTA Provisioning 규격으로 OMA DM과 TR069이 WiMAX 단말을 위하여 어떻게 적용하도록 규정하고 있는지를 살펴본다. 특히, WiBro 가입자 인증뿐만 아니라 폰북, DRM, 금융서비스 등 다양한 부가 서비스를 위하여 사용되는 UICC의 원격관리를 위한 관리 요소들을 정의, 설계하고 이를 바탕으로 구현된 KTUICC OTA Provisioning시스템을 소개한다.

  • PDF

Improved AOMDV to Increase of Path Stability by Considering the Mobility of Nodes in Wireless Ad-Hoc network environment (무선 애드 혹 네트워크 환경에서 노드의 이동성을 고려하여 경로 안정성을 높인 향상된 AOMDV)

  • Park, Ran;Kim, Wu-Woan;Jang, Sang-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.216-219
    • /
    • 2012
  • In wireless ad-hoc networks, the nodes configuring a path act as routers with various mobility. If the path is broken by the movement of a node, a new path have to be found again. For this reason, the node with high mobility should be excluded from structuring a path as far as possible. In this paper, we propose an algorithm which excludes nodes with high mobility from constructing a path by collecting and managing the information of mobility. As the result, this can provide more stable paths. The proposed algorithm uses the extended AOMDV method. In this algorithm, we appends History Field and Decline Field in the routing table to collect and manage the mobility information. In addition, we add Mbl Field to RREP (Route Reply) message to apply the collected information to configure the real path.

  • PDF

An Efficient Cluster Routing Protocol Based on 2-level Tree for Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 에너지 효율적인 2-level 트리 기반의 클러스터 라우팅 프로토콜)

  • Lee, Young Joon;Kim, Sung Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.155-162
    • /
    • 2014
  • We proposed a 2 level tree based cluster based routing protocol for mobile ad hoc networks. it is our crucial goal to establish improved clustering's structure in order to extend average node life-time and elevate the average packet delivery ratio. Because of insufficient wireless resources and energy, the method to form and manage clusters is useful for increasing network stability. but cluster-head fulfills roles as a host and a router in clustering protocol of Ad hoc networks environment. Therefore energy exhaustion of cluster-head causes communication interruption phenomenon. Effective management of cluster-head is key-point which determines the entire network performance. The scheme focuses on improving the performance the life time of the network and throughput through the management of cluster-heads and its neighbor nodes. In simulation, we demonstrated that it would obtain averagely better 17% performance than LS2RP.

Development of Safety Climate Measuring Software Tool (안전문화측정 전산화 프로그램 개발)

  • Baek, Jong-Bae;Ko, Jae-Wook
    • Journal of Energy Engineering
    • /
    • v.18 no.1
    • /
    • pp.63-68
    • /
    • 2009
  • The safety culture of an organization is very complex and hard to study, but it is possible to examine norms that make up the culture. This paper describes of a Process Safety Management (PSM) climate assessment tool developed in high risk industry such as chemical industries. The main purpose is to develop measuring software tool behaviors by examining their nature and strength and by analysing underlying factors that offer explanations for attitudinal differences. We reviewed the current techniques and literatures available to assess safety climate and culture, conducted focus group interviews and discussions. Based on the reviews and focus group, PSM climate assessment questionnaires and an online application program were developed. A pilot assessment was done at a chemical plant in Korea and the safety climate profile was completed. It was suggested to have a constant feedback from different sectors of industry to improve the application.

Construction of Efficient Distributed Authentication Server without Additional Key Management (부가적인 키관리를 필요로 하지 않는 효율적인 분산 인증서버의 구축)

  • Hong, Seong-Min;Yoon, Hyun-Soo;Lee, Seung-Won;Park, Yon-Su;Cho, Yoo-Kun
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.175-186
    • /
    • 2000
  • Over the years, the extensive use of networks and distributed systems has increased the need for authentication and digital signatures. Inperforming authentication on a massive scale, authentication servers that use multiple workstations or PCs are more economical than servers that use one inicomputer or mainframe. However, the establishment of authentication servers with multiple platforms can cause some security problems and increases the cost of key management because all platforms within the server must have the private key of the authentication server. We propose a scheme which can solve these problems. The proposed scheme can establish a strong authentication server with no additional key management and improve the performance of the authentication server up to 13 times.

  • PDF

A Parallel Transmission Overlay Multicast Scheme for Massive Contents Delivery (대용량 콘텐츠 전송을 위한 병렬전송 오버레이 멀티캐스트)

  • Park, Jin-Hong;;Kim, Seon-Ho;Shin, Yong-Tae;Shin, Seok-Kyoo
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.593-602
    • /
    • 2005
  • Overlay multicast delivery method is a new approach in which multicast functionality is implemented at the end-hosts application layer in the timing of sparse deployment of IP multicast. However, existing overlay multicast protocols are not being standardization and many restrictions occur when delivering high capacity contents. Therefore, new delivery mechanism is required for the overlay multicast based high capacity contents delivery. In this paper. we separate group management and delivery management of overlay multicast and describe a capable group management. We also defined high speed delivery method better than that of existing overlay multicast through use of collaborated distribute downloading. This improved efficiency of massive contents transmission.

Algorithm and Data Structure for Improving of Operation Layer Performance in NETCONF Protocol (NETCONF 프로토콜의 오퍼레이션 계층 효율성 향상을 위한 자료 구조 및 알고리즘)

  • Lee, Yang-Min;Lee, Jae-Kee
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.10
    • /
    • pp.543-548
    • /
    • 2014
  • Modern network has a complex structure that includes diverse and heterogeneous equipments to cope with multi-purpose functions. For proper administration of networks with complex structures, NETCONF protocol has been proposed. It still, however, has a few unresolved issues with each layer of the protocol. Tackling one of the less attended issues of NETCONF, this article suggests a technique which can efficiently update the configuration data of network equipments when multiple administrators are present. Specifically, for efficient updates of the network equipment configuration, we propose to add a pre-examination of the data dependent to algorithm in 오퍼레이션 layer and modify the data structure for managing XML documents for changing the configurations of network equipments. We have implemented and experimented with our method and confirmed that our approach brought an significant overall performance improvement to NETCONF.

A Study on the Analysis of Authentication and ID-based key Management Protocol in Online Game Environment (온라인 게임 환경에서 인증 및 ID 기반 키 관리프로토콜 분석 연구)

  • Lee, Yang-Sun;Park, Sang-Oh
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.664-671
    • /
    • 2011
  • The development of IT technology and breakthrough of the network and the wired network, wireless network boundaries disappear and wired and wireless integrated service environment is the advent in online game environment. However, the wired and wireless integrated service environment appropriate security technology is still inactive, wired and wireless integration environment due to the characteristic as well as security threats wired network and security threats in wireless networks should be considered. Therefore, This wired and wireless integrated environment has been considering studied various, Among them wired and wireless environment considering the lightweight of ID-based authentication and key management has been in progress. In recent, Moon et al. pervasive environment in authentication and ID-based key management protocol is proposed. However, Moon et al.'s scheme is use the ID-based public-key approach to decreased the amount of computation. However, pairing by using a technique similar to the existing public key scheme can represent the amount of computation. Therefore, In this paper the way of Moon etc in security vulnerability analysis.

Performance Analysis of Cross-Layer Handoff Scheme in IP-Based Next-Generation Wireless Networks (IP기반 차세대 무선 네트워크에서의 교차계층 핸드오프 기법의 성능 분석)

  • Lee, JaeSuk;Jeong, Jongpil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.454-472
    • /
    • 2013
  • The development of wireless network technology and the increasing use of wireless networks to mobile users with a variety of wireless network systems has arisen. Wireless sensor networks, they can be nested together, and the need to switch between the network, depending on your needs. Next Generation Wireless Networks(NGWN) gives the mobile user a wide coverage and optimized service etc. Previous hand off management protocol is not enough to secure support of the NGWN application program. Cross-layer Handoff(CLH) protocol technique has been developed to support between and inside networks of handoff management of NGWN. CLH supports mobility management in a wireless network environment and also utilizes mobility speed and handoff signaling delay information to improve the handoff performance ability. For the analysis of handoff performance ability, we analyzed sensitivity of link layer and network layer, therefore, CLH technique is suggested based on this analysis.