• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.034 seconds

A Method of Implementation for Integrated Aeronautical Data Management Network Using SWIM Architecture (SWIM 구조를 이용한 항공데이터 종합관리망 구축 방안)

  • Kim, Jin-Wook;Jo, Yun-Hyun;Kim, Sang-Uk;Yoon, In-Seop;Choi, Sang-Bang;Chung, Jae Hak;Park, Hyo-Dal
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.6
    • /
    • pp.44-53
    • /
    • 2013
  • Ongoing SWIM(System Wide Information Management) with the United States and European countries as the center is a part of the ASBU(Aviation System Block Upgrade) program improved performance of aeronautical data system in the International Civil Aviation Organization and a core technology of Integrated Aeronautical Data Management Network to elevate service through digitally aeronautical information management. Therefore, in this paper, we analyze SWIM architecture and network applied the concept of SOA(Service Oriented Architecture), and propose methods of implementation transforming applications operating established legacy aeronautical data system into integrated aeronautical data management network through adapter technology. This will allow development of middleware and application suitable for the next generation infrastructure network environment for efficient ATM(Air Traffic Management)and provide timely required information for users.

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.

A Study of the Intelligent Researcher Connection Network Build-up that Merges the Recommendation System and Social Network (추천시스템과 소셜 네트워크를 융합한 지능형 연구자연결망 구축)

  • Lee, Choong-Moo;Lee, Sang-Gi;Lee, Byeong-Seop
    • Journal of Information Management
    • /
    • v.40 no.1
    • /
    • pp.199-215
    • /
    • 2009
  • The web 2.0 concept rapidly spreads to the various field which is based on an opening, the participation, and a share. And the research about the recommendation system, that is the personalize feature, and social network is very active. In the case of the recommendation system and social network, it had been developing in the respectively different area and the new research toward the service model of a form that it fuses these is insignificant. In this paper, I'm going to introduce efficient social network which is called the researcher connection network. It is possible to recommend the researcher intellectually who studies the similar field by analyzing the usage log and user profile. Through this study, we could solved the network expandability problem which is due to the user passive participation and the difficulty of the initial network construction that is the conventional social network problem.

Process Algebra Based Formal Method for SDN Application Verification (SDN 응용 검증을 위한 프로세스 알지브라 기반 정형 기법)

  • Shin, Myung-Ki;Yi, Jong-Hwa;Choi, Yunchul;Lee, Jihyun;Lee, Seung-Ik;Kang, Miyoung;Kwak, Hee Hwan;Choi, Jin-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.387-396
    • /
    • 2014
  • Recently, there have been continuous efforts and progresses regarding the research on diverse network control and management platforms for SDN (Software Defined Networking). SDN is defined as a new technology to enable service providers/network operators easily to control and manage their networks by writing a simple application program. In SDN, incomplete or malicious programmable entities could cause break-down of underlying networks shared by heterogeneous devices and stake-holders. In this sense, any misunderstanding or diverse interpretations should be completely avoided. This paper proposes a new framework for SDN application verification and a prototype based on the formal method, especially with process algebra called pACSR which is an extended version of Algebra of Communicating Shared Resources (ACSR).

MAP Load Control and Route Optimization in HMIPv6 (HMIPv6에서의 MAP의 부하 제어 및 경로 최적화)

  • Nam, Sung-Hyun;Lee, Kyung-Geun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.12
    • /
    • pp.120-127
    • /
    • 2008
  • HMIPv6 draws lots of attentions in recent years for providing an efficient handover and reducing the signaling overhead. HMIPv6 employs MAP(Mobility Anchor Point) in order to minimize a signaling overhead and a local mobility management. MAP completes an efficient mobility management in HMIPv6 network environment with frequent handover. However, HMIPv6 causes load concentration at a paricular MAP and may have unnecessary latency between HN(Mobile Node) and CN(Correspondent Node) within the same network. A MAP may also disturb the route optimization in HMIPv6 network because all packets must be transmitted through a MAP. In this paper, we propose a scheme to optimize the route in HMIPv6 networks according to MAP load. We configure a threshold in order to support the better service into MAP domain. The packets do not pass through MAP and are directly transmitted to AR(Access Router) if the number of current MNs attached to the MAP exceed the desired threshold. We simulate the performance of the proposed scheme and compare with HMIPv6. Resultly, the proposed scheme reduces signaling costs and mitigates concentration of a paticular MAP as well.

Resource Management Scheme for Improvement of Reliability and Connectivity in wireless USB System (무선 USB 시스템에서 신뢰성과 연결성 향상을 위한 자원 관리 기법)

  • Kim, Jin-Woo;Jeong, Min-A;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1159-1166
    • /
    • 2014
  • In this paper, a resource management scheme for enhancing the network connectivity and reliability in wireless USB system is proposed. Wireless USB protocol is suitable for the application that supports the real-time multimedia service in Ship Area Network since it supports high speed data transfer. However, the device's mobility is caused the dramatic change of link state and network topology, and is occurred the degradation of network performance. Therefore, a resource management scheme for wireless USB system is proposed in this paper. The proposed technique can intelligently treat the change of link state, and solve the degradation of network performance. The simulation results show that proposed protocol can enhance the throughput and delay performance by selecting relay device with better link state.

Design and Implementation of UCC Metadata Manager for Social Collaborative Service (소셜 협업 서비스를 위한 UCC 메타데이터 매니저 설계 및 구현)

  • Oh, Jung-Min;Song, Ju-Hong;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.1-10
    • /
    • 2011
  • Social network service is defined as an online service or communication service based on social relations among people applied the concept of social network. Social collaborative service included in social network service is characterized by the new value of modified content or recreated content made through collaborative creation process between members of the group. It has the remarkable merits such as sharing and collaboration. But, at the same time, it has the latent problems such as content reuse or copy that is not allowed for members to use. It has been emerged that UCC which is a typical example of recreated or modified content has the copyright issues in both creation and publishing step. To resolve this matter, we don't have many appropriate methods except CCL so far. So, in this paper, we define the problem and implement the UCC metadata manager to control metadata reflecting the feature of UCC. We draw the reference metadata element to identify original content utilized re-creation process. After that we define the R.Metadata Loader module based on the use case. Finally, the proposed UCC metadata manager provides the information of referenced content and lets us to identify the relationship between reference contents. So as to implement prototype, we use Kaltura which is CMS using open source and obtain functional extensibility of metadata manager by using open API.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

A Study on the Ethernet Network protection switching mechanism for DAS (배전자동화시스템의 Ethernet Network 보호절체 메커니즘 연구)

  • Yu, Nam-Cheol;Lee, Sung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.745-747
    • /
    • 2011
  • 확장성과 유용성 그리고 간편성과 가격 효율성 측면에서 발전을 거듭하고 있는 이더넷은 가장 광범위한 커버리지를 확장해 가고 있으며 최근 전력시스템에도 그 적용성을 넓히고 있다. 또한 이미 표준화가 이루어진 기술과 많은 사용자로 인한 기술적 이해도가 높고 쉽게 구현할 수 있다는 점에서 최근 스마트그리드의 표준 인터페이스와 네트워크 표준으로 활발한 연구가 진행 중이다. 그러나 모든 통신망이 그러하겠지만 특히 이더넷 통신망의 경우 안정적인 동작과 중단 없는 서비스를 통하여 통신망의 효율성을 극대화하기 위해서는 통신망의 고장이나 성능의 저하에 대응하기 위한 관리방안이 필요하다고 하겠다. 따라서 논문에서는 이더넷 기반 링형 네트워크에서의 보호절체 메커니즘과 배전자동화 시스템에 대한 적용을 위한 다양한 적용기술에 대해 기술하고자 한다.

  • PDF

Fast Handovers for Hierarchical Mobile IPv6 (계층적 Mobile IPv6에서 Fast Handover의 지원)

  • 이준섭;정희영;김성한;고석주;민재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.447-449
    • /
    • 2003
  • 최근 공중 무선랜 서비스와 같이 IP 기반의 액세스 망을 사용하는 네트워크 환경이 증가하고, IP를 기반으로 하는 차세대 네트워크 환경이 대두됨에 따라 IP 기반의 이동성 관리 기술의 필요성이 증가하고 있다. IP 기반의 이동성 지원을 위해 MIPv6 프로토콜이 제시되었으며, MIPv6의 핸드오버 성능을 개선하기 위한 여러 가지 확장 프로토콜이 제시되고 있다 대표적으로 계층적인 구조에서 지역 이동성을 지원하는 MAP을 도입함으로써 바인딩 갱신에 소요되는 지연 시간을 줄이는 HMIPv6와 새로운 망에서 사용될 주소를 미리 생성하고 라우터들 간의 터널을 통해 패킷을 전달함으로써 패킷 손실을 줄이는 FMIPv6이 제시되었다. 이 두 가지 프로토콜을 결합함으로써 보다 우수한 핸드오버 성능을 제공할 수 있을 것이다. 그러나 단순한 두 프로토콜의 결합은 패킷의 전달 경로를 복잡하게 하는 단점이 있다. 본 논문에서는 HMIPv6와 FMIPv6을 결합할 때 발생하는 복잡한 경로를 단순화하는 F-HMIPv6 프로토콜을 제안한다.

  • PDF