• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.028 seconds

Sustainable Urban Regeneration and Smart Water Management (지속가능한 도시재생과 스마트 물 관리)

  • Lee, Yoo Kyung;Lee, Seung Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.86-86
    • /
    • 2018
  • 본 연구는 한국의 도시재생과 스마트 물 관리의 정책 분석을 위하여 도시재생과 스마트 물 관리의 등장 배경, 주요 현안 및 연계성을 모색하고 도시재생방안으로서 스마트 물 관리체계의 가능성을 검토하는 것을 목적으로 한다. 1950년대의 도시재건(Urban Reconstruction)과 1970~80년대의 도시재개발(Urban Renewal, Urban Redevelopment) 등의 정비 사업은 물리적 환경정비에 초점을 맞추었다. 그러나 1990년대 환경문제가 세계적 이슈로 등장하면서 교외지역 난개발 문제에 대한 대응책이 필요하게 되었고 도시의 물리 환경적, 산업 경제적, 사회 문화적 측면을 부흥시키는 도시재생 접근법이 출현하였다. 한국 정부는 2017년부터 시작한 '도시재생 뉴딜사업'의 일환으로 스마트 기술을 적용한 도시재생사업을 통해 스마트도시 선도국가 도약과 세계적 흐름에 부합하는 도시성장을 기대하고 있다. 1980년대 초 등장한 스마트 기술은 2000년대 들어와 스마트 도시, 스마트 인프라, 스마트 그리드 등의 분야로 확대, 진보하였다. 물 분야의 스마트 기술은 2009년 스마트워터그리드 이니셔티브(Smart Water Grid Initiative)의 발족과 함께 IBM, CISCO, Intel 등의 IT 기반 물 관리 워킹그룹 형성, Suez, Veolia, Siemens 등 수처리 기업의 스마트워터그리드 분야 진출 모색과 함께 발전하기 시작하였다. 이후 2012년 유엔 스마트 물 관리 포커스 그룹(ITU-T SG 5)의 스마트 물 관리 표준화 연구가 착수되었고 한국은 국토교통부 건설교통기술 연구 개발사업 중 하나로 스마트 물 관리 장기 연구 사업을 시작하였다. 스마트 물 관리는 수자원 및 상하수도 관리의 효율성 제고를 위하여 스마트 미터, 센서, 디지털지도제작 등 ICT를 이용한 차세대 물 관리시스템이라고 정의할 수 있다. 구체적인 대상 분야를 고려한다면 하천수, 우수, 지하수, 하폐수처리수, 해수담수 등 다양한 수자원의 관리, 물의 생산과 수송, 사용한 물의 처리 및 재이용 등 물 관리 전 분야를 포함한다. 그러나 스마트 물 관리의 용어와 개념을 처음으로 도입한 미국 등 선진국과 관련기업들은 스마트 물 관리를 '스마트 워터 미터, 센서, 첨단 모델링, 수문 지도제작, 스마트 관개농업, 자동화 로봇 등 다양한 기술을 통합적으로 운영하는 지능적인 수자원 관리를 위한 정보네트워크'로 정의한다. 일찍이 도시재생으로의 패러다임 전환을 실시한 영국 및 일본과 달리 한국의 도시재생은 개념, 구성요소, 범위, 사업방식 등의 여러 가지 측면에서 아직 형성단계에 있다. 또한 한국의 스마트 물 관리 논의는 개념정립 측면에서 심층적 논의가 거의 부재하였다. 기존의 논의들은 수자원 혹은 상하수도서비스 분야에서의 연구결과와 기술개발성과를 기계적으로 적용하고 확대하는 측면만을 부각시켰다. 그러나 이와 같은 스마트 물 관리에 대한 논의는 정보통신기술과 물 관리 서비스를 단편적으로 연결하고 적용범위를 제한할 수도 있다는 점에서 한계성이 있다. 본 연구는 국내외 문헌검토를 바탕으로 한국의 도시재생과 스마트 물 관리의 정책을 분석하고 지금까지 별개로 간주된 두 개념의 장점을 융합하여 향후 지속가능한 도시개발 사업으로서의 가능성을 검토하고자 한다.

  • PDF

Security Threats Analysis for Network-based Mobile IPv6 (네트워크 기반 Mobile IPv6 보안 취약점 분석)

  • Kim, Hyun-Gon;Seo, Jae-Hyeon;Oh, Byeong-Kyun;Ahn, Tae-Nam;Kim, Jin-Hyung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.137-147
    • /
    • 2007
  • In the host-based Mobile IPv6, a mobile node is responsible for doing the signaling to its home agent to enable session continuity as it moves between subnets. To remove the mobile node's signalling processing load, the network-based Mobile IPv6 has been proposed recently. It allows session continuity for a mobile node without its involvement in mobility management. The proxy mobility agent in the network performs the signaling and does the mobility management on behalf of the mobile node. However, to make secure communications for a mobile node, security mechanisms against diverse attacks should be adopted. To do this, first of all security threats to the network-based Mobile IPv6 should be also identified and analyzed. Potential attack objectives may be to consume network services at the cost of a legitimate mobile node and, eavesdropping and fabrication of user traffic through interception of a mobile node's communications. This paper identifies and discusses security threats to the network-based Mobile IPv6 in details. The results of threats analysis are limited to threats that are peculiar to the network-based Mobile IPv6 except threats to IPv6 in general.

IBN-based: AI-driven Multi-Domain e2e Network Orchestration Approach (IBN 기반: AI 기반 멀티 도메인 네트워크 슬라이싱 접근법)

  • Khan, Talha Ahmed;Muhammad, Afaq;Abbas, Khizar;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.23 no.2
    • /
    • pp.29-41
    • /
    • 2020
  • Networks are growing faster than ever before causing a multi-domain complexity. The diversity, variety and dynamic nature of network traffic and services require enhanced orchestration and management approaches. While many standard orchestrators and network operators are resulting in an increase of complexity for handling E2E slice orchestration. Besides, there are multiple domains involved in E2E slice orchestration including access, edge, transport and core network each having their specific challenges. Hence, handling of multi-domain, multi-platform and multi-operator based networking environments manually requires specified experts and using this approach it is impossible to handle the dynamic changes in the network at runtime. Also, the manual approaches towards handling such complexity is always error-prone and tedious. Hence, this work proposes an automated and abstracted solution for handling E2E slice orchestration using an intent-based approach. It abstracts the domains from the operators and enable them to provide their orchestration intention in the form of high-level intents. Besides, it actively monitors the orchestrated resources and based on current monitoring stats using the machine learning it predicts future utilization of resources for updating the system states. Resulting in a closed-loop automated E2E network orchestration and management system.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.

HFN-Based Right Management for IoT Health Data Sharing (IoT 헬스 데이터 공유를 위한 HFN 기반 권한 관리)

  • Kim, Mi-sun;Park, Yongsuk;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.88-98
    • /
    • 2021
  • As blockchain technology has emerged as a security issue for IoT, technology which integrates block chain into IoT is being studied. In this paper is a research concerning token-based IoT service access control technology for data sharing, which propose a possessor focused data sharing technic by using the permissioned blockchain. To share IoT health data, a Hyperledger Fabric Network consisting of three organizations was designed to provide a way to share data by applying different access control policies centered on device owners for different services. In the proposed system, the device owner issues access control tokens with different security levels applied to the participants in the organization, and the token issue information is shared through the distributed ledger of the HFN. In IoT, it is possible to lightweight the access control processing of IoT devices by granting tokens to service requesters who request access to data. Furthmore, by sharing token issuance information among network participants using HFN, the integrity of the token is guaranteed and all network participants can trust the token. The device owners can trust that their data is being used within their authorized rights, and control the collection and use of data.

Design and Implementation of IoT based Urination Management System (사물인터넷 기반의 배뇨관리 시스템 설계 및 구현)

  • Lee, Hak-Jai;Lee, Kyung-Hoon;Kim, Young-Min
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.209-218
    • /
    • 2017
  • Healthcare services can be provided through a number of independent service platforms for measurement of vital signs, diagnosis and prevention of diseases, and Information and communication technology(ICT) such as internet and mobile are converged to provide health information to users at anytime and anywhere, and it is in the center of the IoT(Internet of things). Accordingly, in this paper, we designed IoT based urination management system and evaluate the performance. A low - power Zigbee network was constructed for the configuration of the urination management system. The implemented capacitive diaper sensor was operable for the duration of 2,000 hours. We also built a database server using Raspberry Pi, a tiny embedded device, and stored the collected data to verify the data through an Android-based mobile application. The proposed urination management system can be utilized not only for the older patients, but also for the infants.

Design of Intrusion Responsible System For Enterprise Security Management (통합보안 관리를 위한 침입대응 시스템 설계)

  • Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.51-56
    • /
    • 2005
  • Service operating management to keep stable and effective environment according as user increase and network environment of the Internet become complex gradually and requirements of offered service and user become various is felt constraint gradually. To solve this problem, invasion confrontation system through proposed this log analysis can be consisted as search of log file that is XML's advantage storing log file by XML form is easy and fast, and can have advantage log files of system analyze unification and manages according to structure anger of data. Also, created log file by Internet Protocol Address sort by do log and by Port number sort do log, invasion type sort log file and comparative analysis created in other invasion feeler system because change sort to various form such as do log by do logarithm, feeler time possible.

  • PDF

Schemes for Managing Semantic Web Data in Ubiquitous Environment (유비쿼터스 환경을 고려한 시맨틱 웹 데이터 관리 기법 연구)

  • Kim, Youn-Hee;Kim, Jee-Hyun
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One important issue to generalize the ubiquitous paradigm is the development of user-centralized and intelligent ubiquitous computing systems. Sharing knowledge and correct communication between users and devices are needed to be aware of continuous changed context information and infer services for which users are suited. The goal of this paper is to describe and manage effectively the meaning of services or data which each device offers for interaction between users and devices based on semantic relationships and reasoning. In this paper, we represent semantic data using OWL and design a ubiquitous based intelligent system. We propose some index structures and strategies to process queries classified by each subsystem and adopt labeling schemes to identify classes and resources in the semantic data. We can find devices which satisfies various user's requests exactly and quickly using the proposed strategies.

  • PDF

A Study on CSFs in the 4th Industrial Revolution (제4차 산업혁명의 성공요인에 관한 연구)

  • Sung, Tae kyung
    • Journal of Service Research and Studies
    • /
    • v.10 no.1
    • /
    • pp.69-83
    • /
    • 2020
  • The purposes of this study is to identify the critical success factors for the 4th industrial revolution through literature review and to empirically evaluate the validity of these factors through questionnaires from executives engaging in the industries of the 4th industrial revolution. Literature review identifies leadership, change management, top management support, strategic fit, training, empowerment, teamwork, organizational culture, communication, and project management as ten critical success factors, Questionnaires were administered to CIOs and CEOs in the industries belong to the 4th industrial revolution. Response rate was 64.4% which shows quite high participation. Respondents rated strategic fit as the most important factor, followed by top management support, leadership, change management, project management, teamwork, communication, training, organizational culture, and empowerment. To successfully pursue the 4th industrial revolution, the followings are recommended. (1) detailed and refined execution strategy, (2) establishment of effective network among government, public companies, research institutes, universities, and industries, (3) strategic and long-term plan, (4) differentiated execution strategy from other countries and global cooperation system.

Big Data Management Scheme using Property Information based on Cluster Group in adopt to Hadoop Environment (하둡 환경에 적합한 클러스터 그룹 기반 속성 정보를 이용한 빅 데이터 관리 기법)

  • Han, Kun-Hee;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.235-242
    • /
    • 2015
  • Social network technology has been increasing interest in the big data service and development. However, the data stored in the distributed server and not on the central server technology is easy enough to find and extract. In this paper, we propose a big data management techniques to minimize the processing time of information you want from the content server and the management server that provides big data services. The proposed method is to link the in-group data, classified data and groups according to the type, feature, characteristic of big data and the attribute information applied to a hash chain. Further, the data generated to extract the stored data in the distributed server to record time for improving the data index information processing speed of the data classification of the multi-attribute information imparted to the data. As experimental result, The average seek time of the data through the number of cluster groups was increased an average of 14.6% and the data processing time through the number of keywords was reduced an average of 13%.