• 제목/요약/키워드: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.039 seconds

Design and Implementation of ISO/IEEE 11073 DIM Transmission Structure Based on oneM2M for IoT Healthcare Service (사물인터넷 헬스케어 서비스를 위한 oneM2M기반 ISO/IEEE 11073 DIM 전송 구조 설계 및 구현)

  • Kim, Hyun Su;Chun, Seung Man;Chung, Yun Seok;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.3-11
    • /
    • 2016
  • In the environment of Internet of Things (IoT), IoT devices are limited by physical components such as power supply and memory, and also limited to their network performance in bandwidth, wireless channel, throughput, payload, etc. Despite these limitations, resources of IoT devices are shared with other IoT devices. Especially, remote management of the information of devices and patients are very important for the IoT healthcare service, moreover, providing the interoperability between the healthcare device and healthcare platform is essential. To meet these requirements, format of the message and the expressions for the data information and data transmission need to comply with suitable international standards for the IoT environment. However, the ISO/IEEE 11073 PHD (Personal Healthcare Device) standards, the existing international standards for the transmission of health informatics, does not consider the IoT environment, and therefore it is difficult to be applied for the IoT healthcare service. For this matter, we have designed and implemented the IoT healthcare system by applying the oneM2M, standards for the Internet of Things, and ISO/IEEE 11073 DIM (Domain Information Model), standards for the transmission of health informatics. For the implementation, the OM2M platform, which is based on the oneM2M standards, has been used. To evaluate the efficiency of transfer syntaxes between the healthcare device and OM2M platform, we have implemented comparative performance evaluation between HTTP and CoAP, and also between XML and JSON by comparing the packet size and number of packets in one transaction.

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery ($EFcHD^2$) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed $EFcHD^2$ method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of $EFcHD^2$ method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

Patch Type Body Temperature Measurement System for Ubiquitous Healthcare (U-헬스케어를 위한 패치형 체온 측정 시스템)

  • Kim, Hyun-Joong;Yang, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1628-1634
    • /
    • 2011
  • With the advancement of ubiquitous computing technology, u-Healthcare (i.e. ubiquitous health care), is regarded as a key application for information society, which provides health management service at anytime in anywhere. To implement U-Healthcare system, it is essential to monitor stable biological information in daily life. In this paper, we proposed a small size, light weight, patch type real time temperature monitoring system based on wireless sensor network (WSN) technology to monitor patients' body temperature without any inconvenience of activity.

Type based Access Control Model and Application of Rehabilitation Psychology Analysis System (재활심리분석시스템의 타입기반 접근제어 모델 및 응용)

  • Kim, Young-Soo;Kim, Jung-Dae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2082-2090
    • /
    • 2013
  • As rehabilitation psychology analysis system which manages examination information becoming more popular, interoperability, portability and security are becoming major concerns of modern computing. We propose a security model on the type information based access control system for rehabilitation psychology analysis that can enhance both security and availability by separating the functions delivered from object-oriented databases to solve these problems. We apply the access control model specifically to enhancement of security system and also perform a test to verify the security and availability of our model.

A License Audit Model for Secure DRM System in Home Network Environment (홈네트워크 환경에서의 안전한 DRM 시스템을 위한 라이센스 감사 모델)

  • Jang, Ui-Jin;Jung, Byung-Ok;Yeo, Sang-Soo;Shin, Yong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.438-447
    • /
    • 2009
  • Digital home devices aims at providing the multimedia service which is not limited at time and space in home network environment. However, it is incapable of the fair use of consumers who legally buys contents, and causes damage to the contents providers owing to the indiscriminate distribution and use of illegal contents. DRM system appeared to solve this problem cannot protect the license stored on digital home devices and manage license by redistribution. This paper proposes a license audit model which makes an inspection of illegal access, modification and redistribution and reports alert logs to server.

  • PDF

Design of Remote management System Using Mobile Agents (이동에이전트를 이용한 원격관리 시스템 설계)

  • Hong, Seong-Pyo;Song, Gi-Beom;Park, Chan-Mo;Lee, Joon;Oh, Moo-Song
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.368-371
    • /
    • 2000
  • The distributed object computing is possible to distributed computing on same or heterogeneous machine environment with growth of distributed computing and object-oriented technology. The typical of model, CORBA is int solved the interoperability in heterogeneous machine environment over the network But, the CORBA has a problem that the server is can't rely on request of client occurs network overhead by extinction of network A plan was on the rise to solve the problem that is combination of mobile agent and distributed computing technology.

  • PDF

Efficient Fault Tolerant Key Agreement for Ad-Hoc (Ad-Hoc 네트워크에서 링크 장애를 고려한 효율적인 키 협정 방법)

  • Lee, Young-Jun;Min, Sung-Gi;Lee, Sung-Jun
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.45-53
    • /
    • 2004
  • Ad-Hoc network is wireless network architecture without infrastructure. We encounter new types of security problems in Ad-Hoc networks because such networks have little or no support from infrastructure. Thus, wireless communications need security mechanisms in order to guarantee the integrity and the privacy of the communication, as well as the authentication of the entities involved. Many practical systems have been proposed. The most familiar system is the Diffie-Hellman key distribution system. This algorithm allows the establishment of a cryptographic secret key between two entities. If more than two users want to compute a common key, then a group key agreement system is used. This paper discusses several group key agreement systems and presents two efficient fault tolerant methods to perform successful group key agreement.

  • PDF

New Key Recovery System For IPSec(NKRS_IPSec) (IPSec을 위한 새로운 키 복구 시스템)

  • Kim, Jeong-Beom;Lee, Yun-Jeong;Park, Nam-Seop;Hyeon, Eun-Sil;Kim, Tai-Yun
    • Annual Conference of KIPS
    • /
    • 2001.04b
    • /
    • pp.693-696
    • /
    • 2001
  • 최근 네트워크 보안에 대한 사용이 증가하고 있다. 그러나 암호는 본래 가지고 있는 키 관리의 어려움 때문에 여러 가지 문제가 발생할 수 있다. 이러한 암호의 사용이 야기하는 역기능을 해소하고 순기능을 조장하기 위하여 키 복구 개념이 도입되었다. 이러한 키 복구 방법 중 본 논문에서는 캡슐화 방식을 사용한다. 하지만 이 방식에서의 문제점은 키 협상 부분에서 키 복구에 대한 부분도 협상해야 한다. 그렇기 때문에 복잡한 키 협상 자정이 더욱 복잡해지며 마찬가지 이유로 SPD(Security Policy Database) 역시 복잡해진다. 그리고 키 복구에 대한 정보를 정해진 시간을 주기로 계속 보내야 하기 때문에 네트워크 소스 역시 많이 소비된다. 이러한 점을 해결하고자 본 논문에서는 TOS(Type Of Service)의 4bit를 이용하여 한 번의 키 복구 정보를 보내고, 사용자가 이러한 서비스를 자신이 사용하고자 할 경우에만 선택할 수 있도록 함으로써 해결하였다.

  • PDF

A Hierarchical Multicast Based on Regional Registration approach with Mobile IPv4 (Mobile IPv4 지역 등록 기법을 기반으로 한 계층적 멀티캐스트)

  • Kim, Jeong-Ai;Kim, Tae-Soo;Lee, Kwang-Hui
    • Annual Conference of KIPS
    • /
    • 2003.11b
    • /
    • pp.883-886
    • /
    • 2003
  • 호스트의 위치를 동적으로 관리해야 하는 이동 통신망 환경에서 멀티캐스트 서비스 지원을 위하여 기존 고정 통신망 환경에서 사용되는 멀티캐스트 프로토콜의 사용은 부적합하다. 이동 호스트의 이동성을 보장하기 위하여 IETF에서는 원격 가입(remote subscription)과 양방향 터널링(bidirectional tunneling)을 제안하였다. 하지만, 이 방법들 또한 경로 비최적화 문제, 멀티캐스트 트리의 빈번한 재구성 등의 문제점을 가지고 있다. 본 논문에서는 Mobile IPv4 지역 등록 기법을 이용함으로써 이동 호스트의 이동 후 등록 절차에서 나타나는 지연을 줄였다. 그리고, 멀티캐스트 트리의 빈번한 재구성을 줄이기 위해서 로컬 네트워크의 GFA(gateway foreign agent)가 실제 트리에 가입한다. 그러므로 로컬 네트워크 내의 움직임은 트리 재구성에 영향을 미치지 않도록 하였다. 또한 이동 호스트는 이전 DFA에게 멀티캐스트 데이터를 포워딩 받을 수도 있고, 현재의 GFA가 직접 멀티캐스트 트리에 가입하여 데이터를 받을 수 있다. 이러한 기법들을 사용하여 경로 비최적화 문제를 해결하고, 트리 재구성 빈도를 줄일 수 있는 방안을 제시하였다.

  • PDF

A Fair Multicast Congestion Control Mechanism based on the Designated Server (지정된 서버를 이용한 공정한 멀티캐스트 혼잡제어 메커니즘)

  • Oh, Jae-Hwan;Kum, Jung-Hyun;Chung, Kwang-Sue;Kim, Hwa-Sung
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.233-241
    • /
    • 2002
  • In this paper, we proposed a new mechanism that solves the fairness problem between unicast traffic using the TCP and multicast traffic using the UDP, and satisfies the requirement of various receivers fairly in the Internet. The proposed mechanism decentralizes the load of blanket transmission rate control from sender to designated server, and uses the method that talc designated server intercepts the sender's data and controls the transmission rate suitable for it's local network. Therefore, the proposed mechanism not only provides multicast service by accurate estimation of the network status of each receiver, but also realizes both the inter-session fairness and the intra-session fairness problem.