• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.032 seconds

The method of Deciding PC Web Important Image for Mobile Web Service (모바일 웹 서비스를 위한 PC 웹에서의 중요 이미지 결정 방법)

  • Park, Dae-Hyuck;Hong, Maria;Seo, Jeong-Man;Lee, Keun-Soo;Lim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.63-69
    • /
    • 2006
  • There are many new studies on the contents for mobile devices that are all connected to networks in a seemingly ubiquitous environment. The purpose of this paper is to propose a framework for obtaining Internet content intended for computers on mobile devices. In other words, the primary concern of this paper is to select the best images for optimal performance and convert them into images that can be effectively reproduced on mobile devices. For this, the performance of the server is to be optimized through selecting high-priority images among the many available images and converting them while considering the display pixel rates (DPR) and the image distribution areas.

  • PDF

A Rendezvous Router Decision Algorithm Considering Routing Table Size (라우팅 테이블의 크기를 고려한 랑데부 라우터 선정 알고리즘)

  • Cho, Kee-Seong;Jang, Hee-Seon;Kim, Dong-Whee
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.905-912
    • /
    • 2006
  • Depending on the location of the rendezvous point (RP), the network efficiency is determined in the core based tree (CBT) or protocol independent multicast-sparse mode (PIM-5M) multicasting protocol to provide the multicast services based on the shared tree. In this paper, a new algorithm to allocate the RP using the estimated values of the total cost and the size(number of entries) of the routing tables is proposed for efficiently controlling the cost and the number of routing table entries. The numerical results show that the proposed algorithm reduces the total cost in 5.37%, and the size of routing tables in 13.35% as compared to the previous algorithm.

Study on Classification Scheme for Multilateral and Hierarchical Traffic Identification (다각적이고 계층적인 트래픽 분석을 위한 트래픽 분류 체계에 관한 연구)

  • Yoon, Sung-Ho;An, Hyun-Min;Kim, Myung-Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.47-56
    • /
    • 2014
  • Internet traffic has rapidly increased due to the supplying wireless devices and the appearance of various applications and services. By increasing internet traffic rapidly, the need of Internet traffic classification becomes important for the effective use of network resource. However, the traffic classification scheme is not much studied comparing to the study for classification method. This paper proposes novel classification scheme for multilateral and hierarchical traffic identification. The proposed scheme can support multilateral identification with 4 classification criteria such as service, application, protocol, and function. In addition, the proposed scheme can support hierarchical analysis based on roll-up and drill-down operation. We prove the applicability and advantages of the proposed scheme by applying it to real campus network traffic.

Client Authentication Scheme based on Infinitely Overlapped Hashchains on Hyperledger Fabric (Hyperledger Fabric을 이용한 중첩형 무한 해시체인 기반의 클라이언트 인증기법)

  • Shin, Dong Jin;Park, Chang Seop
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.3-10
    • /
    • 2018
  • Each online user should perform a separate registration and manage his ID and password for each online commerce or SNS service. Since a common secret is shared between the user and the SNS server, the server compromise induces the user privacy breach and financial loss. In this paper, it is considered that the user's authentication material is shared between multiple SNS servers for user authentication. A blockchain service architecture based on Hyperledger Fabric is proposed for each user to utilize an identical ID and OTP using the enhanced hash-chain-based OTP.

  • PDF

An Efficient MIPv4 Registration Protocol With Minimal Overheads Of AAA (AAA 오버헤드를 최소화한 효율적인 MIPv4 등록 프로토롤)

  • Kang Hyun-Sun;Park Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.43-52
    • /
    • 2005
  • MIPv4 supports node mobility, manages MN's binding list and provides seamless communication through registration protocol. Since the registration protocol usually operating in the wireless environment involves authenticating MNs, it is a general approach to introduce the AAA infrastructure as key distribution center for the purpose of authentication. In this paper, we propose an efficient registration protocol with lightweight AAA based on domain key. Proposed protocol also withstands various replay attacks, and provides non-repudiation service for the accounts of the usage of the network service.

A Model for the Distributed Firewall to Mitigate Distributed DoS Attacks (DDoS 공격 완화를 위한 분산 방화벽 모델)

  • Pang, Sechung;Lee, SeungHa;Kim, Yang-woo
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.1428-1431
    • /
    • 2009
  • 현재 사이버 공간에서 일어나고 있는 정보보호 위반사건들은 이미 실생활에 구체적인 악영향을 미치고 있고 이런 정보보호 관련 이슈사항에 대한 여러 보완 및 개선 방안이 제시되고 있다. 그런데 분산 서비스거부공격(DDoS)에 의한 피해규모는 나날이 커지는 반면에 인터넷의 구조적 특성으로 명확한 대응책보다는 조기탐지를 통해 사전에 대응함으로써 피해규모를 줄이거나 공격을 완화시켜 가용성을 확보하는 방법만 고안되고 있다. 그러나 우리는 공격을 완화시켜 주는 추가적인 고가의 네트워크 장비 구축 없이 기존 시스템을 활용한 분산 방화벽 모델을 제안한다. DDoS 공격이 이루어질 때 방화벽의 세션테이블과 간단한 관리기능을 그리드 컴퓨팅 기법 중 하나인 워크릿(worklet)으로 구성하여 방화벽 하위 웹 서버 군(group)에 배포시켜 각각의 웹 서버가 방화벽의 세션테이블 기능을 부분적으로 수행하는 것이다. 이렇게 함으로써 공격이 진행되는 중이라도 기존 구조에서는 할 수 없었던 정당한 인터넷 서비스 요청에 응답할 수 있어 가용성이 증대되는 효과를 얻을 수 있다.

A Study on the Development of Electronic Resource Management System in a University Library (대학도서관 전자자원관리시스템(ERMS) 구축에 관한 연구)

  • Kim, Yong;Cho, Su-Kyeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.249-276
    • /
    • 2010
  • With the rapid growth and development of information technology and the Internet, the amount of information published in electronic formats such as video, audio, digitalized text, etc. and the number of users accessing information online to satisfy their information needs are growing at a tremendous rate. This study analyzes standardized components to construct ERMS and proposes a model of ERMS based on the result of the analysis. The main functions of ERMS in university libraries are: 1) ERMS can manage and control access information to various electronic resources, metadata, holdings, user resources. Also, ERMS can be compatible with an existing library system such as IR(Information Retrieval) system, linking system, or proxy system. 2) ERMS should completely be compatible with acquisition and cataloging systems for effective management and control of integrated information organization and library budget. 3) ERMS should systematically and effectively manage license information on electronic resources. 4) ERMS should provide ideal and effective environment for use and access control of electronic resources in a library and integrated tool to manage and control all of electronic resources. Additionally, this study points out the need to organize committee groups to establish standardized rules and collaborative management of electronic resources among university libraries like DLF ERMI and redesign organizations in a library and a librarian's job description.

A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment (네트워크 보안 환경에서의 현장적용 중심 암호품질 만족도 평가 메트릭스 설계 프로세스)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.29-35
    • /
    • 2015
  • The network security encryption type is divided into two, one is point-to-point, second method is link type. The level of security quality attributes are a system security quality requirements in a networked environment. Quality attributes can be observed and should be able to be measured. If the quality requirements can be presented as exact figures, quality requirements are defined specifically setting quality objectives. Functional requirements in the quality attribute is a requirement for a service function which can be obtained through the encryption. Non-functional requirements are requirements of the service quality that can be obtained through the encryption. Encryption quality evaluation system proposed in this study is to derive functional requirements and non-functional requirements 2 groups. Of the calculating measure of the evaluation index in the same category, the associated indication of the quality measure of each surface should be created. The quality matrix uses 2-factor analysis of the evaluation for the associated surface quality measurements. The quality requirements are calculated based on two different functional requirements and non-functional requirements. The results are calculated by analyzing the trend of the average value assessment. When used this way, it is possible to configure the network security encryption based on quality management.

Improving the Performance of L3 Handover Mobility Management in Heterogeneous Wireless Network (이종 무선망에서 L3 핸드오버 이동성 관리 성능 향상)

  • Hong, Sung-Back;Lee, Kyeong-Ho;Kim, Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6B
    • /
    • pp.382-389
    • /
    • 2007
  • In this paper we report the development of mobility test bed, the realization of basic protocol that supports L3 mobility and the measurement of performance parameters that can affect handover performance. Previously proposed mobility management system, BBM (Break Before Make) method such as MIPV6 and Fast MIPV6, uses one interface in wireless network. In this method, to connect to new AP, it first disconnects existing AP and tries to connect to new AP. This can cause packet loss for the traffic vulnerable to delay such as VoIP. To provide seamless handover between different wireless networks, we propose MBB (Make Before Break) handover method having two network interfaces. Comparative study of previous method and proposed method on mobility and handover was conducted under simulated real environment on the test bed. Almost no packet loss was found with newly proposed method. In conclusion, it is shown that mobility protocol with proposed handover method can be applied to the application services sensitive to delay and packet loss.

Fast Micro-mobility Management Scheme without DAD Session in HMIPv6 Networks (계층적 Mobile IPv6 기반의 빠른 Micromobility 관리 프로토콜)

  • Lee, Sung-Kuen;Kim, Eal-Lae;Lim, Tae-Hyung;Jeong, Seok-Jong;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7A
    • /
    • pp.746-754
    • /
    • 2007
  • In this paper, we propose a fast handoff algorithm for micromobility management enhancement in HMIPv6 networks, which eliminates the DAD procedure involved in the regular HMIPv6 in order to o decrease handoff latency and increase the resource utilization efficiency. In the proposed scheme, the MAP is designed to guarantee the uniqueness of MN's interface identifier within a MAP domain as long as the MN moves in a MAP domain, so that the MN configures the new address without the DAD procedure resulting in the decreased handoff latency significantly When the MN resides in a subnet, MIPv6 is used adaptively as a mobility management protocol, which is to reduce bandwidth waste from the IP packet header overhead of IP-in-IP tunneling from the regular HMIPv6. We evaluate the performance of the proposed handoff micromobility algorithm in terms of handoff delay and packet loss thru computer simulation. Thru various computer simulation results, we verified the superior performance of the proposed scheme by comparing with the results of other schemes, MIPv6 and HMIPv6.