• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.038 seconds

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.

Development of User Interface and Blog based on Probabilistic Model for Life Log Sharing and Management (라이프 로그 공유 및 관리를 위한 확률모델 기반 사용자 인터폐이스 및 블로그 개발)

  • Lee, Jin-Hyung;Noh, Hyun-Yong;Oh, Se-Won;Hwang, Keum-Sung;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.5
    • /
    • pp.380-384
    • /
    • 2009
  • The log data collected on a mobile device contain diverse and continuous information about the user. From the log data, the location, pictures, running functions and services of the user can be obtained. It has interested in the research inferring the contexts and understanding the everyday-life of mobile users. In this paper, we have studied the methods for real-time collection of log data from mobile devices, analysis of the data, map based visualization and effective management of the personal everyday-life information. We have developed an application for sharing the contexts. The proposed application infers the personal contexts with Bayesian network probabilistic model. In the experiments, we confirm that the usability of visualization and information sharing functions based on the real world log data.

3S: Scalable, Secure and Seamless Inter-Domain Mobility Management Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 3S를 고려한 도메인간 이동성관리 기법)

  • Kang, Min;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.99-114
    • /
    • 2012
  • Proxy Mobile IPv6 (PMIPv6) has received considerable attention between telecommunications and the Internet communities and does not require active participation of the Mobile Node (MN) by way of network-based mobility management. The PMIPv6 domain is studying establishment in progress to support extensively a number of MN by using a low handover latency. In this research, we are propose a novel 3S scheme for building Scalable and Secure and Seamless PMIPv6 domains. In the proposed scheme, all of Mobility Access Gateway (MAG) are acting as the Local Mobility Anchor (LMA) and composing a virtual ring with another MAG. General hashing is used in the efficient distribution-mapping between each MN and the MN's LMA of all MAGs. And, MAG and MN are authenticated using the symmetric key. Through mathematical analysis, we verifies the safety, scalability, and seamless service for 3S. Also, we're propose a handover procedure of 3S and show better than the existing schemes in terms of handover latency.

An enhanced VS/VD switching algorithm to support fairly ABR service in ATM (ATM 망에서 공정한 ABR 서비스를 제공하는 확장된 VS/VD 스위칭 알고리즘)

  • 양해권;전광탁
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.2
    • /
    • pp.313-322
    • /
    • 2000
  • The ATM Forum has been focusing on flow control mechanism for ABR traffic management. The goal of this activity is to efficiently manage the leftover network bandwidth and fairly distribute it among contending ABR VC so that communication links can be optimally utilized. ABR traffic is difficult to predict traffic shape because it has bursts and variable behavior. Also it's sensitive to lose but not to delay. This behavior makes difficult to UPC function in network and cause of congestion in switch, thus performance is degraded. To resolve this problem, various flow control mechanism has been worked in the ATM Forum. Especially, the rate-based flow control mechanism for ABR traffic has been standardized in the ATM Forum, Sept. 1994. Thus, various flow control mechanism has been working which likes EFCI, ER, VS/VD. VS/VD control is superior than existed ER control because it isolate different networks from each other. In this paper, we propose an expanded VS/VD flow control algorithm and compare with existed VS/VD flow control algorithm. Simulation result shows that this algorithm improve a problem in aspect of delay and fairness.

  • PDF

Development of Signature Generation and Update System for Application-level Traffic Classification (응용 레벨 트래픽 분류를 위한 시그니쳐 생성 및 갱신 시스템 개발)

  • Park, Jun-Sang;Park, Jin-Wan;Yoon, Sung-Ho;Lee, Hyun-Shin;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.99-108
    • /
    • 2010
  • The traffic classification is a preliminary but essentialstep for stable network service provision and efficient network resource management. While various classification methods have been introduced in literature, the payload signature-based classification is accepted to give the highest performance in terms of accuracy, completeness, and practicality. However, the collection and maintenance of up-to-date signatures is very difficult and time consuming process to cope with the dynamics of Internet traffic over time. In this paper, We propose an automatic payload signature generation mechanism which reduces the time for signature generation and increases the granularity of signatures. Furthermore, We describe a signature update system to keep the latest signatures over time. By experiments with our campus network traffic we proved the feasibility of our mechanism.

The Effective Application Management Using Characteristics of Tizen Wearable Platform (타이젠 웨어러블 플랫폼의 특성을 이용한 효율적인 어플리케이션 관리)

  • Ham, Dong-eup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.318-321
    • /
    • 2017
  • Most of wearable platforms(i. e. Samsung Gear, Android Wear) are using most of Tizen mobile platform features without any changes. However wearable devices have unique characteristics due to wearable type, small battery, screen shape, poor network and relative short but frequent user interfaces. In general, a wearable device has a process to be paired with the mobile device, which includes capability exchange that includes information such as device model name, network capability (3G, LTE, Wi-Fi and so on), manufacturer and supported languages. In other word, a wearable device depends heavily on the companion device (i. e. phone, tablet), so wearable platform should consider this. In this paper, we provide the effective application management mechanism using these characteristics of wearable platform to enhance user experience and to reduce sluggish of wearable platform.

  • PDF

Healthcare Application based on Radio Frequency (무선 통신 기반의 헬스케어 어플리케이션)

  • Seo, Jung-hee;Park, Hung-bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.899-902
    • /
    • 2009
  • As computer network and wireless technology continue to grow rapidly, a wide range of remote application has been applied to medical field such as remote medical consulting and remote patient monitoring. This research aims to design RF telecommunication-based healthcare application to collect and manage patient's physiological data, and describe the overall procedure of experiment. MySQL database is designed to record patient's physiological data including temperature, blood pressure and heart rate and save information about medical behaviors such as doctor's prescription for patients. Therefore, users approved by healthcare application can query patient's data and collected data can be used to reorganize data for clinical test. As a result, temperature and humidity of patient's room which must be checked frequently can be processed automatically through ubiquitous sensor network. The information entered from mobile phones or web is saved in database, ensuring systematical management through computer. Moreover, patient's family members can easily access hospital data, improving their experience with medical service.

  • PDF

Trend Analysis of Foreign Academic Libraries' Development Plan (해외 대학도서관 발전계획 동향 분석)

  • Ye Jin Choi;Chohae Kim;Jee Yeon Lee
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.3
    • /
    • pp.163-196
    • /
    • 2023
  • The academic library development plan has external importance as it explicitly declares the library's role and development direction. Internally, it is also a library service guideline. To develop the development plan, libraries must understand the trends and needs of international, national, and affiliating universities and their constituents. Accordingly, this research includes case, content, and network analyses of foreign academic libraries' development plans to identify the trends. The analysis results show most foreign academic libraries employed various strategies and plans, which can be characterized as 'collaboration,' 'collection development,' and 'research support.' Consequently, we propose the following factors to consider when developing an academic library development plan: specification of mission, vision, and core values; recognition of core values such as diversity, equity, and inclusion; awareness of the significance of collaboration and partnership with other units within the universities and external organizations; and utilization of university library development plans as tools for achieving management objectives.

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

OSI Network Management of CORBA-based using Object Web (Object Web을 이용한 CORBA기반의 OSI 망관리)

  • 김강석;송왕철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.1
    • /
    • pp.163-173
    • /
    • 1999
  • The CORBA provides a object-oriented middleware that lets applications extend their range across networks, languages, component boundaries, and operating systems. Java can provide a potable object that works in any operating system. Mapping Java into CORBA helps large scale information system operate through the Web by using the mobile code property of Java and object component technique of CORBA. This development environment is called the Object Web. This paper proposes an architecture of OSI network management with a CORBA manager using Object Web and an CORBA/CMIS gateway which apply a CMIS-level gateway model to gateway. In this architecture, CORBA manager is based on Object Web and can manage MOs in the OSI domain. The gateway has a role to translate CORBA IDLs into CMIS services and vice versa. In addition, an OSI agent is abstracted into a CORBA agent.

  • PDF