• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.035 seconds

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF

A Study on the API Gateway for human resources management modules extensions in ERP

  • Lee, Ji-Woon;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.79-88
    • /
    • 2021
  • In this paper, we propose a API Gateway technique for the expansion of human resource management module, one of the ERP functions. The institution has introduced ERP (Enterprise Resource Planning) based on its efforts to transform all human and physical resources into business competitiveness and its response to the digital knowledge informatization environment, and listed it as multiple success factors. Human resource management is one of the factors that have been dealt with. However, ERP's Human Resources Management Module remains in the role of functional personnel management. How to utilize human resources begins with navigating and recognizing human resources. The proposed API Gateway technique leverages blockchain networks to design and implement APIs for human resource sharing and navigation, including the possibility of extending ERP's human resource management module. Secondly, it was designed and implemented using a smart contract that behaves like an API for preventing information forgery. The proposed method will not only be used as a tool that can actively utilize human resources, but will also be a complete resource for utilizing big data technology.

HIMIPv6: An Efficient IP Mobility Management Protocol for Broadband Wireless Networks (HIMIPv6: 광대역 무선 통신 네트워크를 위한 효율적인 IP 이동성 관리 프로토콜)

  • Jeong Hyeon-Gu;Kim Young-Tak;Maeng Seung-Ryoul;Chae Young-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.291-302
    • /
    • 2006
  • With the increasing deployment of mobile devices and the advent of broadband wireless access systems such as WiBro, WiMAX, and HSDPA, an efficient IP mobility management protocol becomes one of the most important technical issues for the successful deployment of the broadband wireless data networking service. IETF has proposed the Mobile IPv6(MIPv6) as the basic mobilitymanagement protocol for IPv6 networks. To enhance the performance of the basic MIPv6, researchers have been actively working on HMIPv6 and FMIPv6 protocols. In this paper, we propose a new mobility management protocol, HIMIPv6 (Highly Integrated MIPv6), which tightly integrates the hierarchical mobility management mechanism of the HMIPv6 and the proactive handover support of the FMIPv6 to enhance the handover performance especially for the cellular networking environment with high frequent handover activities. We have performed extensive simulation study using ns-2 and the results show that the proposed HIMIPv6 outperforms MIPv6, FMIPv6 and HMIPv6 in terms of signaling overhead, service interruption and packet lost during handovers.

Design of Mobile Agent Management System based on OSGi (OSGi 기반 이동 에이전트 관리 시스템 설계)

  • Lee, Seung-Keun;Kim, In-Tae;Kim, Tae-Gan;Lee, Kyoung-Mo;Rim, Ki-Wook;Lee, Jung-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.41-48
    • /
    • 2005
  • OSGi(Open Service Gateway Initiative) offers a unique opportunity for pervasive computing as a potential framework for achieving interoperability between various sensors, home appliances, and networked devices. The OSGi framework supports a remote installation of a bundle, which is a unit that installs and deploys services. However, in order for the bundle in execution to migrate, a specific form of bundle such a mobile agent, is needed one which is able to move through a heterogeneous network. This paper proposes a method that can manage bundles like these dynamic agents, in order to ensure the mobility of entities in multiple OSGi framework environments. For our purposes, we have designed the mobile agent management system for managing the lifecycle and mobility of agents in the OSGi framework. The mobile agent management system we are proposing implements a bundle form which can perform in an OSGi framework as well as manage autonomous mobile services. As a result, mobility in a pervasive environment will be supported more efficiently.

An Efficient Location Cache Scheme for 3-level Database Architecture in PCS Networks (PCS 네트워크에서 3-레벨 데이터베이스 구조를 위한 효과적인 위치 캐시 기법)

  • Han, Youn-Hee;Song, Ui-Sung;Hwang, Chong-Sun;Jeong, Young-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.253-264
    • /
    • 2002
  • Recently, hierarchical architectures of databases for location management have been proposed in order to accommodate the increase in user population in future personal communication systems. In particular, a 3-level hierarchical database architecture is compatible with current cellular mobile systems. In the architecture, a newly developed additional databases, regional location database(RLR), are positioned between HLR and VLRs. We propose an efficient cache scheme, called the Double T-thresholds Location Cache Scheme. The cache scheme extends the existing T-threshold location cache scheme which is competent only under 2-level architecture of location databases currently adopted by IS-41 and GSM. The idea behind our scheme is to use two pieces of cache information, VLR and RLR serving called portables. The two pieces are required in order to exploit root only locality of registration area(RA) but also locality of regional registration area(RRA) which is the wide area covered by RLR. We also use two threshold values in order to determine whether the two pieces are obsolete. In order to model the RRA residence time, the branching Eralng-$\infty$ distribution is introduced. Our minute cost analysis shows that the double T-threshold location cache scheme yields significant reduction of network and database costs for molt patterns of portables.

Distributed Trust Management for Fog Based IoT Environment (포그 기반 IoT 환경의 분산 신뢰 관리 시스템)

  • Oh, Jungmin;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.731-751
    • /
    • 2021
  • The Internet of Things is a huge group of devices communicating each other and the interconnection of objects in the network is a basic requirement. Choosing a reliable device is critical because malicious devices can compromise networks and services. However, it is difficult to create a trust management model due to the mobility and resource constraints of IoT devices. For the centralized approach, there are issues of single point of failure and resource expansion and for the distributed approach, it allows to expand network without additional equipment by interconnecting each other, but it has limitations in data exchange and storage with limited resources and is difficult to ensure consistency. Recently, trust management models using fog nodes and blockchain have been proposed. However, blockchain has problems of low throughput and delay. Therefore, in this paper, a trust management model for selecting reliable devices in a fog-based IoT environment is proposed by applying IOTA, a blockchain technology for the Internet of Things. In this model, Directed Acyclic Graph-based ledger structure manages trust data without falsification and improves the low throughput and scalability problems of blockchain.

A Study on the Measurement Method of Cold Chain Service Quality Using Smart Contract of Blockchain (블록체인의 스마트계약을 이용한 콜드체인 서비스 품질 측정 방안에 대한 연구)

  • Kim, ChangHyun;Shin, KwangSup
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.1-18
    • /
    • 2019
  • Due to the great advances in e-Marketplace and changes in type of items purchased from the online market, it has been dramatically increased the demand of the storage and transportation under the special conditions such as restricted temperature. Especially, the cold chain needs the way to transparently measure and monitor the entire network in realtime because it has a very complicated structure and requires totally different criteria at the every different steps and items. In this research, it has been presented the performance evaluation metrics to make contract using service level agreement (SLA), the way to apply the smart contract based on blockchain, the structure of blocks, service platform and application in order to build cold chain which can prevent the risk factors by measuring and sharing information in realtime using block chain technology. In addition, we have proposed the way to store the measured performance and reputation of each player in the block using smart contract based on SLA. With the presented framework, all players including service providers as well as users can secure the information for making the rational decisions. When the service platform is actually built and operated, it seems possible to secure the information in transparently and realtime. Also, it is possible to prevent the risk factors or prepare the preemptive plans to react on them.

A study on the relevant market definition of online search advertising - Focusing on Naver, Korean Search & Portal service provider - (온라인검색광고시장의 시장획정에 관한 연구 - 검색포털사업자 네이버를 중심으로 -)

  • Cho, Dae-keun
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.109-119
    • /
    • 2017
  • This paper is to analyse empirically using the data collected from Korea portal Naver's ad management system and show online ad platform may not be two-sided market. It is aim of this study to propose the appropriate approach to define the market, based on the empirical result. Here are two research questions to be reviewed. First, is there any consistency between business model of search advertising and definition of two-sided market which Rochet-Tirole proposed in 2006? Second, do indirect network externalities exist significantly in search advertising market? if so, this study is going to estimate the level of it through empirical measurement. Based on Luchetta's paper which suggested that google may be one-sided market, it performed the correlation & regression analysis to prove his suggestion. The result is that online search advertising costs increased by more than 50 won when advertisers increased by one unit. However, there was no significant correlation and regression between the search frequency and online search advertising cost. It means that there is little possibility to identify two-sidedness in online search advertising service(market) because of no(or little) indirect network externalities which are a necessary condition for two-sided market. This result has three implications, such as the availability to adapt traditional market definition tools to online search advertising market, the possibility enhancement to find the fundamental competition elements in defined market and promotion of the powers of persuasion in competitive market reality. It is significant that the gap between legal scholars including regulatory practitioners and economists can be overcome to some extent. who have shown the different perspective on the two-sided market.

A Study on Application Plan LTE Wireless Network in the Container Terminal Yard (컨테이너터미널 장치장에서 무선네트워크 LTE 적용방안에 관한 연구)

  • Cha, Sang-Hyun;Noh, Chang-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.40 no.1
    • /
    • pp.43-50
    • /
    • 2016
  • Amid of the logistics hub center competition is going to intensifying between the world major port, it is essential to pre-occupied the base in the logistics hub world take advantage of advanced technology of logistics equipment than other ports. In existing container terminal, when container moves the terminal use the omnidirectional and directional antenna in order to exchange data information on the basis of 802.11 wireless network system. Case of loading height of exceeding, the blind sport will occur and a limited frequency channel can't help using in the area. A limited frequency channel usage and nested areas happen to use the closed terminal, it has a great influence to operate the terminal working. In this paper, LTE network is configured provided by the specified company ('L' Corp,.Ltd) and terminal data extracted through LBO (Local Breakout) in the cell site which is configured directly with container terminal operation server. Using this method, container terminal yard equipment operate without overlapping arises with uninterrupted data presented for ways to efficiently. I would suggest both the existing wireless AP LAN configuration of container terminal and new LTE system and applied to the real yard operating devices situations. Through these methods presented comparative the existing network traffic with new constructed LTE configuration. I admired to suggest that wireless network LTE introduction is fundamental factors to get rid of the blind spot, the problem of limited frequency channel and overlapping arises. These essential points can be a continual improving terminal services and more efficient terminal operational management.

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.