• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.029 seconds

A Simulation Output Analysis Environment by utilizing Elastic Stack (Elastic Stack을 이용한 시뮬레이션 분석 환경 구성)

  • Hwang Bo, Seong Woo;Lee, Kang Sun;Kwon, Yong Jun
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.65-73
    • /
    • 2018
  • In this paper, we propose a simulation output analysis environment using Elastic Stack technology in order to reduce the complexity of the simulation analysis process. The proposed simulation output analysis environment automatically transfers simulation outputs to a centralized analysis server from a set of simulation execution resources, physically separated over a network, manages the collected simulation outputs in a fashion that further analysis tasks can be easily performed, and provides a connection to analysis and visualization services of Kibana in Elastic Stack. The proposed analysis environment provides scalability where a set of computation resources can be added on demand. We demonstrate how the proposed simulation output analysis environment can perform the simulation output analysis effectively with an example of spreading epidemic diseases, such as influenza and flu.

Interference Space Reuse and the Adoption Strategy through QoS Constraints in Three-Cell Downlink MIMO Interference Channels (3-Cell 하향링크 MIMO 간섭 채널에서의 간섭 공간 재활용 및 QoS Constraint에 따른 그 적용 방안)

  • Yoon, Jangho;Lee, Hwang Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1093-1105
    • /
    • 2012
  • We propose an interference space reuse (ISR) algorithm for the MU-MIMO design in 3-cell downlink interference channels. Also, we provide a strategy for the adoption of the ISR scheme in the cellular network. In the multicell interference channels, the cell edge users may undergo severe interferences and their signals should be protected from the interferers for reliable transmissions. However, the intra cell users do not only experience small interferences but also they require small transmission power for stable communication. We provide a vector design algorithm based on ISR, where intra cell users are served through reusing the cell edge users' interference space. The performance enhancement reaches 20% compared to the fractional frequency reuse (FFR) scheme combined with IA through the scheduling between the cell edge users and the intra cell users. Also, it can be used to enhance the cell edge throughput when the quality of service (QoS) requirements of the intra cell users are fixed.

How to Cope with Ransomware in the Healthcare Industry (의료산업에서의 랜섬웨어 대응 방법)

  • Jeon, In-seok;Kim, Dong-won;Han, Keun-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.155-165
    • /
    • 2018
  • As medical healthcare industry is growing up rapidly these days, providing various new healthcare service is considered carefully. Health information is considered to be more important than financial information; therefore, protecting health information becomes a very significant task. Ransomware is now targeting industry groups that have high information value. Especially, ransomware has grown in various ways since entering maturity in 2017. Healthcare industry is highly vulnerable to ransomeware since most healthcare organizations are configured in closed network with lack of malware protection. Only meeting the security criteria is not the solution. In the case of a successful attack, restoration process must be prepared to minimize damages as soon as possible. Ransomware is growing rapidly and becoming more complex that protection must be improved much faster. Based on ISO 27799 and 27002 standard, we extract and present security measures against advanced ransomware to maintain and manage healthcare system more effectively.

A Study on Improving the Fairness by Dropping Scheme of TCP over ATM (ATM상의 TCP 패킷 폐기정책에 따른 공정성 개선에 관한 연구)

  • Yuk, Dong-Cheol;Park, Seung-Seob
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3723-3731
    • /
    • 2000
  • Recently, the growth of applications and services over high-speed Internet increase, ATM networks as wide area back-bone has been a major solution. The conventional TCP suite is still the standard protocol used to support upper application on current Internet and uses a window based protocol for flow control in the transport layer. When TCP data uses the UBR service in ATM layer, the control method is also buffer management. If a cell is discarded in ATM layer. one whole packet of TCP will be lost. Which is responsible for most TCP performance degradation and do not offer sufficiently QoS. To solve this problem, Several dropping strategies, such as Tail Drop, EPD, PPO, SPD, FBA, have been proposed to improve the TCP performance over ATM. In this paper, to improve the TCP fairness of end to end, we propose a packet dropping scheme algorithm using two fixed threshold. Under similar condition, we compared our proposed scheme with other dropping strategies. Although the number of VC is increased, simulation results showed that the proposed scheme can allocate more fairly each VC than other schemes.

  • PDF

A Group Update Technique based on a Buffer Node to Store a Vehicle Location Information (차량 위치 정보 저장을 위한 버퍼 노드 기반 그룹 갱신 기법)

  • Jung, Young-Jin;Ryu, Keun-Ho
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.1-11
    • /
    • 2006
  • It is possible to track the moving vehicle as well as to develop the location based services actively according to the progress of wireless telecommunication and GPS, to the spread of network, and to the miniaturization of cellular phone. To provide these location based services, it is necessary for an index technique to store and search too much moving object data rapidly. However the existing indices require a lot of costs to insert the data because they store every position data into the index directly. To solve this problem in this paper, we propose a buffer node operation and design a GU-tree(Group Update tree). The proposed buffer node method reduces the input cost effectively since the operation stores the moving object location data in a group, the buffer node as the unit of a non-leaf node. hnd then we confirm the effect of the buffer node operation which reduces the insert cost and increase the search performance in a time slice query from the experiment to compare the operation with some existing indices. The proposed tufter node operation would be useful in the environment to update locations frequently such as a transportation vehicle management and a tour-guide system.

3D Coverage Analysis of LTE Network for UTM Services Considering Actual Terrain and Base Station Layouts (실제 지형과 기지국 배치를 고려한 UTM 통신을 위한 LTE 통신망 3차원 커버리지 분석)

  • Jang, Minseok;Kim, Daeho;Kim, Hee Wook;Jung, Young-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.2
    • /
    • pp.91-98
    • /
    • 2022
  • Unmanned aircraft system traffic management (UTM) service for the safe operation of unmanned aerial vehicles (UAV) such as drones using commercial communication networks such as long-term evolution (LTE) and 5G in low-altitude areas of 150m or less is being studied in several countries. In this paper, whether it is possible to secure three-dimensional (3D) coverage for UTM service using the existing LTE cellular network for terrestrial usersis analyzed through simulations. The practicality in the real environment is confirmed by performing performance analysis in the actual topographical environment and the LTE base station layouts in Korea. According to the analysis results, as the altitude increases, the number of line-of-sight (LOS) interference base stations increases, resulting in a worse signal to interference plus noise ratio (SINR), but coverage is secured except for the limited areas within 150m. was confirmed to be possible. In addition, it is confirmed that a significant proportion of outage areas could be reduced by placing a small number of additional base stations for the outage area.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.

A Study on the Security Threat Response in Smart Integrated Platforms (스마트 통합플랫폼 보안위협과 대응방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.129-134
    • /
    • 2022
  • A smart platform is defined as an evolved platform that realizes physical and virtual space into a hyper-connected environment by combining the existing platform and advanced IT technology. The hyper-connection that is the connection between information and information, infrastructure and infrastructure, infrastructure and information, or space and service, enables the realization and provision of high-quality services that significantly change the quality of life and environment of users. In addition, it is providing everyone with the effect of significantly improving the social safety net and personal health management level by implementing smart government and smart healthcare. A lot of information produced and consumed in these processes can act as a factor threatening the basic rights of the public and individuals by the informations themselves or through big data analysis. In particular, as the smart platform as a core function that forms the ecosystem of a smart city is naturally and continuously expanded, it faces a huge security burden in data processing and network operation. In this paper, platform components as core functions of smart city and appropriate security threats and countermeasures are studied.

A Field Case Report on Oral Health Education Applying Intervention Activities in Some Areas of Hongcheon-gun (홍천군 일부 지역의 중재 활동을 적용한 구강보건교육 사례보고)

  • Min-A Kim
    • Journal of agricultural medicine and community health
    • /
    • v.49 no.2
    • /
    • pp.121-131
    • /
    • 2024
  • Objective: This study is to design an intervention model for local residents to manage their oral health on their own. By establishing an autonomous participatory network without the intervention of external experts, it is possible to actively practice toothbrushing and use preventive services. Method: This is a case report study, and oral health education was conducted after interviews with 8 members of the Health Plus Village Committee in the N region of Hongcheon-gun and 156 residents of the senior center. Result: To foster oral health guardians in the community and to change behavior by actively sharing information and communicating with residents. It was confirmed that the Health Plus Village Committee was influential in spreading information, means, and interest about toothbrushing practices and preventive dental services to neighbors. Conclusion: In order to implement continuous resident-led oral health projects, resident-led village projects led by the Health Plus Village Committee should be activated through repeated empowerment education.

The Utilization of Big Data's Disaster Management in Korea (국내 재난관리 분야의 빅 데이터 활용 정책방안)

  • Shin, Dong-Hee;Kim, Yong-Moon
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.377-392
    • /
    • 2015
  • In today's data-driven society, we've been hearing a great deal about the power of Big Data over the last couple of years. At the same time, it has become the most important issue that the problems is caused by the data collection, management and utilization. Moreover, Big Data has a wide applications ranging from situation awareness, decision-making to the area to enable for the foreseeable future with man-made and analysis of data. It is necessary to process data into meaningful information given that the huge amount of structured and unstructured data being created in the private and the public sector, even in disaster management. This data should be public and private sector at the same time for the appropriate linkage analysis for effective disaster management. In this paper, we conducted a literature review and case study efficient Big Data to derive the revitalization of national disaster management. The study obtained data on the role and responsibility of the public sector and the private sector to leverage Big Data for promotion of national disaster management plan. Both public and private sectors should promote common development challenges related to the openness and sharing of Big Data, technology and expansion of infrastructure, legal and institutional maintenance. The implications of the finding were discussed.