• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.033 seconds

Analyzing Technological Convergence for IoT Business Using Patent Co-classification Analysis and Text-mining (특허 동시분류분석과 텍스트마이닝을 활용한 사물인터넷 기술융합 분석)

  • Moon, Jinhee;Gwon, Uijun;Geum, Youngjung
    • Journal of Technology Innovation
    • /
    • v.25 no.3
    • /
    • pp.1-24
    • /
    • 2017
  • With the rise of internet of things (IoT), there have been several studies to analyze the technological trend and technological convergence. However, previous work have been relied on the qualitative work that investigate the IoT trend and implication for future business. In response, this study considers the patent information as the proxy measure of technology, and conducts a quantitative and analytic approach for analyzing technological convergence using patent co-classification analysis and text mining. First, this study investigate the characteristics of IoT business, and characterize IoT business into four dimensions: device, network, platform, and services. After this process, total 923 patent classes are classified into four types of IoT technology group. Since most of patent classes are classified into device technology, we developed a co-classification network for both device technology and all technologies. Patent keywords are also extracted and these keywords are also classified into four types: device, network, platform, and services. As a result, technologies for several IoT devices such as sensors, healthcare, and energy management are derived as a main convergence group for the device network. For the total IoT network, base network technology plays a key role to characterize technological convergence in the IoT network, mediating the technological convergence in each application area such as smart healthcare, smart home, and smart grid. This work is expected to effectively be utilized in the technology planning of IoT businesses.

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).

A Study on the International Research Trend in Education Development focused on Text Network Analysis(2002~2017) (교육개발협력에 관한 국제 학술지 연구 동향 고찰 : 텍스트 네트워크 분석을 중심으로(2002~2017))

  • Kim, Sang-Mi;Kim, Young-Hwan;Cho, Won-Gyeum
    • Korean Journal of Comparative Education
    • /
    • v.28 no.1
    • /
    • pp.1-24
    • /
    • 2018
  • The objective of the article is to find the research trends and the main traits presented in the keywords on abstracts of research articles of "International Journal of Education Development" from 2002 to 2017. To do this, Text Network Analysis(TNA) was applied targeting 966 papers on the journal and the major research outcomes are as follows. First, the frequency analysis on the keywords showed that the keywords like Administration of education program, Schools and instruction, Regional public administration, Educational support service, Elementary education, and Elementary and secondary school were analyzed more than 100 times and also high in centrality degree. Second, the analysis results of the keywords presented in those research articles by development goal periods showed that several new keywords like Elementary education, Elementary and secondary school, Education quality, Secondary education, Educational planning have emerged frequently after SDGs and these keywords showed high in their centrality analysis. Third, the analysis on education level showed that the keywords like Elementary education, Administration of education program, School children were high in frequency and centrality degree in Elementary level. In secondary level, Schools and instruction, Administration of education program, Academic achievement were high, and in high level, college and university was high, respectively.

Analysis on Targeting Countries for Overseas Expansion of Korean Companies: Focusing on The Difference between Shipping, Manufacturing and Logistics Companies (우리나라 기업의 해외진출 대상 국가에 관한 연구: 제조·물류 기업별 차이를 중심으로)

  • Kim, Sang Youl;Park, Ho;Jang, Hyunmi;Kim, Taehun
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.3087-3099
    • /
    • 2018
  • Due to the constant changes of companies' global networks, the expansion of global e-commerce as well as the market-oriented global supply chain management, global enterprises are strategically selecting and entering into viable countries able to become global footholds. Therefore, this study aims to scrutinize the trend of changes in the global networks of Korean companies by analyzing the current overseas countries over the past decade. From the analysis, it has been found that there is a significant difference in the priorities of targeting countries among shipping, manufacturing and logistics companies. Logistics companies preferred to enter Germany first while they attached to a lower priority to Singapore. Manufacturing companies had a lower priority to advance to India, while they preferred to advance to Mexico; however, shipping companies were analyzed to prefer to enter the US. In addition, all of these companies identified the importance of securing volume and network by entering overseas markets to achieve economies of scale and scope and to maintain global competitiveness. Joint overseas expansion of manufacturers with shipping and logistics companies can be recommended to facilitate the entry and thus, enhance global competitiveness and service capabilities and also secure new growth engines.

An Intelligent Land Vehicle Information System for CDMA-based Wireless Remote Diagnosis and Management (CDMA기반 무선 원격진단 및 관리를 위한 지능형 차량 정보 시스템)

  • Kim, Tae-Hwan;Lee, Seung-Il;Hong, Won-Kee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.2
    • /
    • pp.91-101
    • /
    • 2006
  • Researches on services of vehicles have been mainly focused on how to provide useful information and entertainment for an in-vehicle driver. However, the needs are appreciably increased for more advanced services that help drivers to check and manage their vehicles conveniently, without requiring drivers to attach to their vehicles. It is a sort of ubiquitous computing, providing an intelligent interactive services for human at any time and any where. In this paper, we present an intelligent vehicle information system to enable a driver to remotely diagnose and control a vehicle via CDMA communication network connected to the Internet. The system improves mobility for diagnosis and control of vehicle by implementing a cut and call back mechanism, which allows the vehicle terminal to have access to the information server on the Internet via CDMA call. No matter where the driver is, he can obtain the remote diagnosis and control services on the web browser without any additional application installation. Design methodology is introduced and evaluation results are analyzed for the CDMA-based intelligent vehicle information system. The experimental results show that the response time of the vehicle terminal to a web client request is 10.302 seconds at the beginning and 646.44ms thereafter. The average response time of CAN sensor node to a vehicle terminal request is 6.669ms.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

An Efficient Video Management Technique using Forward Timeline on Multimedia Local Server (전방향 시간 경계선을 활용한 멀티미디어 지역 서버에서의 효율적인 동영상 관리 기법)

  • Lee, Jun-Pyo;Woo, Soon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.147-153
    • /
    • 2011
  • In this paper, we present a new video management technique using forward timeline to efficiently store and delete the videos on a local server. The proposed method is based on capturing the changing preference of the videos according to recentness, frequency, and playback length of the requested videos. For this purpose, we utilize the forward timeline which represents the time area within a number of predefined intervals. The local server periodically measures time popularity and request segment of all videos. Based on the measured data, time popularity and request segment, the local server calculates the mean time popularity and mean request segment of a video using forward timeline. Using mean time popularity and mean request segment of video, we estimate the ranking and allocated storage space of a video. The ranking represents the priority of deletion when the storage area of local server is running out of space and the allocated storage space means the maximum size of storage space to be allocated to a video. In addition, we propose an efficient storage space partitioning technique in order to stably store videos and present a time based free-up storage space technique using the expected variation of video data in order for avoiding the overflow on a local server in advance. The simulation results show that the proposed method performs better than other methods in terms of hit rate and number of deletion. Therefore, our video management technique for local server provides the lowest user start-up latency and the highest bandwidth saving significantly.

Implementation of a Remote Patient Monitoring System using Mobile Phones (모바일 폰을 이용한 원격 환자 관리 시스템의 구현)

  • Park, Hung-Bog;Seo, Jung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1167-1174
    • /
    • 2009
  • In the monitoring of a patient in a sickroom, not only the physiologic and environmental data of the patient, which is automatically measured, but also the clinical data(clinical chart)of the patient, which is drew up by a doctor or nurse, are recognized as important data. However, since in the current environment of a sickroom, clinical data is collected being divided from the data that is automatically measured, the two data are used without an effective integration. This is because the integration of the two data is difficult due to their different collection times, which leads the reconstruction of clinical data to be remarkably uncertain. In order to solve these problems, a method to synchronize the continuous environmental data of a sickroom and clinical data is appearing as an important measure. In addition, the increase of use of small machines and the development of solutions based on wireless communications provide a communication platform to the developers of health care. Thus, this paper realizes a remote system for taking care of patients based on a web that uses mobile phones. That is, clinical data made by a nurse or doctor and the environmental data of a sick room comes to be collected by a collection module through a wireless sensor network. An observer can see clinical data and the environmental data of a sickroom through his/her mobile phone, integrating and storing his/her data into the database. Families of a patient can see clinical data made by hospital and the environment of the sick room of the patent through their computers or mobile phones outside the hospital. Through the system,hospital can provide better medical services to patients and their families.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

A Study on the Types and Causes of Defects in Apartment Housing Information and Communication Work (공동주택 정보통신공사 하자 유형 및 원인에 관한 연구)

  • Park, Hyun Jung;Jeong, U Jin;Park, Jae Woo;Kang, Sang Hun;Kim, Dae Young
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.3
    • /
    • pp.231-239
    • /
    • 2021
  • Entering the era of the fourth industrial revolution, information and communication technologies such as CCTV, home network systems and equipment are being used in the construction industry. In particular, in order to increase the autonomy of information and communication technologies in apartments, the government has announced an administrative revision of information and communication-related laws, and companies are focusing on developing technologies such as smart home services. In addition, most domestic and foreign studies on the information and communication work were mainly conducted on technology and management. However there is a lack of research on physical defects affecting the quality of ICT. Therefore, this study collected the defect data registered in the project management system of three domestic construction companies and classified them according to the standards of the Enforcement Decree of the Apartment House Management Act. According to the analysis of the frequency of defects work type, 88.10% of defects occurred in home network equipment work. In addition, analysis of defects type in the four detailed works showed the highest number of operation error. The cause was analyzed and prevention measures and countermeasures were presented in parts of design, construction, and maintenance. The results of this study will improve the quality of apartment housing and be used as basic data for future research on practical defect minimization and prevention measures.