• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.027 seconds

A Data Sharing Algorithm of Micro Data Center in Distributed Cloud Networks (분산클라우드 환경에서 마이크로 데이터센터간 자료공유 알고리즘)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.63-68
    • /
    • 2015
  • Current ICT(Information & Communication Technology) infrastructures (Internet and server/client communication) are struggling for a wide variety of devices, services, and business and technology evolution. Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In the distributed cloud environments, management costs for the network and computing resources are solved fundamentally through the integrated management system. It can increase the cost savings to solve the traffic explosion problem of core network via a distributed Micro DC. However, traditional flooding methods may cause a lot of traffic due to transfer to all the neighbor DCs. Restricted Path Flooding algorithms have been proposed for this purpose. In large networks, there is still the disadvantage that may occur traffic. In this paper, we developed Lightweight Path Flooding algorithm to improve existing flooding algorithm using hop count restriction.

Development of Real time Aircraft harmful gas detecting Emebedded system through wireless sensor network (무선 센서 네트워크를 통한 실시간 항공기 유해가스 감지 임베디드 시스템 개발)

  • Choi, Won-Huyck;Jie, Min-Seok
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.672-678
    • /
    • 2013
  • In this paper, with the development of Information technology, application service between IT and traditional industry has been on the rise. And there are many on-going discussions actively regarding the Air quality system based on wireless sensor network which monitor and control the aircraft environment automatically and manually with the application service of detecting harmful gas. In this paper, operation program constitute the administrator monitoring device, which collects data from sensor node of wireless sensor network and sensor node and transmits environment information to display and server. Also for remote monitoring, user operation program constitutes based on PC/smartphone. Under this, the harmful gas which is made in aircraft life is measured. Real time monitoring system based on wireless sensor network is designed and realized.

Efficient Hop-based Access Control for Private Social Networks (소셜 네트워크에서 프라이버시를 보호하는 효율적인 거리기반 접근제어)

  • Jung, Sang-Im;Kim, Dong-Min;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.505-514
    • /
    • 2012
  • Because people usually establish their online social network based on their offline relationship, the social networks (i.e., the graph of friendship relationships) are often used to share contents. Mobile devices let it easier in these days, but it also increases the privacy risk such as access control of shared data and relationship exposure to untrusted server. To control the access on encrypted data and protect relationship from the server, M. Atallah et al. proposed a hop-based scheme in 2009. Their scheme assumed a distributed environment such as p2p, and each user in it shares encrypted data on their social network. On the other hand, it is very inefficient to keep their relationship private, so we propose an improved scheme. In this paper, among encrypted contents and relationships, some authenticated users can only access the data in distributed way. For this, we adopt 'circular-secure symmetric encryption' first. Proposed scheme guarantees the improved security and efficiency compared to the previous work.

A Measurement-based Quality Evaluation Scheme for Mobile VoIP Service over Wireless Broadband (WiBro) Networks (와이브로를 통한 모바일 VoIP 서비스의 측정 기반 품질 평가 방안)

  • Kim, Dong-Yon;Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.528-533
    • /
    • 2010
  • Currently the telephone service using Internet grows and the recent introduction of a smart phone is expected to accelerate the trend. In particular, considering the domestic situation that the wireless broadband (WiBro) system deployed over the nation, the telephone service over WiBro can be a solution toward its fast expansion. Unlike telephone service over a conventional telephone network or mobile network, however, internet telephone cannot guarantee it service quality, which can be severer in a wireless environment such as a WiBro network. Therefore, a more strict and systematic management for controlling the quality of internet telephone service over WiBro in a more efficient way. As the first step to establish the management system, this paper proposes a scheme to manage the quality of internet telephone service over WiBro and introduces a software developed for the purpose. The developed software is installed on a user terminal and facilitates efficient service quality management by measuring the quality of internet telephone service over WiBro in terms of VoIP metric, network metric, and wireless metric.

Efficient Intermediate Node mobility Management Technique in CCN Real-time Streaming Environment (CCN 실시간 스트리밍 환경에서 효율적인 중간노드 이동성 관리 기법)

  • Yoon-Young Kim;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1073-1080
    • /
    • 2023
  • The development and speed improvement of the Internet network, and the development of many platforms based on it, have brought about a rapid expansion of production and consumption of various contents. However, the existing IP-based Internet system cannot efficiently cope with such an urgent increase in data. Accordingly, an alternative called the CCN(Contents Centric Network) has emerged, enabling more efficient data transmission and reception centered on content rather than host. In this paper, we will deal with the mobility of intermediate nodes in CCN real-time streaming service, which is one of the major research fields of CCN, and minimize network overload through more efficient path switching through RSSI detection. In other words, by improving the method of selecting and switching a spare path when an intermediate node located between the requester(consumer) and the provider moves, a mechanism for managing data transmission is not interrupted and unnecessary load due to route switching does not occur in the network.

Flow Handover Management Scheme based on QoS in SDN Considering IoT (IoT를 고려한 SDN에서 QoS 기반 플로우 핸드오버 관리 방법)

  • Kyung, Yeun-Woong;Kim, Tae-Kook
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.45-50
    • /
    • 2020
  • In this paper, we propose a QoS-based handover management scheme in SDN. Even though there have been lots of recent services such as IoT, the conventional networks provide a monolitic handover method without considerations on flow-specific QoS features. For example, the conventional Internet provides a handover method which only considers IP continuity. On the other hand, 4G and 5G networks use a strict handover method for all kinds of flows with resource reservations. This means that it is difficult to guarantee the QoS requirements for the flow with a strict QoS requirement in Internet and the inefficient resource utilization can occur in the 4G and 5G because of the strict QoS-based handover management. The proposed scheme proposes the flow handover management scheme based on QoS requirements according to the SDN controller's management. From the network operators' perspective, the proposed scheme can provide the efficient resource utilization as well as QoS provisioning.

Designing a Path Management Method in Large-scale Multiple Sensor Networks (대규모 다중 센서 네트워크에서 효과적인 경로 관리 기법)

  • Lim, Yu-Jin;Park, Jae-Sung;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.205-212
    • /
    • 2008
  • In the environment with multiple heterogeneous wireless sensor networks with a single point of sensed data collection or a gateway (GW), relay points (RPs) may be required for the energy efficient delivery of sensed data from static or mobile sinks to the GW. The optimal placement of RPs becomes an even more difficult problem if static sinks are dynamically added or the trajectory of mobile sinks can not be known in advance. In order to resolve this problem, we propose a mechanism to deploy RPs in a grid pattern and to use the tree-based relaying network for reducing the cost of the RP and for reducing the control overhead incurred by the route setup from sinks to the GW. For the performance evaluation of our proposed mechanism, we have carried out a numerical analysis on a single route setup from a sink to the GW and, for more general performance evaluations, ns-2 based simulations have been carried out. According to the performance evaluation results, our tree-based relaying network mechanism outperforms that based on AODV in terms of the data delivery time, the network service time and the control overhead.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

Design and Comparative Performance Analysis of Fully Distributed Mobility Management Scheme on PMIPv6 (PMIPv6 기반의 완전 분산형 이동성 관리 기법의 설계 및 성능 비교 분석)

  • Lee, Han-Bin;Lee, Jong Hyup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.220-223
    • /
    • 2016
  • Explosive growth of smartphone-based mobile nodes has increased exponentially the mobile data traffic on the Internet. To reduce the traffic load on the network and to support the seamless mobility of the mobile nodes, the IETF and 3GPP have standardized a number of mobility management mechanisms. More recently, they are making an effort to find some schemes to distribute the networking systems that involve in the mobility management in order to assure the scalability and the reliability of the network. In IETF, DMM concept for the distributed mobility management on the Internet is being discussed. Specifically, the DMM can be classified into the partially distributed management and fully distributed management. In this paper, we propose a fully distributed mobility management scheme (FuDMM) on PMIPv6-based network by applying the extended NDP. We also present the performance of FuDMM using the comparative analysis with the existing ones.

  • PDF

Security Event Processing for Effective Security Situation Analysis (효과적 보안상황 분석을 위한 보안이벤트 처리)

  • Lee, S.H.;Bang, H.C.;Chang, B.H.;Na, J.C.
    • Electronics and Telecommunications Trends
    • /
    • v.22 no.1 s.103
    • /
    • pp.59-72
    • /
    • 2007
  • 기존의 사이버 공격은 특정 호스트나 서버를 목표로 하여 정보의 탈취 및 변경 등에 집중되었으나, 현재는 직접 혹은 간접적으로 과다 트래픽을 유발하여 네트워크 서비스를 마비시키는 방향으로 그 경향이 변하고 있다. 이런 사이버 공격을 방지하여 네트워크의 안정적인 서비스의 제공을 위해서는 해당 공격에 대한 적절한 대응을 수행하여야하며 이를 위해서는 관리 도메인 상에서 발생하는 보안 이벤트들을 분석하여 현재의 보안 상황에 대한 파악이 필수적으로 이루어져야 한다. 본 논문에서는 보안상황 분석을 위해 보안이벤트간 연관성 분석 기술에 대한 일반적 동향과 이벤트 연관성 분석의 특정 분야로써 현재 활발이 연구가 진행중인 이벤트의 시각화를 통한 보안상황 분석에 대한 연구 동향을 다루도록 한다.