• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.028 seconds

The Study On Monitoring of Power Consumption and Breaking of Abnormal Power using Power Line Commnuncation Modem (전력선통신 모뎀을 이용한 전력소비감시 및 이상전력 차단해 관한 연구)

  • Yoon, Jae-Shik;Wee, Jung-Chul;Lim, Ja-Yong;Kim, Jae-Heon
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.279-280
    • /
    • 2009
  • 최근 경세성장과 함께 생활수준의 향상으로 인하여 에너지 수요는 매년 증가하고 있으며 그 중에서 하나인 전력수요도 역시 급격히 늘어나고 있는 추세이다. 이와 더불어 투자자원 및 입지확보의 어려움, 환경제약의 문제로 전력 공급의 어려움은 날로 증가되고 있다. 따라서 수요증가를 전력공급 능력의 증진뿐만 아니라 수요관리 측면에서도 필요성이 대두되고 있다. 전력선 통신은 전력선을 매체로 하기 때문에 신규선로의 포설 없이 가전기기 및 정보화 서비스 모뎀들의 네트워크화에 용이할 뿐만 아니라 커버리지 확장에도 뛰어나서 디지털 가전, 원격검침, 전력설비 감시제어, 국가 재난 감시 시스템 등의 기본 통신 방식으로 가장 유력한 기술로써 디지털 가전을 포함한 유비쿼터스 전기설비 네트워크 구성에서 필수적 기술로 채택되고 있기 때문에 지능형 홈 네트워크, 전력IT 부가서비스, 설비감시 네트워크, 유비쿼터스 네트워크 관련 기술에 대한 파급 효과가 매우 크며, 디지털 가전의 기본 통신 방식으로 가장 유력한 기술로써 디지털 가전 구성에서 필수적 기술로 채택되고 있기 때문에 지능형 홈 네트워크 관련 기술에 대한 파급 효과가 매우 크다. 본 연구에서는 전력선통신모뎀을 이용하여 가전기기의 전력 소비를 감지할 수 있는 센서를 내장한 전력선 통신기반의 전력 감시 모듈을 개발하여 실시간 원격 모니터링을 통해 소비전력 패턴을 작성한다. 그리고 전력감시 모듈에 연결된 가전기기의 소비전력 패턴 분석을 통해 전력소비 이상 유무를 감지할 수 있는 알고리즘을 개발, 탑재하여 이상유무를 판단하고 전력소비가 급증할 시 자동으로 전력을 차단하여 화재나 누전의 위험을 방지한다. 이에 본 연구는 전력선통신을 이용하여 전력소비감시 및 이상전력차단에 관한 연구에 관한 것이다.

  • PDF

VIMS: Design and Implementation of Virtual Network Integrated Control and Management Framework over National Research Network (연구망에서 가상네트워크 통합제어플랫폼 구현 및 실험)

  • Cho, Ilkwon;Kang, Sun-Moo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.10
    • /
    • pp.877-888
    • /
    • 2012
  • Network virtualization technology is a crucial research issue of Future Internet which pursues a service-oriented architecture so-called NaaS (Network as a Service) or SDN (Software Defined Network). Network virtualization is expected to play an important role in Future Internet researches as a network testbed technology which enables innovative protocols to be experimented independently on a common testbed environment. We propose a control framework in order to provide user defined topology and bandwidth services with network virtualization and to separate and manage multiple-user traffics in a small and medium scale - single domain research network. The proposed framework (VIMS; Virtual network Integrated control and Management System) supports testbed expansions without any changes of heterogeneous virtual network support equipments through accommodation of each equipment's control plane. The framework shows a feasibility through applied to KOREN and we describe the differences and further study directions for improvement the framework comparing with GENI control framework.

A Fuzzy-based Dynamic Method for Efficient Sharing Bandwidth in Local Physical Network (로컬 물리적 네트워크에서 효율적인 대역폭 공유를 위한 퍼지 기반의 동적 방법)

  • Ma, Linh-Van;Park, Sanghyun;Jang, Jong-hyun;Park, Jaehyung;Kim, Jinsul
    • Journal of Digital Contents Society
    • /
    • v.18 no.2
    • /
    • pp.411-422
    • /
    • 2017
  • Current policies for sharing bandwidth increase average throughput and improve utilization of the bandwidth in the local network. However, with these policies, a central administer, which is responsible for allocating bandwidth to each network flow, cannot allocate resources based on user characteristics. Thus, it leads to unfair bandwidth allocation because it does not guarantee services based on user characteristics. Therefore, we propose a novel negotiation method to share the bandwidth in a limited bandwidth network, in which, a user negotiates with other users to gain more resource. Ideally, we use a fuzzy system to infer and determine whether a device will request bandwidth or not based on the current usage of the given device. We conduct two experiments consisting of a video streaming simulation in OPNET and a real-time video streaming in WebRTC. The results of the experiment indicate that the proposed method can flexibly share the bandwidth utilization based on user's requirement in the network.

A study on Deep Q-Networks based Auto-scaling in NFV Environment (NFV 환경에서의 Deep Q-Networks 기반 오토 스케일링 기술 연구)

  • Lee, Do-Young;Yoo, Jae-Hyoung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.23 no.2
    • /
    • pp.1-10
    • /
    • 2020
  • Network Function Virtualization (NFV) is a key technology of 5G networks that has the advantage of enabling building and operating networks flexibly. However, NFV can complicate network management because it creates numerous virtual resources that should be managed. In NFV environments, service function chaining (SFC) composed of virtual network functions (VNFs) is widely used to apply a series of network functions to traffic. Therefore, it is required to dynamically allocate the right amount of computing resources or instances to SFC for meeting service requirements. In this paper, we propose Deep Q-Networks (DQN)-based auto-scaling to operate the appropriate number of VNF instances in SFC. The proposed approach not only resizes the number of VNF instances in SFC composed of multi-tier architecture but also selects a tier to be scaled in response to dynamic traffic forwarding through SFC.

A School Network Construction using the ESM System (ESM 시스템을 이용한 안정된 학내망 구축)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.1-7
    • /
    • 2005
  • Today, network is a fragile state in many threat attacks. Especially, the company serviced like internet or e-commerce is exposed to danger and targeted of attacker Therefore, it is realistic that the company use the security solution. It exist various security solution in our school network. For example, Firewall, IDS, VirusWall, VPN, etc. The administrator must manage various security solution. But it is inefficient. Therefore, we need the Management System to controll every security solution. In this paper, we deal with basic contents of security solution to manage the ESM and merits and demerits when use it. Also we suggest method that the Administrator can manage his network more efficiently and systematically by using the ESM in our school network.

  • PDF

Collaboration Framework based on Social Semantic Web for Cloud Systems (클라우드 시스템에서 소셜 시멘틱 웹 기반 협력 프레임 워크)

  • Mateo, Romeo Mark A.;Yang, Hyun-Ho;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.65-74
    • /
    • 2012
  • Cloud services are used for improving business. Moreover, customer relationship management(CRM) approaches use social networking as tools to enhance services to customers. However, most cloud systems do not support the semantic structures, and because of this, vital information from social network sites is still hard to process and use for business strategy. This paper proposes a collaboration framework based on social semantic web for cloud system. The proposed framework consists of components to support social semantic web to provide an efficient collaboration system for cloud consumers and service providers. The knowledge acquisition module extracts rules from data gathered by social agents and these rules are used for collaboration and business strategy. This paper showed the implementations of processing of social network site data in the proposed semantic model and pattern extraction which was used for the virtual grouping of cloud service providers for efficient collaboration.

A Study on Implementation of Authentication System for Home Networking Service (홈 네트워크 서비스를 위한 인증시스템 구현에 관한 연구)

  • Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1091-1098
    • /
    • 2009
  • In this paper, we designed the authentication system for home network service and applied it to actual sensor nodes. The pair-wise pre-distribution key skim is applied for prevention of authentication key from sniffing on the wireless sensor networks. The authentication key and data are encrypted by using the CBC mode RC5 algorithm based on the SPINS. The experimental environment consists of a base station (BS)and sensor nodes and each sensor node sends both sensing data and the encrypted authentication key to the BS. For simulations we set up some what-if scenarios of security menaces in home network service.Slightly modified the TOS_Msg data arrays of TinyOS is suggested to store 8-byte authentication key which can enable data encryption and authentication at the each sensor node. As a result, malfunction caused by communication between BS and nodes of other groups of added nodes having malicious purpose can be protected. Also, we confirmed that a critical data of home networking service like vital signal can be transmitted securely through this system by encryption technique.

DDoS Defense using Address Prefix-based Priority Service (Address Prefix에 기반한 우선 순위 서비스를 이용한 DDoS 방어)

  • Jin, Jinghe;Lee, Tai-Jin;Nam, Seung-Yeob
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.207-217
    • /
    • 2009
  • We propose a two-stage Distributed Denial of Service (DDoS) defense system, which can protect a given subnet by serving existing flows and new flows with a different priority based on IP history information. Denial of Service (DoS) usually occurs when the resource of a network node or link is limited and the demand of the users for that resource exceeds the capacity. The objective of the proposed defense system is to provide continued service to existing flows even in the presence of DDoS attacks. The proposed scheme can protect existing connections effectively with a smaller memory size by reducing the monitored IP address set through sampling and per-prefix history management. We evaluate the performance of the proposed scheme through simulation.

A Method of Device Matching based on UPnP for Service Automation in Cloud Computing Environment (클라우드 컴퓨팅환경에서 서비스 자동화를 위한 UPnP기반의 디바이스 매칭 방법)

  • Cui, Yun;Kim, Myoung-Jin;Lee, Han-Ku;Yoon, Hyo-Gun;Yin, Lei
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.446-449
    • /
    • 2011
  • 최근 이동통신, 초고속 인터넷 등 유무선 통신 네트워크 기술 발전에 따라서 정보가정기기 기반의 홈네트워크 서비스는 비약적인 발전을 하고 있다. 특히, 이기종기기간 QOS(Quality of Service)를 보장해줄 수 있는 UPnP(Universal Plug and Play) 기반 기술은 다양한 홈네트워크 서비스 개발에 적용되어지고 있다. 홈네트워크 환경 구축 시 이기종기기간 데이터 교환 및 서비스 전환을 위해서는 홈네트워크 상에 구성되어져 있는 모든 디바이스들을 등록, 연결, 삭제 할 수 있는 관리 기능은 매우 중요한 요소이다. 이에 본 논문에서는 홈네트워크 환경에서 모바일에이전트를 사용하여 자동적으로 디바이스를 탐색하고 상호 연결 할 수 있으며 UPnP 기기가 설치된 공간에서 이동형 서비스를 연속적으로 제공할 수 있는 자동화된 디바이스 매칭 방법을 제안하였다. 모바일에이전트는 홈네트워크 환경에 구성되어져 있는 UPnP Device를 주기적으로 검색하고 탐색하는 기능을 가지고 있다. 또한 Device간의 신뢰성 있는 서비스를 위해 모바일에이전트는 사용자의 Device와 서비스 Device의 연관성을 분석한다. 그리고 가장 유사도가 높은 Device에게 서비스를 연결하는 서비스로그 정보 링크 동작을 수행한다. 그럼으로써 사용자는 서로 다른 서비스 환경에서도 자신의 서비스를 시간, 공간의 제약 없이 연속적으로 제공받을 수 있다.

Design of Telematics POI Service Platform based on UPnP and GIS (UPnP와 GIS 기반 텔레매틱스 POI 서비스 플랫폼의 설계)

  • Jeon, Byoung-Chan;Byun, Hwan-Sik;Lee, Sang-Jeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.149-157
    • /
    • 2008
  • In this paper, a POI(Point-of-Interest) telematics service platform, in which detailed POI telematics services are discovered automatically and provided, is developed. The platform discovers services with UPnP middleware and provides a location-based service using GIS information. It is implemented by a telematics server, terminals, and service gateways and tested by applying test scenario for validation. Also, the response time and throughput of UPnP messages in the platform is measured and analyzed. The result shows that it has little impact on the service network congestion.

  • PDF