• Title/Summary/Keyword: 네트워크 구간

Search Result 505, Processing Time 0.029 seconds

Status and Future of Security Techniques in the Internet Banking Service (인터넷 뱅킹 서비스 보안기술의 현황과 미래)

  • Lee, Kyungroul;Yim, Kangbin;Seo, Jungtaek
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.31-42
    • /
    • 2017
  • As Internet banking service became popular, many users can exchange goods by online. Even though this advantage, there are incident cases in the Internet banking service due to security threats. In order to counteract this problem, various security techniques have been applied over whole area in the Internet banking service. Therefore, we described that analyzed results of security techniques applied in the financial institutions area and network communication area in this paper. We consider that this paper will be useful as a reference to protect security threats occurred by insiders and vulnerabilities in implementation.

A Deterministic Transit Assignment Model for Intercity Rail Network (지역간 철도의 결정적 통행배정모형 구축 연구)

  • Kim, Kyoung-Tae;Rhee, Sung-Mo;Kwon, Yong-Seok
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.6
    • /
    • pp.550-561
    • /
    • 2008
  • The purpose of this paper is to propose a new transit assignment model for intercity rail networks. The characteristics of intercity rail are different from that of public transit in urban area. Line selection probability on route section is introduced to include the characteristics of intercity rail into transit assignment model. Network expansion is more simplified by a assumption line selection probability is externally given. The generalized cost is used to decide the volume of each transit line in most of existing transit assignment models. But, many variables have influence on the volume of each line such as time schedule of transit lines, inter-station distance, passengers' income, seasonal variation of demand and regional characteristics. The influence of these variables can be considered to decide the volume of each line by introducing line selection probability on route section. The tests on a small scale network show that the model proposed in this paper is superior to existing models for predicting intercity rail demand. Proposed model is suitable to consider the complicated fare structure of intercity rail and to draw inter-station demand directly as a result of assignment procedure.

Performance Evaluation of a Subcarrier Allocation Scheme with Inter-Cell Interference and Network Coding in OFDMA Relay Systems (OFDMA 중계 시스템에서 인접셀 간섭과 네트워크 코딩을 고려한 주파수 할당 기법의 성능 평가)

  • Jang, Woo Jin;Son, Se Ho;Hwang, Ho Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.54-56
    • /
    • 2013
  • A subcarrier allocation scheme for base station (BS), relay station (RS) and mobile station (MS) can affect the performance of orthogonal frequency division multiple access (OFDMA) relay systems. In this paper, we propose a subcarrier allocation scheme with inter-cell interference and network coding in OFDMA relay systems. In the network coding zone, we consider an environment where RS can transmit a frame to BS and MS simultaneously. We divide an OFDMA frame into downlink zone, uplink zone, and network coding zone. The proposed scheme allocates subcarriers to BS, RS, and MS for each zone with consideration of inter-cell interference in OFDMA relay systems. We evaluate the performance of the proposed subcarrier allocation scheme through simulation.

  • PDF

Enhanced TCP Congestion Control Mechanism for Networks with Large Bandwidth Delay Product (대역폭과 지연의 곱이 큰 네트워크를 위한 개선된 TCP 혼잡제어 메카니즘)

  • Park Tae-Joon;Lee Jae-Yong;Kim Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.3 s.345
    • /
    • pp.126-134
    • /
    • 2006
  • Traditional TCP implementations have the under-utilization problem in large bandwidth delay product networks especially during the startup phase. In this paper, we propose a delay-based congestion control(DCC) mechanism to solve the problem. DCC is subdivided into linear and exponential growth phases. When there is no queueing delay, the congestion window grows exponentially during the congestion avoidance period. Otherwise, it maintains linear increase of congestion window similar to the legacy TCP congestion avoidance algorithm. The exponential increase phase such as the slow-start period in the legacy TCP can cause serious performance degradation by packet losses in case the buffer size is insufficient for the bandwidth-delay product, even though there is sufficient bandwidth. Thus, the DCC uses the RTT(Round Trip Time) status and the estimated queue size to prevent packet losses due to excessive transmission during the exponential growth phase. The simulation results show that the DCC algorithm significantly improves the TCP startup time and the throughput performance of TCP in large bandwidth delay product networks.

An Efficient Smoothing Algorithm for VOD Server With Limited Network Bandwidth (제한된 네트워크 대역폭을 갖는 VOD 서버를 위한 효율적인 스무딩 알고리즘)

  • Lee Myoun-Jae;Park Do-Soon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.61-63
    • /
    • 2006
  • 스무딩은 가변 비트율로 저장된 비디오 데이터를 클라이언트로 전송할 때 일련의 고정 비트율로 전송할 수 있도록 전송 계획을 세우는 것이다. 이러한 스무딩 알고리즘들에는 CBA, MCBA, MVBA, PCRTT, e-PCRTT 알고리즘 등이 있다. 그러나 이 알고리즘들에서는 전송률 감소량의 최대화를 고려하지 않아서 새로운 구간에서 전송률의 감소가 요구되는 경우에 서버에서 제공할 수 있는 여분의 대역폭에 대한 효율적인 사용을 어렵게 할 수 있다. 따라서, 본 논문에서는 제한된 네트워크 대역폭을 갖는 VOD 서버에서 보다 많은 비디오 데이터를 서비스 할 수 있게 하기 위하여 새로운 구간의 전송률의 감소가 요구되는 경우에는 전송률 감소량을 최대로 하고 새로운 구간의 전송률의 증가가 요구되는 경우에는 전송률 증가량을 최소로 하는 스무딩 알고리즘을 제안하고 성능을 평가한다. 제안 알고리즘의 성능은 Final Four 비디오 소스를 이용하여 첨두 전송률, 전송률 변화 횟수, 평균 전송률 증가량, 평균 전송률 감소량을 비교 분석하였다.

  • PDF

A Study on Traffic Volume Prediction for e-Commerce Systems (전자상거래 시스템의 트래픽량 예측에 관한 연구)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.1
    • /
    • pp.31-44
    • /
    • 2011
  • The applicability of network-based computing depends on the availability of the underlying network bandwidth. Such a growing gap between the capacity of the backbone network and the end users' needs results in a serious bottleneck of the access network in between. As a result, ISP incurs disadvantages in their business. If this situation is known to ISP in advance, or if ISP is able to predict traffic volume end-to-end link high-load zone, ISP and end users would be able to decrease the gap for ISP service quality. In this paper, simulation tools, such as ACE, ADM, and Flow Analysis, were used to be able to perceive traffic volume prediction and end-to-end link high-load zone. In using these simulation tools, we were able to estimate sequential transaction in real-network for e-Commerce. We also imported virtual network environment estimated network data, and create background traffic. In a virtual network environment like this, we were able to find out simulation results for traffic volume prediction and end-to-end link high-load zone according to the increase in the number of users based on virtual network environment.

Performance Evaluation in Combination of Wired and Wireless Mesh Networks (메쉬 네트워크 기반의 유무선 통합망 성능 평가)

  • Han, Jin-Young;Jung, Hee-Dong;Im, Young-Bin;Lee, Jeong-Keun;Ryu, Ji-Ho;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.778-782
    • /
    • 2008
  • The performance in combination of wired and wireless mesh network which will be a main access network in future internet is directly linked with service quality to users. In this paper, we evaluate variant TCP performance and analyze traffic characteristics on Wireless (Seoul National University Mesh testbed) - Wired (KOREN/Abilene) - Wireless (HP Mesh testbed in the USA) Network. We found that RTT is proper in this network to serve a VoIP service. Also we propose an enhanced TCP protocol which can perform well in both wireless network which has many packet losses and wired network which has high bandwidth and long delay.

A Solution for Reducing Transmission Latency through Distributed Duty Cycling in Wireless Sensor Networks (무선 센서 네트워크에서 수신구간 분산 배치를 통한 전송지연 감소 방안)

  • Kim, Jun-Seok;Kwon, Young-Goo
    • 한국ITS학회:학술대회논문집
    • /
    • v.2007 no.10
    • /
    • pp.225-229
    • /
    • 2007
  • Recently, wireless sensor networks are deployed in various applications range from simple environment monitoring systems to complex systems, which generate large amount of information, like motion monitoring, military, and telematics systems. Although wireless sensor network nodes are operated with low-power 8bit processor to execute simple tasks like environment monitoring, the nodes in these complex systems have to execute more difficult tasks. Generally, MAC protocols for wireless sensor networks attempt to reduce the energy consumption using duty cycling mechanism which means the nodes periodically sleep and wake. However, in the duty cycling mechanism. a node should wait until the target node wakes and the sleep latency increases as the number of hops increases. This sleep latency can be serious problem in complex and sensitive systems which require high speed data transfer like military, wing of airplane, and telematics. In this paper, we propose a solution for reducing transmission latency through distributed duty cycling (DDC) in wireless sensor networks. The proposed algorithm is evaluated with real-deployment experiments using CC2420DBK and the experiment results show that the DDC algorithm reduces the transmission latency significantly and reduces also the energy consumption.

  • PDF

Design and Implementation of A Section-Specific QoE Frame for Efficient QoE Measurement (구간별 QoE 프레임을 이용한 QoE 네트워크 설계 및 구현)

  • Cho, Sungchol;Han, Li;Sun, Shimin;Jin, Xianshu;Liu, Jing;Han, Sunyoung
    • Journal of KIISE:Information Networking
    • /
    • v.41 no.4
    • /
    • pp.151-166
    • /
    • 2014
  • The present method of measuring QoE (Quality of Experience) was to measure the whole block from the server that provides service to the terminal that the client gets the service. In this way, it was possible to simply determine whether the quality of QoE was good or not, and when the quality of QoE became bad, there was no way of presenting solutions. Also, as QoE metrics are numerous, there has been no strict regulation on how to use. This study analyzed QoE metrics in the viewpoints of network and clients, subdivided the whole service into three phases including one from the server providing the service to the router, another from the router to the terminal getting the service, and the third from the service router to the client router, and presented QoE metric frames appropriate for each phase. Through this, in the KOREN-CERNET environment, this study designed and embodied QoE network and demonstrated stability of QoE network, reduction in client complaint settlement time, and content adjustment effect according to the network change.

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF