• Title/Summary/Keyword: 네트워크 구간

Search Result 505, Processing Time 0.028 seconds

Method on DTN Performance Acceleration and Packet Loss Minimization for Transfer Efficiency Maximizing (전송효율성 극대화를 위한 DTN 성능 가속 및 병목구간 패킷손실 최소화 방안)

  • Park, Jong-Seon;Noh, Min-Ki
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.37-43
    • /
    • 2018
  • Science DMZ is a network architecture that considers complicated network components such as dedicated network, DTN, and minimum security policy to maximize transfer efficiency. And DTN tuning is an essential component to take full advantage of Science DMZ's available bandwidth. In addition, tuning of network system should be performed concurrently to minimize packet loss due to network bottleneck. In this paper, we propose a tuning method of data transfer node and network system for maximizing transfer efficiency in Science DMZ network architecture. As a result of the performance measurement using the KREONET, the network performance after the DTN tuning shows 180% improvement than that of existing method without DTN tuning. In addition, performance of 9.4Gb/s was shown without loss of performance measurement after tuning network system applying shaping policy.

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

BCC Based Mobile WIMAX Initial Network Entry with Improved Security (보안성이 강화된 타원곡선 암호 기반의 Mobile WIMAX 초기 진입 구간)

  • Choi, Do-Hyun;Park, Jung-Oh;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1305-1314
    • /
    • 2011
  • Initial entry section has vulnerability which exposes plain text parameter in Mobile WIMAX environment which is the 4th generation technology. Each node message need to be encrypted to prevent the third party attack or message leakage. In this paper, we propose Mobile WIMAX initial entry section encryption using Elliptic Curve Cryptosystem. We have compared proposed model with existing model using OPNET simulator tool. He delay rate has increased little bit in initial entry section than before after the comparison, but it has shown more effective in average delay and throughput than encryption applied other existing model.

Study of Multimedia Contents Search and Streaming Service in P2P Environment (P2P 환경에서 멀티미디어 콘텐츠 검색과 스트리밍에 관한 연구)

  • Lee, Ji-Hyun;Lee, Kwang-Min;Cho, Sang-Yeon;Han, Kwang-Rok
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.731-738
    • /
    • 2007
  • 본 논문에서는 P2P 환경에서 사용자간에 멀티미디어 콘텐츠를 공유하는 목적의 시스템 구현에 초점을 맞추어 P2P 네트워크에서 피어들 간에 멀티미디어 콘텐츠를 공유하고 구간정보를 이용하여 효율적으로 스트리밍 하는 방법에 대하여 논한다. 피어들은 멀티미디어 콘텐츠의 관심 있는 부분만을 쉽고 편리하게 추출하려는 경향이 있기 때문에 멀티미디어 콘텐츠에서 구간정보를 색인한 파일을 만들어 검색서버에 등록한 후 피어들의 요청이 있을 때 이 구간정보를 이용하여 필요한 부분만을 스트리밍 서비스 할 수 있도록 한다. 많은 피어들의 서버 접속으로 인한 서버의 부하를 줄이기 위해 P2P 환경에서의 스트리밍 기술을 이용하여 피어의 PC가 필요에 따라 서버 기능을 할 수 있도록 기능을 구현하고, 검색서버에서 제공되는 구간정보에 따라 해당하는 피어가 구간별로 멀티미디어 콘텐츠를 스트리밍 한다.

  • PDF

Design of Bottleneck detection and analysis System on Web-base (Web 기반 bottleneck 구간 탐지 및 분석 시스템의 설계)

  • Sung, Yun-Gook;Cho, Kang-Hong;Choi, Young-Su;Chung, Jin-Wook
    • Annual Conference of KIPS
    • /
    • 2000.10a
    • /
    • pp.681-684
    • /
    • 2000
  • 본 논문은 Client & Server 모델을 기반으로 선로 이용률과 응답시간을 분석, 조합하여 웹 상에서 해당 목적지 경로 사이에 있을 수 있는 bottleneck 구간을 탐지하기 위한 시스템을 설계하였다. 이를 위해 traceroute를 이용하여 사용자와 해당 목적지 경로 사이의 인터페이스들을 추적하였다. 추적된 인터페이스들의 IP로 TCP/IP 표준 네트워크 망 관리 프로토콜인 SNMP Polling을 하여 인터페이스로부터 각종 MIB 정보들을 가져와 각 인터페이스간의 선로 이용률을 분석해냈으며, 또한 정확한 bottleneck 구간을 알아내고자 각 라우터로 ping을 실행시켜 응답시간을 계산하였다. 이렇게 얻은 선로 이용률과 응답시간으로 보다 정확한 트래픽 정보와 bottleneck 구간을 분석해낼 수 있었다. 이러한 분석 시스템으로 인해 사용자들은 전문적인 지식 없이 단지 자신의 컴퓨터의 웹브라우저를 통한 서버 분석 시스템 접속만으로도 해당 구간의 어떤 부분이 bottleneck 구간인지를 탐지, 분석할 수 있을 것이다.

  • PDF

Sampling time-based Adaptive Beacon Interval and Superframe Duration Control in IEEE 802.15.4 (IEEE 802.15.4에 있어서 샘플링 주기를 이용한 비콘 구간 및 슈퍼프레임 구간의 적응적 제어방법)

  • Kim, Jeong-Ah;Jeon, Yeong-Ho;Park, Hong-Seong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1A
    • /
    • pp.75-82
    • /
    • 2007
  • This paper proposes the way that reduces power consumption of the IEEE 802.15.4-based sensor network. To reduce power consumption, we consider following two schemes; first scheme is the Adaptive Beacon Interval Control. The next is the Adaptive Superframe Duration Control. Our results show that these guarantee reducing power consumption in ns-2 simulator.

Exploring the Suicide Phenomena in Korea Using News Big Data Analysis (뉴스 빅데이터를 활용한 한국의 자살현상 분석)

  • Lee, Jungeun;Lyu, Jiyoung
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.33-46
    • /
    • 2021
  • Using news big data analysis, this study was aimed to examine the suicide phenomena in Korean society, and to evaluate whether suicide prevention policies reflect social phenomena appropriately. For this purpose, 9,142 news titles with suicide as the keyword were collected from eight central newspapers between 2000 to 2018. Nouns were extracted, and data was refined for network analysis. The total period was divided into 4 periods based on the 1st and 2nd suicide prevention policies, and the characteristics of suicide phenomena in each period were identified through the top 50 frequent main words and the clusters. As a result, period 1 (2000~2003) with 6 clusters (military, internet environment, economic problems, pessimism, school, corruption), period 2 (2004~2008) with 8 clusters (high social class, school, economic problems, suicide attempts, family issues, social problems, military, responsibilities), period 3 (2009~2013) with 6 clusters (school, family issues, suicide attempts, occupation, military, investigation), and period 4 (2014~2018) with 8 clusters (military, suicide insurance money, family issues, suicide attempts, occupation, job stress, celebrity, corruption) were identified. Study results suggested the characteristics of suicide phenomena in our society. Further, the appropriateness of the implementation of suicide prevention policies was discussed.

Rogue AP Protection System Based On Radius Authentication Serve (라디우스 인증 서버를 이용한 Rogue AP 차단 시스템 설계)

  • 김동필;강철범;김상욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.316-318
    • /
    • 2004
  • 최근 무선 네트워크 장비의 가격이 하락함에 따라 낮은 전송 속도를 가지는 이동 통신 시스템의 대안으로 무선랜 시스템의 수요가 증가하고 있다. 그러나 무선랜은 특성상 해킹와 침투에 취약한 약점을 안고 있다. 무선랜 환경에서 유선 네트워크와 무선 네트워크를 매개해주는 액세스 포인트는 내부 네트워크안에서만 접속이 이루어진다. 이러한 취약점을 이용하여 공격자는 위장 액세스 포인트를 설치하여 내부 망으로 침투할 수 있게 된다. 본 논문에서는 무선 구간 모니터링을 하여 위장 액세스 포인트를 탐지하고 AAA서버인 라디우스 인증 서버를 사용하여 위장 액세스 포인트를 차단하는 시스템을 제안한다.

  • PDF

An Adaptive UDT Rate Control Method on Network Traffic Condition (네트워크 트래픽 상태에 적응적인 UDT Rate Control 기법)

  • An, Do-Sik;Wang, Gi-Cheol;Kim, Seung-Hae;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.3
    • /
    • pp.19-27
    • /
    • 2011
  • Due to the growth of optical fiber network technologies, most networks recently support several tens of Gb/s bandwidth. UDT(UDP-based Data Transfer protocol) is an optimized protocol for bulk data transmission on the network, which has the high bandwidth and long delay time. It periodically controls the sending rate on the fixed sync-interval, 0.01 sec. Here, if the network traffic status varies quickly, available network bandwidth is not able to be properly utilized in-between the sync-intervals. In this paper, we propose an adaptive rate control method with considering the network traffic status in-between the sync-interval periods. The network traffic status is determined based on the RTT variances. With dividing the network status into four classes, the proposed method performs a new rate control by adjusting the inter-packet sending period for a corresponding class. As a simulation result, the proposed method improves the message delivery throughput as well as stability than that of the existing UDT Protocol.

A Study on the Accuracy of Traffic Demand Forecasting in National Highway (일반국도의 교통수요 예측 정확도 연구)

  • Jeon, Woo-Hoon;Lim, Kang-Won;Cho, Hye-Jin
    • International Journal of Highway Engineering
    • /
    • v.12 no.4
    • /
    • pp.61-70
    • /
    • 2010
  • The purpose of this study is to analyze the accuracy of traffic volume forecast by comparing an estimated to real traffic volume. For this study, total 10 sections of national highways, which are planned in 1980s and 1990s, were selected and traffic analysis data for highway construction were collected. In addition, targeted 10 sections were categorized into network-related and -unrelated sections. In the analysis of inaccuracy between the estimated and real traffic, for network-related sections, appeared to have lower inaccuracy. As time goes on after traffic open, inaccuracy between the estimated and real traffic appeared to be lower. In various section lengths, the longer the section length, the higher the inaccuracy is. Using 3 years passed data after traffic open, national highway have lower inaccuracy than expressway. However, the traffic analysis according to traffic open time resulted in little change of the inaccuracy.