• Title/Summary/Keyword: 네트워크 운용

Search Result 1,003, Processing Time 0.031 seconds

Real-Time Bandwidth Management Service for Effective Multiple Isochronous Streaming Transmission in IEEE1394 based Home Network (IEEE1394 기반 홈네트워크에서 효율적인 다중 등시성 스트리밍 전송을 위한 실시간 대역폭 관리 서비스)

  • Chae Hwa-Young;Jung Gi-Hoon;Kang Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9B
    • /
    • pp.838-847
    • /
    • 2006
  • In order to support multiple multimedia streaming services in home networks, many critical issues must be considered. In addition, handling the shortage of network bandwidth is one of the most significant and complicated issues. In this paper, real-time bandwidth management service is suggested as a solution to the problem regarding the IEEE1394-based home network. In order to handle the shortage of network bandwidth and to enhance the bus utilization rate, the proposed service combines two methods. First, the bus bandwidth management function determines the state of the network bandwidth and restores the residual bandwidth, which is excessively occupied by a streaming service, to the available free bandwidth. Second, the Isochronous Streaming (IS) Scheduler manages all streaming services according to priority. In order to test the proposed service, we implemented a prototype steaming management middleware and evaluated it by using the IEEE1394 network test-bed.

Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System (고성능 침입탐지 및 대응 시스템의 구현 및 성능 평가)

  • Kim, Hyeong-Ju;Park, Dae-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.157-162
    • /
    • 2004
  • Recently, the growth of information infrastructure is getting fatter and faster. At the same time, the security accidents are increasing together. We have problem that do not handle traffic because we have the Intrusion Detection Systems in low speed environment. In order to overcome this, we need effective security analysis techniques that ran Processed data of high-capacity because high speed network environment. In this paper we proposed the Gigabit Intrusion Detection System for coordinated security function such as intrusion detection, response on the high speed network. We suggested the detection mechanism in high speed network environment that have pattern matching function based packet header and based packet data that is proceeded in system kernel area, we are shown that this mechanism was excellent until maximum 20 times than existing system in traffic processing performance.

Internet Advertising System based on Wireless LAN Access Point (무선 LAN 액세스 포인트 기반의 인터넷 광고 시스템)

  • Kim, Young-Dae;Jeong, Geun-Ho;Choi, Jae-Young
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.143-154
    • /
    • 2005
  • This paper presents a reliable multicast transmission for the advertising-supported Access Point in which a user can use a wireless network access service through receiving the advertisement. In this paper we propose a application-layer multicast protocol that controls a transmission rate of the mobile device for the reliable multicast in wireless LAN environment. Internet advertising includes all means and medias for advertising on the Internet in order to raise sales or popularity of the products or services. Since the current Internet advertising systems are passive, the target systems are exposed to unspecified persons and its exposure rates of the advertisement are changeable and unpredictable. In this paper, we propose an Internet advertising system, with which users can access the wireless Internet without charge, advertisers can provide customized advertisement according to location, time, and categories of users, and owners of network infrastructure can manage the system with a low cost.

  • PDF

Design of Communication Protocol for the Subsea Walking Robot (해저보행로봇을 위한 통신 프로토콜 설계)

  • Kim, Bang-Hyun;Park, Sung-Woo;Lee, Pan-Mook;Jun, Bong-Huan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.403-406
    • /
    • 2011
  • 한국해양연구원에서는 국토해양부의 지원을 받아 2010년 7월부터 새로운 개념의 해저로봇 개발에 착수하였다. 새로이 개발되는 해저로봇은 프로펠러 방식으로 추력을 얻는 기존의 해저로봇과는 달리 여러 개의 관절로 이루어진 6개의 다리를 이용하여 해저면에 근접해서 보행과 유영으로 이동하는 해저로봇으로 강조류와 악시계의 환경에서도 운용이 가능한 로봇이다. 이 해저보행로봇 시스템은 선상시스템과 완충기, 그리고 해저보행로봇으로 구성되며, 이들 사이는 광변환기를 통해서 광케이블로 연결된다. 선상시스템에는 해저로봇의 제어 및 모니터링을 위하여 10대의 컴퓨터가 설치되어 있고, 완충기와 해저로봇에 각각 1대의 입출력 컴퓨터가 내장되어 장착된 센서와 모터의 인터페이스를 담당한다. 본 논문에서는 해저보행로봇의 통신 시스템을 소개하고, 이 통신 시스템에서 사용되기 위하여 설계된 메시지의 통신 프로토콜을 설명한다. 해저보행로봇 시스템의 주 네트워크는 기가비트 이더넷이며, 안정된 통신 환경의 소규모 독립 네트워크이다. 완충기와 해저보행로봇에는 최대 100㎐로 동작하는 다양한 직렬 통신 방식을 갖는 다수의 센서와 모터가 장착되어 있는데, 입출력 컴퓨터가 이더넷 네트워크와의 인터페이스 역할을 수행하여 계층적 네트워크를 구성한다. 로봇 제어에서는 실시간성이 중요하기 때문에 이더넷에서 통신 메시지는 한 번의 전송으로 여러 컴퓨터에 전달할 수 있도록 멀티캐스팅을 사용하여 전송된다. 설계된 통신 프로토콜은 이러한 해저로봇 시스템의 특성에 적합한 간결한 구조로 설계되었으며, 최대 255개의 주소를 지정할 수 있고 255 종류의 메시지 형태를 설정할 수 있다.

Designing a Path Management Method in Large-scale Multiple Sensor Networks (대규모 다중 센서 네트워크에서 효과적인 경로 관리 기법)

  • Lim, Yu-Jin;Park, Jae-Sung;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.205-212
    • /
    • 2008
  • In the environment with multiple heterogeneous wireless sensor networks with a single point of sensed data collection or a gateway (GW), relay points (RPs) may be required for the energy efficient delivery of sensed data from static or mobile sinks to the GW. The optimal placement of RPs becomes an even more difficult problem if static sinks are dynamically added or the trajectory of mobile sinks can not be known in advance. In order to resolve this problem, we propose a mechanism to deploy RPs in a grid pattern and to use the tree-based relaying network for reducing the cost of the RP and for reducing the control overhead incurred by the route setup from sinks to the GW. For the performance evaluation of our proposed mechanism, we have carried out a numerical analysis on a single route setup from a sink to the GW and, for more general performance evaluations, ns-2 based simulations have been carried out. According to the performance evaluation results, our tree-based relaying network mechanism outperforms that based on AODV in terms of the data delivery time, the network service time and the control overhead.

Patent Analysis of Information Security Technology for Network-Centric Warfare (네트워크 중심전을 위한 정보보호기술의 특허동향 분석)

  • Kim, Do-Hoe;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.355-364
    • /
    • 2007
  • The paradigm of war is basically changed by development of information and communication technologies. One of the paradigms in future war is NCW(Network-Centric Warfare) that is purposed of achievement in information-superiority. In this future war, the level of menace and fragility is rapidly increased in information-security according to the massive information and complex system. Therefore the Korean army is developing the information-security technologies for NCW. But, until now patent analysis concerning NCW has not performed. In this paper, we suggest a meaningful data for efficient R&D through patent analysis of information-security technologies on NCW.

The Analysis of Patterns and Strategies of Standards Competition in Telecommunications Industry (정보통신산업의 표준화 경쟁의 유형과 전략에 관한 연구)

  • Park, Wung;Park, Jong-Bong;Kim, Young-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.591-596
    • /
    • 2001
  • Many consumption goods, most notably in network markets including the telecommunications industry, exhibit network externalities. For that reason, standardization is the tore Issue in network markets with powerful positive feedback. firms in the telecommunications industry compete intensively against one another to build on early lead due to w inertia and network externalities. Therefore, a firm's strategies err very important in standards competition. In this paper, we'll examine the patterns of standards competition and cooperation, anti a variety of firms' strategies in the telecommunications industry. And then, we'll examine the trend of the change from standard competition to standard cooperation. After that, we'll suggest the national policies for the preemption.

  • PDF

An Attribute-Based Naming Architecture for Wireless Sensor Networks (무선 센서 네트워크를 위한 속성 기반 네이밍 구조)

  • Jung, Eui-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.95-102
    • /
    • 2007
  • Recently, a lot of researchers focus on the sensor middleware that hide the complexity of application developments and provide the abstraction of functions to upper application layer. Although there we several factors to design sensor middleware, the attribute-based naming is considered to be an essential factor among them. However, most existing researches were not designed to reflect the characteristics of sensor networks and have the limitation of attribute-based query extension. This study adopts the concept of Virtual Counterpart to suggest the structure there attribute-based naming is supported by virtual sensor nodes of the middleware on the sink node. Unlike traditional data-centric middleware in which individual sensor nodes process attribute-based query, virtual sensor nodes mapped to physical sensor nodes are running on the middleware of the sink node and process attribute-based query as a proxy of the physical sensor. This approach enables attribute-based naming independent of physical infrastructure and easy extensibility.

  • PDF

A Range-Free Localization Algorithm for Sensor Networks with a Helicopter-based Mobile Anchor Node (센서 네트워크에서 모바일 앵커 노드(헬기)를 이용한 위치인식 알고리즘)

  • Lee, Byoung-Hwa
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.8
    • /
    • pp.750-757
    • /
    • 2011
  • Wireless Sensor Network is composed of a lot of sensor nodes that are densely deployed in a field. So generally this sensor nodes are spreaded using Helicopter or Fixed wing. Each node delivers own location and acquired information to user when it detects specific events. In this paper, we propose localization algorithm without range information in wireless sensor network using helicopter. Helicopter broadcasts periodically beacon signal for sensor nodes. Sensor nodes stored own memory this beacon signal until to find another beacon point(satisfied special condition). This paper develops a localization mechanism using the geometry conjecture(perpendicular bisector of a chord) to know own location. And the simulation results demonstrate that our localization scheme outperforms Centroid, APIT in terms of a higher location accuracy.

Research on Malware Classification with Network Activity for Classification and Attack Prediction of Attack Groups (공격그룹 분류 및 예측을 위한 네트워크 행위기반 악성코드 분류에 관한 연구)

  • Lim, Hyo-young;Kim, Wan-ju;Noh, Hong-jun;Lim, Jae-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.193-204
    • /
    • 2017
  • The security of Internet systems critically depends on the capability to keep anti-virus (AV) software up-to-date and maintain high detection accuracy against new malware. However, malware variants evolve so quickly they cannot be detected by conventional signature-based detection. In this paper, we proposed a malware classification method based on sequence patterns generated from the network flow of malware samples. We evaluated our method with 766 malware samples and obtained a classification accuracy of approximately 40.4%. In this study, malicious codes were classified only by network behavior of malicious codes, excluding codes and other characteristics. Therefore, this study is expected to be further developed in the future. Also, we can predict the attack groups and additional attacks can be prevented.