• Title/Summary/Keyword: 네트워크 운용

Search Result 994, Processing Time 0.025 seconds

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.

The Medium Access Scheduling Scheme for Efficient Data Transmission in Wireless Body Area Network (WBAN 환경에서 효율적 데이터 전송을 위한 매체 접근 스케줄링 기법)

  • Jang, EunMee;Park, TaeShin;Kim, JinHyuk;Choi, SangBan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.2
    • /
    • pp.16-27
    • /
    • 2017
  • IEEE 802.15.6 standard, a Wireless Body Area Network, aims to transfer not only medical data but also non-medical data, such as physical activity, streaming, multimedia game, living information, and entertainment. Services which transfer those data have very various data rates, intervals and frequencies of continuous access to a medium. Therefore, an efficient anti-collision operations and medium assigning operation have to be carried out when multiple nodes with different data rates are accessing shared medium. IEEE 802.15.6 standard for CSMA/CA medium access control method distributes access to the shared medium, transmits a control packet to avoid collision and checks status of the channel. This method is energy inefficient and causes overhead. These disadvantages conflict with the low power, low cost calculation requirement of wireless body area network, shall minimize such overhead for efficient wireless body area network operations. Therefore, in this paper, we propose a medium access scheduling scheme, which adjusts the time interval for accessing to the shared transmission medium according to the amount of data for generating respective sensor node, and a priority control algorithm, which temporarily adjusts the priority of the sensor node that causes transmission concession due to the data priority until next successful transmission to ensure fairness.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

Change Detection for High-resolution Satellite Images Using Transfer Learning and Deep Learning Network (전이학습과 딥러닝 네트워크를 활용한 고해상도 위성영상의 변화탐지)

  • Song, Ah Ram;Choi, Jae Wan;Kim, Yong Il
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.3
    • /
    • pp.199-208
    • /
    • 2019
  • As the number of available satellites increases and technology advances, image information outputs are becoming increasingly diverse and a large amount of data is accumulating. In this study, we propose a change detection method for high-resolution satellite images that uses transfer learning and a deep learning network to overcome the limit caused by insufficient training data via the use of pre-trained information. The deep learning network used in this study comprises convolutional layers to extract the spatial and spectral information and convolutional long-short term memory layers to analyze the time series information. To use the learned information, the two initial convolutional layers of the change detection network are designed to use learned values from 40,000 patches of the ISPRS (International Society for Photogrammertry and Remote Sensing) dataset as initial values. In addition, 2D (2-Dimensional) and 3D (3-dimensional) kernels were used to find the optimized structure for the high-resolution satellite images. The experimental results for the KOMPSAT-3A (KOrean Multi-Purpose SATllite-3A) satellite images show that this change detection method can effectively extract changed/unchanged pixels but is less sensitive to changes due to shadow and relief displacements. In addition, the change detection accuracy of two sites was improved by using 3D kernels. This is because a 3D kernel can consider not only the spatial information but also the spectral information. This study indicates that we can effectively detect changes in high-resolution satellite images using the constructed image information and deep learning network. In future work, a pre-trained change detection network will be applied to newly obtained images to extend the scope of the application.

The Trends and Prospects of Health Information Standards : Standardization Analysis and Suggestions (의료정보 표준에 관한 연구 : 표준화 분석 및 전망)

  • Kim, Chang-Soo
    • Journal of radiological science and technology
    • /
    • v.31 no.1
    • /
    • pp.1-10
    • /
    • 2008
  • Ubiquitous health care system, which is one of the developing solution technologies of IT, BT and NT, could give us new medical environments in future. Implementing health information systems can be complex, expensive and frustrating. Healthcare professionals seeking to acquire or upgrade systems do not have a convenient, reliable way of specifying a level of adherence to communication standards sufficient to achieve truly efficient interoperability. Great progress has been made in establishing such standards-DICOM, IHE and HL7, notably, are now highly advanced. IHE has defined a common framework to deliver the basic interoperability needed for local and regional health information networks. It has developed a foundational set of standards-based integration profiles for information exchange with three interrelated efforts. HL7 is one of several ANSI-accredited Standards Developing Organizations operating in the healthcare arena. Most SDOs produce standards (protocols) for a particular healthcare domain such as pharmacy, medical devices, imaging or insurance transactions. HL7's domain is clinical and administrative data. HL7 is an international community of healthcare subject matter experts and information scientists collaborating to create standards for the exchange, management and integration of electronic healthcare information. The ASTM specification for Continuity of Care Record was developed by subcommittee E31.28 on electronic health records, which includes clinicians, provider institutions, administrators, patient advocates, vendors, and health industry. In this paper, there are suggestions that provide a test bed, demonstration and specification of how standards such a IHE, HL7, ASTM can be used to provide an integrated environment.

  • PDF

A Study on the Accuracy Enhancement Using the Direction Finding Process Improvement of Ground-Based Electronic Warfare System (지상용 전자전장비의 방향 탐지 프로세스 개선을 통한 정확도 향상에 관한 연구)

  • Chin, Huicheol;Kim, Seung-Woo;Choi, Jae-In;Lee, Jae-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.627-635
    • /
    • 2017
  • Modern warfare is gradually changing into a network war, and information electronic warfare is also progressing. In modern war, electronic warfare is all military activity concerned with electromagnetic field use, such as signal collecting, communication monitoring, information analysis, and electronic attack. The one key function of signal collecting for enemy signal analysis, direction finding, collects the signal radiated from enemy area and then calculates the enemy direction. This paper examined the Watson-Watt algorithm for an amplitude direction finding system and CVDF algorithm for phase direction finding system and analyzed the difference in the direction finding accuracy between in the clean electromagnetic field environment and in the real operating field environment of electronic warfare system. In the real field, the direction finding accuracy was affected by the reflected field from the surrounding obstacles. Therefore, this paper proposesan enhanced direction finding process for reducing the effect. The result of direction finding by applying the proposed process was enhanced above $1.24^{\circ}$ compared to the result for the existing process.

Sharing of DLNA Media Contents among Inter-homes based on DHCP or Private IP using Homeserver (동적 사설 IP 기반의 다중 홈간 DLNA 미디어 컨텐츠 공유)

  • Oh, Yeon-Joo;Lee, Hoon-Ki;Kim, Jung-Tae;Paik, Eui-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.709-716
    • /
    • 2006
  • According to the increase of various AV media devices and contents in the digital home, the DLNA becomes to play an important role as the interoperability standard between then Since this guideline only focuses on the interoperability among home networked devices, media players, and media contents existing inside of the homenetwork, there is no retrieval and transmission method for sharing multimedia contents located over several homes via Internet. Additionally, this guideline lets device-detection and notification messages to be transmitted using W multicast methods, and current Internet environment cannot guarantee consistent IP multicast services, it has the limitation that it cannot retrieve and control DLNA devices in other digital homes remotely via the Internet. Therefore, in this paper, we propose the IHM(Inter-Home Media) proxy system and its operating mechanism to provide a way of sharing media contents distributed over multiple DLNA-based homes, through analyzing these limitations and building up a sharing method for A/V media contents distributed over the DLNA homes based on the dynamic or private IP networks. Our method removes the limitation on the user locations through sharing distributed media contents, and also makes cost-downs for storing media contents, from the view point of individual residents.

Design and Implementation of Open GIS OLE DB Component Using RDBMS (RDBMS를 이용한 개방형 GIS OLE DB 제공자 컴포넌트의 설계 및 구현)

  • Kim, Min-Soo;Lee, Ki-Won;Lee, Jong-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.67-70
    • /
    • 2000
  • 최근 네트워크 서비스 및 분산 컴퓨팅 환경의 급격한 발전과 더불어 인터넷 기반 지리정보 시스템과 이 기종 시스템간에 상호 운용성을 지원하는 분산 지리정보시스템의 기술이 혁신적으로 발전하게 되었다. 현재 이러한 상호 운용성과 더불어 기 구축된 시스템의 재 사용성을 극대화하기 위하여 개방형 컴포넌트 소프트웨어 기술이 발표[1]되었으며, 최근 발표되는 지리정보시스템들도 이러한 개방화와 컴포넌트화 기술을 채택하여 개발되고 있다. 이러한 개방형 컴포넌트 소프트웨어 기술은 컴퓨터 소프트웨어 산업 전반에 커다란 파급 효과를 끼치고 있다. 지리정보시스템 분야에서는 OpenGIS Consortium(OGC)을 주축으로 하여 개방형 컴포넌트 지리정보시스템을 위한 표준 구현 사양을 발표하고 있으며, 이러한 표준 사양을 수용한 제품들이 개발되고 있는 실정이다. 본 논문에서는 분산 환경에서 다양한 관계형 데이터베이스시스템을 이용하여 OGC가 제시한 OLE/COM 기반의 데이터 제공자 컴포넌트의 설계 및 구현에 중점을 두고 있다. 본 시스템의 데이터 제공자 컴포넌트는 순수한 관계형 데이터베이스시스템 기반 위에서 구성되므로, 우선 OGC에서 요구하는 GIS 관련 핵심 기능들을 제공하기 위해서 우선 관계형 데이터베이스와 ODBC를 이용하여 공간엔진을 구성하고 있다. 본 공간 엔진은 OGC 사양을 충족하기 위해서 이용되는 최소한의 기능-공간데이터 관리 기능, 공간 연산 처리, 공간 색인 기능 그리고 클라이언트와 통신하기 위한 기능-들을 포함하고 있다. 그러므로 본 논문에서는 이러한 공간 엔진의 기반 위에서 OGC OLE DB 제공자 컴포넌트의 설계 및 구현 방법에 대해서 자세히 살펴보고 실제 SQL Server 7.0 환경에서 구축된 공간 엔진 및 OLE DB 제공자 컴포넌트의 구현 예에 대하여 살펴볼 것이다. 혈액내방사선 조사량이 안전용량 범위(200rad)에 속하며 48시간 후 체내잔류량은 서양인과 큰 차이가 없었다.비출현의 소견을 보이는 악성종양 환자의 골 신티그람 53개중 44개 (83.0%)에서 척추 및 늑골에 미만성, 또는 다발성 침습이 관찰되었다. 또 골전이 부위를 두개골, 척추, 견대부, 늑골, 골반, 사지의 근위부 장골의 6개 부위로 나누어 분석할 경우 49개(92.5%)에서 3부위 이상에 전이가 발견되었고, 35개(66.0%)에서 4부위 이상에 전이가 발견되었으며, 5부위 이상, 6개 부위에 모두 전이가 발견된 것은 각각 20개 (37 7%), 11개(20.8%)이었다. 이상의 성적으로 보아 악성종양 환자의 골 신피그라피에서 신장 영상의 비출현은 종양의 광범위한 골전이를 간접적으로 시사하는 소견으로 생각된다. 여러 악성종양중 전립선암에서 신장 영상 비출현의 빈도가 가장 높았으며, 특히 위암에서 골전이 및 신장 영상 비출현의 빈도가 높음은 주목할 만한 것이라 하겠다.출한 결과 인,규소 증가와 자가영양성 미소플랑크톤(ANP)증가에 미치는 요인이 해안과 외해에서 동일하게 가장 큰 설명력을 보였다. N:P 비도 해안에서 36.4, 외해에서 32.6을 보이고 있어 인이 상당히 부족한 것으로 나타났다. 따라서 조사해역은 인이 식물플랑크톤 성장에 중요한 제한요인으로 작용하고 있다고 판단된다.의 회전. 전위력의 강도, 적용시점, 그리고 키, 체중등의 신체적 요인 등이 있으나 능숙한 기계사용과 정확한 슬관절 위치에서 검사할 때 전방 십자 인대 파열에 대한 진단에 유용한 기구이다.태라고 하였다. 본 연구에서는 이러한 근거를 바탕으로 개방형 문제의 유형을 다양한 답이 존재하는 문제, 다양한 해결 전략이 가능한 문제, 답이 없는 문제, 문제 만들기, 일반화가 가능한 문제 등으로 보고, 수학적 창의성 중

  • PDF

A study on improvement of ISO/IEC 29157 MAC protocol (ISO/IEC 29157 표준 MAC 프로토콜 개선 연구)

  • Cha, Bong-Sang;Jeong, Eui-Hoon;Jeon, Gwangil;Seo, Dae-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.17-26
    • /
    • 2013
  • ISO/IEC 29157 originally developed in the Republic of Korea and is based on commercially available PicoCast v1.0. ISO/IEC JTC1 SC6 was registered by the international standard on May 2010. A single platform for a variety of applications and media formats to support development objectives were. ISO/IEC 29157 based wireless networks, ie, Pico-net to master node periodically transmit sync signal is synchronized to the number of slave nodes have the communications structure. Pico-net also supports a variety of network topologies and direct communication between nodes(single-hop communication) and QoS is guaranteed. But Pico-net network structure has the following problems. Loss of communication problems due to mobile nodes, resulting in limitations of node mobility and wireless network operation range of conventional wireless networks operating range less than 1/4 was reduced to the problem. In this paper, a possible solution to the problems mentioned is proposed, using multi-hop communication technology and sync signal transmission technology between nodes.