• Title/Summary/Keyword: 네트워크 지도

Search Result 12,175, Processing Time 0.039 seconds

Design and Implementation of the Evaluation Framework for Decentralized Multimedia Streaming Services

  • Park, Sangsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.91-100
    • /
    • 2020
  • This paper presents an evaluation framework for prototyping multimedia streaming services including audio and video in a distributed and/or decentralized storage that can evaluate service quality and performance under various network conditions. The evaluation framework focuses on important indicators which measure and improve service quality by applying decentralized storage to multimedia streaming services that can mimic the scalability of the existing server-client software architecture and the issue of a single point of failure. The integrated framework not only measures performance indicators for evaluating the quality and performance of multimedia streaming on open source based multimedia content streaming services, but also adjusts network quality using network virtualization technology for comprehensive evaluations. The experimental results show that the integrated framework has low overhead in building and operating a decentralized storage with multimedia streaming services on a single host computer which validates the scalability of the developed framework.

FDANT-PCSV: Fast Detection of Abnormal Network Traffic Using Parallel Coordinates and Sankey Visualization (FDANT-PCSV: Parallel Coordinates 및 Sankey 시각화를 이용한 신속한 이상 트래픽 탐지)

  • Han, Ki hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.693-704
    • /
    • 2020
  • As a company's network structure is getting bigger and the number of security system is increasing, it is not easy to quickly detect abnormal traffic from huge amounts of security system events. In this paper, We propose traffic visualization analysis system(FDANT-PCSV) that can detect and analyze security events of information security systems such as firewalls in real time. FDANT-PCSV consists of Parallel Coordinates visualization using five factors(source IP, destination IP, destination port, packet length, processing status) and Sankey visualization using four factors(source IP, destination IP, number of events, data size) among security events. In addition, the use of big data-based SIEM enables real-time detection of network attacks and network failure traffic from the internet and intranet. FDANT-PCSV enables cyber security officers and network administrators to quickly and easily detect network abnormal traffic and respond quickly to network threats.

Energy-aware Routing Protocol using Multi-route Information in Wireless Ad-hoc Networks with Low Mobility (저이동성을 갖는 무선 애드혹 망에서 다중 경로 정보를 이용한 에너지 인지 라우팅 프로토콜)

  • Hong, Youn-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.55-65
    • /
    • 2010
  • We present a method for increasing network lifetime without link failure due to lack of battery capacity of nodes in wireless ad-hoc networks with low mobility. In general, a node with larger remaining battery capacity represents the one with lesser traffic load. Thus, a modified AODV routing protocol is proposed to determine a possible route by considering a remaining battery capacity of a node. Besides, the total energy consumption of all nodes increase rapidly due to the huge amount of control packets which should be flooded into the network. To reduce such control packets efficiently, a source node can store information about alternative routes to the destination node into its routing table. When a link failure happens, the source node should retrieve the route first with the largest amount of the total remaining battery capacity from its table entries before initiating the route rediscovery process. To do so, the possibility of generating unnecessary AODV control packets should be reduced. The method proposed in this paper increases the network lifetime by 40% at most compared with the legacy AODV and MMBCR.

Defeating IP Source Address Spoofing with Foreign Agent Care-of-Address in Mobile IPv4 (Mobile IPv4 네트워크에서 접속제어리스트와 역터널링을 이용한 IP Spoofing 제거 방안)

  • Kim, Han-Lim;Kim, Sung-Il;Kim, Sang-Eun;Park, Se-Jun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.313-317
    • /
    • 2005
  • The network ingress filtering is a simple and efficient method for preventing IP source spoofing of fixed nodes. Since mobile hosts cannot communicate with its correspondent nodes if the network ingress filtering is configured in mobile IPv4 network, reverse tunneling was considered as a method for avoiding network ingress filtering. But, unfortunately this method does not solve IP source spoofing of mobile nodes. In this paper, we propose a simple and efficient method for preventing IP source spoofing of mobile nodes assuming that only the mobile hosts connected to foreign agents and the network that foreign agent manages is small.

  • PDF

Study on Determining Core Journals and Network Analysis in the Field of Disaster & Safety (재난안전 분야 핵심 학술지 탐색 및 네트워크 분석 연구)

  • Kim, Byungkyu;You, Beom-Jong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.373-397
    • /
    • 2019
  • Recent disasters are a complex and growing trend. In order to effectively prepare for and respond to disasters that occur without notice, it is very important to use scientific information related to disaster and safety in addition to the standardized disaster safety information that is used. In this paper, we searched and selected major journals in the field of disaster & safety and conducted various network analysis studies using the classification scheme for development of integrated metadata for disaster & safety information developed through Disaster & Safety Information Sharing Platform R&D project as well as KSCD. Also, we have constructed and analyzed citation network, co-authorship network and keyword network through data identification and preprocessing of research paper contents. As a result of this study, based on the network constructed by information analysis unit, the network structure between core domestic and foreign journals, major research institutes, core keywords and individual information by disaster & safety type was identified in detail, and the analysis results were presented on a case-by-case basis.

Lightweight IP Traceback Mechanism on IPv6 Network Environment (IPv6 네트워크 환경에서의 경량화된 IP 역추적 기법)

  • Heo, Joon;Kang, Myung-Soo;Hong, Choong-Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.93-102
    • /
    • 2007
  • A serious problem to fight DDoS attacks is that attackers use incorrect or spoofed IP addresses in the attack packets. Due to the stateless nature of the internet, it is a difficult problem to determine the source of these spoofed IP packets. The most of previous studies to prevent and correspond to DDoS attacks using the traceback mechanism have been accomplished in IPv4 environment. Even though a few studies in IPv6 environment were introduced, those have no detailed mechanism to cope with DDoS attacks. The mechanisms for tracing the origin of attacks in IPv6 networks have so many differences from those of IPv4 networks. In this paper we proposed a lightweight IP traceback mechanism in IPv6 network environment. When marking for traceback is needed, the router can generate Hop-by-Hop option and transmit the marked packet. We measured the performance of this mechanism and at the same time meeting the efficient marking for traceback.

GDCS : Energy Efficient Grid based Data Centric Storage for Sensor Networks (GDCS : 센서네트워크를 위한 에너지 효율적인 그리드 기반 데이터 중심 저장 시스템)

  • Shin, Jae-Ryong;Yoo, Jae-Soo;Song, Seok-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.98-105
    • /
    • 2009
  • In this paper, new data centric storage that is dynamically adapted to the change of work load is proposed. The proposed data centric storage distributes the load of hot spot area by using multilevel grid technique. Also, the proposed method is able to use existing routing protocol such as GPSR (Greedy Perimeter Stateless Routing) with small changes. Through simulation the proposed method enhances the lifetime of sensor networks over one of the state-of-the-art data centric storages. We implement the proposed method based on a operating system for sensor networks, and evaluate the performance through running based on a simulation tool.

An Analysis on the Evolutionary Characteristics of Ubiquitous City through Evolutionary Map of Ubiquitous City (유시티 진화 지도를 통한 유시티 진화 특성 분석)

  • JO, Sung-Soo;LEE, Sang-Ho;LEEM, Youn-Taik
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.75-91
    • /
    • 2015
  • This study aims to analyse the U-City characteristics through the U-City historical mapping. The U-City characteristics were analysed by building the U-City historical map in terms of STIM model which consists of service, technology, infrastructure and management. The data for analysis is the National Informatization White Paper published by the NIA (National Information Society Agency) from 2002 to 2013. As a result, first, the U-City service were evolved from administration informatization, enterprise informatization, administration/living informatization and administration/space/private informatization through the intelligence facilities and space. Second, the U-City technology were changed through wire network, sensor/network, processing/super-highway network, convergence of network/security. Third, the U-City infrastructure have had evolutionary process such as wire computer network, wire/wireless network, intellectualization facility and intelligent facility space. Forth, the U-City management were carried out with making the unit network/infrastructure management, information connection/operating management and information integration/participation management. Therefore, the history of U-City has been making rapid development in government computerization, computer oriented society, information city and ubiquitous city.

Data Congestion Control Using Drones in Clustered Heterogeneous Wireless Sensor Network (클러스터된 이기종 무선 센서 네트워크에서의 드론을 이용한 데이터 혼잡 제어)

  • Kim, Tae-Rim;Song, Jong-Gyu;Im, Hyun-Jae;Kim, Bum-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.12-19
    • /
    • 2020
  • The clustered heterogeneous wireless sensor network is comprised of sensor nodes and cluster heads, which are hierarchically organized for different objectives. In the network, we should especially take care of managing node resources to enhance network performance based on memory and battery capacity constraints. For instances, if some interesting events occur frequently in the vicinity of particular sensor nodes, those nodes might receive massive amounts of data. Data congestion can happen due to a memory bottleneck or link disconnection at cluster heads because the remaining memory space is filled with those data. In this paper, we utilize drones as mobile sinks to resolve data congestion and model the network, sensor nodes, and cluster heads. We also design a cost function and a congestion indicator to calculate the degree of congestion. Then we propose a data congestion map index and a data congestion mapping scheme to deploy drones at optimal points. Using control variable, we explore the relationship between the degree of congestion and the number of drones to be deployed, as well as the number of drones that must be below a certain degree of congestion and within communication range. Furthermore, we show that our algorithm outperforms previous work by a minimum of 20% in terms of memory overflow.

Journal Citation Analysis for Library Services on Interdisciplinary Domains: A Case Study of Department of Biotechnology, Y University (학제적 분야의 정보서비스를 위한 학술지 인용 분석에 관한 연구: Y대학교 생명공학과를 중심으로)

  • Yu, So-Young;Lee, Jae-Yun
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.4
    • /
    • pp.283-308
    • /
    • 2008
  • In this study, we testify that network structural attributes of a citation network can explain other aspects of journal citation behaviors and the importances of journals. And we also testify various citation impact indicators of journals including JIF and h-index to verify the difference among them especially focused on their ability to explain an institution's local features of citation behaviors. An institutional citation network is derived using the articles published in 2006-2007 by biotechnology faculties of Y University. And various journal citation impact indicators including JIF, SJR, h-index, EigenFactor, JII are gathered from different service sites such as Web of Science, SCImago, EigenFactor.com, Journal-Ranking.com. As a results, we can explain the institution's 5 research domains with inter-citation network. And we find that the co-citation network structural features can show explanations on the patterns of institutional journal citation behavior different from the simple cited frequency of the institution or patterns based on general citation indicators. Also We find that journal ranks with various citation indicators have differences and it implies that total-based indices, average-based indices, and hybrid index(h-index) explain different aspects of journal citation pattern. We also reveal that the coverage of citation DB doesn't be a matter in the journal ranking. Analyzing the citation networks derived from an institution's research outputs can be a useful and effective method in developing several library services.