• 제목/요약/키워드: 네트워크 지도

Search Result 12,221, Processing Time 0.038 seconds

Research on Wireless Router for Data Relay between Binary CDMA Pico-Cell Networks (Binary CDMA Pico-Cell 네트워크간의 데이터 중계를 위한 무선 라우터에 대한 연구)

  • Park, Jong-Beom
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.116-124
    • /
    • 2011
  • For Binary CDMA network, communication can be accomplished only within a Pico-net on the boundary of management by the master station because it manages network resources of each entity. In this research, we try to overcome these limits and extend the application for Binary CDMA system to broad-band network. We suggest a new Binary CDMA router such that network is devised by cell unit and multiple Pico-net and a unique address is assigned to each Pico-cell to relaying data between Pico-cells.

VPN(Virtual Private Network)기술의 개요

  • 정태명
    • Review of KIISC
    • /
    • v.9 no.4
    • /
    • pp.3-10
    • /
    • 1999
  • 현재의 산업 상황은 제한적인 내부 네트워크의 사용만으로는 충분히 뒷받침할수 없 는 새로운 업무형태로 바뀌었다. 기업에서는 내부 네트워크의 구성뿐만 아니라 증가하는 지 사나 이동 근무자나 재택근무자들을 지원하기 위한 네트워크 확장이 필요하게 되었다. 그러 나 기존 네트워크 구성에서 사용하던 전용선이나 PSTN을 이용하는 방법은 많은 비용 때문 에 기업에 과중한 부담을 가져오게 되었으며 이에 대한 해결책으로 VPN이 제안되었다. VPN은 공중망을 매개로 한 가상적인 네트워크 구성으로서 네트워크 확장에 소요되는 비용 을 크게 절감하고 네트워크 관리를 용이하게 하였다. 특히 근래에 인터넷 사용자가 급격하 게 증가하면서 보안 솔루션으로서의 IP 기반 VPN에 대한 관심이 집중되고 있다, 본 고에서 는 VPN 기술의 전반적인 내용에 대해 소개하고 VPN의 핵심기술이라 할수 있는 터널링 기 술을 IPsec 중심으로 살펴보기로 한다.

  • PDF

An Log Visualization Method of Network Security Equipment for Private Information Security (개인정보 보호를 위한 네트워크 보안장비의 로그 가시화 방법 연구)

  • Sim, Hee-Youn;Kim, Hyung-Jong
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.31-40
    • /
    • 2008
  • Recently, network forensic research which analyzes intrusion-related information for tracing of attackers, has been becoming more popular than disk forensic which analyzes remaining evidences in a system. Analysis and correlation of logs from firewall, IDS(Intrusion Detect System) and web server are important part in network forensic procedures. This work suggests integrated graphical user interface of network forensic for private information leakage detection. This paper shows the necessity of various log information for network forensic and a design of graphical user interface for security managers who need to monitor the leakage of private information.

  • PDF

A High Performance NoC Architecture Using Data Compression (데이터 압축을 이용한 고성능 NoC 구조)

  • Kim, Hong-Sik;Kim, Hyunjin;Hong, Won-Gi;Kang, Sungho
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.1-6
    • /
    • 2010
  • 본 논문에서는 네트워크 온 칩(NoC: network on chip) 구조에서의 내부 데이터 통신의 성능을 최적화 할 수 있는 새로운 온 칩 네트워크 인터페이스 구조를 제안하였다. 제안하는 NoC 구조는 기본적으로 하드웨어 면적을 줄이기 위하여 XY 라우팅 알고리듬을 기반으로 구현되었으며, 전달되는 패킷의 크기 또는 플릿의 개수를 최소화하기 위하여 Golomb-Rice 인코딩/디코딩 알고리듬에 기반을 둔 하드웨어 압축기/해제기를 이용하여 통신되는 데이터의 양을 크게 줄임으로써 네트워크 지연시간을 최소화 할 수 있는 새로운 구조를 제안하였다. 즉 전송될 데이터는 전송자(sender)의 네트워크 인터페이스에서 내장된 하드웨어 인코더를 통해 압축된 형태로 패킷의 개수를 최소화하여 온 칩 네트워크상의 데이터를 업로드하게 된다. 이러한 압축된 데이터가 리시버(receiver)에 도착하면, 하드웨어 디코더를 통해서 원래의 데이터로 복원된다. 사이클 수준의 시뮬레이터를 통하여 제안된 라우터 구조가 온 칩 시스템의 네트워크 지연시간을 크게 줄일 수 있음을 증명하였다.

Performance of Dilated Banyan Networks with Internal Buffers (내부 버퍼가 있는 확장 배년 네트워크의 성능 분석)

  • Song, Hyo-Jeong;Gwon, Bo-Seop;Yun, Hyeon-Su
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.5
    • /
    • pp.595-601
    • /
    • 1999
  • 기본 배년 네트워크의 내부 링크를 확장계수배만큼 확장한 확장 배년 네트워크는 기존 병렬처리 컴퓨터나 ATM 스위칭 시스템을 위한 효율적인 통신하부구조로서 여겨져왔다. 본 논문에서는 특히 각 스위치 소자 내부 버퍼가 있는 확장 배년 네트워크의 성능 분석 모델을 마코프 체인에 기초하여 제안한다. 제안한 분석모델에 의해 도출된 네트워크 지연시간과 정규처리율의 값을 모의실험결과와 비교하고, 네트워크 부하가 높고 확장계수가 작은 경우를 제외하고는 두 결과값이 항상 일치함을 보인다. 이러한 확장 배년 네트워크는 스위치의 크기와 관계없이 확장 계수가 3 이상이면 이상적인 처리율과 지연시간을 나타낸다.

Effects of Chaotic Signal in the Cyclic Connection Neural Networks (순환결합형 뉴럴네트워크에 있어서 카오스 신호의 영향)

  • 박철영
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.4
    • /
    • pp.22-28
    • /
    • 2002
  • It has been reported that neural network with cyclic connections generates limit cycles. The dynamics of discrete time network with cyclic connections has been analyzed. But the dynamics of cyclic network in continuous time has not been known well due to its huge calculation complexity. In this paper, we study the dynamics of the continuous time network with cyclic connections and the effect of chaotic signal in the network for transitions between limit cycles.

  • PDF

An Analysis on the Structure of Temporal Co-Authorship Networks (시간적 공저 네트워크의 구조 분석에 관한 연구)

  • SunKyung Seo
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.3
    • /
    • pp.381-409
    • /
    • 2024
  • In co-authorship networks, temporal networks can be modeled by identifying the formation and dissolution (linking and removing) of co-authorship relationships over time from the publication year information of the papers. Therefore, this study seeks to analyze the overall research collaboration networks of data papers and articles from an evolutionary perspective for modeling the temporal network in terms of informetrics and investigating the dynamic and structural mechanisms of the temporal co-authorship network. For that purpose, Biodiversity Data Journal, a mixed data journal in the biodiversity domain was used as the unit of analysis in this study as this domain had proposed data paper as a new mechanism for data publication. In addition, bibliometric records of 247 data papers and 638 articles involving two or more researchers were collected from the Web of Science. The results indicated that the dynamic co-authorship networks of data papers and articles in the biodiversity domain exhibited the scale-free property of a complex network and the small-world property in the Watts-Strogatz sense during the network evolution. Also, both publication types kept the structure of locally cohesive author groups over time in the networks. The implementation of TTBC (Temporal Triadic Betweenness Centrality) has allowed for the examination and tracking of the evolutionary trends of important or influential time-dependent authors (nodes) by the target year. And last, visualization with a dynamic approach enabled a more effective identification of analysis results, such as the exhibited structural difference in the temporal co-authorship networks of data papers and articles in the biodiversity domain, which can be interpreted as the structural properties of the networks among collaborative researchers dealing with data.

Mobile IP User Mobility Model for Effective Mobility Management Accommodating Heterogeneous Networks under Cognitive Networking Environments (이종 네트워크간의 효과적 이동성 수용을 위한 이동 IP 네트워크 사용자 이동성 모델)

  • Cheon, Eun-Ji;Kim, Jeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.6
    • /
    • pp.90-97
    • /
    • 2012
  • In this paper, the new user mobility model which can be utilized to register user's location for interworking with heterogeneous overlay convergent networks under the time-varying radio propagation environment has been proposed. Thus the user mobility model is considered in order to evaluate the behaviors of users in the overlay convergent networks. This Mobile IP user mobility model will be very useful to model the user mobility behaviors and can be used to estimate the signaling traffic and frequency spectrum demands for massive data transfer for the heterogeneous overlay convergent networks.

A Study on the Improvement of Wired and Wireless Network Survivability using Integrated IP Management (IP 통합 관리를 통한 유·무선 네트워크의 생존성 향상에 관한 연구)

  • Kim, Si-hung;Koo, Ja-Hwan;Park, Byung-Yeon;Park, Hark-Soo;Choi, Jang-Won;Lee, Jae Young
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.43-50
    • /
    • 2003
  • Computer Communications and networks have been revolutionized by technological advances in the last decade. There has been an increasing interest in the network security because of the growing popularity of Internet and the importance of networking in business area. With this growing interest, Network engineers come to more concern about improving network survivability. In this paper, we suggest the method that improves the survivability of wired and wireless network. To achieve this goal, we propose the integrated IP management with monitoring network nodes in the same network and controlling its activities.

  • PDF

Design and Analysis of Wireless Ad Hoc Networks Based on Theory of Complex Networks (복잡계 네트워크기반 무선 애드혹 네트워크 설계 및 분석)

  • Jung, Bang Chul;Kang, Kee-Hong;Kim, Jeong-Pil;Park, Yeon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2020-2028
    • /
    • 2013
  • In this paper, we propose a novel analysis and design methodology based on complex network theory for wireless large-scale ad hoc networks. We also enhance the conventional analysis methods which does not sufficiently consider the effect of the wireless communication channels and extend the existing random graph theory by reflecting the wireless communication environments. As a main result, the effect of the network topology such as average degree of each communication node on the network capacity through extensive computer simulations.