• Title/Summary/Keyword: 망 분리

Search Result 525, Processing Time 0.028 seconds

The Public Choice Analysis of Korean Mobile Telecom Policy (이동통신 정책의 공공 선택 분석)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.917-920
    • /
    • 2014
  • In Korea mobile phone subscribers exceeded 1 million people in 1995, and ten million people in 1998. Prevalence of the mobile phone increased dramatically over 110% compared to the population. And all family members including children and students use one or two mobile terminal. Mobile phone is obviously necessary good more than washer, vacuum cleaner, passenger car. Our daily life with mobile communication are conveniently positioned, but communication related costs including the price of the device has become a big burden on the household. But the government does not seem to do the right role at the right time to prevent the failure of the market to further maximize consumer welfare and social welfare through fair competition. This principal-agent problems exist especially in perspective of joint use of the mobile communication network, number portability, separation of phone distribution and phone service and network neutrality among in mobile communication policies since the early 1990s up to now.

  • PDF

Implementation of Ring Topology Interconnection Network with PCIe Non-Transparent Bridge Interface (PCIe Non-Transparent Bridge 인터페이스 기반 링 네트워크 인터커넥트 시스템 구현)

  • Kim, Sang-Gyum;Lee, Yang-Woo;Lim, Seung-Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.3
    • /
    • pp.65-72
    • /
    • 2019
  • HPC(High Performance Computing) is the computing system that connects a number of computing nodes with high performance interconnect network. In the HPC, interconnect network technology is one of the key player to make high performance systems, and mainly, Infiniband or Ethernet are used for interconnect network technology. Nowadays, PCIe interface is main interface within computer system in that host CPU connects high performance peripheral devices through PCIe bridge interface. For connecting between two computing nodes, PCIe Non-Transparent Bridge(NTB) standard can be used, however it basically connects only two hosts with its original standards. To give cost-effective interconnect network interface with PCIe technology, we develop a prototype of interconnect network system with PCIe NTB. In the prototyped system, computing nodes are connected to each other via PCIe NTB interface constructing switchless interconnect network such as ring network. Also, we have implemented prototyped data sharing mechanism on the prototyped interconnect network system. The designed PCIe NTB-based interconnect network system is cost-effective as well as it provides competitive data transferring bandwidth within the interconnect network.

Efficient Analysis of Discontinuous Elements Using a Modified Selective Enrichment Technique (수정된 선택적 확장 기법을 이용한 불연속 요소의 효율적 해석)

  • Lee, Semin;Kang, Taehun;Chung, Hayoung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.35 no.5
    • /
    • pp.267-275
    • /
    • 2022
  • Using a nonconforming mesh in enrichment methods results in several numerical issues induced by discontinuities and singularities found within the solution spaces, including the computational overhead during integration. In this study, we present a novel enrichment technique based on the selective expansion technique of moment fitting (Düster and Allix, 2020). In particular, two modifications are proposed to address the inefficiency during the integration process. First, a feedforward artificial neural network is introduced to correlate the implicit functions and integration moments. Through numerical examples, it is shown that the efficiency of the method is greatly improved when compared with existing expansion techniques, whereas the solution accuracy is maintained. Additionally, the finite element and domain representation grids are separated, which in turn improves the solution accuracy even for coarse mesh conditions.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

Infection status of anisakid larvae in anchovies purchased from local fishery market near southern and eastern sea in Korea (해안지역에서 시판되는 멸치의 anisakid 유충 감염상)

  • 송수복;이상룡
    • Parasites, Hosts and Diseases
    • /
    • v.33 no.2
    • /
    • pp.95-100
    • /
    • 1995
  • A survey was carried out on the larval anilsakids in anchovies (Engrnuyis jnponica) which were caught from April to .lune in 1993 at the southern and eastern sea in Korea. Anisakids in anchovies were morphological classified into Anisakis type I and II and Contracaecum type B and C, after fixation in 70% alcohol and clearing in lactophenol. A examined. The infection rates showed no relation with length of the anchovies. The numbers of anisakids by organs of anchovies were 96 (56.1%) from the muscle, 65 (38.0%) from the omentum, 7 (4.1%) from the intestine, 2 (1.7%) from the stomach and 1 (0.6%) from the testis. Infection rates of anchovies with anisakids by localities were 5.1% at Taebyon, 8.0% at Sokcho and 9.2% at Chungmu. The larval uisikids in anchovies may infect humans who often eat raw anchovies.

  • PDF

Studies on Stream Ecosystem in the Bukhan River using Stable Isotopes (안정동위원소를 이용한 북한강 하천생태계 연구)

  • Kang, Jung-In;Kim, Jae-Gu;Lee, Sang-Don
    • Journal of Wetlands Research
    • /
    • v.13 no.3
    • /
    • pp.515-522
    • /
    • 2011
  • This study examined the epiphytes using stable isotopes. Separated epiphytes should represent the water quality. In study areas, where agricultural paddies were prevailing, biomass of epiphytes can increase nitrogen isotopes(${\delta}^{15}N$) and as a result decrease in carbon isotopes(${\delta}^{13}C$). Naerin stream and Inbuk upper areas showed higher nitrogen isotopes(${\delta}^{15}N$) than in Hangye and Buk stream. Also, stable carbon isotopes(${\delta}^{13}C$) in Naerin stream and Inbuk streams tended to increase than in Hangye and Buk stream. This can indicate the epiphytes can be a good indicator for water quality pollution.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Postal Envelope Image Recognition System for Postal Automation (서장 우편물 자동처리를 위한 우편영상 인식 시스템)

  • Kim, Ho-Yon;Lim, Kil-Taek;Kim, Doo-Sik;Nam, Yun-Seok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.4
    • /
    • pp.429-442
    • /
    • 2003
  • In this paper, we describe an address image recognition system for automatic processing of standard- size letter mail. The inputs to the system are gray-level mail piece images and the outputs are delivery point codes with which a delivery sequence of carrier can be generated. The system includes five main modules; destination address block location, text line separation, character segmentation, character recognition and finally address interpretation. The destination address block is extracted on the basis of experimental knowledge and the line separation and character segmentation is done through the analysis of connected components and vortical runs. For recognizing characters, we developed MLP-based recognizers and dynamical programming technique for interpretation. Since each module has been implemented in an independent way, the system has a benefit that the optimization of each module is relatively easy. We have done the experiment with live mail piece images directly sampled from mail sorting machine in Yuseong post office. The experimental results prove the feasibility of our system.

Wireless Access Network Virtualization Based on Distributed Antenna Systems (분산 안테나 시스템에 기반한 무선 액세스망 가상화)

  • Kim, Su Min;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2085-2094
    • /
    • 2012
  • In this paper, we propose a wireless access network virtualization algorithm based on a digital unit (DU)-radio unit (RU) separated network structure in a cellular network with multiple radio access technologies (RATs). The proposed wireless access network virtualization algorithm consists of a baseline access network virtualization, RAT virtualization, and access path migration algorithms. Final wireless access network virtualization is performed by sequentially performing these procedures. Through system-level simulations which assume 3GPP LTE and WiMAX systems, the performance of the proposed wireless access network virtualization is evaluated in terms of system throughput for two scenarios according to asymmetry of network traffic load. Numerical results show that our proposed wireless access network virtualization algorithm achieves significant system throughput gain even in asymmetric traffic load and user distribution situations.

Session Management and Control Architecture for N-Screen Services (N-스크린 서비스를 위한 세션 제어 및 관리 구조)

  • Kim, Jae-Woo;Ullah, Farman;Sarwar, Ghulam;Lee, Hyun-Woo;Lee, Sung-Chang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.15-23
    • /
    • 2013
  • In this paper, we propose a session management and control architecture for N-Screen services, which enable users to change devices and transfer contents among user's devices during service by session transfer and split. In N-Screen services, users may have multiple devices with different attribute such as screen resolution, CPU capability and access network interfaces. Also, since users may change devices during service, or one user may use multiple stream, N-Screen services need to enable the user to share and transfer contents across N-Screen devices. We introduce the management and control servers to provide session split over user multiple devices and session continuity while changing device. Furthermore, the proposed architecture provides the device capabilities aware session continuity. In addition, the proposed scheme minimizes the session transfer delay and content server processing load. We present results that show the effectiveness and usefulness of proposed architecture.