• Title/Summary/Keyword: 융합네트워크

Search Result 1,994, Processing Time 0.024 seconds

Multi-Line Data Gathering Scheme for Efficient Operation of a Mobile Sink in Solar-Powered Wireless Sensor Networks (태양 에너지 수집형 무선 센서 네트워크에서 모바일 싱크의 효율적 운용을 위한 멀티라인 데이터 수집 기법)

  • Lee, Seungwoo;Kang, Minjae;Son, Youngjae;Gil, Gun Wook;Cheong, Seok Hyun;Bae, Ha Neul;Noh, Dong Kun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.135-138
    • /
    • 2020
  • 무선 센서 네트워크에서 모바일 싱크의 도입은 기존의 고정된 위치의 싱크를 사용하는 WSN에서 발생하는, 싱크 주변 노드들과 외곽 노드들 간의 에너지 불균형 문제(에너지 핫스팟 문제)를 어느 정도 해결할 수 있게 하였다. 그러나 모바일 싱크의 에너지 제약으로 인해 싱크가 모든 노드를 방문하여 데이터를 수집할 수 없기 때문에, 앵커(또는 헤드)라고 불리는 특정 노드에서 데이터를 모으고, 모바일 싱크는 이러한 앵커 노드들만을 방문하는 방법이 널리 사용되고 있다. 최근 연구에서는 모바일 싱크가 보다 효율적으로 에너지 불균형 문제를 해결하기 위하여 모바일 싱크 이동 경로 및 앵커 노드 선정 최적화 방법이 활발히 연구되고 있다. 본 연구에서는 태양 에너지 기반 센서 네트워크를 위한 영역 기반 앵커 선정 기법 및 모바일 싱크 이동 경로 선택 기법을 제안한다. 제안 기법은 각 노드가 수집하는 태양 에너지의 활용을 최대화하고, 에너지 핫스팟 문제를 완화하기 위해 두 개의 라인(영역)을 설정하고 이 라인을 따라 앵커 노드가 선정된다. 모바일 싱크는 데이터 수집을 위해 이 두 라인을 왕복 이동 경로로 택하여 라인 내의 앵커 노드를 방문한다. 실험을 통해 제안 기법이 기존 기법보다 에너지 불균형 문제가 완화되어 노드의 정전 시간이 줄어들고, 이에 따라 모바일 싱크에서 수집되는 데이터의 양이 증가하는 것을 확인하였다.

  • PDF

A Reservation based Network Resource Provisioning Testbed Using the Integrated Resource Management System (통합자원관리시스템을 이용한 예약 기반의 네트워크 자원 할당 테스트베드 망)

  • Lim, Huhn-Kuk;Moon, Jeong-Hoon;Kong, Jong-Uk;Han, Jang-Soo;Cha, Young-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1450-1458
    • /
    • 2011
  • The HPcN (Hybrid & high Performance Convergence Network) in research networks means environment which can provide both computing resource such as supercomputer, cluster and network resource to application researchers in the field of medical, bio, aerospace and e-science. The most representative research network in Korea, KREONET has been developing following technologies through the HERO (Hybrid Networking project for research oriented infrastructure) from 200S. First, we have constructed and deployed a control plane technology which can provide a connection oriented network dynamically. Second, the integrated resource management system technology has been developing for reservation and allocation of both computing and network resources, whenever users want to utilize them. In this paper, a testbed network is presented, which is possible to reserve and allocate network resource using the integrated resource management system. We reserve network resource through GNSI (Grid Network Service Interface) messages between GRS (Global Resource Scheduler) and NRM (Network Resource Manager) and allocate network resource through GUNI (Grid User Network Interface) messages between the NRM (network resource manager) and routers, based on reservation information provided from a user on the web portal. It is confirmed that GUNI interface messages are delivered from the NRM to each router at the starting of reservation time and traffic is transmitted through LSP allocated by the NRM.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

AAA Mechanism for the Integration between Heterogeneous Network in Wireless Network Roaming Environment (무선 네트워크 로밍 환경에서 이기종 네트워크간 연동을 위한 AAA 메커니즘)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.481-492
    • /
    • 2008
  • With the advancement of the Internet and networks, the combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security vulnerability. Also, form of service that users offer will be service for roaming user. In these service, we must provide fast authentication and security at roaming. Therefore in this paper we proposed roaming and AAA mechanism in heterogeneous network environment. Our system provides secure communication and efficiency.

A Inter-layer Path Provisioning System Architecture in Multi-layer Networks (다계층 광네트워크에서 계층간 경로설정 시스템 구조 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.25-31
    • /
    • 2013
  • Looking at the recent value change of users and the usage pattern of network users, it is changing from simple web information, one-way information acquisition and data transmission to increase of usage of multimedia, increasing demand for security and customization, and increasing demands for free mobility. Due to this change of demand, the services which were provided individually, developed into a form which is merged, the network also seems to develop into the combined network from the individual network for individual service, and the communication network control technology which is the core technology is also rapidly developing. To reflect the users' demands, the next generation network created the multi-layer network which is based on the WDM/IP transmission system and added the to make it easy to restructure. P-OTS (Packet-Optical Transport System) can be defined as a platform that combines SONET/SDH, Ethernet, DWDM, optical transport network (OTN) switching and reconfigurable optical add-drop multiplexers (ROADMs). In this paper, we suggested that the optimum path choice be performed through diversification of the PCE-based path selection using the information of various layers altogether in the multi-layer environment, compared with the established path selection method when the path was selected using the information of each layers.

Polling Method based on Weight Table for Efficient Monitoring (효율적인 모니터링을 위한 가중치 테이블 기반의 폴링기법)

  • Mun, Hyung-Jin
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.5-10
    • /
    • 2015
  • With the advance of ICT, understanding the condition of network and analysing network monitoring have become an important issue. On the TCP/IP network, SNMP is the typical protocol that catches the condition of network by using polling method. If polling method is implemented for a long period, to catch the change of the condition of the network is not easy. On the other hand, in case of short-term polling, even if it could catch the condition of the network in real time, responsive messages to results of the polling cause the increase of traffic and therefore burden the network. There have been studies to control the overhead of responsive messages by controlling the polling period. However, not considering the characteristics of an agent, and running randomly, they cannot decrease the overhead although they would have an instant effect. This paper suggests an efficient polling method that decreases the traffic overhead of polling and catches the condition of the network in real time. Proposed method an polling for a short period and gave weight based on the characteristics of agents to catch the network condition, and a manager decided polling differentially based on the weight so that it decreased the overhead of polling traffic.

  • PDF

A Designing Method of Intranet Security Architecture Model for Network Security Efficiency (보안 효율성 제고를 위한 인트라넷 네트워크 아키텍쳐 모델)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.9-17
    • /
    • 2010
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security architecture is the concept to distinguish the architecture from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security architecture could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every architecture. For the establishment of security architecture it is needed to show what criterion of net work should be set up. This study is based on analysis of diagnostic weakness structure in the network security architecture and research the criterion for topology factor, security architecture structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture.

A Study on Efficient Network Topology Visualization using Node Centrality (노드 중심성을 이용한 효율적 네트워크 토폴로지 시각화 연구)

  • Chang, Beom-Hwan;Ryu, Jemin;Kwon, Koohyung
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.47-56
    • /
    • 2021
  • Network topology visualization has been studied a lot since the past and developed with many tools. The network topology has strength in understanding the overall structure of a network physically and is useful for understanding data flow between nodes logically. Although there are existing tools, not many can be utilized efficiently while using the general network node data structure and express the topology similar to the actual network structure. In this paper, we propose an efficient method to visualize topology using only connection information of network nodes. The method finds the central node by using the centrality, the influence of nodes in the network, and visualizes the topology by dynamically segmenting all nodes and placing network nodes in 3D space using the weight of the child node. It is a straightforward method, yet it effectively visualizes in the form of an actual network structure.

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

방송통신 융합 환경을 위한 MPEG-21 기술

  • 남제호;홍진우;김진웅
    • Broadcasting and Media Magazine
    • /
    • v.8 no.3
    • /
    • pp.4-18
    • /
    • 2003
  • 디지털방송의 도입과 이동통신기술의 눈부신 발전에 힘입어 최근 국내외적으로 본격화되고 있는 방송통신 융합 추세는 정보통신환경에서의 새로운 패러다임의 등장을 예고한다. 본 고에서는 다양한 네트워크 환경 및 상이한 사용자 단말기들이 혼재되어질 방송통신 융합 환경에서 멀티미디어 콘텐츠의 생성, 저작, 전달, 소비, 보호, 관리 및 유통 등 콘텐츠 운용의 전 과정에 걸친 하부 기반구조 들을 총체적으로 통합, 관리, 체계화하는 '멀티미디어 프레임워크'를 제공하는 MPEG-21 표준기술을 방송 통신 융합 관점에서 조망해본다.