• Title/Summary/Keyword: 주소정보

Search Result 1,330, Processing Time 0.03 seconds

Log-based Wireless Sensor Network Simulator (로그 기반 무선 센서 네트워크 시뮬레이터)

  • Cho, Min-Hee;Son, Cheol-Su;Kim, Won-Jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.845-848
    • /
    • 2008
  • In case of application test in wireless sensor network, there are many difficulties in power supplying to wireless sensor node, installing and deploying of sensor nodes, maintaining and debugging. For efficient development and maintenance of wireless sensor network-based application, a simulator is essentially needed. However, the existing wireless sensor network simulators are focused to distribution of MAC address, routing, power management, it is not suitable to test the function of application in host which processes message through sink node. In this paper, we designed and implemented a log-based simulator for application running in host connected sink node.

  • PDF

A Study on the Efficient Label Management Methods in High-Speed IP Switching Networks (고속 IP 교환망에서 효율적인 레이블 관리 방식에 관한 연구)

  • Shim, Jae-Hun;Chang, Hoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.527-538
    • /
    • 2004
  • In this paper, we present the flow aggregation method and the FLTC(flow lasting time control) algorithm to reduce the number of flows and solve the scalability problem in high speed IP switching networks. The flow aggregation based on the destination address could reduce the total number of flows, improve the label efficiency, and increase the total amount of the switched packets. The FLTC algorithm also eliminates the waste of label by deleting the flow binding efficiently. With the traces of real Internet traffics, we evaluate the performance of these schemes by simulation. The label efficiency, the average number of label used, and the percentage of packets switched and the number of packets switched are used as performance measures for this simulation.

FPGA-based Hardware Implementation of Cryptography Algorithm ARIA (암호화 알고리즘 ARIA의 FPGA기반 하드웨어 구현)

  • Kim Young-Soo;Cho Sun-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1229-1236
    • /
    • 2006
  • Group oriented multicast service is a prerequisite for the current application system for remote lecture and customer service. IP multicast is used to be generally accepted as an internet standard. IP multicast which is designed to support network based replication model can efficiently use host and network resource, however it has some weak points that it has to support IP multicast in the internet by adding multicast-capable internet infrastructure such as router and is vulnerable to security by using public IP address for group identifier. Therefore we propose the trigger based application level multicast model that can enhance both scalability and security by separating the functions, which send and receive message to solve these problems. Our suggested model is expected to ensure the promotion of quality of service and reliability.

Sensor Network Deployment for Warehouse Management System based on RFID (RFID 기반 물류창고 시스템을 위한 센서 네트워크 구축)

  • Lee, Shin-Hyoung;Lee, Chi-Yung;Kim, Dong-Shin;Lee, Chan-Haeng;Lee, Won-Jun;Min, Sung-Gi;Yoo, Hyuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.22-30
    • /
    • 2008
  • Warehouse has many changes for the stocks by entering and taking. Management about the stocks is important. To manage, sensor network based on RFID is deployed in warehouse. Sensor network uses fluster based on energy and hierarchical routing. Supporting mobility between clusters makes guarantee connectivity for mobile nodes.

Extraction of Landmarks for Pedestrian Navigation System (보행자 내비게이션 시스템을 위한 랜드마크 추출 방법)

  • Rho, Gon-Il;Kim, Ji-Young;Yu, Ki-Yun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.4
    • /
    • pp.413-420
    • /
    • 2011
  • This study is to extract landmark buildings for pedestrian navigation from the existing spatial data sets automatically. At first, we defined candidates for landmark based on sight of pedestrian, then extracted final landmark by evaluating attributes of each candidate. The attribute is evaluated with relative or absolute criteria depending on the nature of each attribute. Landmarks extracted through the proposed method are compared to existing landmarks for vehicle and assessment of the validity and the applicability is performed. As a result, extracted Landmarks are expected to help guiding pedestrian effectively.

The intruder traceback mechanism based on active networks (액티브 네트워크 기반 침입자 역추적 메커니즘)

  • Lee Young-seok
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2005
  • Recently, the patterns of cyber attack through internet have been various and have become more complicated and thus it is difficult to detect a network intruder effectively and to response the intrusion quickly. Therefore, It is almost not possible to chase the real location of a network intruder and to isolate the Intruder from network in UDP based DoS or DDoS attacks spoofing source IP address and in TCP based detour connection attacks. In this paper, we propose active security architecture on active network to correspond to various cyber attacks promptly. Security management framework is designed using active technology, and security control mechanism to chase and isolate a network intruder is implemented. We also test the operation of the active security mechanism implemented on test_bed according to several attack scenarios and analyze the experiment results.

  • PDF

Communication protocol for multi subscribers using radio equipments based on CSMA/CA (CSMA/CA 기반 무전기를 통한 다중가입자 통신 프로토콜)

  • Jang, Myung-Jin;Park, Seong-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2385-2390
    • /
    • 2010
  • The PRC-999K radio widely used in Korean Army is half-duplex and also has the broadcasting radio wave character that all subscribers listen when one subscriber speaks in time. The radio data communication system configures a 1:1 unicast network between a command post and network members in a military fire control system. The system also applies CSMA/CA technique to avoid data collision and additionally applies SDLC protocol for efficiency and fast communication. This paper shows that allocating address to network members in serial order can reduce data transmitting/receiving time, and thereby a command post needs to broadcast data only one time and the assigned members can reply in order without data collision. It is validated through an experimental test.

An Architecture of Vector Processor Concept using Dimensional Counting Mechanism of Structured Data (구조성 데이터의 입체식 계수기법에 의한 벡터 처리개념의 설계)

  • Jo, Yeong-Il;Park, Jang-Chun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.167-180
    • /
    • 1996
  • In the scalar processing oriented machine scalar operations must be performed for the vector processing as many as the number of vector components. So called a vector processing mechanism by the von Neumann operational principle. Accessing vector data hasto beperformed by theevery pointing ofthe instruction or by the address calculation of the ALU, because there is only a program counter(PC) for the sequential counting of the instructions as a memory accessing device. It should be here proposed that an access unit dimensionally to address components has to be designed for the compensation of the organizational hardware defect of the conventional concept. The necessity for the vector structuring has to be implemented in the instruction set and be performed in the mid of the accessing data memory overlapped externally to the data processing unit at the same time.

  • PDF

O(1) IP Lookup Scheme (O(1) IP 검색 방법)

  • 이주민;안종석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.1-3
    • /
    • 2002
  • 백본 라우터에서의 최장 길이 프리픽스 검색(LPM: Longest Prefix Matching) 속도를 향상시키기 위해 활발히 연구된 방식들은 계산 량과 사용 메모리 량을 교환하는 방식들이다. 이러한 방식들은 성능향상을 위해서 대용량의 포워딩 테이블(Forwarding Table)을 캐쉬(Cache)에 저장할 수 있는 소용량 인덱스 테이블(Index Table)로 압축함으로써 고속 캐쉬 접근 회수와 그 계산량은 증가하는 대신 저속 메모리 접근 회수를 줄이는 방식이다.〔1〕본논문에서는 저속 메모리 사용량이 증가하는 반면 저속 메모리의 접근 빈도와 계산량을 동시에 감소시키는 FPLL(Fixed Prefix Length Lookup) 방식을 소개한다. 이 방식은 포워딩 엔트리(Entry)들을 프리픽스의 상위 비트(Bit)에 의해 그룹으로 나누고, 각 그룹에 속하는 엔트리들을 같은 길이로 정렬한다. FPLL에서의 LPM검색은 목적지 주소가 속하는 그룹들의 길이를 계산하여 검색할 최장 프리픽스의 길이를 미리 결정하고, 결정된 프리픽스를 키(key)로 하여 해시 테이블(Hash Table)로 구성된 포워딩 테이블에서 완전 일치(Exact Matching) 검색을 한다. 완전 일치 검색을 위해 같은 그룹에 속한 엔트리들을 정렬할 필요가 있는데 이 정렬을 위해 여분의 포워딩 테이블 엔트리가 생성된다. 3만개 엔트리를 갖는 Mae-West〔2〕 경우에, FPLL방식은 12만개 정도의 여분의 엔트리가 추가로 생성되는 대신에 1번 캐쉬 접근과 O(1)의 복잡도를 갖는 해시 테이블 검색으로 LPM 검색을 수행한다.

  • PDF

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection (DB 보호를 위한 Protocol Redirection기반 트래픽 중앙통제시스템 개발)

  • Su, Yang-Jin;Lee, Jae-Pil;Park, Cheon-O;Lee, Deok-Gyu;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1212-1220
    • /
    • 2010
  • The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.