• Title/Summary/Keyword: 통신교환

Search Result 2,099, Processing Time 0.032 seconds

Extending Jabber Messaging System for Effective Collaboration (효과적인 협업지원을 위한 Jabber 메시징 시스템의 확장)

  • Lee, Keon-Woong;Ahn, Geon-Tae;Hwang, Eui-Yoon;Kim, Jin-Hong;Lee, Myung-Joon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1161-1170
    • /
    • 2003
  • The BioPlace system is a web-based collaborative system which offers effective exchange of information and research activities among the genomic researchers. BioPlace supports collaborative works among the related group members through Personal Workspces and Team Workspces which are virtual spaces on the web. Jabber is an open messaging system based on XML, giving an efficient way of developing messaging services by providing various functionality for real-time communication and interoperability with other foreign messaging systems. In this paper, we have designed additional Jabber XML protocol to extend Jabber messaging system to be used as real-time communication methods on the BioPlace collaborative system. Also, according to the protocol, we have developed both the extended Jabber server and the BioPlace messenger client.

Priority Control Using Cell and Windows Counter in ATM Switchs (ATM 교환기에서 셀 및 윈도우 카운터를 이용한 우선순위 제어)

  • Kim Byun-Gon;Seo Hae-Young;Jang Ting-Ting;Park Ki-Hong;Han Cheol-Min;Kim Nam-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.3
    • /
    • pp.1-11
    • /
    • 2006
  • With the improvement of information telecommunication technology, the various service in broadband integrated services digital networks have a wide range of delay, delay jitter and cell loss probability requirements according to traffic specification. Therefore, the design of appropriate control schemes that can satisfy the cell loss, delay requirements with various traffic specification for B-ISDN is an extremely important challenging problem. In this paper, we propose a priority control scheme using a window counter and a cell counter per each type of class. In the proposed priority control scheme, for satisfying required service quality, we performed the priority control scheme using the delay/loss factors obtained by comparing window counter with cell counter. The performance of proposed control scheme is estimated by computer simulation. In the results of simulation, we verified that the proposed method satisfied per class requirements as the results showed that cell loss probability has a order of video, data, voice and delay time has a order of video, voice and data.

  • PDF

Design and Implementation of Dynamic Binding System among the Devices Located in Inside and Outside of Home Networks (홈 네트워크에서의 댁내외 기기들의 동적 바인딩 시스템 설계 및 구현)

  • Lee, Jae-Hyun;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.169-176
    • /
    • 2006
  • Since home network system is usually set up based on the built-in system inside home at the time of construction, it has a difficulty in being compatible with new devices after construction. In this paper, we propose DBS(Dynamic Binding System) that can make links effectively among the devices located in inside and outside of home networks. Implementation of the DBS is based on the ZigBee's binding in WPAN(Wireless Personal Area Network). For this research, we constructed the system consisting of home server that contains proxy server and location server, devices inside home in which tinyOS is embedded, and mobile device that is an emulator. The communication inside home is done by IEEE 802.15.4 protocol and the communication between servers and mobile devices outside home is done by TCP/IP protocol. Regardless of device's address format, the DBS facilitates a link among the devices located inside and outside of home networks. And, introducing a new device into home network can be recognized easily by exchanging messages between devices.

  • PDF

XML Document Encrypt Implementation using Elliptic Curve Cryptosystem (타원곡선 알고리즘을 이용한 XML 문서 암호 구현)

  • Ko, Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2007
  • As the use of the computer and networks generalized, the various tasks which are requested secrets can be processed such os the banking transaction. And because of increasing of data exchange, Internet, and mobile networks, the method which is not connected only but also used with many users has been changed. Especially because of the structural problem of the Internet, a lot of information is leaked out when we use the Internet banking. If we check the Internet banking by using an existing cypher method which is either simple of slow, a credit card number, an account number or password will be leaked out. Because the security of information doesn't meet our expectation, we need more powerful cryptography. But, the wasted space-time which is required shouldn,t be ignored when the whole transferred data are encrypted. So, by using both the Elliptic Curve algorithm which is based on mobile networks and the partial encryption of the DTD of XML in this essay, we will implement more faster cypher method of the partial XML.

  • PDF

Development of Web-based Flood Prevention Information system (Web 기반 홍수방재정보시스템 개발)

  • Yeo, Woon-Ki;Seo, Young-Min;Jang, Kyung-Soo;Jee, Hong-Kee;Lee, Soon-Tak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.795-799
    • /
    • 2007
  • 최근 정보통신산업이 급속도로 발전함에 따라 Internet을 이용하여 각종 정보를 쉽게 얻을 수 있게 되어 수자원 분야에도 정보의 공유와 자료의 통합이 활발히 이루어지고 있다. 또한 재해정보를 효율적이고 직관적으로 표현하기 위해서 방재업무에 GIS를 도입하고 있다. Internet을 통한 손쉬운 정보의 취득은 효율적인 재해관리에 매우 중요하며, 자료의 효율적인 관리와 표현을 위한 GIS기법 또한 필수적이다. 따라서 본 연구에서는 Internet과 GIS를 결합하여 보다 많은 사람들이 신속하고 정확한 재해정보를 얻을 수 있게 하며, 방재 업무에 활용토록 하여 재해에 의한 주민들의 생명의 위협과 재산피해를 줄이도록 하는데 그 목적이 있다. 효과적인 재해관리를 위해서는 계획과 관련된 정보, 재해발생 이력, 대상지역의 각종 정보가 통합되어 실시간으로 전달될 필요가 있다. 또한 이러한 정보들을 빠른시간내에 이해하고 분석하여 대책을 수립하고 시행해야한다. Internet GIS는 비상상황에 대비한 계획과 대처 그리고 복구사업에 있어 가장 정확하고 신속한 정보를 제공해 줄 수 있다. 즉, Internet GIS는 방대한 양의 정보를 효과적이고 지능적으로 분석이 가능하며, 이해하기 쉬운 그래픽 기반의 자료를 보여주므로 방재업무에 큰 도움을 줄 수 있다. Internet GIS를 방재정보 시스템에 이용할 경우 에 있어 장점, 약점, 기회, 위기에 대한 SWOT분석을 실시하였다. Internet이라는 환경의 장점을 그대로 이어받아 비용면에서 효과적이며 적용범위와 사용자층도 넓어지게 된다. 또한 누구나 간편하게 이용할 수 있어 협력체계 또한 쉽게 구축할 수 있으며 빠른 정보의 교환이 가능하다. 하지만, 인터넷에 의존한다는 점에 있어 서버가 자연재해에 노출될 경우 시스템 자체가 제 기능을 할 수 없으며 여러명이 동시에 서버에 접속을 하기 때문에 컴퓨터에 부하가 많이 걸리는 모델링이나 복잡한 분석은 실시하기 어려우며, 대용량 데이터를 전송할 수 있는 대역폭이 확보 되어야 한다. 또한, Internet 환경으로 개발을 해야되기 때문에 데스크탑용 GIS에 비해 개발속도가 느리며 개발 초기비용이 많이 들게 된다. 하지만, 네트워크 기술의 발달과 모바일과의 연계 등으로 이러한 약점을 극복할 수 있을 것으로 판단된다. 따라서 본 논문에서는 인터넷 GIS를 이용하여 홍수재해 정보를 검색, 처리, 분석, 예경보할 수 있는 홍수방재정보 시스템을 구축토록 하였다.

  • PDF

Anomaly Detection Mechanism against DDoS on BcN (BcN 상에서의 DDoS에 대한 Anomaly Detection 연구)

  • Song, Byung-Hak;Lee, Seung-Yeon;Hong, Choong-Seon;Huh, Eui-Nam;Sohn, Seong-Won
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.55-65
    • /
    • 2007
  • BcN is a high-quality broadband network for multimedia services integrating telecommunication, broadcasting, and Internet seamlessly at anywhere, anytime, and using any device. BcN is Particularly vulnerable to intrusion because it merges various traditional networks, wired, wireless and data networks. Because of this, one of the most important aspects in BcN is security in terms of reliability. So, in this paper, we suggest the sharing mechanism of security data among various service networks on the BcN. This distributed, hierarchical architecture enables BcN to be robust of attacks and failures, controls data traffic going in and out the backbone core through IP edge routers integrated with IDRS. Our proposed anomaly detection scheme on IDRS for BcN service also improves detection rate compared to the previous conventional approaches.

  • PDF

The Design and Implementation of a Security Management Server for Pre-Distributed Key Exchange Method and Lightweight Key Distribution Protocol for Mobile Ad-hoc Node (이동 Ad-hoc 노드용 사전 키 분배 기법 및 경량 키 분배 프로토콜을 위한 보안관리 서버 시스템 설계 및 구현)

  • Yang, Jong-Won;Seo, Chang-Ho;Lee, Tae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.1-8
    • /
    • 2007
  • The Mobile Ad-hoc network does environmental information which an individual collects in nodes which are many as the kernel of the USN technology based on the radio communication. And it is the latest network description delivering critical data to the destination location desiring through a multi-hop. Recently, the Ad-hoc network relative technique development and service are activated. But the security function implementation including an authentication and encoding about the transmitted packets, and etc, is wirelessly the insufficient situation on the Ad-hoc network. This paper provides the security service of key exchange, key management. entity authentication, data enciphering, and etc on the Mobile Ad-hoc network. It implements with the Ad-hoc network security management server system design which processes the security protocol specialized in the Ad-hoc network and which it manages.

  • PDF

Improvement of Service Location Discovery and Download Protocol in Wide Area Network (광역망에서의 서비스 위치 탐색 및 다운로드 프로토콜의 개선)

  • Huh, Duck-Haing;Kim, Han-Kyoung
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.55-62
    • /
    • 2011
  • To make service location protocol of IETF which is to be used in the wide area network to discover the location of desired service when computing resources are connected to the network, and to support simless connectivity between wired and wireless network in service viewpoint, to support the diversity trend of service agents in WIF, it needs to improve SLP, so as to add Liaison Agent and Forwarding Agent with FAAdvert message that is to communicate in between those entities. LA entity confirms the location of service located in wide area network, and FA transfers service information. The usage of existing messages such as SrvRqst, SrvRply, AttrRqst, AttrRply, DAAdvert, SrvReg, SrvAck, SrvDeReg is same as ever in wide area service network. The behaviors of improved protocol is modeled into petri-net and prove that it is free of deadlock and live-lock by execution of the model.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

Architecture and Feasibility Evaluation of VSN (Virtual Switch Network) based Mobile ATM Switching System (VSN (Virtual Switch Network) 기반의 이동 ATM 교환기 구조 및 타당성 평가)

  • Kim, Dae-Sik;Han, Chi-Moon;Ryu, keun-Ho
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.10
    • /
    • pp.40-50
    • /
    • 1999
  • The novel network architecture is recently required to accommodate a variety and intelligence of communication services. It is also required to provide customized network functions and to efficiently satisfy a various user's requirements. Accordingly, open network architecture based on ATM transport network features has been mainly studied in communication network. This paper evaluates the VSN(Virtual Switch Network) characteristics in the call processing of IMT-2000 switching system, which is composed of VSN instead of ATM switch network. VSN means switch network which is composed of ATM transport network. As a result, this paper proposes new VSN based ATM-MSC architecture with integrated call and connection control systems. and evaluates call processing delay characteristics using call process procedures. Internal call processing delay is increased approximately 3.5msec than the conventional ATM switching system. The experimental values applied in the analysis condition are the load 0.8, and the 100km distance between CCCPs(Call and Connection Control Processors) and VSNs. It is confirmed that the VSN has the potentiality in the practical implementation.

  • PDF