• Title/Summary/Keyword: 프록시 구조

Search Result 53, Processing Time 0.017 seconds

Implementation and Performance Evaluation of the Smart Meter Concentrator Control Protocol for Advanced Metering Infrastructure (차세대 검침 기반구조를 위한 스마트 미터 집중기 제어 프로토콜의 구현과 성능분석)

  • Jang, Soon-Gun;Choi, In-Ji;Park, Byoung-Seok;Kim, Young-Hyun;Yoon, Chong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.3
    • /
    • pp.41-49
    • /
    • 2011
  • In this paper, we propose an open protocol to be employed between a smart meter concentrator and a metering data collection server, and also evaluate its performance. Legacy concentrators performs the connection establishment and data gathering operations with DLMS/COSEM protocol standards. However, we note that there are no standardized protocols between the concentrator and the collection server, which inevitably conduces each commercial smart metering system to have its own proprietary protocol. In order to solve this problem, we propose an open protocol - Smart Meter Concentrator Control Protocol(SMCCP) by extending the existing standard protocol(DLMS/COSEM). The SMCCP can provide the proxy mode to enable efficient transmission between the concentrator and the data collection server. It also can support the relay mode to enable a direct communication between the data collection server and each far end smart meter. We also implement an emulator system and a protocol analyzer to provide its operation. In addition, we evaluate the session holding time and the link usage ratio in both relay and proxy modes with OMNET++ simulator.

A Study on the Development of Electronic Resource Management System in a University Library (대학도서관 전자자원관리시스템(ERMS) 구축에 관한 연구)

  • Kim, Yong;Cho, Su-Kyeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.249-276
    • /
    • 2010
  • With the rapid growth and development of information technology and the Internet, the amount of information published in electronic formats such as video, audio, digitalized text, etc. and the number of users accessing information online to satisfy their information needs are growing at a tremendous rate. This study analyzes standardized components to construct ERMS and proposes a model of ERMS based on the result of the analysis. The main functions of ERMS in university libraries are: 1) ERMS can manage and control access information to various electronic resources, metadata, holdings, user resources. Also, ERMS can be compatible with an existing library system such as IR(Information Retrieval) system, linking system, or proxy system. 2) ERMS should completely be compatible with acquisition and cataloging systems for effective management and control of integrated information organization and library budget. 3) ERMS should systematically and effectively manage license information on electronic resources. 4) ERMS should provide ideal and effective environment for use and access control of electronic resources in a library and integrated tool to manage and control all of electronic resources. Additionally, this study points out the need to organize committee groups to establish standardized rules and collaborative management of electronic resources among university libraries like DLF ERMI and redesign organizations in a library and a librarian's job description.

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.