• Title/Summary/Keyword: Internet Protocol

Search Result 2,426, Processing Time 0.031 seconds

Performance Evaluation of iSER on Storage system using Infiniband fabric (인피니밴드기반 저장장치에서의 iSER(iSCSI Extension for RDMA) 성능평가)

  • Kim, Young Hwan;Son, Jae-Gi;Jung, Hye-Dong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.148-150
    • /
    • 2013
  • 최근 TCP/IP에서 세션을 통하여 노드들 간의 통신을 연결하는 방식에서 현재는 하나의 채널을 통해 고속의 I/O가 가능하도록 하는 인피니밴드 같은 기술이 많이 연구되고 있다. 인피니밴드는 프로세싱 노드와 입출력 장치 사이의 통신, 프로세스간 통신에 대한 산업 표준이 되고 있고 프로세싱 노드와 입출력 장치를 연결하기 위해 스위치 기반의 상호 연결은 전통적인 버스 입출력을 대체하는 새로운 입출력 방식이다. 또한 인피니밴드에서는 현재 이슈가 되고 있는 RDMA 방식을 이용해 원격지 서버들간에 직접 메모리 접근 방식을 통해 CPU와 OS의 로드를 최소화하고 있다. 본 논문에서는 인피니밴드 네트워크를 이용하는 저장장치 접근 프로토콜인 iSER(iSCSI Extension RDMA Protocol)와 기존 이더넷망에서 사용되는 iSCSI(Internet SCSI) 프로토콜을 이용하여 서버와 저장장치 간의 IOPS 와 초당 데이터 전송량에 대한 성능을 평가한다. 우리는 성능평가를 위해 Intel에서 제공하는 저장장치 I/O 성능평가 도구인 IO meter를 이용했다.

A study on Kerberos Authentication mechanism (Kerberos 인증메커니즘에 관한 연구)

  • Kim Cheol-hyun;Lee Yon-Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.53-64
    • /
    • 2005
  • In this paper, proposes Kerberos certification mechanism that improve certification service of PKINIT base that announce in IETF CAT Working Croup. Also proposed Authentication Mechanism for reusability of Ticket that after Ticket's Lifetime is ended, message exchange that Local Client receives Remote Server's service. Since my suggestion to regional services are not described in Kerberos, authentication between regions can be performed via PKINIT(Public Key Cryptography for Initial Authentication) presented by IETF(Internet Engineering Task Force) CAT working group. The new protocol is better than the authentication mechanism proposed by IETF CAT Working group in terms of communication complexity and mechanism according to simplified Ticket issue processing.

Countermeasures to the Vulnerability of the Keyboard Hardware (키보드컨트롤러의 하드웨어 취약점에 대한 대응 방안)

  • Jeong, Tae-Young;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.187-194
    • /
    • 2008
  • This paper proposes an effective countermeasure to an intrinsic hardware vulnerability of the keyboard controller that causes sniffing problem on the password authentication system based on the keyboard input string. Through the vulnerability, some possible attacker is able to snoop whole the password string input from the keyboard even when any of the existing keyboard protection software is running. However, it will be impossible for attackers to gather the exact password strings if the proposed policy is applied to the authentication system though they can sniff the keyboard hardware protocol. It is expected that people can use secure Internet commerce after implementing and applying the proposed policy to the real environment.

Selection of Detection Measure using Traffic Analysis of Each Malicious Botnet (악성 봇넷 별 트래픽 분석을 통한 탐지 척도 선정)

  • Jang, Dae-Il;Kim, Min-Soo;Jung, Hyun-Chul;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.37-44
    • /
    • 2011
  • Recently malicious activities that is a DDoS, spam, propagation of malware, steeling person information, phishing on the Internet are related malicious botnet. To detect malicious botnet, Many researchers study a detection system for malicious botnet, but these applies specific protocol, action or attack based botnet. In this reason, we study a selection of measurement to detec malicious botnet in this paper. we collect a traffic of malicious botnet and analyze it for feature of network traffic. And we select a feature based measurement. we expect to help a detection of malicious botnet through this study.

On the Need for Efficient Load Balancing in Large-scale RPL Networks with Multi-Sink Topologies

  • Abdullah, Maram;Alsukayti, Ibrahim;Alreshoodi, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.212-218
    • /
    • 2021
  • Low-power and Lossy Networks (LLNs) have become the common network infrastructure for a wide scope of Internet of Things (IoT) applications. For efficient routing in LLNs, IETF provides a standard solution, namely the IPv6 Routing Protocol for LLNs (RPL). It enables effective interconnectivity with IP networks and flexibly can meet the different application requirements of IoT deployments. However, it still suffers from different open issues, particularly in large-scale setups. These include the node unreachability problem which leads to increasing routing losses at RPL sink nodes. It is a result of the event of memory overflow at LLNs devices due to their limited hardware capabilities. Although this can be alleviated by the establishment of multi-sink topologies, RPL still lacks the support for effective load balancing among multiple sinks. In this paper, we address the need for an efficient multi-sink load balancing solution to enhance the performance of PRL in large-scale scenarios and alleviate the node unreachability problem. We propose a new RPL objective function, Multi-Sink Load Balancing Objective Function (MSLBOF), and introduce the Memory Utilization metrics. MSLBOF enables each RPL node to perform optimal sink selection in a way that insure better memory utilization and effective load balancing. Evaluation results demonstrate the efficiency of MSLBOF in decreasing packet loss and enhancing network stability, compared to MRHOF in standard RPL.

A Study on the Development for Environment Monitoring System of Micro Data Center (마이크로 데이터센터의 환경 모니터링 시스템 개발 연구)

  • Lee, Kap Rai;Kim, Young Sik
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.355-360
    • /
    • 2022
  • In this paper, we present design and developing method for EMS(environment monitoring system) of micro data center. This developing EMS monitors operating environment of micro data center and analyze sensing data through IoT(Internet of things) sensors in real time. Firstly we present configuration method of IoT sensing package and design method EMS hardware platform. Secondly we design data collector software for data collection of IoT sensor with different protocol and develop monitoring software of EMS. The data collector software consists of sensor collector module and collector manager module. Also we design EMS software which has micro service architecture structural style and component based business logic.

Hierarchical Location Mobility Management using MobilityManagement Points in IP networks

  • Park, Chul Ho;Oh, Sang Yeob
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.8
    • /
    • pp.1069-1074
    • /
    • 2022
  • IP mobility can be handled in different layers of the protocol. Mobile IP has been proposed to handle the mobility of Internet hosts in the network layer. Recently, a new method based on the SIGMA mobility architecture has been proposed to support mobility management with reduced packet loss and latency. The location management structure is not suitable for frequent mobile handover due to the high mobility of the user with this transport layer solution. In this paper, we propose a location management optimization method in a mobile communication network by applying hierarchical location management using MMPs(Mobility Management Points) for transport layer mobility management. Therefore, we propose an efficient hierarchical mobility management structure even between heterogeneous wireless networks using MMPs for the probability that a mobile terminal can change multiple location areas between two messages and calls. The proposed method shows reduction in location update cost and data retrieval cost using MMPs, and as opposed to mobility appearing in time intervals with the minimum cost required to reach 90% of the stabilized cost, the mobility location update search, location It was found that the message processing cost per area was reduced.

Full-scale bridge expansion joint monitoring using a real-time wireless network

  • Pierredens Fils;Shinae Jang;Daisy Ren;Jiachen Wang;Song Han;Ramesh Malla
    • Structural Monitoring and Maintenance
    • /
    • v.9 no.4
    • /
    • pp.359-371
    • /
    • 2022
  • Bridges are critical to the civil engineering infrastructure network as they facilitate movement of people, the transportation of goods and services. Given the aging of bridge infrastructure, federal officials mandate visual inspections biennially to identify necessary repair actions which are time, cost, and labor-intensive. Additionally, the expansion joints of bridges are rarely monitored due to cost. However, expansion joints are critical as they absorb movement from thermal effects, loadings strains, impact, abutment settlement, and vehicle motion movement. Thus, the need to monitor bridge expansion joints efficiently, at a low cost, and wirelessly is desired. This paper addresses bridge joint monitoring needs to develop a cost-effective, real-time wireless system that can be validated in a full-scale bridge structure. To this end, a wireless expansion joint monitoring was developed using commercial-off-the-shelf (COTS) sensors. An in-service bridge was selected as a testbed to validate the performance of the developed system compared with traditional displacement sensor, LVDT, temperature and humidity sensors. The short-term monitoring campaign with the wireless sensor system with the internet protocol version 6 over the time slotted channel hopping mode of IEEE 802.15.4e (6TiSCH) network showed reliable results, providing high potential of the developed system for effective joint monitoring at a low cost.

DMX over IP based LED Lighting Control Networks Analysis (DMX over IP의 LED 조명 제어 네트워크 분석)

  • Kim, Youjin;Kim, Insu;Park, Seong-hee;Kang, Tae-gyu;Han, Dong-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.559-560
    • /
    • 2009
  • 네트워크를 이용한 LED 조명의 제어는 최근 IP(Internet Protocol)을 이용한 조명 제어와 융합되어 단순한 디밍(Dimming)제어 뿐만 아니라, 미디어 파사드(Media facade), 카이네틱 아트(Kinetic Art)등의 새로운 조명 분야로 범위가 확대 되고 있다. 본 논문에서는 다양화 되는 네트워크 기반의 제어 방식 중 DMX over IP 에 대하여 멀티케스트-다중화 방식(Multicast & Multiplexing)으로 분석 및 시뮬레이션 하였다. 그 결과 1 만개 이상의 채널 수를 가지는 규모가 큰(large volume) 조명 네트워크 시스템의 경우 채널의 개수 증가가 delay-throughput 에 영향이 적음을 알 수 있다.

A study on the Collection and Conveyance Service of the Management Data of Surface Facilities (지상시설물 관리를 위한 데이터 수집 및 전송 서비스에 관한 연구)

  • Lee, Byung-Bog;Bae, Myung-Nam;Choi, Byeong-Cheol;Lee, In-Hwan;Kim, Nae-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1049-1052
    • /
    • 2009
  • 본 논문에서는 센서노드들을 관리 대상이 되는 지상시설물에 부착하여 다양한 사건 및 상황 감지 기능을 가지고 수집한 데이터를 특정 메시지 형식으로 정의하여 IP(Internet Protocol) 네트워크에 연결된 운용자 시스템에 전달하는 센싱 데이터 수집 및 전달 서비스 개발에 관한 사항들을 기술한다. 센싱 데이터 수집 및 전달 서비스는 게이트웨이 시스템에 설치되는 순수 소프트웨어이며, 센서네트워크의 싱크노드로 부터 센싱 데이터를 수집하여 XML 형식으로 구성되어 IP 네트워크에 연결된 운용자 시스템에 전달된다. 또한, 센싱 데이터 수집 및 전달 서비스는 운용자가 요구하는 센서네트워크 제어 서비스 컴포넌트, 센싱 데이터 수집에 관한 특성 변경 서비스 컴포넌트, 센싱 데이터 보고 서비스 컴포넌트, XML 파서/인코더, C-구조체 메시지 파서/인코더 컴포넌트 등의 추가 및 변경이 용이한 유연한 소프트웨어 구조를 갖도록 서비스 로직 개념을 도입하였다.