• Title/Summary/Keyword: Legacy Service

Search Result 230, Processing Time 0.03 seconds

A Monitoring System based on Layered Architecture (계층형 구조를 기반으로 한 모니터링 시스템)

  • Kwon Sung-Ju;Choi Jae-Young;Lee Ji-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.7
    • /
    • pp.440-447
    • /
    • 2006
  • Grid computing is the complex deployments of various hardware and software components. The Grid environment should provide a mechanism for real-time monitoring and notification. It is very important to implement a monitoring mechanism in the Grid environment. Most existing monitoring systems only focus on their own requirements. With the development of Grid computing technology, the extensible monitoring systems become more and more feasible and popular. In this paper, we describe our research and development works on M-Mon, a novel framework for the flexible and adaptive Grid monitoring system. M-Mon system focuses on some critical issues like scalability, reusability, runtime extensibility, protocol transparency and uniform data representation. To provide interoperability with other monitoring systems and to reuse legacy facilities with a minimum effort, our monitoring system has been developed using service-oriented architecture.

A Method for Specifying the Access Control of XML Document using Process Algebra (프로세스 대수를 이용한 XML 문서의 접근권한 표현법)

  • Lee, Ji-Yeon;Kim, Il-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.251-258
    • /
    • 2007
  • With the increase of a web service technology, a new access control mechanism has developed for XML documents. As a result, as legacy access control systems, access control systems has become an active research topic. In this paper, we propose a methodology to translate access control policies for XML documents into formal specification language CSP. To do this, first, we introduce a method to translate a hierarchical access to XML documents using XPath language into CSP process algebra. Second, we explain a method to represent a XML schema as a formal model like automata. Third, we present a method for representing the semantics of access control policies such as the scope of rules and confliction resolution into a process algebra language. Finally, a CSP specification example of an XML schema and path expressions aye shown to illustrate the validity of our approach.

  • PDF

An Exploratory Study on Linking ISAD(G) and CIDOC CRM Using KARMA (KARMA를 활용한 ISAD(G)와 CIDOC CRM 연계에 관한 탐색적 연구)

  • Park, Zi-young
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.18 no.2
    • /
    • pp.189-214
    • /
    • 2018
  • Archival description is considered as a creation and curation process, and the results of the descriptive records can be used for archival information service. Therefore, various archival descriptive standards provide essential guidelines for establishing a semantic and synthetic structure of the archival records. In this study, the structural aspects of the archival descriptive standards were analyzed and an experimental mapping between General International Standard Archival Description (ISAD(G)), the archival standard, and CIDOC Conceptual Reference Model (CIDOC CRM), the domain ontology of cultural heritage field was performed. The data structure of ISAD(G) is examined in advance and mapping was performed using Karma as a platform. It was thus concluded that there is a need to understand the ontology-based mapping method and the event-focused domain ontology. Moreover, developing a CIDOC CRM-compatible archival ontology and restructuring the legacy ISAD(G) are needed.

Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks (링크 플러딩 공격 완화를 위한 소프트웨어 정의 네트워크 기반 허니넷)

  • Kim, Jinwoo;Lee, Seungsoo;Shin, Seungwon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.152-155
    • /
    • 2018
  • Over the past years, Link Flooding Attacks (LFAs) have been introduced as new network threats. LFAs are indirect DDoS attacks that selectively flood intermediate core links, while legacy DDoS attacks directly targets end points. Flooding bandwidth in the core links results in that a wide target area is affected by the attack. In the traditional network, mitigating LFAs is a challenge since an attacker can easily construct a link map that contains entire network topology via traceroute. Security researchers have proposed many solutions, however, they focused on reactive countermeasures that respond to LFAs when attacks occurred. We argue that this reactive approach is limited in that core links are already exposed to an attacker. In this paper, we present SDHoneyNet that prelocates vulnerable links by computing static and dynamic property on Software-defined Networks (SDN). SDHoneyNet deploys Honey Topology, which is obfuscated topology, on the nearby links. Using this approach, core links can be hidden from attacker's sight, which leads to effectively building proactive method for mitigating LFAs.

  • PDF

Implementation of MPOA for Supporting Various Protocols over ATM (ATM 상에서 다양한 프로토콜을 지원하기 위한 MPOA의 구현)

  • Lim, Ji-Young;Kim, Mi-Hee;Choi, Jeong-Hyun;Lee, Mee-Jeong;Chae, Ki-Joon;Choi, Kil-Young;Kang, Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.181-199
    • /
    • 2000
  • In this paper, we implemented and tested MPOA(MutiProtocol Over ATM) standardized in ATM Forum, which provides service for various layer 3 protocols as well as legacy LAN applications over ATM networks. The functions of MPCs(MPOA Clients) and MPSs(MPOA Servers) which are the components in MPOA systems are implemented. MPCs are located at the edge device and MPOA hosts and MPSs exist in routers. The implemented MPCs have the functions such as exchances of primitives between an LEC(LAN Emulation Client) and an MPC, management and maintenance of Egress/Ingress cache, default transmission through LECs and shortcut transmission. Assuming that routing, convergence and NHRP(Next Hop Resolution Protocol) functions exist in routers, the implemented MPSs have the functions such as exchanges of primitives between an LEC and an MPC, conversion and exchanges of frames between MPOA and NHRP, and management and maintenance of Egress/Ingress cache. All of the possible scenarios are made up to test whether they run correctly. The implemented system is tested by simulation according to the scenarios.

  • PDF

Inter-AP Security Transition Mechanism and Its FSM in WLAN AP Supporting Fast Roaming (이동 무선랜 접속장치의 접속점 보안 천이 메커니즘과 유한상태머신)

  • Chung ByungHo;Kang You Sung;Oh KyungHee;Kim SangHa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.601-606
    • /
    • 2005
  • Recently with the high expectation of voice over WLAN service, to supped fast inter-AP security transition in WLAN AP is one of the most actively investigating issues. It is also very important to minimize inter-AP security transition latency, while maintaining constantly the secure association from old AP when a station transits to new AP. Hence, this paper first defines secure transition latency as a primary performance metric of AP system in WLAN supporting IEEE802.11i, 802.1x, and 802.11f, and then presents low latency inter-AP security transition mechanism and its security FSM whose objective is to minimize inter-AP transition latency. Experiment shows that the proposed scheme outperforms the legacy 802.1X AP up to $79\%$ with regard to the transition latency.

Performance Evaluation of Caching in PON-based 5G Fronthaul (PON기반 5G 프론트홀의 캐싱 성능 평가)

  • Jung, Bokrae
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.1
    • /
    • pp.22-27
    • /
    • 2020
  • With the deployment of 5G infrastructure, content delivery network (CDN) will be a key role to provide explosive growing services for the independent media and YouTube which contain high-speed mobile contents. Without a local cache, the mobile backhaul and fronthaul should endure huge burden of bandwidth request for users as the increase number of direct accesses from contents providers. To deal with this issue, this paper fist presents both fronthaul solutions for CDN that use dark fibers and a passive optical network (PON). On top of that, we propose the aggregated content request specialized for PON caching and evaluate and compare its performance to legacy schemes through the simulation. The proposed PON caching scheme can reduce average access time of up to 0.5 seconds, 1/n received request packets, and save 60% of backhaul bandwidth compared to the no caching scheme. This work can be a useful reference for service providers and will be extended to further improve the hit ratio of cache in the future.

Load-based Dynamic Backoff Algorithm in Contention-based Wireless Shared Medium (단일 경쟁 매체에서의 새로운 로드 기반 동적 매체 접속 제어 백오프 알고리즘)

  • Seo Chang-Keun;Wang Weidong;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.406-415
    • /
    • 2005
  • The standards which use shared medium like IEEE 802.11 wireless LAN have transmission opportunity by contention in contention period. If there are collisions in contention period, medium access control protocol may solve problem by using backoff algorithm. Backoff algorithm is important part in medium access control, but legacy backoff method which is used under IEEE 802.11 standards is not adjusted when load is heavy because of increasing collisions. In this paper, we propose a new load-based dynamic backoff algorithm in contention-based wireless shared medium to improve throughput of medium and to reduce the number of collisions. Proposed backoff algorithm can increase the network utilization about $20\%$ higher than that of binary exponential backoff algorithm.

Design and Implementation of RFID Based u-SCM System for Fiber and Apparel Industry (섬유 및 의류산업의 RFID 기반 u-SCM 시스템의 설계 및 구현)

  • Moon, Il-Whan;Ahn, Jae-Geun;Kim, Sam-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.986-995
    • /
    • 2011
  • Recently, the market of fiber and apparel industry is rapidly changing from producer to consumer oriented. This trend emphasizes the necessity of SCM systems being able to do flexible correspondences to the market changing through synthetically reflecting consumers' various needs and a variety of patterns. However, because traditional SCMs manage their supply chains being based on bar code systems from the production to the distribution, they are suffering from the needs of real time information sharing and have their essential restrictions in the response to the environmental changes of the market and consumers' needs. This paper suggests a new RFID based u-SCM system optimized into the fiber and apparel industry. The proposed system has the benefits that through basing on RPID can collect information of the production and the distribution real time and make better use of it and connect to the legacy systems organically via Web services and rapidly respond to the market changing and consumers' needs. Through implementation, it is demonstrated that the proposed system can effectively facilitate them.

A Study on RF/PON Transmission System for CableTV Network Upgrade (케이블TV 네트워크 고도화를 위한 RF/PON 전송시스템에 관한 연구)

  • Ahn, Byoung-Jun;Park, Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.8
    • /
    • pp.510-517
    • /
    • 2014
  • Recently, Cable communications services are becoming the HDTV to 3DTV, UHDTV broadcasting and 100Mbps to 1Gbps Internet. however existing technologies are limited to provide high-quality broadband services in the HFC network. The network upgrade technologies have some problems that Up/Downsteam frequency extension, Cost of upgrading by using DOCSIS3.1, EPOC and Legacy STB compatibility, Cost of upgrading the network by RFoG, RF overlay PON. This paper propose the RF/PON based gigabit Transmission system in order to provide the 1Gbps internet without using frequency and the Multiscreen to IP devices. After the proposed RF/PON system was developed and implemented, this paper evaluate the performance of RF/PON system for simultaneously real-time braodcasting and 1Gbps internet, Multiscreen service, and so on.