• Title/Summary/Keyword: MAC주소

Search Result 64, Processing Time 0.156 seconds

A Link Protection Scheme with a Backup Link Spanning Tree for Provider Backbone Bridged Networks and Implementation (프로바이더 백본 브리지 망을 위한 백업링크 스패닝트리 기반 링크장애 복구기능과 구현)

  • Nam, Wie-Jung;Lee, Hyun-Joo;Yoon, Chong-Ho;Hong, Won-Taek;Moon, Jeong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.58-68
    • /
    • 2010
  • In this paper, we propose an efficient link protection switching scheme for provider backbone bridge systems with a spanning tree for backup links exclusively, and evaluate its performance. The proposed scheme offers guaranteed QoS flows even when a link fault occurrs in the primary link by flooding the flows over the profiled spanning tree. The flooding mechanism over the spanning tree can also provide low latency and remove the loopback flows. We also derive the efficiency of bandwidth usage for the normal flows and the number of lost frames during the link restoration. For evaluating its feasibility, we implement a prototype of PBB-TE systems based on the Linux bridge codes, which can support both link protection switching capability with CCM and MAC-in-MAC encapsulation. A related protocol analyzer is also developed. One can see that the proposed scheme and the prototype can be useful for developing carrier class Ethernet systems based on PBB-TE.

A Study of the Method for Subscriber-Aware and Fair Aggregation Scheme in Ethernet (이더넷에서 가입자 구별 및 공평한 접선에 관한 연구)

  • Kwon Tae-Hyun;Park Jong-Su;Park Dae-Geun;Lee Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7B
    • /
    • pp.602-607
    • /
    • 2006
  • A subscriber-oriented service became necessary for the QoS management due to the development of network. BcN(Broadband convergence Network) which incorporates communication, broadcasting and internet not only improves the quality of the communication and broadcasting service but also. aims at broadband service. Therefore, QoS management for each subscriber becomes more important. Not yet, however, the discussion for the subscriber oriented QoS management is not activated. Although, there are several techniques for subscriber distinction using flow information, IP information or MAC information, but they are only processed in layer 3 network. Actually, it is impossible to manage QoS of all subscriber's in layer 3 network. In this paper, we propose a method for QoS management scheme that does not need additional processes or large hardware in layer 2 network and analyze efficiency and overheads. We propose the first subscriber-oriented service method in layer 2 network that is applicable to either existing network or BcN.

A Countermeasure Technique for Attack of Reflection SSDP in Home IoT (홈 IoT에서 SSDP 반사체 공격에 대한 대응기법)

  • Park, Kwang-ok;Lee, Jong-Kun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, the DDoS attack using the amplifier method makes it difficult to distinguish the normal traffic from the normal server and it is difficult to detect even the attack detection. Since the SSDP protocol is a common protocol widely used in IoT devices, it is used as a DDoS amplification attack. In this paper, we analyze the reflector attack of SSDP which is one of the DDoS and suggest a technical proposal to detect and defend against the attack by managing the Mac address of each device. Also, we propose a control structure to protect the reflection attack of SSDP in Home IoT. The efficiency of the proposed system has been verified by performing an experimental attack on the virtual environment.

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types (위조 ARP 응답 유니캐스트 스푸핑을 이용한 서버 유형별 네트워크 해킹 및 구현기술 연구)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.61-71
    • /
    • 2017
  • ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing.

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

Model Validation of a Fast Ethernet Controller for Performance Evaluation of Network Processors (네트워크 프로세서의 성능 예측을 위한 고속 이더넷 제어기의 상위 레벨 모델 검증)

  • Lee Myeong-jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.92-99
    • /
    • 2005
  • In this paper, we present a high-level design methodology applied on a network system-on-a-chip(SOC) using SystemC. The main target of our approach is to get optimum performance parameters for high network address translation(NAT) throughput. The Fast Ethernet media access controller(MAC) and its direct memory access(DMA) controller are modeled with SystemC in transaction level. They are calibrated through the cycle-based measurement of the operation of the real Verilog register transfer language(RTL). The NAT throughput of the model is within $\pm$10% error compared to the output of the real evaluation board. Simulation speed of the model is more than 100 times laster than the RTL. The validated models are used for intensive architecture exploration to find the performance bottleneck in the NAT router.

A Cross-layering Handover Scheme for IPv6 Mobile Station over WiBro Networks (와이브로 망에서 IPv6 이동 단말의 교차 계층 핸드오버 기법)

  • Jang, Hee-Jin;Han, Youn-Hee;Hwang, Seung-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.48-61
    • /
    • 2007
  • WiBro (Wireless Broadband) service, developed in Korea, can provide the host mobility while its users hang around within the subnet. Next-generation Internet protocols, IPv6 and Mobile IPv6 (MIPv6), provide a plenty of addresses to the nodes and enable the handover between different subnets. However, MIPv6 is not enough to support a real time service such as VoIP (Voice over IP) due to the long latency, and it is necessary to develop an enhanced handover mechanism which is optimized to the WiBro networks. In this paper, we suggest an improved fast handover mechanism while the mobile node moves around WiBro networks. The proposal is based on Fast Mobile IPv6 (FMIPv6) which is the representative protocol for fast handover, and reduces the handover latency by the close interaction between the link layer (WiBro MAC) and IP layer (FMIPv6). Finally, we analyze the performance of proposed mechanism through the mathematical analysis.

Diligence/Indolence Management Scheme Using WiFi Access Points (와이파이 무선접근점을 이용한 근태관리 기법)

  • Jo, Hyun Joon;Park, Jin Soo;Lee, Dong Gi;Kim, Dong Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1395-1400
    • /
    • 2014
  • Diligence/Indolence records are the key data for a human resource management and the basic data to measure the salaries of the employees. However, existing mechanical or electro-magnetic diligence/indolence management systems have the problems that the systems are often incorrect or require much cost to build them. In this paper, we design and implement the diligence/indolence management system using a smart device of an employee. To measure the data of the diligence/indolence, the implemented system acquires the location data of the employee using the MAC addresses of both a smart device and access points of the WiFi and transfers the data of punching-in/out based on the acquired location to a server. The benefit of the proposed system is that it is easy for small business to use the proposed D/I management system with low cost because the system exploits smart devices and WiFi access points installed previously.

Isolation of Escherichia coli O157 in Children with Diarrhea (소아설사 환아에서의 Escherichia coli O157 분리)

  • Song, Wonkeun;Kim, Hyoun Tae;Lee, Kyu Man;Cha, Jae Kook;Lee, Kon Hee
    • Pediatric Infection and Vaccine
    • /
    • v.4 no.1
    • /
    • pp.73-78
    • /
    • 1997
  • Purpose : Escherichia coli O157 can produce diarrhea as well as hemorrhagic colitis and hemolytic uremic syndrome. In many parts of North America, E. coli O157 often is the second or third most commonly isolated enteric bacterial pathogens. Recently, intakes of fast food, including hamburgers have increased in Korea. Therefore, E. coli O157 infection in Korea are likely to be increased. Methods : Stool samples from 317 pediatric diarrheal patients were analyzed by culture on sorbitol-MacConkey agar. Sorbitol-negative colonies were teated by E. coli O157 latex agglutination test. Results : Of the 317 specimens, one (0.3%) were E. coli O157:NM that not produced Shiga toxin. The 7 year old male patient who had complained of abdominal pain, vomiting and non-bloody diarrhea for 2 days. The patient was improved for 2 days after admission. Conclusions 1 Only one (0.3%) of all fecal samples were isolated E. coli O157 that not produced Shiga toxin. Therefore, routine stool culture for the isolation of E. coli O157 was not likely to be neccessary so far.

  • PDF

Study on Efficient Communication Scheme between Multi-homed Host and Multi-Network (멀티 인터페이스 단말과 멀티 네트워크 간의 통신 지원 표준화 동향 분석)

  • Youn, Joo-Sang;Pack, Sangheon;Hong, Yong-Geun;Park, Jung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.915-918
    • /
    • 2009
  • 다중 네트워크 인터페이스 단말과 멀티 네트워크 환경간의 통신을 위한 네트워크 구조에 관한 기존 연구는 GLL, A-MAC처럼 멀티네트워크 자원관리에 초점을 둔 프로토콜 연구가 대부분이며 이 프로토콜들은 2.5 계층, 즉, 네트워크 계층과 데이터 링크 계층 사이에 위치하여 응용을 위해서 다중 인터페이스 중 하나의 인터페이스를 선택할 수 있는 기능을 제공한다. 따라서 기존 연구에 초점은 기존 통신 프로토콜 및 인터넷 구조의 변화를 최소화 할 수 있으나 단말내의 응용이 다중 네트워크 인터페이스를 효율적으로 사용할 수 있는 기술은 아니다. 본 연구에서는 기존 통신 프로토콜 및 인터넷 구조에서 단말이 다중 네트워크 인터페이스 사용 시 발생하는 계층별 문제점 및 IETF MIF WG 표준화 동향을 분석한다. 특히 응용 계층이 멀티 네트워크 인터페이스 기반의 멀티 연결을 지원하지 못하는 문제점, 전송 계층에서의 다중 연결 시 발생하는 문제점, 네트워크 계층에서 다중 인터페이스별로 할당된 IP 주소에 대한 처리문제, 다중 인터페이스 라우팅 문제, Split DNS 문제, 응용별 서비스 요구에 적응적인 인터페이스 선택 방법에 관한 문제를 정의하고 이를 해결하기 위한 연구 방향을 제시한다.

  • PDF