• 제목/요약/키워드: Software defined network

검색결과 388건 처리시간 0.028초

5G에서 V2X를 위한 End to End 모델 및 지연 성능 평가 (End to End Model and Delay Performance for V2X in 5G)

  • 배경율;이홍우
    • 지능정보연구
    • /
    • 제22권1호
    • /
    • pp.107-118
    • /
    • 2016
  • 2020년경 우리에게 모습을 보이게 될 5G 이동통신은 IoT, V2X 등을 비롯하여 다양한 서비스를 고객들에게 제공할 것으로 예상되며, 이러한 서비스를 제공하기 위한 요구사항은 꾸준히 수준을 높여오던 고속 데이터 속도 외에도, 신뢰도, 그리고 실시간 서비스를 위한 지연 감소 등이 가장 중요한 고려사항이 될 것으로 전망된다. 이러한 이유는 5G의 주요 응용분야로 고려되는 분야인 M2M, IoT, Factory 4.0 등의 서비스를 위해서는 기존의 속도뿐 아니라, 특히 지연 및 신뢰성이 매우 중요하게 고려되어야 한다. 특히, 교통관제 등 자동차를 기반으로 하는 다양한 V2X(Vehicle to X)를 활용한 지능형 교통관제 시스템 및 서비스에서는 요구사항이 가장 높은 수준으로 고려될 수 있다. 5G 이동통신을 위하여 세계 각국의 표준화 기구들은 서비스를 규정하고 이를 요구사항에 따라 그룹화하여, 서비스의 시나리오 와 기술적 요구사항을 도출하였고, 최근에는 이러한 시나리오를 위한 요구사항의 수준이 어느 정도 합의에 다다르고 있다. 도출된 서비스 시나리오는 5개이며 이는 다음과 같다. 첫 번째 시나리오는 빠른 데이터 전송이 필요한 서비스로 가상 사무공간의 3차원 정보의 전송을 위해 높은 품질의 데이터를 요구한다. 두 번째 시나리오는 운동장, 콘서트장, 백화점과 같이 군중이 몰린 곳에서도 합리적인 이동통신 광대역 서비스 제공하는 경우이며, 세 번째는 이동 중에 일정 수준의 서비스를 제공하는 경우이고, 네 번째 경우는 지연 및 신뢰도에 대한 매우 강한 요구사항을 갖는 경우이며, M2M 통신과 같이 실시간성 보안 및 산업을 위한 응용 등의 예가 해당된다. 마지막으로 다섯 번째는 유비퀴터스 통신의 예이며, 다양한 요구사항을 가진 많은 수의 디바이스에 대한 효과적인 조정하는 경우를 예로 들 수 있다. 5G 통신은 또한 차세대 망의 구조를 고려하여 SDN(Software Defined Network)기반의 구조를 채택하고 있는데, 이러한 망의 구조는 지연과 신뢰도와 밀접한 관계를 갖고, 최악조건의 경우를 위한 SDN을 고려한 망 구조측면의 검토가 필요하다. 다양한 요구사항 중 5G에서 가장 주요시 고려 되어야 할 지연 및 신뢰도에 가장 적합한 시나리오는 지능형 교통 시스템 및 서비스 환경에서의 응급상황이다. 자동차는 매우 빠른 속도로 5G의 작은 셀들을 지나가고, 응급상황에 전달해야 하는 메시지는 매우 짧은 시간에 전달 및 처리되어야 하는 시나리오로 지연에 민감한 최악조건의 대표적인 예라고 생각할 수 있다. 본 논문에서는 V2X의 응급상황에서 SDN 망 구조 및 정보흐름의 규모에 대한 시뮬레이션을 통하여 시스템 수준의 분석을 진행하였다.

SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템 (Sampling based Network Flooding Attack Detection/Prevention System for SDN)

  • 이윤기;김승욱;부 둑 티엡;김경백
    • 스마트미디어저널
    • /
    • 제4권4호
    • /
    • pp.24-32
    • /
    • 2015
  • 최근 SDN은 데이터센터 네트워크로 활발히 사용되고 있으며, 그 사용범위를 점진적으로 늘려나가고 있다. 이러한 새로운 네트워크 환경 변화와 함께, 네트워크 보안시스템을 SDN 환경 상에서 구축하는 연구들이 진행되고 있다. 특히 OpenFlow Switch의 포트를 통과하는 패킷들을 지속적으로 관찰함으로써 네트워크 플러딩 공격 등을 탐지하기 위한 시스템들이 제안되었다. 하지만 다수의 스위치를 중앙집중형 컨트롤러에서 관리하는 SDN의 특성상 지속적인 네트워크 트래픽 관찰은 상당한 오버헤드로 작용할 수 있다. 이 논문에서는 이러한 지속적인 네트워크 트래픽 관찰에 따른 오버헤드를 줄이면서도 네트워크 플러딩 공격을 효과적으로 탐지 및 방어 할 수 있는, 샘플링 기반 네트워크 플러딩 공격 탐지 및 방어 시스템을 제안한다. 제안된 시스템은 네트워크 트래픽을 주어진 샘플링 조건에 맞추어 주기적으로 관찰하고, 샘플링 패킷들을 분석하여 네트워크 플러딩 공격을 탐지하며, 탐지된 공격을 OpenFlow Switch의 플로우 엔트리관리를 통해 능동적으로 차단하다. 네트워크 트래픽 샘플링을 위해 sFlow agent를 활용하고, 샘플링된 패킷 정보를 소프트웨어적으로 분석하여 공격을 탐지하기 위해 오픈소스 기반 IDS인 snort을 사용하였다. 탐지된 공격의 자동화된 방어 기작의 구현을 위해 OpenDaylight SDN 컨트롤러용 어플리케이션을 개발하여 적용하였다. 제안된 시스템은 OVS (Open Virtual Switch)를 활용한 로컬 테스트베드 상에서 그 동작을 검증하였고, 다양한 샘플링 조건에 따른 제안된 시스템의 성능 및 오버헤드를 분석하였다.

Design and Implementation of SDN-based 6LBR with QoS Mechanism over Heterogeneous WSN and Internet

  • Lee, Tsung-Han;Chang, Lin-Huang;Cheng, Wei-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.1070-1088
    • /
    • 2017
  • Recently, the applications of Internet of Things (IoTs) are growing rapidly. Wireless Sensor Network (WSN) becomes an emerging technology to provide the low power wireless connectivity for IoTs. The IPv6 over low-power wireless personal area networks (6LoWPAN) has been proposed by IETF, which gives each WSN device an IPv6 address to connect with the Internet. The transmission congestion in IoTs could be a problem when a large numbers of sensors are deployed in the field. Therefore, it is important to consider whether the WSN devices have be completely integrated into the Internet with proper quality of service (QoS) requirements. The Software Defined Network (SDN) is a new architecture of network decoupling the data and control planes, and using the logical centralized control to manage the forwarding issues in large-scale networks. In this research, the SDN-based 6LoWPAN Border Router (6LBR) is proposed to integrate the transmission from WSNs to Internet. The proposed SDN-based 6LBR communicating between WSNs and the Internet will bring forward the requirements of end-to-end QoS with bandwidth guarantee. Based on our experimental results, we have observed that the selected 6LoWPAN traffic flows achieve lower packet loss rate in the Internet. Therefore, the 6LoWPAN traffic flows classified by SDN-based 6LBR can be reserved for the required bandwidth in the Internet to meet the QoS requirements.

Leveraging Proxy Mobile IPv6 with SDN

  • Raza, Syed M.;Kim, Dongsoo S.;Shin, DongRyeol;Choo, Hyunseung
    • Journal of Communications and Networks
    • /
    • 제18권3호
    • /
    • pp.460-475
    • /
    • 2016
  • The existing Proxy Mobile IPv6 suffers from a long handover latency which in turn causes significant packet loss that is unacceptable for seamless realtime services such as multimedia streaming. This paper proposes an OpenFlow-enabled proxy mobile IPv6 (OF-PMIPv6) in which the control of access gateways is centralized at an OpenFlow controller of a foreign network. The proposed OF-PMIPv6 separates the control path from the data path by performing the mobility control at the controller, whereas the data path remains direct between a mobile access gateway and a local mobility anchor in an IP tunnel form. A group of simple OpenFlow-enabled access gateways performs link-layer control and monitoring activities to support a comprehensive mobility of mobile nodes, and communicates with the controller through the standard OpenFlow protocol. The controller performs network-layer mobility control on behalf of mobile access gateways and communicates with the local mobility anchor in the Proxy Mobile IPv6 domain. Benefiting from the centralized view and information, the controller caches the authentication and configuration information and reuses it to significantly reduce the handover latency. An analytical analysis of the proposed OF-PMIPv6 reactive and proactive handover schemes shows 43% and 121% reduction in the handover latency, respectively, for highly utilized network. The results gathered from the OF-PMIPv6 testbed suggest similar performance improvements.

SDN 환경에서의 데이터 생성 형태와 서버 응답시간을 고려한 효율적인 부하분산 기법 (Efficient Load Balancing Technique Considering Data Generation Form and Server Response Time in SDN)

  • 김종건;권태욱
    • 한국전자통신학회논문지
    • /
    • 제15권4호
    • /
    • pp.679-686
    • /
    • 2020
  • 전 세계 데이터 총량이 2025년이면 175 ZB로 늘어날 것으로 전망되면서[1] 네트워크 영역에서의 데이터 처리 능력은 더욱 중요해지고 있다. 특히 데이터센터는 데이터 사용량이 늘어남에 따라 고집적화되고 있어서 유입되는 데이터로부터 유발되는 부하는 비용 절감과 효율적인 운영 등을 위해 적절히 분산되어야 한다. 기존 네트워크 체계의 한계점을 극복하기 등장한 SDN 기술은 네트워크 장비에서 H/W와 S/W를 분리하여 Legacy 체계의 경직성을 해소하는데, S/W 기반의 유연성을 이용해서 데이터센터에서의 부하분산에 효과적으로 적용할 수 있다. 본 논문에서는 SDN 기술을 활용하여 사용자로부터 받은 데이터를 유형별로 분류하고, 분류된 데이터를 데이터센터내 서버의 응답시간 순서대로 전송·처리함으로써 효율을 높일 수 있는 방법을 제안한다.

Design and Implementation of Geo-Social Information based Personalized Warning Notification System

  • ;;김경백
    • 스마트미디어저널
    • /
    • 제5권2호
    • /
    • pp.42-50
    • /
    • 2016
  • In case of a emergency situation or a natural disaster, a warning notification system is an essential tool to notify at-risk people in advance and provide them useful information to survive the event. Although some systems have been proposed such as emergency alert system using android, SMS, or P2P overlay network, these works mainly focus on a reliable message distribution methods. In this paper, we proposed a novel design and implementation of a personalized warning notification system to help inform not only the at-risk people but also their family and friends about the coming disaster as well as escape plan and survival information. The system consists of three main modules: the user selection module, the knowledge based message generator, and message distribution modules. The user selection module collects the list of people involved in the event and sorts them based on their level of involvement (their location, working position and social relationships). The knowledge based message generator provides each person with a personalized message that is concise and contains only the necessary information for the particular person based on their working position and their involvement in the event. The message distribution module will then find a best path for sending the personalized messages based on trustiness of locations since network failures may exist in a disaster event. Additionally, the system also have a comprehensive database and an interactive web interface for both user and system administrator. For evaluation, the system was implemented and demonstrated successfully with a building on fire scenario.

SDN 환경에서 실시간 패킷 유형과 QoS 평가 기반한 효율적인 Load Balancing 기법 (Efficient Load Balancing Techniques Based on Packet Types and Real-Time QoS Evaluation in SDN)

  • 윤정현;권태욱
    • 한국전자통신학회논문지
    • /
    • 제16권5호
    • /
    • pp.807-816
    • /
    • 2021
  • 4차 산업혁명 기술로 네트워크 트래픽은 공급의 증가, 수요의 증가, 트래픽 패턴의 복잡도 증가의 특징으로 유통되는 Data가 늘고 있다. 이런 방대한 트래픽을 효율적으로 관리하기 위해 H/W와 S/W가 분리된 개념인 SDN이 차세대 네트워크로 주목받고 있다. S/W Opensource로 구현된 SDN의 Controll Layer, Infrastructure Layer 컨트롤러를 이용하여 경직된 Vendor 종속성의 문제를 탈피하여 유연한 정책을 적용할 수 있는 장점으로 많은 연구가 진행되고 있다. 이에 본 논문에서는 SDN을 이용하여 네트워크 계층의 패킷 구조를 통해 그룹화하고 Packet Delay, Transmission Rate 등을 분석하여 효율적인 부하분산 기법을 제안한다.

FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN

  • Lian, Weichen;Li, Zhaobin;Guo, Chao;Wei, Zhanzhen;Peng, Xingyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.264-284
    • /
    • 2021
  • As the next-generation network architecture, software-defined networking (SDN) has great potential. But how to forward data packets safely is a big challenge today. In SDN, packets are transferred according to flow rules which are made and delivered by the controller. Once flow rules are modified, the packets might be redirected or dropped. According to related research, we believe that the key to forward data flows safely is keeping the consistency of flow rules. However, existing solutions place little emphasis on the safety of flow rules. After summarizing the shortcomings of the existing solutions, we propose FRChain to ensure the security of SDN data forwarding. FRChain is a novel scheme that uses blockchain to secure flow rules in SDN and to detect compromised nodes in the network when the proportion of malicious nodes is less than one-third. The scheme places the flow strategies into blockchain in form of transactions. Once an unmatched flow rule is detected, the system will issue the problem by initiating a vote and possible attacks will be deduced based on the results. To simulate the scheme, we utilize BigchainDB, which has good performance in data processing, to handle transactions. The experimental results show that the scheme is feasible, and the additional overhead for network performance and system performance is less than similar solutions. Overall, FRChain can detect suspicious behaviors and deduce malicious nodes to keep the consistency of flow rules in SDN.

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

Lessons from constructing and operating the national ecological observatory network

  • Christopher McKay
    • Journal of Ecology and Environment
    • /
    • 제47권4호
    • /
    • pp.187-192
    • /
    • 2023
  • The United States (US) National Science Foundation's (NSF's) National Ecological Observatory Network (NEON) is a continental-scale observation facility, constructed and operated by Battelle, that collects long-term ecological data to better understand and forecast how US ecosystems are changing. All data and samples are collected using standardized methods at 81 field sites across the US and are freely and openly available through the NEON data portal, application programming interface (API), and the NEON Biorepository. NSF led a decade-long design process with the research community, including numerous workshops to inform the key features of NEON, culminating in a formal final design review with an expert panel in 2009. The NEON construction phase began in 2012 and was completed in May 2019, when the observatory began the full operations phase. Full operations are defined as all 81 NEON sites completely built and fully operational, with data being collected using instrumented and observational methods. The intent of the NSF is for NEON operations to continue over a 30-year period. Each challenge encountered, problem solved, and risk realized on NEON offers up lessons learned for constructing and operating distributed ecological data collection infrastructure and data networks. NEON's construction phase included offices, labs, towers, aquatic instrumentation, terrestrial sampling plots, permits, development and testing of the instrumentation and associated cyberinfrastructure, and the development of community-supported collection plans. Although colocation of some sites with existing research sites and use of mostly "off the shelf" instrumentation was part of the design, successful completion of the construction phase required the development of new technologies and software for collecting and processing the hundreds of samples and 5.6 billion data records a day produced across NEON. Continued operation of NEON involves reexamining the decisions made in the past and using the input of the scientific community to evolve, upgrade, and improve data collection and resiliency at the field sites. Successes to date include improvements in flexibility and resilience for aquatic infrastructure designs, improved engagement with the scientific community that uses NEON data, and enhanced methods to deal with obsolescence of the instrumentation and infrastructure across the observatory.