• Title/Summary/Keyword: Subnet

Search Result 81, Processing Time 0.029 seconds

An Implementation of a ATMARP Multiple Server on the LINUX (리눅스 상에서 ATMARP 다중서버 구현)

  • 서은미;박광로;장일순;조경록;유영갑
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3B
    • /
    • pp.399-407
    • /
    • 2000
  • Recently, supporting ATM networks under LINUX operating systems environment has been actively studied. An ATMARP server in a conventional LINUX environment was designed under the ATMARP single-server to operate independently within a Local IP Subnet(LIS). In this paper, an ATMARP multi-server is introduced and implemented an ATMARP-server managing multiple LIS's on the LINUX-based IPOA. The ATMARP protocol processing functions and addition/deletion functions on management tables are required to implement the ATMARP multi-server. These functions can solve the problem of increasing the number of ATMARP servers in ATMARP single-server environment. The file transmission experiment with a connection configuration between LIS's shows that multiple LIS' con be managed by an ATMARP-server. As the results, the ATMARP multi-server scheme yields a smaller number of servers than that of the conventional ATMARP single-server scheme, and the network composition can be improved substantially.

  • PDF

Modified CGA for Frequently Moving Mobile Nodes in Secure Neighbor Discovery

  • Kim, Esther;Kim, Nam-Uk;Kim, Soo-Duek;Chung, Tae-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.537-538
    • /
    • 2009
  • IPv6 is newly introduced to solve limitations and problems of IPv4 and in IPv6 network, nodes use Neighbor Discovery protocol to discover the subnet prefix and configure its own address. However, Neighbor Discovery is vulnerable to various attacks as it does not have secure mechanism to protect itself. Thus, the Secure Neighbor Discovery has introduced and the main mechanism used in Secure Neighbor Discovery is Cryptographically Generated Address. In this paper, we provide a brief of Cryptographically Generated Address and its limitation in a case where a mobile node moves from one network to another frequently. The proposed scheme resolves this limitation by using the fixed interface identifier.

Network Bridge System for Interoperation of ZigBee-UPnP Network (UPnP-ZigBee 네트워크 브릿지 시스템)

  • Kim, Seong-Joong;Seo, Hae-Moon;Park, Woo-Chool;Kim, Min-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.48-51
    • /
    • 2011
  • Universal Plug and Play (UPnP) is one of the most promising home network middleware technologies because of its straightforward implementation and zero configuration characteristics. However, it has a limitation of the operations only IP based network and proceeding in a single IP subnet. In this paper, we proposed network bridge architecture for UPnP network to interoperate heterogeneous network, UPnP and ZigBee. The proposed network bridge architecture is capable of configuration ZigBee device as a virtual UPnP device. This technique is promising for seamless inter-networking with ZigBee and UPnP network. Also, the architecture of the proposed network bridge architecture can be applied for a future smart home.

An Autonomous Master Node Election Algorithm in a Subnet (서브넷에서 마스터 노드의 자율적인 선출 알고리즘)

  • KiYong Kim;YeonSeung Ryu;DongHo Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1355-1358
    • /
    • 2008
  • 긴급 업무를 위한 네트워크 시스템에서는 네트워크 구성요소의 고장을 즉시 극복할 수 있는 메커니즘이 제공되어야 한다. 고장 극복을 위해서 네트워크 경로를 이중화하고 경로를 주기적으로 감시하여 고장 발생 시에 대체 경로를 사용하는 방법이 연구되어 왔다. 이를 위해서 서브넷 상의 경로를 감시하는 마스터 노드가 필요한데 마스터 노드의 고장 시 이를 극복할 방법이 필요하다. 본 논문에서는 마스터 노드가 있는 단일 서브넷에서 마스터의 고장 시에 모든 노드가 참여하여 자율적으로 새로운 마스터를 선출하는 알고리즘을 연구하였다.

Replication and Node Recovery for Efficiency and Safety in P2P sytmem (P2P 시스템에서 안전성과 성능을 고려한 노드 복구와 복제 기법)

  • Cha Bonggwan;park Sunghwan;Son Youngsung;Kim Kyongsok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.472-474
    • /
    • 2005
  • 최근에 P2P(Peer-to-Peer) 시스템에서 효율적인 자원 탐색 방법에 대해 많이 연구되고 있다. 대부분의 P2P 시스템은 overlay network를 형성하므로 노드와 노드 사이의 물리적인 거리를 고려하지 않는다. 그래서 서로 이웃한 노드라도 실제 물리적인 latency가 클 수 있다는 문제점을 가지고 있다. 이런 문제점을 해결하기 위해 Topology를 고려한 계층적 시스템을 설계하였다. 이 시스템을 TB-Chord(Topology-based Chord)라 부른다. TB-Chord는 자신의 subnet에 Global network에 있는 데이터의 사본(Replica)을 저장하기 때문에 저장 공간(Storage)의 낭비와 노드가 떠날(leave) 때 데이터의 이동에 따른 네트워크 부하가 생기는 문제가 있다. 이 논문은 효율적인 복제 기법을 이용하여 저장공간과 네트워크의 효율성을 높이고 노드 fail에 대한 rejoin 메카니즘을 사용하여 효율적으로 시스템을 회복하는 방법을 제안한다.

  • PDF

A LOW-COST PROTOCOL IN SENSOR NETWORK UBIQUITOUS ENVIRONMENT

  • Lee Dong-heui;Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.766-769
    • /
    • 2005
  • In a ubiquitous environment made up of multiple sensors, most sensors participate in communications with limited battery, and the sensor node isn't able to participate in communications when all the battery is used up. When an existing authentication method is used for the sensor node which has to participate in a long term communication with limited battery, it creates a problem by making the length of network maintenance or sensor node's operation time relatively shorte. Therefore, a network structure where RM (Register Manager) node and AM (Authentication Manager) node are imported to solve the energy consumption problem during a communication process is presented in this thesis. This offers a low power protocol based on safety through a mutual authentication during communications. Through registration and authentication manager nodes, each sensor nodes are ensured of safety and the algorithm of key's generation, encryption/descramble and authentication is processed with faster operation speed. So the amount of electricity used up during the communications between sensor nodes has been evaluated. In case of the amount of electrical usage, an average of $34.783\%$ for the same subnet and 36.855 for communications with two different subnets, are reduced. The proposed method is a protocol which maintains the limited battery for a long time to increase the effectiveness of energy usage in sensor nodes and can also increase the participation rate of communication by sensor nodes.

  • PDF

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

Perofrmance Analysis of Mobility Support Protocol in Each Layer (계층간 이동성 지원 프로토콜들의 성능 분석)

  • Lee, Hyo-Beom;Kim, Kwang-Ryoul;Hwang, Seung-Hee;Min, Sung-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.134-142
    • /
    • 2007
  • Several mobility supporting protocols have been proposed across OSI reference layers. Each protocol has similar or different characteristics based on its operating layer which affect a handover latency. In this paper, we analyze handover performance of most representative protocols in each layer. For analysis, we use SUBNET model based Markovian model and movement model. In result, difference of protocol handover latency is not occurred by DAD but also by security, movement detection, message processing time.

An Implementation of Firewall System Supporting High Speed Data Transmission in 3-tier Client/server Systems (3계층 클라이언트/서버 시스템의 고속 전송 침입 차단 시스템 구현)

  • 홍현술;정민수;한성국
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1361-1373
    • /
    • 2001
  • In the firewall systems of 3-tier client/server systems, in general, data transmission speed is declined rapidly according to the duplicated proxy services in application server and fire wall server. In this paper, an application server configuration containing the proxy functions of firewall system is proposed so that the high speed data transmission can be achieved. The proposed application server can form the dual-homed gateway by means of the additional network interface card. The screened router of application server forms the screened subnet gateway that can separate the internal network. The proposed server configuration is more effective in traffic control than the traditional firewall systems and provides high speed data transmission with the functions of firewall. It can be also cost-effective alternative to the firewall system.

  • PDF

A Study on the Netted Radar Information Network (Jamming 효과를 고려한 Netted 레이다의 정보통합망 설계에 관한 연구)

  • 김춘길;이형재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.4
    • /
    • pp.398-414
    • /
    • 1992
  • For designing the radar integrated data network, we construct the network structure with a spatial hierarchy decomposition scheme. The RIDN can be decomposed into several subnet classes, those of which are composed of the several group classes of radar sits, In a group class, the communication nodes of a radar site are modeled by the software modules formulated with the statistical attributes of discrete events. And we get the analysis over the network through the separately constructed infra group level models which were coded with the C language. After constructing the local area network with these infra models through the proper data links. We got the analysis of the communication performance of inner models and the global network.

  • PDF