• Title/Summary/Keyword: TCP/IP Network

Search Result 506, Processing Time 0.027 seconds

Design and Implementation of Dynamic Binding System among the Devices Located in Inside and Outside of Home Networks (홈 네트워크에서의 댁내외 기기들의 동적 바인딩 시스템 설계 및 구현)

  • Lee, Jae-Hyun;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.169-176
    • /
    • 2006
  • Since home network system is usually set up based on the built-in system inside home at the time of construction, it has a difficulty in being compatible with new devices after construction. In this paper, we propose DBS(Dynamic Binding System) that can make links effectively among the devices located in inside and outside of home networks. Implementation of the DBS is based on the ZigBee's binding in WPAN(Wireless Personal Area Network). For this research, we constructed the system consisting of home server that contains proxy server and location server, devices inside home in which tinyOS is embedded, and mobile device that is an emulator. The communication inside home is done by IEEE 802.15.4 protocol and the communication between servers and mobile devices outside home is done by TCP/IP protocol. Regardless of device's address format, the DBS facilitates a link among the devices located inside and outside of home networks. And, introducing a new device into home network can be recognized easily by exchanging messages between devices.

  • PDF

Design and Implementation of IEC 61162-4 based TLI Protocol for e-Navigation on Ship (선박의 통합정보처리를 위한 IEC 61162-4 기반 TLI 프로토콜 설계 및 구현)

  • Jang, Kil-Woong;Lee, Jang-Se;Park, Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.351-359
    • /
    • 2010
  • In this paper, we propose a transmission algorithm of the TLI protocol of the IEC 61162-4 standard to perform the e-Navigation on ship, and we design and implement the TLI protocol according to the proposed algorithm. The implemented protocol is a TCP/IP based protocol, and is a network protocol with the MAU and LNA components proposed in the IEC 61162-4 standard. In addition, it makes a data transmission over the network architecture based on client/server network model. In the implemented protocol, there are a communication between the MAU and the LNA in one host, and also a communication between the LNA and the LNA in each other hosts. In order to provide a variety of service in a host, every client host has a LNA and multiple MAUs. According to the standard specification and the proposed transmission algorithm, we designed and implemented the TLI protocol using object-oriented mechanism. We carried out the experiment under a simple network model similar to real ship environment, and confirmed that it successfully transmits and receives data between the hosts.

[Retracted]Cyber Threat Analysis on Network Communication in Power System and Countermeasures Suggestions ([논문철회]전력계통 네트워크 통신방식 변화에 따른 사이버위협 분석 및 대응방안 제시)

  • Il Hwan Ji;Seungho Jeon;Jung Taek Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.91-102
    • /
    • 2023
  • The Energy Management System (EMS) communicates with power plants and substations, monitors the substations and plant operational status of the transmission and substation system for stability, continuity, real-time, and economy of power supply, and controls power plants and substations. Currently, the power exchange EMS communicates with power plants and substations based on the serial communication-based Distributed Network Protocol (DNP) 3.0 protocol. However, problems such as the difficulty of supply and demand of serial communication equipment and the lack of installation space for serial ports and modems are raised due to the continuous increase in new facilities to perform communication, including renewable power generation facilities. Therefore, this paper presents a TCP/IP-based communication method instead of the existing serial communication method of the power exchange EMS, and presents a security risk analysis that may occur due to changes in the communication method and a countermeasure to the security risk.

Adaptive Data Hiding Techniques for Secure Communication of Images (자기유사성 네트워크에서 트래픽 제어에 의한 성능 개선)

  • 석경휴;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6B
    • /
    • pp.575-583
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to the window-based congestion control, in particular, such as the TCP. This is performed by interfacing the TCP with a large time scale control module which adjusts the aggressiveness of the bandwidth consumption behavior exhibited by the TCP as a function of large time scale Self-Similar network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by the RTT. How to effectively utilize such an information-due to its probabilistic nature, dispersion over the multiple time scales, and affection on the top of the existing window-based congestion controls-is a non-trivial problem. The evaluation performance of the multiple time scale TCP is facilitated by a simulation of the bench-mark environment which is based on the physical modeling of a self-similar traffic. We explicate our methodology for discerning and evaluating the impact of changes in transport protocols in the protocol stack under the self-similar traffic conditions. We discuss issues arising in the comparative performance evaluation under heavy-tailed workloads.

A Security Packet Analyzer in IPv4/IPv6 network (IPv4/IPv6 보안 패킷 분석기)

  • Kwon, Hyeok-Chan;Nah, Jae-Hoon;Sohn, Sung-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.1353-1356
    • /
    • 2003
  • 본 논문에서는 EP 보안(IPsec : IP Security)이 적용된 보안 패킷들을 네트워크 상에서 실시간으로 수집하여 분석해 주는 IP 보안 패킷 분석기를 설계 및 구현하였다. 본 패킷 분석기는 TCP UDP IP, ICMP 등의 일반 네트워크 패킷과 키 교환을 위한 IKE 패킷, 보안 통신을 위한 AM, ESP 패킷 등을 실시간으로 수집하고 분석하는 기능을 갖는다. 본 패킷 분석기는 현재의 IPv4 패킷 뿐 아니라 차세대 인터넷인 IPv6 패킷에 대하여도 실시간 수집 및 분석 기능을 제공한다. 또한 본 분석기는 IPsec 엔진에 대한 보안성을 평가하기 위한 자동화된 평가기능도 제공해 준다. 개발한 패킷 분석기를 이용하여 ETRI에서 개발한 통합 IPsec 엔진에 대한 보안성을 평가한 결과도 함께 보인다.

  • PDF

A Study on the Application method of Server Router for Reliable Multicast (신뢰성 있는 멀티캐스트를 위한 서버라우터의 활용 방안에 관한 연구)

  • Choi, Won-Hyuck;Lee, Kwang-Jae;Kim, Jung-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1483-1486
    • /
    • 2002
  • Multicast protocols are efficient methods of group communication, but they do not support the various transmission protocol services like a reliability guarantee, FTP, or Telnet that TCPs do. The purpose of this dissertation is to find a method to utilize sewer routers to form multicasts that can simultaneously transport multicast packets and TCP packets. For multicast network scalability and error recovery the existing SRM method has been used. Three packets per TCP transmission control window size are used for transport and an ACK is used for flow control. A CBR and a SRM is used for UDP traffic control. Divided on whether a UDP multicast packet and TCP unicast packet is used simultaneously or only a UDP multicast packet transport is used, the multicast receiver with the longest delay is measured on the number of packets and its data receiving rate. It can be seen that the UDP packet and the TCP's IP packet can be simultaneously used in a server router.

  • PDF

Ethernet with Virtual Polling Algorithm for real-Time Industrial Communication Network (실시간 산업용 네트워크를 위한 가상 폴링 기반 이더넷 구현)

  • Kim, T. J.;Lee, K. C;Lee, S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.602-605
    • /
    • 2001
  • This paper focus on a method to use Ethernet Network for Industrial Communication Network. Ethernet use the CSMA/CD MAC(Medium Access Control) Protocol at the Data-Link Layer, Which isn't suit for Industrial Communication Network requiring Real-Time Communication, periodic data processing, critical data processing characteristics. In this paper we proposed the Virtual Polling Algorithm at the Application Layer will be solution of using the Ethernet Network for the Industrial Communication Network, Proposed Algorithm terminate the Collision in the network thus Delay Time is reduced and Real-Time Communication will be implemented.

  • PDF

Development of a remote monitoring system for gas detection at the subway station (지하철 역내 가스 검출 원격 모니터링 시스템 구현)

  • Park, Yong-Man;Kim, Hei-Sik;Kim, Gyu-Sik;Lee, Moon-Gyu
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.439-441
    • /
    • 2007
  • The seoul metropolitan subway has installed 8 lines and about 500 stations to transport 5 million passengers everyday. The underground air pollution level in the subway stations is very severe status, which is very harmful to the commutators and its personals. Although subway roles as such a massive and huge transportation system, the subway doesn't adapt yet any real-time air monitoring system. They have only some hand-held type detector equipments for monitoring air pollution. Therefore subway passengers are exposed to the harmful air pollution environment. The most harmful environmental parameters among the air pollution are known as the dust and sound noise dB level in the subway station. Because the dust is consisted of very small particles, we can't see them easily in dark condition on the platform, but it is very harmful. The monitoring system for air pollution is developed using embedded system attached with 6 different environmental sensors. This system monitors air pollution of dust sound noise, gas, temperature, humidity, inflammable gas, toxic gas in the subway ?station. The sensor unit of the ARM-CPU board and sensor transmits real time environmental data to the main server using Zigbee wireless communication module and TCP/IP network. The main control server receives and displays the real-time environmental data, and it send alarms to the personals when high level value.

  • PDF

Research on Signature Maintenance Method for Internet Application Traffic Identification using Header Signatures (헤더 기반 인터넷 응용 트래픽 분석을 위한 시그니쳐 관리 방법에 관한 연구)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.19-33
    • /
    • 2011
  • The need for application traffic classification becomes important for the effective use of network resources. The header-based identification method uses the header signature {IP address, port number, transport layer protocol TCP/UDP)}extracted from Internet application server to overcome some limitations overhead, payload encryption, etc.) of previous methods. A lots signature is extracted because this method uses header information of server. So, we need a maintenance method to keep essential signatures. In this paper, we represent the signature maintenance method using properties of identified traffic and history of the signature. Also, we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

A Study on the Active Traceback Scheme Respond ing to a Security Incident (침해사고 대응을 위한 능동적 역추적 기법에 관한 연구)

  • Park Myung Chan;Park Young Shin;Choi Yong Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.27-34
    • /
    • 2005
  • Current security reinforcement systems are Passive defense system that only blocks filter to all traffic from the attacker. So, Those are weak re-attack and Stepping Stones attack because active response about attacker is lacking. Also, present techniques of traceback need much time and manpower by log information collection and trace through the personal inspection and active response is lacking. In this paper, We propose technique for TCP connection traceback that can apply in present internet and trace to inserted marking on IP header to correspond re-attack and Stepping Stones attack. Therefore, Proposed technique is unnecessary correction of existing network component and can reduce size of marked information and overhead of resources.

  • PDF