• Title/Summary/Keyword: virtual network

Search Result 1,548, Processing Time 0.029 seconds

A Study of Virtual Home Environment Implementation Scenario for Subscriber Privacy (가입자 정보보호를 위한 Virtual Home Environment 시나리오 보안 취약점 분석)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.117-122
    • /
    • 2001
  • Currently, the VHE (suggested for global roaming user to provide personal service environment) implementation scenario is being proposed to realize 3G network requirements. However, developing VHE scenarios are focused on signal flow between node and network, and network and network. this case may result in weakness to protect subscriber's privacy in 3G network which commonly uses visited network. In this paper, we reanalyze a several VHE implementation scenarios for user profile protection, indicate a problem concerning user privacy, and finally, design a procedure to cope with vulnerability in VHE implementation scenario.

  • PDF

Trends in Network Address Moving Technology (네트워크 주소 이동 기술 동향)

  • Park, K.M.;Woo, S.;Moon, D.S.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.73-82
    • /
    • 2017
  • Moving Target Defense(MTD) is a novel security technology concept in which the IT infrastructure changes its form actively and prevents various types of cyber attacks. Network address moving technology is the field that has been most actively researched in terms of MTD. A number of studies on network address moving published over the last decade have suggested a virtual address-based network address moving technology for efficiency in the implementation. However, virtual address-based network address moving technology has serious vulnerabilities in terms of security and availability. This paper examines the technological characteristics of the existing studies and analyzes their limitations. It suggests security requirements to be considered when designing the network address moving technology through a technological analysis.

Behavior Control Algorithm of Swarm Robots to Maintain Network Connectivity (네트워크 연결성 유지를 위한 군집 로봇의 행동 제어 알고리즘)

  • Kim, Jong Seon;Jeong, June Young;Ji, Sang Hoon;Joo, Young Hoon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.12
    • /
    • pp.1132-1137
    • /
    • 2013
  • In swarm robot systems, it is vital to maintain network connectivity to ensure cooperative behavior between robots. This paper deals with the behavior control algorithm of the swarm robots for maintaining network connectivity. To do this, we divide swarm robots into search-robots, base-robots, and relay-robots. Using these robots, we propose behavior control algorithm to maintain network connectivity. The behavior control algorithms to maintain network connectivity are proposed for the local path planning using virtual force and global path planning using the Delaunay triangulation, respectively. Finally, we demonstrate the effectiveness and applicability of the proposed method through some simulations.

(An Effective Way to Construction the Highest Interworkable Virtual Network) (최상위 상호작용을 위한 효과적인 가상 네트워크 구축방법)

  • 석진원;이태공
    • Journal of the military operations research society of Korea
    • /
    • v.23 no.1
    • /
    • pp.100-114
    • /
    • 1997
  • The network for proving information exchange function in distributed system is interconnected among other networks which are in the state of independent construction and operation. However, due to various network protocols and distributed applications, Problems occurred in the area of network interconnectivity and interoperability of distributed applications in internetworking which should provide a good interoperability. This paper proposed an improved method for finding route which has the highest interworkability between end-systems using the interrelationship of network protocol. An algorithm and method of constructing a virtual network which is suitable for required distributed application are also proposed in this research.

  • PDF

Development of Internet-based Cooperative System for Integrity Evaluation of Reactor Pressure Vessel (원자로 압력용기의 건전성평가를 위한 인터넷기반 협업시스템의 개발)

  • Kim, Jong-Choon;Choi, Jae-Boong;Kim, Young-Jin;Choi, Young-Hwan
    • Proceedings of the KSME Conference
    • /
    • 2004.11a
    • /
    • pp.166-171
    • /
    • 2004
  • Since early 1950's fracture mechanics has brought significant impact on structural integrity assessment in a wide range of industries such as power, transportation, civil and petrochemical industries, especially in nuclear power plant industries. For the last two decades, significant efforts have been devoted in developing defect assessment procedures, from which various fitness-for-purpose or fitness-for-service codes have been developed. From another aspect, recent advances in IT (Information Technologies) bring rapid changes in various engineering fields. IT enables people to share information through network and thus provides concurrent working environment without limitations of working places. For this reason, a network system based on internet or intranet bas been appeared in various fields of business. Evaluating the integrity of structures is one of the most critical issues in nuclear industry. In order to evaluate the integrity of structures, a complicated and collaborative procedure is required including regular in-service inspection, fracture mechanics analysis, etc. And thus, experts in different fields have to cooperate to resolve the integrity problem. In this paper, an internet-based cooperative system for integrity evaluation system which adapts IT into a structural integrity evaluation procedure for reactor pressure vessel is introduced. The proposed system uses Virtual Reality (VR) technique, Virtual Network Computing (VNC) and agent programs. This system is able to support 3-dimensional virtual reality environment and to provide experts to cooperate by accessing related data through internet.

  • PDF

A Sensor Overlay Network Providing Middleware Services on Wireless Sensor Networks (무선 센서 네트워크에서 미들웨어 서비스를 제공하는 센서 오버레이 네트워크)

  • Kim, Yong-Pyo;Jung, Eui-Hyun;Park, Yong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.653-660
    • /
    • 2009
  • A research for middleware of WSN can provide sensor applications with avoiding tight coupling of hardware, ease of development, and abstract data access. However, previous works have some limitations which should install their own middleware onto the all sensor nodes resulting in computational and communication overhead. In order to address it, we proposed a virtual sensor overlay network, called TinyONet-Lite which introduced virtual sensors to model a virtual counterpart of physical sensors. These virtual sensors dynamically grouped into an overlay network, Slice, which provides middleware services. We implemented TinyONet-Lite on mote class hardware with TinyOS. In accordance with experiments and comparison with existing researches, TinyONet-Lite was proved to show advantages of extensibility, dynamic service composition and reducing overhead.

Teleoperatoin System Control using a Robust State Estimation in Networked Environment (네트웍 환경에서의 강건상태추정을 이용한 원격조작시스템 제어)

  • Jin, Tae-Seok;Kim, Hyun-Sik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.746-753
    • /
    • 2008
  • In this paper, we introduce the improved control method are communicated between a master and a slave robot in the teleoperation systems. When the master and slave robots are located in different places, time delay is unavoidable under the network environment and it is well known that the system can become unstable when even a small time delay exists in the communication channel. The time delay may cause instability in teleoperation systems especially if those systems include haptic feedback. This paper presents a control scheme based on the estimator with virtual master model in teleoperation systems over the network. As the behavior of virtual model is tracking the one of master model, the operator can control real master robot by manipulating the virtual robot. And LQG/LTR scheme was adopted for the compensation of un-modeled dynamics. The approach is based on virtual master model, which has been implemented on a robot over the network. Its performance is verified by the computer simulation and the experiment.

Virtual and Augmented Reality Technologies in the Organization of Modern Library Media Space

  • Horban, Yurii;Gaisynuik, Nataliya;Dolbenko, Tetiana;Karakoz, Olena;Kobyzhcha, Nataliia;Kulish, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.375-380
    • /
    • 2022
  • Virtual and augmented reality technologies provide access to learning materials and improve the organization of a modern library's media space. This article aims to identify the significance and role of virtual and augmented reality technologies in the modern library's media space organization. Methodology. The research uses a university library case study methodology to empirically investigate virtual and augmented reality technologies. Results. Virtual and augmented reality technologies provide research and improve learning outcomes by engaging students and learners with significant interest in such technologies. Libraries offer users the opportunity to create their VR content through available software. Students can test their VR content in the libraries' labs. Libraries support access to a variety of virtual and augmented reality content. The content is accessed using "virtual reality headsets" for viewing and workstations with "authoring software and loanable 360 cameras" for creating. The library lab is a space to support students' digital creativity and research through virtual and augmented reality. There are 3D Design Labs within the libraries as a medium to large group design learning spaces with virtual reality technology. Libraries form a media space where users can create videos, podcasts, portfolios, edit media, and book tours, and students and researchers can explore different scientific knowledge. In this way, technology ensures that risks in learning are minimized as opposed to hands-on seminars and classes.

Performance Benefits of Virtual Path Tunneling for Control and Management Flows in the Broadband ATM Network

  • Choi, Jun-Kyun;Kim, Soo-Hyung;Kim, Nam;Sohn, Sung-Won;Choi, Mun-Kee
    • ETRI Journal
    • /
    • v.21 no.4
    • /
    • pp.23-28
    • /
    • 1999
  • In this paper, we analyze the performance benefits of broadband ATM networks when the call control and management flows are separated from user data flows. The virtual path tunneling concept for control and management flows are applied to the same physical ATM networks. The behaviors of channel throughput and transfer delay are analyzed. It results that the proposed virtual short-cut paths can maintain the network being stable with acceptable bandwidth. They are very useful to provide the stable control and management capabilities for Internet and mobile applications in the broadband ATM networks. In our numerical results, the effective throughputs of the proposed virtual shout-ut channel are about three times than those of end-to-end user data channels with hop distances of 10, and about two times than those with hop distance of 5 when the link blocking probability increases to 0.1. It concludes that the effective channel bandwidth are greatly reduced down while physical links are not stable and user traffic flows are occasionally overflowed.

  • PDF

Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks (차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.22-29
    • /
    • 2003
  • In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.