• Title/Summary/Keyword: 네트워크 아키텍쳐

Search Result 108, Processing Time 0.03 seconds

CASE Tool For HLA Application (HLA Application 개발을 위한 CASE Tool)

  • 박민호;김재형;정창성
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.415-417
    • /
    • 2001
  • HLA(High Level Architecture)는 차세대 DIS(Distributed Interactive Simulation)를 이어 네트워크 분산 시뮬레이션의 기반이 되는 표준 아키텍쳐이다. 이 HLA 시스템의 개발 과정에서 FEDEP(Federation Development and Execution Process) Model이 제안되었는데, FEDEP의 목적은 federation 개발자가 application의 요구를 충족시킬 수 있도록 federation 개발 및 실행에 대한 guideline을 정하는 것이다. FEDEP의 일련의 process들 중에서 노동집약적인 과정은 CASE(Computer Aided Software Engineering) tool을 사용함으로써 보다 강화되고 능률적으로 이루어질 수 있다. 본 논문에서 소개하는 HLA Application Builder 는 federate 와 federation을 자동적으로 생성하는 CASE tool 로서, 자동적인 FED(Federation Execution Data)file 및 C++ source code를 생성함으로써 HLA Federation 개발에 있어서의 인력(manpower)을 크게 줄일 수 있다. 본 논문에서는 HLA에 대한 배경지식과 HLA Application Builder 개발의 필요성과 구현, 그리고 실제 예를 들어서 HLA Application Builder가 어떻게 federation 개발에 사용되는지에 대해서 설명한다.

  • PDF

A Study on Usage of Rule Engine for SOA (SOA 관점의 Rule Engine 활용에 관한 연구)

  • Lee, Jae-Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.1141-1144
    • /
    • 2012
  • 최근의 SW 개발환경은 네트워크 환경이 발달하고 복잡한 비즈니스를 구현하기 위해 분산 컴퓨팅 환경으로 옮겨진 상황이다. 따라서, 시스템간의 쉬운 연결성을 보장하여 자원의 낭비를 줄이고 재사용하며 활성화 할 수 있는 플랫폼을 갖출 수 있는 SOA(Service Oriendted Architecture)의 활용이 필요한 시점이다. 이런 복잡한 니즈의 비즈니스를 구현함에 있어 업무 규칙을 별도로 관리하고 룰엔진에 의해 판단을 할 수 있다면, 프로그램 코드로부터 업무를 완전히 분리해낼 수 있다 본 논문에서는 이러한 진일보한 사상을 조합하여 비즈니스 구현에 집중하고 결합성은 낮출 수 있는 SW 개발 아키텍쳐를 제시해본다.

Octeon architecture emulation on QEMU (QEMU기반 옥테온 아키텍처 에뮬레이션)

  • Soohun Kim;Brent ByungHoon Kang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.301-302
    • /
    • 2023
  • 에뮬레이션 기술은 다양한 아키텍처에 대해 하드웨어 독립적인 실험 및 분석 환경을 제공하기 때문에 임베디드 기기 분석에 널리 활용되고 있다. 옥테온(Octeon) 아키텍처는 고성능 네트워크 장비에서 주로 사용되는 프로세서로, 이에 대응하는 에뮬레이션 환경의 구축이 어려워 초기 개발 및 분석에 어려움을 겪는다. 따라서 본 논문에서는 QEMU(v.6.0)을 활용한 옥테온 아키텍처의 에뮬레이션 환경을 구현하고 실험한 결과를 소개한다. 구현된 옥테온 에뮬레이션 환경은 옥테온 아키텍처 고유 인스트럭션 중 특정 하드웨어의 지원을 요하지 않는 인스트럭션에 대하여 에뮬레이션이 가능함을 보였으며 이는 옥테온 아키텍처 기반의 기기 프로그램 에뮬레이션에 활용할 수 있을 것으로 기대한다.

  • PDF

A Building Method of Security Architecture Framework on the Medical Information Network Environment (의료정보시스템상에서의 네트워크 보안기능 프레임워크와 보안 아키텍쳐 설계방법)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.3-9
    • /
    • 2011
  • On health information network architecture, traffic along the path of traffic and security, blocking malicious code penetration is performed. The medical information system network security infrastructure study, which was whether to be designed based on the structure and methodology is designed to develop the security features. Health informati on system's functionality and capabilities framework for infrastructure is the backbone and structure. The design fea tures a framework for the overall network structure formation of the skeleton and forms the basic structure of the security methodology. Infrastructure capabilities to build the framework and the application functionality is being implemented. Differentiated in accordance with security zones to perform security functions and security mechanisms that operate through this study is to present. u-Healthcare future advent of cloud computing and a new health information environment, the medical information on the preparation of this study is expected to be utilized for security.

Components Clustering for Modular Product Design Using Network Flow Model (네트워크 흐름 모델을 활용한 모듈러 제품 설계를 위한 컴포넌트 군집화)

  • Son, Jiyang;Yoo, Jaewook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.263-272
    • /
    • 2016
  • Modular product design has contributed to flexible product modification and development, production lead time reduction, and increasing product diversity. Modular product design aims to develop a product architecture that is composed of detachable modules. These modules are constructed by maximizing the similarity of components based on physical and functional interaction analysis among components. Accordingly, a systematic procedure for clustering the components, which is a main activity in modular product design, is proposed in this paper. The first phase in this procedure is to build a component-to-component correlation matrix by analyzing physical and functional interaction relations among the components. In the second phase, network flow modeling is applied to find clusters of components, maximizing their correlations. In the last phase, a network flow model formulated with linear programming is solved to find the clusters and to make them modular. Finally, the proposed procedure in this research and its application are illustrated with an example of modularization for a vacuum cleaner.

A remote device authentication scheme in M2M communications (M2M 통신에서 원격장치 인증 기법)

  • Lee, Song-Hee;Park, Nam-Sup;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.309-316
    • /
    • 2013
  • Machine-to-machine (M2M) communication occurs when devices exchange information independent of human intervention. Prominent among the technical challenges to M2M communication are security issues, such as eavesdropping, spoofing, modification, and privacy violation. Hence, it is very important to establish secure communication. In this paper, we propose a remote authentication scheme, based on dynamic ID, which provides secure communication while avoiding exposure of data through authentication between the M2M domain and the network domain in the M2M architecture. We then prove the correctness and security of the proposed scheme using a logic-based formal method.

A Design and Implementation of Mobile Application SREMS (SREMS 모바일 어플리케이션 설계 및 개발)

  • Jeong, Kyong-Jin;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1173-1180
    • /
    • 2012
  • Based on Smart Phone, this study added and implemented the mobile App to the existing IT agriculture system, which system automatically controlled green house's growth environment. Because the mobile App characterfully possesses high portability, limited resource, mobile wireless network support, enterprise mobile computing support, etc., the hybrid-App should be inevitably adopted. The hybrid App can minimize resource consumption for performing related duties and also, in spite of the mobile device's limits, it can derive high performance, in which facts the system can ensure the service-based architecture's reliance and also, implements the highly sophisticated functionality as well. Through the proposed system, the study expects to contribute to improve quality of life as well as to increase farmer's income through IT-based agriculture system development.

A Study on MT-Serpent Cryptographic Algorithm Design for the Portable Security System (휴대용 보안시스템에 적합한 MT-Serpent 암호알고리즘 설계에 관한 연구)

  • Lee, Seon-Keun;Jeong, Woo-Yeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.195-201
    • /
    • 2008
  • We proposed that is suitable network environment and wire/wireless communication network, easy of implementation, security level preservation, scalable & reconfigurable to TCP/IP protocol architecture to implement suitable smart card MS-Serpent cryptographic algorithm for smart card by hardware base chip level that software base is not implement. Implemented MT-Serpent cryptosystem have 4,032 in gate counter and 406.2Mbps@2.44MHz in throughput. Implemented MS-Serpent cryptographic algorithm strengthens security vulnerability of TCP/IP protocol to do to rescue characteristic of smart card and though several kind of services are available and keep security about many user in wire/wireless environment, there is important purpose.

  • PDF

A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture (Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구)

  • Na, Sang Yeob;Noh, Si Choon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.

A Study on an WiBro and WiFi Interworking Architecture design and performance analysis for Service Continuity (서비스 연속성 지원을 위한 WiBro-WiFi 상호연동 아키텍쳐 설계 및 성능 분석에 관한 연구)

  • Mok, Kyungyul;Lee, Gowoon;Joh, Hangki;Ryoo, Intae
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.471-479
    • /
    • 2013
  • WiBro technology provide mobile devices with a transmission speed of more than 1 Mbps even under the condition of high mobility (120 km/h). In a building, however, there is more demand for high bandwidth for various activities, and WiBro services may not be available. In order to guaranteeing a seamless service continuity and high transmission capability for mobile users within a specific establishment that has deployed WiBro network, we should secure an internetworking platform for WiBro and WiFi networks. This paper introduces WiMax forum and 3GPP standards, proposes WiBro-WiFi Interworking (WWI) architecture, its implementation details, and finally verifies validity of the proposal by using OPNet simulations.