• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.027 seconds

Design and Implementation of a Session Handler Module for SyncML Data Synchronization Clients (SyncML 자료 동기화 클라이언트를 위한 세션 핸들러 모듈의 설계 및 구현)

  • Ha Byoung-Hoon;Park KeeHyun;Ju HongTaek;Woo Jongjung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.741-748
    • /
    • 2005
  • SyncML is an open standard data synchronization protocol proposed by OMA(Open Mobile Alliance). In this paper, a Session Handler module, one of major modules for developing SyncML data synchronization clients, and a client User Setup program are designed and implemented. The Session Handier Module controls communication sessions, generates header parts of messages exchanged, and determines the legitimacy of incoming messages. In order to justify normal operations of the Session Handler module and the client User Setup program implemented In this paper, they are ported to a Zaurus PDA, which runs on LINUX operating system. In addition, data synchronization operations are performed between the PDA and a Synthesis sever, whose SyncML data synchronization operation is certificated by OMA, Wireless Internet International Standard Forum.

Load Balancing Schemes in the MANET with Multiple Internet Gateways (다중 인터넷 게이트웨이를 갖는 MANET의 부하 균등화 기법)

  • Kim, Young-Min;Lim, Yu-Jin;Yu, Hyun;Lee, Jae-Hwoon;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.621-626
    • /
    • 2006
  • A mobile ad hoc network (MANET) is an infrastructureless network that supports multi-hop communication. For the MANET nodes wishing to communicate with nodes in the wired Internet, the global Internet connectivity is required and this functionality can be achieved with the help of the Internet gateway. For the support of reliability and flexibility, multiple Internet gateways can be provisioned for a MANET. In this case, load-balancing becomes one of the important issues since the network performance such as the network throughput can be improved if the loads of the gateways are well-balanced. In this paper, we categorize the load-balancing mechanisms and propose a new metric for load-balancing. Simulation results show that our proposed mechanism using the hop distance and the number of routing table entries as a load-balancing metric enhances the overall network throughput.

A Test Design for Service Connection of Business Service and Application Service in SOA using Service Message Flow Diagram (SMFD 기반의 SOA 비즈니스 서비스와 어플리케이션 서비스 연결 테스트 설계)

  • Ji, Eun-Mi;Yoon, Hoi-Jin;Choi, Byoung-Ju
    • Journal of Internet Computing and Services
    • /
    • v.9 no.5
    • /
    • pp.35-46
    • /
    • 2008
  • This paper defines a diagram showing the characteristics of service connections in SOA, and it designs the connection testing with the diagram. The detail steps of building test requirements in the test design phase are explained, and the steps are applied to two different enterprise cases as examples. The cases are real SOA system of real enterprises. Recently, many enterprises have been trying to reconfigure their system as SOA systems. However, these projects are hard to be applied to their mission-critical real systems, since there is few testing technique understanding SOA characteristics, One of the missing characteristics of SOA in testing is that SOA needs a layering systems between business processes and applications. This paper focuses on the layering system of SOA to solve the testing problem in SOA.

  • PDF

A Study of Intrusion Detection Scheme based on Software-Defined Networking in Wireless Sensor Networks (무선 센서 네트워크에서 소프트웨어 정의 네트워킹 기법을 사용한 침입 탐지 기법에 대한 연구)

  • Kang, Yong-Hyeog;Kim, Moon Jeong;Han, Moonseog
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.51-57
    • /
    • 2017
  • A wireless sensor network is composed of many resource constrained sensor nodes. These networks are attacked by malicious attacks like DDoS and routing attacks. In this paper, we propose the intrusion detection and prevention system using convergence of software-defined networking and security technology in wireless sensor networks. Our proposed scheme detects various intrusions in a central server by accumulating log messages of OpenFlow switch through SDN controller and prevents the intrusions by configuring OpenFlow switch. In order to validate our proposed scheme, we show it can detect and prevent some malicious attacks in wireless sensor networks.

Pushback Based Advanced Packet Marking Mechanism for Traceback (Pushback 방식을 적용한 패킷 마킹 기반 역추적 기법)

  • Lee, Hyung-Woo;Choi, Chang-Won;Kim, Tai-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1120-1130
    • /
    • 2004
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive tracing. Existing proactive tracing scheme(such as packet marking and messaging) prepares information for tracing when packets are in transit. But, these scheme require additional network overhead. In this paper, we propose a "advanced Traceback" mechanism, which is based on the modified Pushback system with secure router mechanism. Proposed mechanism can detect and control DDoS traffic on router and can generate marked packet for reconstructing origin DDoS attack source, by which we can diminish network overload and enhance Traceback performance.

  • PDF

An Authentication Protocol for Fast Soft Handover in Portable Internet (휴대인터넷에서 고속 소프트 핸드오버를 위한 인증 프로토콜)

  • Ryu, Dae-Hyun;Choi, Tae-Wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.10
    • /
    • pp.1786-1795
    • /
    • 2006
  • Portable Internet extended from wireless LAN has a large cell size, similar to a wireless mobile communication. and can provide the seamless service which offers middle-low speed mobility. IEEE 802.16e, the international standard of Portable Internet, uses PKMv2 protocol for authorization and key exchange between a MSS and a BS. This paper proposes a new protocol based on PKMv2, which can provide that MSS is able to do fast authorization with a new BS when soft handover is occurred in a MSS. Our protocol can carry out fast authorization because of reducing the number of messages and parameter exchange, public key encryption and signature in wireless network more than the previous works. It also prevents eavesdropping from an external attacker and keeps the security against impersonation attacks for both a MSS and a BS.

Design and Implementation of Communication Module for Distributed Intelligence Control Using LonWorks (LonWorks를 이용한 분산 지능 제어를 위한 통신 모듈의 설계 및 구현)

  • Choi Jae-Huyk;Lee Tae-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1654-1660
    • /
    • 2004
  • In this paper, we describes the design and implementation of LonWorks communication module for distributed intelligent control using LonWorks technology of Echelon. LonWorks communication module can be divided hardware and firmware. First, hardwares is divided into microcontroller attaching sensors and LonWorks components for working together control network and data network. Hardwares are consisted of neuron chip, microcontroller, transceiver, LONCard. Second, operating firmware is realized with neuron C using NodeBulider 3.0 development tool. Produced and implemented LonWorks communication module is pretested using LTM-10A, Gizmo 4 I/O board, parallel I/O Interface. For field test, microcontroller module part is tested by HyperTerminal, communication procedure in data network is certified by transmitting and receiving short message using LonMaker for Windows tool. Herewith, LON technology is based on network communication technique using LonWorks.

Performance Evaluation of a Survivable Ship Backbone Network Exploiting k-Shortest Disjoint Paths (k-최단 분리 경로 배정을 적용한 장애 복구형 선박 백본 네트워크의 성능 평가)

  • Tak, Sung-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.701-712
    • /
    • 2012
  • The concept of $k$-shortest disjoint paths is considered important because the establishment of primary and backup forwarding paths exploiting shorter distance and faster propagation time is a dominant consideration for the design of a survivable backbone network. Therefore, we need to evaluate how well the concept of $k$-shortest disjoint paths is exploited for the design of a survivable ship backbone network considering the international standard related to ship backbone networks, the IEC61162-410 standard specifying how to manage redundant message transmissions among ship devices. Performance evaluations are conducted in terms of following objective goals: link capacity, hop and distance of primary and backup paths, even distribution of traffic flows, restoration time of backup forwarding paths, and physical network topology connectivity.

A Security Protocol for Swarming Technique in Peer-to-Peer Networks (피어 투 피어 네트워크에서 스워밍 기법을 위한 보안 프로토콜)

  • Lee, Kwan-Seob;Lee, Kwan-Sik;Lee, Jang-Ho;Han, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1955-1964
    • /
    • 2011
  • With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.

Implementation of a DBA Algorithm with the Maximum Link Bandwidth Allocation in the G-PON (G-PON에서 최대 링크 대역폭까지 할당이 가능한 DBA 알고리즘의 구현)

  • Chung, Hae;Hong, Jung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1549-1560
    • /
    • 2009
  • In the TDMA PON system, the DBA is essential for ONUs to send data efficiently to the upstream. In this paper, we implement a DBA processor for the G-PON OLT with downstream and upstream rate, 2.5 and 1.25 Gbps, respectively, The processor collects bandwidth request messages from ONUs at every cycle time and allocates properly bandwidth to each Alloc-ID with considering priority and fairness for traffics. In the proposed DBA algorithm, one cycle time consists of multiple G-PON frames ($m{\times}125{\mu}s$) for high link efficiency. In particular, the link efficiency is higher because the algorithm adopts a method that an additional overhead is eliminated when an allocated bandwidth is laid between two G-PON frames for an ONU. This enables that the processor flexibly allocates the bandwidth from zero to the maximum link capacity for an ONU. The proposed DBA processor is implemented with the FPGA and shows bandwidth allocating processes for ONUs with logic analyzer.