• Title/Summary/Keyword: 정책기반 네트워크 관리

Search Result 283, Processing Time 0.026 seconds

Design of Internet Telephony Network System using Open Source Softwares (오픈 소스 소프트웨어를 활용한 인터넷 전화망 시스템 설계)

  • Ha, Eun-Yong
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.259-267
    • /
    • 2012
  • Internet telephony is an Internet service which supports voice telephone using VoIP technology on the IP-based Internet. It has some advantages in that voice telephone services can be accompanied with multimedia services such as video communication and messaging services. Recently, the introduction of smart phones has led to a growth in social networking services and thus, the research and development of Internet telephony has been actively progressed and has the potential to become a replacement for the telephone service that is currently being used. In this paper we designed and implemented an Internet telephony network system which is developed by using Asterisk and open source softwares. It is developed on the linux system and has some features such as VoIP telephony service between SIP phones, voice mail, and call recording. It also supports web-based functions such as SIP users and server system management that is implemented by Apache web server and PHP programs. Afterwards, this system will be applied as VoIP network base technology for small sized companies and organizations. It will paly a role for encouraging companies to use open source softwares.

The Detection System for Hosts infected Malware through Behavior information of NAC post-connect (NAC 의 post-connect에서 행위정보를 사용한 악성코드 감염 호스트 탐지 시스템)

  • Han, Myung-Mook;Sun, Jong-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.91-98
    • /
    • 2010
  • NAC(Network Access Control) has been developed as a solution for the security of end-point user, to be a target computer of worm attack which does not use security patch of OS and install Anti-Virus, which spreads the viruses in the Intra-net. Currently the NAC products in market have a sufficient technology of pre-connect, but insufficient one of post-connect which detects the threats after the connect through regular authentication. Therefore NAC users have been suffered from Zero-day attacks and malware infection. In this paper, to solve the problems in the post-connect step we generate the normal behavior profiles using the traffic information of each host, host information through agent, information of open port and network configuration modification through network scanner addition to authentication of host and inspection of policy violation used before. Based on these we propose the system to detect the hosts infected malware.

  • PDF

A Study on the Factors Affecting Technological Innovation of Innovative IT SMEs (혁신형 IT 중소기업의 기술혁신에 영향을 미치는 요인에 관한 연구)

  • Kim, J.K.;Hwang, K.T.
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.201-224
    • /
    • 2016
  • The main objective of this study is to identify and analyze the factors affecting technology innovation of the innovative IT SMEs. A research model is established based on the previous studies on the technology innovation of SMEs. The model consists of independent variables (Adhocracy culture, R&D capability, IT capability, Leadership, and Appraisal & Reward), an intermediate variable (Knowledge management), and dependent variables (product/service innovation and process innovation). Major research results can be summarized as follows: IT SMEs pursuing technology innovation should: (1) pay attention to innovation oriented culture, IT capability, and evaluation & compensation systems of the company; (2) recognize that knowledge management is an essential activity performed by the company; (3) strengthen the R&D capabilities of the company by not only exerting internal efforts but establishing cooperative network with various parties; and (4) resolve the decoupling problem of the evaluation & compensation system.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.

Applying TMO-Based Object Group Model to Area of Distributed Real-Time Applications and Its Analysis (분산 실시간 응용 분야에 TMO 기반 객체그룹 모델의 적용 및 분석)

  • 신창선;정창원;주수종
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.432-444
    • /
    • 2004
  • In this paper, we construct the TMO-based object group model on distributed environment, and analyze and evaluate the executability for distributed real-time service of our object group model by developing the distributed real-time application simulator applying the model. The Time-triggered Message-triggered Object(TMO) is a real-time server object having real-time property itself. The TMO-based object group is defined as a set of objects which logically reconfigured the physically distributed one or more TMOs on network by a given distributed application. For supporting group management of the server objects, the TMO-based object group we suggested provides the functions which register and withdraw the solver objects as a group member to an arbitrary object group, and also provides the functions which insert and delete the access rights of server objects from clients. Also, our model was designed and implemented to support the appropriate object selection and dynamic binding service for a single TMO as well as the duplicated TMOs, and to support the real-time scheduling service for the clients which are requesting the service. Finally, we developed the Defence System against Invading Enemy Planes(DSIEP) simulator as a practical example of distributed real-time application by applying our model, and evaluated the adaptability of distributed service strategies for the group components and the executability of real-time services that the TMO-based object group model provides.

An Integrated QoS Management System for Large-Scale Heterogeneous IP Networks : Design and Prototype Implementation (대규모 이기종 IP 망의 통합품질관리 시스템의 설계 및 구현)

  • Choi, Tae-Sang;Chung, Hyung-Seok;Choi, Hee-Sook;Kim, Chang-Hoon;Jeong, Tae-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3633-3650
    • /
    • 2000
  • Internet is no longer a network for special communities but became a global means of communication infrastructure for everyday life. People are exchanging their personal messages using e-mails, students are getting their educational aids through the web, people are buying a variety of goods from cyber shopping malls, and companies are conducting their businesses over the Internet. Recently, such an explosive growth of the traffic in the Internet raised a big concern on how to accommodate ever-changing user's needs in terms of an amount of the traffic, characteristics of the traffic, and various service quality requirements, Over provisioning can be a simple solution but it is too expensive and inefficient. Thus many new technologies to solve this very difficult puzzle have bcen introduced recently, Any single solution, however, can be insufficient and a carefully designed architecture, which integrates a group of solutions, is required. In this paper, we propose a policy-based Internet QoS provisioning, traffic engineering and perfonnance management system as our solution to this problem. Our integrated management QoS solution can provide highly responsive flow-through service provisioning, more realistic service and resource policy control based on the real network performance information, and centralized control of traffic engineering for heterogeneous networks.

  • PDF

An Enhanced Greedy Message Forwarding Protocol for High Mobile Inter-vehicular Communications (고속으로 이동하는 차량간 통신에서 향상된 탐욕 메시지 포워딩 프로토콜)

  • Jang, Hyun-Hee;Yu, Suk-Dae;Park, Jae-Bok;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.3
    • /
    • pp.48-58
    • /
    • 2009
  • Geo-graphical routing protocols as GPSR are known to be very suitable and useful for vehicular ad-hoc networks. However, a corresponding node can include some stale neighbor nodes being out of a transmission range, and the stale nodes are pone to get a high priority to be a next relay node in the greedy mode. In addition, some useful redundant information can be eliminated during planarization in the recovery mode. This paper deals with a new recovery mode, the Greedy Border Superiority Routing(GBSR), along with an Adaptive Neighbor list Management(ANM) scheme. Each node can easily treat stale nodes on its neighbor list by means of comparing previous and current Position of a neighbor. When a node meets the local maximum, it makes use of a border superior graph to recover from it. This approach improve the packet delivery ratio while it decreases the time to recover from the local maximum. We evaluate the performance of the proposed methods using a network simulator. The results shown that the proposed protocol reveals much better performance than GPSR protocol. Please Put the of paper here.

A Study on Smart Home Service System Design to Support Aging in Place (Aging in Place 지원을 위한 스마트 홈 서비스 시스템 설계에 관한 연구)

  • Sim, Sungho
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.249-254
    • /
    • 2019
  • According to the recent expansion of the network environment, the spread of smart devices is continuously increasing. With the spread of smart devices such as smart phones, smart pads and wearables, changes are taking place in smart technologies and IT convergence technologies. The development of smart technology is a key element of the 4th industrial technology. The Fourth Industrial Revolution expanded the new service-based industry by adding intelligence to residential, industrial and production environments using IT convergence and smart devices. Research on providing various services using smart technologies, such as smart home, smart factory, smart farm, and smart healthcare, is being conducted in variety. In particular, There is a sharp rise in smart homes due to the proliferation of IoT devices and the growth of sensor technology, control technology, applications, data management, and cloud services. Smart home services using smart technology provide residents with convenient, beneficial services and environments. Smart home service has complemented the existing home network service, but there still are flaws to be modified. In other words, the spread of smart devices, the development of service provider-oriented services, and the interlocking of services have limitations in providing services in consideration of user environment and user state. In order to solve this problem, this study proposes a smart home service system that considers the situation of the elderly.

A Study on Improving Estimation of Recurrence Rate of Public Water -Jungnangcheon Watershed- (생활용수 회귀수량 산정방법의 개선연구 -중랑천 유역을 대상으로-)

  • Jung, Chung Gil;Ahn, So Ra;Joh, Hyung Kyung;Kim, Seong Joon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.509-509
    • /
    • 2015
  • 물 수요관리측면에 대한 정책을 수립하기 위해서는 현재 또는 장래에 대한 용수수급의 정확한 이해를 필요로 한다. 이를 위해서는 용수 수요량 및 공급량뿐만 아니라 여러 산정요소를 필요로 하는데, 그 중 회귀수량은 물이 이용되고 다시 하천으로 회귀되어 이용될 가능성이 있는 수량으로 정의되며, 용수수급 및 용수절약 측면에서 회귀 수량은 중요한 요소라 할 수 있다. 회귀수량 조사는 유역조사 사업 이래, 10년간 생?공용수를 중심으로 미시적, 거시적으로 조사를 시행하였으나, 측정 자료의 신뢰도, 조사방법 및 지점선정 등의 문제로 인하여 조사 성과의 활용성이 매우 낮은 실정이다. 수자원장기종합계획등에서는 수자원관련 계획 수립시 생?공용수의 회귀율을 65 %로 적용하고 있으나, 이는 1970년대 말의 사회적 여건 및 경제적 상황이 반연된 결과로 현재 상황에 적용되기 곤란하다. 따라서, 현재 실정에 맞는 회귀율 산정은 반드시 필요하게 된다. 본 연구에서는 기존 생활용수 회귀수량 산정 연구 한계를 보완하고 유역조사 시행을 위한 개선된 회귀수량을 산정하고자 한다. 본 연구는 서울시 중랑물재생센터 처리구역을 기반으로 중랑천유역을 시험유역으로 선정하였다. 기존 회귀수량 산정방법을 개선하기 위해 시험유역 회귀수량 산정을 위한 가용 자료 분석 및 용수흐름 네트워크 공간분석을 추가로 진행하였다. 가용자료로 시험 유역내 상수공급자료(정수장 공급량, 상수계통도, 유수 및 누수율), 하수처리자료(하수처리구역도, 하수처리계통도, 유입량 및 방류량) 및 기상자료(기상청 지점 및 AWS 강우자료)를 구축하였고 각각의 상수계통도 및 하수처리계통도로부터 용수 흐름 네트워크망을 구축하였다. 상수공급자료로부터 상수계통도 공급지역을 구분하여 월별 유수율에 따른 월별 실 공급량을 산정하였다. 하수처리자료로부터 시험유역에서의 월별하수처리 유입량 및 방류량을 산정하였다. 최종적으로 회귀율(하수처리 방류량/실 공급량)을 산정한 결과 연평균 회귀율은 각각 93.97 %(2011년), 95.02%(2012년)로 과잉 추정 되었으며 7 ~ 9월의 회귀율은 110 ~ 120 %로 유입량을 초과하였다. 이는, 하수처리로 유입되는 유입량의 하수관거는 합류식으로 구축되어 7 ~ 9월에 많은 양의 강우량이 우수관을 통해 하수처리장으로 이송되어 생활용수 이외에 자연적인 공급량으로 인한 것으로 분석되었다. 따라서, 월별 회귀율 산정을 위해서는 불투수층에서의 면적강우량(mm)을 유입량(m3/s)으로 환산된 값을 고려하여 회귀율을 재산정하였다. 그 결과 연평균 회귀율은 각각 78.27 %(2011년), 77.58 %(2012년)로 나타났다.각각의 월별 회귀율도 매우 유사하게 나타났으며 과거 관용적으로 사용된 65 % 회귀율보다 약 12 ~ 13%로 증가하였으며 이는, 하수처리시설 구축 및 처리효율의 증가와 상수처리시설의 관로시설의 개량으로 인한 유수율 및 누수율 감소로 회귀율이 증가한 것으로 판단된다.

  • PDF

A Study on Environmental Assessment of Bikeway based on ANP Model for Sustainable Green Road (지속가능 녹색 도로 조성을 위한 ANP 모델 기반 자전거도로 환경 평가 방안)

  • Lee, Ji Hwan;Joo, Yong Jin;Park, Soo Hong
    • Spatial Information Research
    • /
    • v.20 no.6
    • /
    • pp.33-43
    • /
    • 2012
  • As part of recent sustainable transport, bike has come into the spotlight as a green transport at close range to link between walking and public transit and also alterative to solve problems of existing vehicle travel. Some arguments on promotion of using bicycles have already been made in Europe, the U.S and other developed countries. To be sure, much has been written extensively in description of utilization of bike oriented by supplier, for examples, Level of Service with bike path, infrastructure such as bicycle racks and lounge etc. Therefore, our study has been differentiated in development of new evaluation model focused on level of bike user's satisfaction, comprehensively considering suitability for bikeway installation, connectivity of the public transportation system and stability in Incheon City. ANP(Analytic Network Process) analysis which is able to allow consideration of the interdependence of criteria has been hired due to multi-collinearity instead of AHP used in multi-criteria decision analysis. Last but not least, we drew bike route on a case-by-case for maintenance and improvement of its facility in Namdong-gu and Bupyeong-gu. To conclude, suggested finding has dem onstrated the validity of evaluation scheme for bikeways which is appropriate for type and purpose and ultimately this can be used to establish policy decision making for improvement of bikeway.