• Title/Summary/Keyword: 차별화 네트워크

Search Result 313, Processing Time 0.021 seconds

A Designing Method of Intranet Security Architecture Model for Network Security Efficiency (보안 효율성 제고를 위한 인트라넷 네트워크 아키텍쳐 모델)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.9-17
    • /
    • 2010
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security architecture is the concept to distinguish the architecture from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security architecture could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every architecture. For the establishment of security architecture it is needed to show what criterion of net work should be set up. This study is based on analysis of diagnostic weakness structure in the network security architecture and research the criterion for topology factor, security architecture structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture.

Four Consistency Levels in Trigger Processing (트리거 처리 4 단계 일관성 레벨)

  • ;Eric Hanson
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.492-501
    • /
    • 2002
  • An asynchronous trigger processor (ATP) is a oftware system that processes triggers after update transactions to databases are complete. In an ATP, discrimination networks are used to check the trigger conditions efficiently. Discrimination networks store their internal states in memory nodes. TriggerMan is an ATP and uses Gator network as the .discrimination network. The changes in databases are delivered to TriggerMan in the form of tokens. Processing tokens against a Gator network updates the memory nodes of the network and checks the condition of a trigger for which the network is built. Parallel token processing is one of the methods that can improve the system performance. However, uncontrolled parallel processing breaks trigger processing semantic consistency. In this paper, we propose four trigger processing consistency levels that allow parallel token processing with minimal anomalies. For each consistency level, a parallel token processing technique is developed. The techniques are proven to be valid and are also applicable to materialized view maintenance.

Bandwidth Distribution Mechanism based on the Virtual Traffic Profile (가상 트래픽 프로파일을 이용한 대역 분배 메카니즘)

  • Choe, Sang-Gi;Jeong, Gwang-Su
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.3
    • /
    • pp.339-347
    • /
    • 2000
  • 최선형 서비스(best effort service) 방식의 현재 인터넷은 실시간 응용의 출현과 보다 나은 서비스를 기대하는 사용자들에 의해 많은 변화가 요구되고 있다. 이러한 요구를 만족시키기 위해서 새로운 프로토콜, 트래픽 제어 및 QoS 라우팅 등에 관한 연구가 진행되고 있으며, 최근 트래픽 제어를 통해 서로 다른 수준의 서비스를 제공하는 차별화 서비스(differentiated service)모델에 관하여 많은 연구가 진행중이다. 두 가지 우선 순위를 바탕으로 사용자에게 어느 정도 예측 가능한 대역폭을 제공하는 RIO 모델은 차별화 서비스의 대표적인 모델이다. 하지만 RIO 모델에서 제공하는 대역 분배 방식은 네트워크 용량이 충분치 못한 상황에서는 서비스 차별화가 이뤄지지 않으며, 잉여 대역폭의 적절한 분배가 이뤄지지 않는다. 본 논문에서는 시뮬레이션을 통하여 네트워크 상황에 따른 RIO모델의 대역 분배 성능을 분석하였으며, 이를 개선하여 보다 효과적인 서비스 차별화가 이뤄지도록 하였다.

  • PDF

The Study for the Method of Network Security Domain Architecture Designing (네트워크 보안도메인 아키텍처 설계방법 연구)

  • Noh, Si-Choon
    • Journal of Digital Contents Society
    • /
    • v.8 no.2
    • /
    • pp.165-171
    • /
    • 2007
  • The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security domain is the concept to distinguish the domain from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security domain could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every domain. For the establishment of security domain it is needed to show what criterion of net work should be set up. This study is to research the criterion for topology factor, security domain. structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture. The purpose of this paper is to suggest the necessity of development of security mechanism and the distinguished blocking function according to the level of security domain.

  • PDF

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System (Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법)

  • Noh, Si-Choon;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.

Energy-Efficient Topology Construction Algorithm for Wireless Sensor Networks (무선 센서 네트워크를 위한 에너지 효율적인 토폴로지 구성 알고리즘)

  • Roh Tae-Ho;Choi Woong-Chul;Rhee Seung-Hyong;Chung Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.40-42
    • /
    • 2006
  • 무선 센서 네트워크는 제한된 배터리를 갖는 노드로 토폴로지를 구성한다. 이러한 이유 때문에 전체 네트워크의 수명을 극대화하고 라우팅에 에너지 효율성을 고려하여 토폴로지를 구성하는 것이 중요하다. 네트워크 토폴로지는 전송범위에 의해 결정되며 노드의 고정된 전송범위로 인한 에너지 비효율성 문제를 해결하는 방법으로 최적의 전송범위 혹은 MST(Minimum Spanning Tree)기반으로 토폴로지를 구성하는 대안이 있지만 최적의 솔루션은 아니다. 본 논문에서는 단계에 따라 전송범위를 차별화시켜 라우팅을 수행하는 DR(Differential Routing)을 제안하였다. DR은 전송범위에 기반하여 최적의 토폴로지를 구성한다. 그리고 무선 센서 네트워크의 특정한 통신 패턴에 맞게 트리 구성 단계와 데이터 수집 단계의 전송범위를 차별화시켜 전송파워를 조절함으로써 전체 네트워크의 수명 극대화, 파티션 방지, 그리고 에너지 효율성을 향상시킨 알고리즘이다. 실험을 통해 제안한 DR이 최적의 토폴로지를 구성하여 에너지 효율성 측면에서 좋은 성능을 보임을 확인할 수 있었다.

  • PDF

Research Trends on Internet of Things based on Next Generation Networking (차세대 네트워킹 기술 기반 사물인터넷 연구동향)

  • Jung, H.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.3
    • /
    • pp.142-150
    • /
    • 2016
  • 인터넷은 글로벌 네트워크 인프라로서 그 영역을 사물인터넷까지 빠르게 확장해가고 있다. 사물인터넷 시대는 인터넷 초기와는 완전히 차별화된 네트워크 환경이 예상되며 이러한 차별화된 환경에 효율적으로 대응할 수 있는 새로운 네트워킹 기술 개발에 대한 필요성이 최근 대두되고 있다. 본 논문에서는 사물인터넷이 추구하는 기술적 비전을 실현하기 위해 현 네트워킹 기술의 한계를 극복할 수 있는 차세대 네트워킹 기술을 기반으로 사물인터넷을 구축하고자 세계적으로 진행되고 있는 관련 연구동향 및 표준화 동향을 분석한다.

  • PDF

Architecture of Policy-Based Network Management for Providing Internet Differentiated Service on Mobile IP Environment (이동 IP 환경에서 인터넷 차별화 서비스 제공을 위한 정책기반 네트워크 관리 구조)

  • 강승완;김태경;유상조
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.721-736
    • /
    • 2004
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. Today users want to be provided suitable QoS in the internet since demand of services is variety. The policy-based network management is method which can solve various problems of QoS, security, and complication of management in IP networks. This paper presents the network topology constitution, operation procedure and architecture of policy-based network management for providing internet DiffServ on mobile IP environment. In this paper we propose policy classes of policy-based DiffServ network management on mobile environment and create policy scenarios using the proposed policy description language to represent the policy classes. Finally, we implemented a policy-based DiffServ network management system on mobile IP environment.

  • PDF

Bandwidth Distribution Mechanism based on the Virtual Traffic Profile (가상 트래픽 프로파일을 이용한 대역 분배 메카니즘)

  • 최상기;정광수;오승준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.454-456
    • /
    • 1999
  • 최선형 서비스(best effort service) 방식의 현재 인터넷은 실시간 응용의 출현과 보다 나은 서비스를 기대하는 사용자들에 의해 많은 변화가 요구되고 있다. 최근 사용자에게 서로 다른 수준의 서비스를 제공하는 차별화 서비스(differentiated service) 모델에 관하여 많은 연구가 진행중이다. 두 가지 우선 순위를 바탕으로 서비스를 제공하는 RIO 모델은 차별화 서비스의 대표적인 모델이지만 네트워크 상황에 따라 적절한 서비스 차별화가 이뤄지지 않는다. 본 논문에서는 이를 개선하여 보다 효과적인 서비스 차별화기 이뤄지도록 하였다.

  • PDF

Buffer-based Service Differentiation Scheme in Optical Burst Switching Networks (광 버스트 스위칭 네트워크에서 버퍼 기반의 서비스 차별화 방식)

  • Paik, Jung-Hoon;Lee, Kyou-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2835-2842
    • /
    • 2013
  • In this paper, service differentiation scheme using optical buffer that is reduced in size with slow-light technology in optical burst switching networks is presented. In suggested scheme, each outport has buffer to store high-class burst only in case that all its wavelengths are occupied. When all wavelengths are being used, a new arriving high-class burst goes into the buffer and waits until a burst is serviced. As soon as a burst is serviced with a wavelength, the high-class burst at buffer is allocated to the free wavelength. In case that low-class burst is arriving under the same situation, it is not stored at the buffer but discarded. An analytical model is derived to analyze the performance of the suggested scheme and compare its performance with the conventional scheme such as preemption and deflection as well as no service differentiations.