• Title/Summary/Keyword: Configuration protocol

Search Result 251, Processing Time 0.033 seconds

A Study on Environment Management System in Tunnel using Wireless Sensor Networks (무선 센서 네트워크를 이용한 터널 내 환경 관리 시스템에 관한 연구)

  • Joo, Yang-Ick;Kim, Jae-Wan
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.10
    • /
    • pp.1196-1203
    • /
    • 2013
  • In general, the cost of transceiver for wireless network configuration is more expensive than that for wired network. However, in case of environmental management system in a tunnel, the cost can be minimized by adopting low rate tranceiver because the amount of the exchanged data for tunnel monitoring is very small. When the obtained data from sensor node is sent directly to the corresponding command node, there is no need to consider routing problem of the data transfer. However in this case, sensor nodes are required to be implemented with high power transmitter and experience high energy consumption. To tackle this problem, relay nodes can be used to transfer the data of tunnel monitoring, and suitable routing protocols for selecting optimum path are needed. Therefore, in this paper, we propose a routing algorithm and a self-configuration protocol for environment management system in tunnel.

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

Node scheduling algorithm for energy efficiency and delay reduction in mobile sensor networks (모바일 센서 망에서 효율적인 에너지 사용과 전송지연 감소를 위한 노드 스케쥴링 알고리즘)

  • Son, Jae-Hyun;Byun, Hee-Jung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.111-118
    • /
    • 2014
  • In mobile sensor networks, a large number of sensor nodes with battery powered are deployed randomly in a region. They monitor the environmental states and transmit data to its neighboring nodes. For mobile sensor networks, It is needed to maintain the connectivity autonomously among nodes as the sensor node moves. However, the existing works have focused on the energy savings in the fixed sensor networks. A specific algorithm considering node mobility is required in the mobile sensor networks. Along with energy efficiency, the transmission delay should be considered. In this paper, we propose an autonomous configuration scheme and a node scheduling algorithm when a moving node joins into the existing network. Through simulations, we show a superior performance of the proposed algorithm to the existing protocol.

Energy-Aware Configuration Management with Guaranteed Lifetime of Network in Multi-hop WBAN (무선 신체 망에서 망의 생존시간을 보장하는 에너지 인지 망 구성 관리 기법)

  • Seo, Su-Ho;Nah, Jae-Wook;Park, Jong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.981-987
    • /
    • 2009
  • Recently, the study on wireless body area network for providing ubiquitous healthcare services has been actively done, including the standardization of the IEEE and others. Wireless body area network is usually configured in tree format using multi-hop communication mode due to the power limitation and the characteristics of human body. In this case, differently from existing sensor network, the wireless body area network tends to be disconnected due to the frequent movement of human body. The number of connections which can be supported at each node has some limitations due to the constraint imposed on power consumption. In this paper, we have proposed a heuristic algorithm for optimal selection of parent node with guaranteed QoS for a disconnected node, which considers the priority on packet transmission. Simulation has been performed to evaluate the performance of the proposed algorithm.

Introduction of IPv6 Autoconfiguration technology and Standardization trends (IPv6 자동네트워킹 기술 및 표준화 동향)

  • 홍용근;인민교;박정수;김용진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.97-100
    • /
    • 2001
  • For the auto-configuration of diverse hosts and automation of network management as many electronic machines and industrial components are becoming connected to Internet, it is possible to use autoconfiguration using DHCP and network management protocol such as SNMP, CMIP. But these technologies are not developed maturely and lack various standardizations yet because these are designed for restrictive purposes in the past. The new working group "Zeroconf" is made in IETF at March, 2000, it is aimed for making standards of autoconfiguration which is applied to impromptu ad-hoc networks in automobiles, trains, planes and home network or mobile networks. In this paper, we introduce the IPv6 based autoconfiguration technologies such as IP interface configuration, translation between host name and IP address, IP multicast address allocation and service discovery. Finally, trends of standardization in Zeroconf working group will be shown. be shown.

  • PDF

Managed Object and Distributed Network Management Model in Open Interface of OBS Network (개방형 인터페이스가 적용된 OBS 망의 관리객체 및 분산 망 관리 모델)

  • Kwon TaeHyun;Kim ChoonHee;Cha YoungWook
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.449-456
    • /
    • 2005
  • Optical burst switching (OBS) overcomes the inefficient resource usage of optical circuit switching and minimizes the optical buffering requirement of optical packet switching. General switch management protocol (GSMP) is an open interface between a label switch and a controller, and it provides connection, configuration, performance, event management and synchronization. GSMP open interface in the OBS network allows the implementation of OBS switch to be simple by separating the data forward plane from the control plane. We defined managed objects to support connection, configuration, performance, and fault management for the management of OBS network in the GSMP open interface. We proposed the network management model, in which the above managed objects are distributed in a controller and an OBS switch according to network management functions. We verified the possibility of connection management using distributed network management model in the GSMP open interface of OBS network by implementing GSMP and network management functions with managed objects of OBS.

Design of a Security System to Defeat Abnormal IPSec Traffic in IPv6 Networks (IPv6 환경에서 비정상 IPSec 트래픽 대응 보안 시스템 설계)

  • Kim Ka-Eul;Ko Kwang-Sun;Gyeong Gye-Hyeon;Kang Seong-Goo;Eom Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.127-138
    • /
    • 2006
  • The IPSec is a basic security mechanism of the IPv6 protocol, which can guarantee an integrity and confidentiality of data that transmit between two corresponding hosts. Also, both data and communication subjects can be authenticated using the IPSec mechanism. However, it is difficult that the IPSec mechanism protects major important network from attacks which transmit mass abnormal IPSec traffic in session-configuration or communication phases. In this paper, we present a design of the security system that can effectively detect and defeat abnormal IPSec traffic, which is encrypted by the ESP extension header, using the IPSec Session and Configuration table without any decryption. This security system is closely based on a multi-tier attack mitigation mechanism which is based on network bandwidth management and aims to counteract DDoS attacks and DoS effects of worm activity.

Management and Control Scheme for Next Generation Packet-Optical Transport Network (차세대 패킷광 통합망 관리 및 제어기술 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.35-42
    • /
    • 2012
  • Increase of data traffic and the advent of new real-time services require to change from the traditional TDM-based (Time Division Multiplexing) networks to the optical networks that soft and dynamic configuration. Voice and lease line services are main service area of the traditional TDM-based networks. This optical network became main infrastructure that offer many channel that can convey data, video, and voice. To provide high resilience against failures, Packet-optical networks must have an ability to maintain an acceptable level of service during network failures. Fast and resource optimized lightpath restoration strategies are urgent requirements for the near future Packet-optical networks with a Generalized Multi-Protocol Label Switching(GMPLS) control plane. The goal of this paper is to provide packet-optical network with a hierarchical multi-layer recovery in order to fast and coordinated restoration in packet-optical network/GMPLS, focusing on new implementation information. The proposed schemes do not need an extension of optical network signaling (routing) protocols for support.

The Design of ONU and OLT for Dynamic Bandwidth Allocation on Ethernet PON (EPON의 동적대역폭할당을 위한 ONU와 OLT 설계)

  • 이순화;이종호;김장복
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11B
    • /
    • pp.1016-1022
    • /
    • 2003
  • The EPON has been actively studied as one of the access networks for the economic configuration of FTTH. The EPON must support the dynamic bandwidth allocation to the subscribers in order to support the QoS due to its base on Ethernet technology EFM SG, which is actively working for the standardization of EPON, also recently decided to select DBA. Therefore in this paper, we designed a ONU buffer scheduling algorithm(AIWFQ) and a scheme of DBA(Class-based FCFS) for the OLT suitable for embodying MPCP of the EPON. In this paper, we proposed methods that the EPON system can make use of by measuring end to end process delay time and the buffer size in order to implement the algorithm by using the OPNET.

Implementation of the LDAP interoperability testing tool with object-oriented approach (객체 지향 접근을 통한 LDAP 상호운용성 시험도구 구현)

  • Kim Youn-su;Lee Soong-Hee;Lee Jong Hyup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5B
    • /
    • pp.247-252
    • /
    • 2005
  • The testing tools implemented up to now for the LDAP(Light-weight Directory Access Protocol) interoperability tests are not easy to modify or add new test items since their source codes are not open. The object-oriented approach, therefore, is required to implement such a testing tool which can be easily modified or add new test items. Thus we designed the architecture for the testing tool applying the object-oriented approach. Java language, appropriate for the object-oriented approach, was used to implement the testing tool. The newly implemented testing tool can modify partly to adapt to the already stored data in the test suite information even during tests. Five LDAP servers can be tested simultaneously with the same configuration setup. Actual testing for the two LDAP servers validates the usefulness of the designed architecture with the proper working of the implemented testing tool according to the architecture.