• 제목/요약/키워드: En-Router

검색결과 5건 처리시간 0.015초

ARARO: Aggregate Router-Assisted Route Optimization for Mobile Network Support

  • Rho, Kyung-Taeg;Jung, Soo-Mok
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제11권4호
    • /
    • pp.9-17
    • /
    • 2007
  • Network Mobility basic support protocol (NEMO Basic) extends the operation of Mobile IPv6 to provide uninterrupted Internet connectivity to the communicating nodes of mobile networks. The protocol uses a mobile router (MR) in the mobile network to perform prefix scope binding updates with its home agent (HA) to establish a bi-directional tunnel between the HA and MR. This solution reduces location-update signaling by making network movements transparent to the mobile nodes (MNs) behind the MR. However, delays in data delivery and higher overheads are likely to occur because of sub-optimal routing and multiple encapsulation of data packets. To manage the mobility of the mobile network, it is important to minimize packet overhead, to optimize routing, and to reduce the volume of handoff signals over the nested mobile network. This paper proposes en aggregate router-assisted route optimization (ARARO) scheme for nested mobile networks support which introduces a local anchor router in order to localize handoff and to optimize routing. With ARARO, a mobile network node (MNN) behind a MR performs route optimization with a correspondent node (CN) as the MR sends a binding update message (BU) to aggregate router (AGR) via root-MR on behalf of all active MNNs when the mobile network moves. This paper describes the new architecture and mechanisms and provides simulation results which indicate that our proposal reduces transmission delay, handoff latency and signaling overhead. To evaluate the scheme, we present the results of simulation.

  • PDF

A New Architecture for Packet Classification

  • 이보미;윤명희;임혜숙
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 하계종합학술대회 논문집(1)
    • /
    • pp.179-182
    • /
    • 2004
  • The process of categorizing packets into 'class' in an Internet router is called packet classification. All packets with same class obey predefined rule specified in routing tables. Performing classification in real time on an arbitrary number of fields is a very challenge task. In this paper, we present a new algorithm named EnBiT-PC (EnBiT Packet Classification). and evaluate its performance against real classifiers in use today. We compare with previous algorithms, and found out that EnBiT-PC classify packets very efficiently and has relatively small storage requirements.

  • PDF

ADE : 공학 에이전트 개발 환경 (ADE: Agent Development Environment for Engineering)

  • 구본석;이수홍
    • 한국CDE학회논문집
    • /
    • 제8권1호
    • /
    • pp.55-63
    • /
    • 2003
  • ADE i,1 a software tool for the design and implementation of multi-agent systems. ADE allows a designer to draw a multi-agent system graphically, specify the necessary properties, and deploy their applications. ADE offers a set of intuitive, easy to use interfaces that enable a designer to completely specify the agents and agent interactions in a multi-agent system. In this environment, JATLite/sup [1]/ is improved significantly. Furthermore, ADE provides a unique set of features for a multi-agent system design tool. An agent description method based on Design roadmap/sup [2]/ theory, a hierarchy of agents, and a fully featured Java-based Graphical User Interface are combined in ADE. This distinct combination of features mates ADE stand out among the existing multi-agent system design tools. This paper presents the research related to the application of the ADE, along with descriptions of its design and implementation.

IP 어드레스 검색을 위한 새로운 pipelined binary 검색 구조 (A New Pipelined Binary Search Architecture for IP Address Lookup)

  • 임혜숙;이보미;정여진
    • 한국통신학회논문지
    • /
    • 제29권1B호
    • /
    • pp.18-28
    • /
    • 2004
  • 라우터에서의 어드레스 검색은 일초에 수천만개 이상으로 입력되는 패킷에 대하여 실시간으로 처리되어야하기 때문에 인터넷 라우터는 효율적인 IP 어드레스 검색 구조를 갖도록 설계되어야 한다. 본 논문에서는 [1]에서 제안된 IP prefix의 binary tree에 기초한 효율적이면서 실용적인 IP 어드레스 검색 구조와 이를 구현하는 하드웨어 구조를 제안한다. 제안된 구조는 (1)에서 제안된 binary tree의 문제점들을 해결하는 구조로서 작은 수의 엔트리를 갖는 TCAM과 pipelined binary search를 적용하여 효율적인 하드웨어로 구현되었다. 구현된 하드웨어 구조의 성능을 평가하여 본 결과., 약 30,000 여개의 entry를 갖는 MAE-WEST 라우터 데이타의 경우, 2,000여개의 엔트리를 갖는 TCAM과 총 245 Kbyte의 SRAM을 사용하여 한번의 메모리 access를 통하여 어드레스 검색이 가능한 것으로 평가되었다. 또한 제한된 방식은 큰 데이터베이스나 IPv6를 위해서도 확장이 용이하다.

검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구 (A Study on the Security Threats of IoT Devices Exposed in Search Engine)

  • 한경호;이성호
    • 전기학회논문지
    • /
    • 제65권1호
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.