• Title/Summary/Keyword: Gateway System

Search Result 745, Processing Time 0.078 seconds

Damping BGP Route Flaps

  • Duan, Zhenhai;Chandrashekar, Jaideep;Krasky, Jeffrey;Xu, Kuai;Zhang, Zhi-Li
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.490-498
    • /
    • 2007
  • BGP route flap damping(RFD) was anecdotally considered to be a key contributor to the stability of the global Internet inter-domain routing system. However, it was recently shown that RFD can incorrectly suppress for substantially long periods of time relatively stable routes, i.e., routes that only fail occasionally. This phenomenon can be attributed to the complex interaction between BGP path exploration and how the RFD algorithm identifies route flaps. In this paper we identify a distinct characteristic of BGP path exploration following a single network event such as a link or router failure. Based on this characteristic, we distinguish BGP route updates during BGP path exploration from route flaps and propose a novel BGP route flap damping algorithm, RFD+. RFD+ has a number of attractive properties in improving Internet routing stability. In particular, it can correctly suppress persistent route flaps without affecting routes that only fail occasionally. In addition to presenting the new algorithm and analyzing its properties, we also perform simulation studies to illustrate the performance of the algorithm.

A design and implementation of the Wireless Firewall (무선 방화벽의 설계 및 구현에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.44-50
    • /
    • 2003
  • When Mobile terminal user want to contact inner-network information sever, wireless information security need for Protect hacking. For the security, Mobile terminal user could have contact to wireless network through the gateway of Wireless Firewall. In this paper, I present a design scheme of Wireless Firewall that included major function of Packet Filtering, NAT, Authentication, and auditing reports services. I would implement to Wireless Firewall that included major function of Packet Filtering, NAT, Authentication, Integrity, and auditing reports services. I would conclude that the suggest will be useful for research and development on Korean Wireless Firewall System.

  • PDF

A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture (Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구)

  • Na, Sang Yeob;Noh, Si Choon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.

Analysis and Suggestion of Public Library Websites for Children Service in Daegu and Gyeongbuk Area (대구.경북지역 공공도서관의 아동서비스용 웹사이트 분석 및 개선방안)

  • Oh, Seon-Kyung
    • Journal of Information Management
    • /
    • v.38 no.2
    • /
    • pp.127-152
    • /
    • 2007
  • Children seem to be more familiar with getting information from computer and internet than adults, and also it is true that information behavior in the internet has strong influences in the living of the children. When considering this fact, the public library which is the gateway to knowledge should provide a website for children services, allowing to do their life-long learning, read books and access information, without any restrains from time and space. The purpose of this study is to show the importance of public library website, especially for the children, and also to analyze trend of the country and present the solution to the problems. To achieve these goal, the analysis on the websites of the public libraries in Dagu and Gyengbuk area has been conducted. In detail, these were conducted about following criterions: existence of the website, structural system, search service, and contents.

Design of Real-Time Vehicle Information Management Platform Using an IoT-based Gateway (IoT기반 게이트웨이를 활용한 실시간 차량 정보 관리 플랫폼 설계)

  • Chang, Moon-Soo;Lee, Jeong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.548-551
    • /
    • 2018
  • Most vehicles are in the form of maintenance when a problem occurs by the user himself or herself. During maintenance, users are not able to operate the car while it is being serviced, and if the target vehicle is a revenue-generating vehicle, they will have to bear economic losses. Collecting vehicle information in real time, identifying problems that could arise with a vehicle based on the collected big data and providing advance service rather than after-sales service can help secure vehicle operation and reduce economic loss. Thus, in this thesis, a platform was designed to design IoT-based gateways, collect real-time vehicle information, and organize big data to provide vehicle information in real time.

  • PDF

Design and Implementation of Federation of Connection management for Interworking (망간 연동을 위한 연결관리 연합기능의 설계 및 구현)

  • Lee, Han-Yeong;Im, Gyeong-Jun;Seo, Dong-Seon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1515-1521
    • /
    • 1996
  • Object-oriented and distributed processing methods are adopted next -generation telecommunications management architecture. In this paper, we design and implement gradual federation function on connection management system providing connection services to transport network for interworking and encapsulated trader and gateway function for testing interoperability of these service objects between distributed processing environments. These techniques are practically applicable to support interworking between heterogeneous management network systems according to a tendency of integrating telecommunications management systems.

  • PDF

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.

The Wrong Path and the Right Path of Library Policy in Local Governments: Focusing on the Establishment of a Library Foundation (지방자치단체 도서관 정책의 사도와 정도 - 도서관재단의 설립논의를 중심으로 -)

  • Yoon, Hee-Yoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.3
    • /
    • pp.5-24
    • /
    • 2010
  • The public library is the local centre and gateway of knowledge and information. Therefore, the library should be funded and operated by local government and the governing body will be responsible for matters of policy of the library. However, recently public libraries in Korea have faced enormous policy challenges such as the damage of its identity, outsourcing or contracting-out of management, and the general chaos of its administrative system. This paper aims to analyze the current level of infrastructure and policies of public libraries and to review the wrong path and the right path of library policies focused on establishing a library foundation and outsourcing library management in Seoul and Incheon.

A Study on The Personal Wallet Management System Using Beacon Signal Processing (비콘 신호 처리를 활용한 개인소지품 지갑 관리 시스템에 대한 연구)

  • Kim, Dong-Ik;Nam, Kang-Hyun;Lee, Hyeon-Yeong;Ahn, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1109-1116
    • /
    • 2018
  • The purpose of this study is to solve the loss of personal belongings by utilizing monitoring function of IoT platform. The beacon to combined with personal belongings are registered with the application server, the trigger processing function according to the occurrence of the lost event is performed intelligently through the device, the app, the IoT network, and the application server.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.