• Title/Summary/Keyword: IP Version

Search Result 66, Processing Time 0.023 seconds

A Study of Flow-based QoS Management in Packet Transport Network (패킷 전송망에서의 플로우 기반 QoS 관리 방안 연구)

  • Choi, Chang-Ho;Kim, Whan-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.73-82
    • /
    • 2011
  • As a demand of IP based packet service is increasing, transport network is evolving from circuit based transport technology using TDM to Ethernet based packet transport technology. In this paper we introduce packet transport network based on PBB-TE and MPLS-TP and propose a quality of service(QoS) management scheme to satisfy various user requirements in packet transport network. The proposed flow-based QoS management scheme guarantees that per-flow bandwidth control satisfies the predefined QoS requirement perfectly under bandwidth congestion condition by using perflow and per-PTL tunnel management. In order to evaluate the proposed scheme we defined flow and PTL tunnel per input frame and configured QoS parameters for each flow and PTL tunnel respectively. Simulation was done by using OPNET modeler 16.0 version.

A Study on DB Security Problem Improvement of DB Masking by Security Grade (DB 보안의 문제점 개선을 위한 보안등급별 Masking 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.101-109
    • /
    • 2009
  • An encryption module is equipped basically at 8i version ideal of Oracle DBMS, encryption module, but a performance decrease is caused, and users are restrictive. We analyze problem of DB security by technology by circles at this paper whether or not there is an index search, object management disorder, a serious DB performance decrease by encryption, real-time data encryption beauty whether or not there is data approach control beauty circular-based IP. And presentation does the comprehensive security Frame Work which utilized the DB Masking technique that is an alternative means technical encryption in order to improve availability of DB security. We use a virtual account, and set up a DB Masking basis by security grades as alternatives, we check advance user authentication and SQL inquiry approvals and integrity after the fact through virtual accounts, utilize to method as collect by an auditing log that an officer was able to do safely DB.

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

Assessment of the Prediction Performance of Ensemble Size-Related in GloSea5 Hindcast Data (기상청 기후예측시스템(GloSea5)의 과거기후장 앙상블 확대에 따른 예측성능 평가)

  • Park, Yeon-Hee;Hyun, Yu-Kyung;Heo, Sol-Ip;Ji, Hee-Sook
    • Atmosphere
    • /
    • v.31 no.5
    • /
    • pp.511-523
    • /
    • 2021
  • This study explores the optimal ensemble size to improve the prediction performance of the Korea Meteorological Administration's operational climate prediction system, global seasonal forecast system version 5 (GloSea5). The GloSea5 produces an ensemble of hindcast data using the stochastic kinetic energy backscattering version2 (SKEB2) and timelagged ensemble. An experiment to increase the hindcast ensemble from 3 to 14 members for four initial dates was performed and the improvement and effect of the prediction performance considering Root Mean Square Error (RMSE), Anomaly Correlation Coefficient (ACC), ensemble spread, and Ratio of Predictable Components (RPC) were evaluated. As the ensemble size increased, the RMSE and ACC prediction performance improved and more significantly in the high variability area. In spread and RPC analysis, the prediction accuracy of the system improved as the ensemble size increased. The closer the initial date, the better the predictive performance. Results show that increasing the ensemble to an appropriate number considering the combination of initial times is efficient.

Address-Internetworking Scheme between Wireless Sensor Network and Internet Using TCP Port-Numbers (TCP 포트번호를 이용한 센서 네트워크와 인터넷(IPv4/IPv6)의 주소 연동)

  • Kim, Jeong-Hee;Kwon, Hoon;Kim, Do-Hyeu;Kwak, Ho-Young;Do, Yang-Hoi;Kim, Dae-Young;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.114-123
    • /
    • 2007
  • As a promising technology that enables ubiquitous computing and will lead the information technology industries of the next generation, the new field of sensor networks is one of the most active research topics today. From now on, each node, the network formation, and even the sensor network itself will interact with the generic network and evolve dynamically according to environmental changes, in a process of continual creation and extinction. In this paper, we propose a address-Internetworking scheme for interactive networking between a sensor network and the Internet based on the TCP port-numbers. The proposed scheme enables internetworking between a sensor network address scheme based on Zigbee and the Internet address scheme based on the Internet Protocol version 6 (IPv6). We implement the proposed address-Internetworking scheme using Berkeley TinyOS, Mica Motes, and IP. In addition we verify the proposed scheme by an interconnection experiment, which involves wireless sensor networks and the Internet, using IPv4/IPv6.

The Implementation Methodology of Client-Server Architecture for Distributed Measurement System (분산 계측 시스템을 위한 클라이언-서버 아키텍쳐 구현 방안)

  • Song, Min-Gyu;Byun, Do-Young;Je, Do-Heung;Kim, Kwang-Dong;Roh, Duk-Gyoo;Oh, Se-Jin;Lee, Bo-Ahn
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.441-443
    • /
    • 2004
  • With the rapid development of the Internet over the recent years, in conjunction with the transmission protocol TCP/IP and the latest version of hypertext(HTML) facilities, new opportunities have come into existence for the use of the network for the remote control of experiments and the other practical systems in engineering education. Using graphical software environments in client-server systems, remote control and monitoring system can be easily designed. Client-server systems have some general advantages when compared with simple Remote-Access Systems. In this paper we present a client-server architecture for the distributed measurement system of instrumentation over the Internet. The proposed solution allows multi-user, multi-instruments sessions to be obtained by means of a queuing process and provides instrument lock capability. Client applications can be easily developed by using conventional high-level programming languages or well-assessed virtual instrumentation frameworks.

  • PDF

A Study on the Performance Improvement of the Security Transmission Using the SSFNet (SSFNet을 이용한 보안전송 성능개선에 관한 연구)

  • Ryu, Jung-Eun;Ryu, Dong-Ju;Lee, Taek-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.811-815
    • /
    • 2005
  • IPSec(Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. IPSec is providing authentication, integrity and confidentiality security services. The specifications for Internet Key Exchange(IKEv1) were released to the world. Some criticisms of IKEv1 were that it was too complex and endeavored to define too much functionality in one place. Multiple options for multiple scenarios were built into the specification. The problem is that some of the included scenarios are rarely if ever encountered. For IPsec to work, the sending and receiving devices must chare a Public Key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates. This thesis is a study on the performance improvement of the security transmission using the SSFNet(Scalable Simulation Framework Network Models)

  • PDF

A Handover Mechanism in Internetworking with UMTS/WLAN based on HMIPv6 (HMIPv6 기반의 UMTS/WLAN 연동 네트워크에서의 핸드오버 방안)

  • Jeong Eunjoo;Park Sangjun;Lee Hyewon K.;Kim Jaeha;Kim Byunggi
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.508-514
    • /
    • 2005
  • The research in internetworking between UMTS and WLAN, which is completed with merits and demerits, Is actively progressed to establish global roaming environments. This internetworking is classified into two groups: loosely-coupled and tightly-coupled. h tightly-coupled mechanism demands lots of investment and considerable amountof time to construct, which is directly connoted between UNTS and WLAN via IWU. On the other hand, a tersely-coupled mechanism is more scalable and easier to implement than a tightly-coupled one while it has critical drawbacks of packet loss and blocking of services due to handover delay. To alleviate these drawbacks. this work proposes a handover scheme between UMTS and WLAN, which is based on HMIPv6. The performance of the proposed scheme is evaluated by the simaulation. The proposed internetworking scheme based on HMIPv6 shows hotter performance than those based on MIPv6.

A hierarchical Xcast++ mechanism for multicast services in mobile communication environment (이동 통신망 환경에서 멀티캐스트를 제공하기 위한 계층적 Xcast++ 기법)

  • Kim Tae-Soo;Lee Kwang-Hui
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.55-70
    • /
    • 2005
  • In order to provide mobile hosts with multicast service in mobile communication environment, we proposed a multicast mechanism named HXcast++ which is an extended version of the existing Xcast++ with hierarchical architecture, We assured that mobile hosts could get multicast service through an optimal path regardless of their location by making DR(Designated Router) join a group on behalf of the mobile hosts, In this present research we introduced hierarchical architecture in order to reduce the maintenance cost resulting from frequent handoff. We also proposed a GMA (Group Management Agent) based group management mechanism which enables the mobile hosts to join the group without waiting for a new IGMP Membership Query. A fast handoff method with L2 Mobile Trigger was, in this work, employed in order to reduce the amount of the packet loss which occurs as a result of the handoff, We also managed to curtail the packet loss caused by the latency of the group join by using a buffering and forward mechanism.

  • PDF

Study of Reading Rate & Small UHF RFID Tags in The Key Management System in a Metallic Cabinet (작은 UHF RFID를 이용한 열쇠관리용 철재캐비닛 시스템과 인식률에 관한 연구)

  • Chung, You-Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.263-268
    • /
    • 2010
  • This paper shows the key management system in a small metallic cabinet using a small UHF RFID tags. Each key chain with a key has a custom-designed small RFID tag antenna. There are 6 metallic racks in the small cabinet, and each rack can hold 60 key chains. Therefore, the small cabinet can hold 360 key chains with tags. The 360 key chains with RFID tags in a cabinet are recognized by RFID key chain management system. Even though it is hard to recognize 360 tags in the a cabinet, this RFID key management system with small custom designed RFID tags can recognize all the tags in the small cabinet. To read the all the tags, the locations of antennas and tag shapes are optimized. The reading rates based on the bios-version of the reader and the locations of the reader antennas are compared.