• Title/Summary/Keyword: IP configuration

Search Result 146, Processing Time 0.032 seconds

Dynamic Addressing Technique in MANET Using an Enhanced DCDP (Enhanced DCDP를 이용한 MANET에서의 Dynamic Addressing Technique)

  • 나상준;이수경;송주석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.709-711
    • /
    • 2004
  • 네트워크에서의 IP address는 통신을 하기 위한 가장 중요한 요소라고 할 수 있다. 네트워크 상에 존재하는 모든 node들은 자신의 IP address를 가지고 나서야 통신에 참여할 수 있다. 최근 MANET에서의 라우팅 프로토콜에 대한 많은 연구가 진행되고 있으며, 이와 함께 dynamic addressing technique에 대한 연구도 활발히 이루어지고 있다. 본 논문에서는 여러 가지 방식의 dynamic addressing technique들 중에서 빠르고 효율적인 Dynamic Configuration and Distribution Protocol (DCDP)에 대해 살펴보고 보다 안정적인 address 할당 기술을 이용한 Enhanced DCDP를 제안한다.

  • PDF

Study of Internet-­based Device Configuration Protocol for Uniform Field Device Interface (필드 장치 인터페이스 단일화를 위한 인터넷 기반의 DCP 프로토콜 연구)

  • 이영준;조인휘
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.550-552
    • /
    • 2003
  • 기존의 필드장치들의 인터페이스는 시리얼 기반으로, 개발 업체들 간의 인터페이스가 단일화 되어 있지 않아 여러가지 불편함이 있다. DCP (Device Configuration Protocol)는 인터넷을 기반으로 하여, TCP/IP표준 프로토콜상에서 돌아가는 응용 프로토콜로서, 특히 응용계층에서 Client와 Server의 역할을 교환하여, 다양한 필드장치들의 인터페이스를 단일화하기 위해 제안한 프로토콜이다. 만약, 이러한 DCP 인터페이스 방식을 현장에 적용하게 된다면, Device의 소형화에 의한 비용절감 효과와 효율적 장치 제어 및 관리로 인한 서비스의 질적 향상이 기대된다.

  • PDF

Device Configuration Protocol over IPv6 for Real-time Processing (IPv6 상에서의 실시간 처리용 DCP 프로토콜)

  • 이영준;조인휘
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.589-591
    • /
    • 2004
  • DCP (Device Configuration Protocol)는 인터넷을 기반으로 하여, TCP/IP 표준 프로토콜상에서 돌아가는 응용프로토콜로서, 특히 응용계층에서 Client와 Server의 역할을 교환하여, 다양한 필드장치들의 인터페이스를 단일화하기 위해 제안한 프로토콜이다. 이 프로토콜에 실시간 처리 알고리즘과 IPv6에서 제공되는 QoS의 기능을 연동하여 적용하게 된다면, 긴급한 실시간 처리가 요구되는 데이터를 상황에 맞게 처리 할 수 있다. 만약, 이러한 실시간 처리가 보장되는 DCP 인터페이스 방식을 현장에 적용하게 된다면, Device의 소형화에 의한 비용절감 효과, 인터페이스 단일화에 의한 효율적 장치 제어 및 관리. 그리고 실시간 처리로 인한 서비스의 질적 향상이 기대된다.

  • PDF

A Security method and Performance evaluation of preventing DoS attack against DAD in MANET (MANET 환경에서 중복 주소 탐지에 대한 DoS 공격을 방지하는 보안 기법과 성능 평가)

  • Lim, Jeong-Mi;Park, Chang-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1099-1108
    • /
    • 2009
  • The study of IP address allocation in MANET can be categories into Stateful and Stateless. The one, special node monitors other nodes' IP address and allocates IF address. And the other, node generates IP address by itself. Nodes in MANET have mobility and restricted resource, so Stateless is more suitable than Stateful. But, in Stateless, node requires DAD process because of unique IP address allocation. And Dos attack can be happened in DAD precess. In this paper, we propose a security method on preventing DoS attack against DAD in MANET using one-way hash function. Since, Computation of one-way hash function is suitable for nodes' restricted resource character in MANET. And we evaluate performance using NS2 and compare with other security method which is CGA using signature.

  • PDF

Negative Induced Polarization Responses over a Layered Earth (층상대지의 음수 유도분극 응답)

  • Kim, Hee Joon
    • Economic and Environmental Geology
    • /
    • v.20 no.3
    • /
    • pp.197-201
    • /
    • 1987
  • Negative induced polarization (IP) responses are examined for a three-layered earth using a digital linear filter method. The negative IP response can occur when the geoelectric section is of type K or Q. The section of type K creates a more pronounced negative effect than that of type Q. For such sections, IP coefficients are determined as a function of the resistivity distribution and the electrode configuration, and only the IP coefficient of the first layer can be negative. As a result, the negative IP response can occur when the first layer is polarizable in the section of type K or Q. and the polarizabilities of the other layers can act to depress the negative response.

  • PDF

Design of an integrated network management system for telecom subsystem in offshore plants

  • Kang, Nam-seon;Kim, Nam-hun;Lee, Seon-ho;Kim, Young-goon;Yoon, Hyeon-kyu
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.8
    • /
    • pp.863-869
    • /
    • 2015
  • This study analyzed the offshore plant industry and related regulations such as ISO, IEC, and Norsok Standards to develop an integrated network management system (INMS) capable of both on-site and remote management and configuration of IP-based network equipment in offshore plants. The INMS was designed based on actual specifications and POS plans, and a plan of management was verified through an offshore plant engineering company. Various modules such as PAGA interface modules, CCTV, IP-PBX, and HF-radio communication modules were developed for system implementation. Protocol and data design and screen design were followed by framework development and introduction of the automatic satellite communication function.

An Intra-domain Network Topologyd Discovery Algorithm (자치영역 네트워크 토플로지 작성 알고리즘)

  • Min, Gyeong-Hun;Jang, Hyeok-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1193-1200
    • /
    • 2000
  • A network topology has been an important factor for an efficient network management, but data collection for the network configuration has been done manually or semi automatically by a network administrator or an expert. Requirements to generate an intro-domain network topology ar usually either all IP addresses with subne $t^ernet mask or the network identification of all IP addresses. The amounts of traffic are generally high in the semi-automatic system due to using large number of low-level protocols and commands to get rather simple data. In this paper, we propose an algorithm which can be executed with only publicly available input. It can find all IP addresses as well as the network boundary of an intra-domain by using an intelligent method developed in this algorithm. The collected data will be used to draw a network map automatically by using a proposed network topology generation algorithm.hm.

  • PDF

Fast Global Address Configuration Using Address Fragmentation for Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서 주소 영역 할당을 이용한 빠른 글로벌 주소 설정)

  • Yu, Hyun;Ahn, Sanghyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.541-542
    • /
    • 2009
  • MANET은 유선 기반망의 도움 없이 무선 노드들 간에 서로 협력하여 다중-홉으로 정보를 주고 받을 수 있도록 해주는 네트워크이다. 최근 MANET과 인터넷 망과의 통신이 요구되고 있고 이를 위해 무선 노드가 글로벌 IP 주소를 할당 받을 수 있어야 한다. 본 논문에서는 인터넷 게이트웨이를 통해 인터넷 망과 연결된 MANET 구조에서 무선 노드가 빠르게 글로벌 IP 주소를 설정할 수 있는 기법을 제안한다. 제안하는 기법의 성능 평가를 위해 NS-2로 실험을 수행했으며, 그 결과 기존 방법보다 빠르게 글로벌 IP 주소를 설정하고 네트워크 부하를 감소 시킬 수 있음을 입증하였다.

The Design and Implementation of Internet Outlet with Multiple User Interface Using TCP/IP Processor (TCP/IP프로세서를 이용한 다중 사용자 인터페이스 지원 인터넷 전원 콘센트의 설계 및 구현)

  • Baek, Jeong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.103-112
    • /
    • 2012
  • Recently, the infrastructure to be connected to the internet is much provided, there is more and more need to connect electric or electronic products to the internet to monitor or control them remotely. However, most of the existing products lack the network interface, so it was very inconvenient to be connected to the internet. Therefore, this article designs and realizes the internet outlet allowing real-time scheduling that can control the power remotely on the internet by using the hardware TCP/IP processor. The realized product consumes low production cost because it can be realized by using the hardware TCP/IP processor and the 8-bit small microprocessor. In addition, the product can be used widely in both wired and wireless environments with a variety of user interface, including the dedicated control program which provides the environment configuration functions; embedded web service that enables the webpage to be saved on the external flash memory; Android smartphone application; motion recognition control environment that uses the OpenCV computer vision library, etc.

The Study on Security Vulnerabilities in IPv6 Autoconfiguration

  • Kim, Myung-Eun;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1545-1549
    • /
    • 2005
  • According as computer is supplied in a lot of homes and offices and Internet use increases, various service based on the Internet. Including wireless PDA in the future, many devices such as Internet telephone, TV, refrigerator and oven will be connected on the Internet and Internet address exhaustion will be raised to serious problem gradually. Today, the IPv4 address exhaustion problem has been solved partially using NAT (Network Address Translation) however, the transition to next Generation Internet will be accelerated because of advantages such as mobility, security service, QoS, and abundant IP addresses. In IPv6, all hosts are designed to create and set their address automatically without manager's intervention using Neighbor Discovery Protocol. But, when an IPv6 host sets its address automatically, there are serious security vulnerabilities. In this paper, we analysis security vulnerabilities in auto-configuration and provide security requirements for secure auto-configuration.

  • PDF