• Title/Summary/Keyword: IP-Network

Search Result 2,376, Processing Time 0.03 seconds

Multicast using Label Aggregation in MPLS Environment (MPLS환경에서의 Label Aggregation을 통한 Multicast 지원 방안)

  • Park, Pong-Min;Kim, Gyeong-Mok;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.10 s.340
    • /
    • pp.9-16
    • /
    • 2005
  • The growth of the Internet over the last several years has placed a tremendous strain on the high bandwidth Hence, the amount of internet traffic has risen sharply and it has demanded to use the limited resource. MPLS (Multiprotocol Label Switching) is regarded as a core technology for migrating to the next generation Internet. It is important to reduce the number of labels and LSP(Label Switched Path)s for network resource management. In this thesis, we considered an MPLS multicast mechanism in the current Internet. The scalability problem due to lack of labels and multicast property is one of the serious problems in MPLS multicast mechanism, we proposed a Label Aggregation algorithm that the multicast packets on same link in MPLS allocates the same label for the scalability problem. In order to support the proposed algorithm we defined a new LDP(Label Distribution Protocol) multicast field and multicast packet is copied and transmitted for multicast group links of next node in LSR(label Switch Router).

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF

A Study on the Development of the SCADA System using the Internet (인터넷을 이용한 SCADA 시스템 구축에 관한 연구)

  • Park, I.K.;Yoon, K.K.;Kim, Y.S.;Lee, S.G.;Ahn, B.W.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2373-2376
    • /
    • 1998
  • This paper describes the development of the SCADA(Supervisory Control and Data Acquisition) system which can be controlled via the Internet. In this paper, the SCADA system is composed of a number of microprocessor-based RTU(Remote Terminal Unit)s, a MMI(Man Machine Interface) host, a SCADA server, and SCADA clients. There are two protocols used in the system. Each RTU and the MMI host are connected by a RS-485 line and CSMA/CD(Carrier Sense Multiple Access / Collision Detection) protocol is used to communicate with each other. TCP/IP(Transmission Control Protocol/Internet Protocol) is used among the MMI host, the SCADA server, and SCADA clients. The equipments installed in the field are controlled by a number of RTUs. The function of the MMI host is to acquire real-time data from RTUs and control them. The SCADA server supports data transfer between the networked MMI host and the SCADA client on the web-server through TCP/lP. Data transfer is possible regardless of the type of network only if there are TCP/lP Winsock-compatible stack driver. The SCADA client is implemented as the shape of web-page by means of JAVA language. Therefore, it runs on a web-browser such as Netscape and Explorer, and allows a number of users to access this SCADA system.

  • PDF

신세기통신 2000년 전략

  • 정태기
    • Information and Communications Magazine
    • /
    • v.17 no.1
    • /
    • pp.58-63
    • /
    • 2000
  • 새 천년을 맞이하여 국내 이동전화 시장은 규모와 기술적 측면에서 놀랄만한 변화 를 겪게 될 것이다. 음성중심의 2세대 이동전화 서비스는 보급율이 50%를 넘어서며 포화수 준에 근접하고 있으며, 앞으로 무선데이타 통화량이 크게 증가하여 3~4년 후에는 총 통화량 의 50% 이상을 점유할 것으로 예측된다. 통신사업자들은 통신망의 광대역화와 글로벌화, IP Network 화를 더욱 강력하게 추진하고 있으며, 올 연말로 예정된 IMT-2000 사업자 선정은 이러한 추세를 더욱 가속화시킬 것으로 전망된다. 특히, 인터넷과 이동전화의 융화는 인간의 삶과 문화를 한순간에 변모시킬 혁명적 위력을 내포하고 있다. 정보화 시대를 향한 정보통 신업계의 대변혁이 그 절정을 향해 가속도를 붙이기 시작한 것이다. 신세기통신은 이러한 변화와 혼돈의 거친 물결 속에서 21세기 '정보통신 업계의 강자'로 도약하기 위한 힘찬 항해 를 진행하고 있다. 2000년 상반기까지 IS-2000시스템을 구축하여 최대 144kbps 수준의 고속 데이타 서비스를 제공하는 한편 i-TOUCH 017 컨텐츠 (Contents)를 한층 다양화, 첨단화 하는 등 본격적인 이동인터넷 사업을 전개해 나갈 것이다. 또 CDMA 국제 자동로밍 서비스 를 일본, 미국, 유럽 등 전세계로 확대하여 017 서비스의 글로벌화를 이룩할 계획이다. 이러 한 통신망 진화와 이동 인터넷 사업의 상당 부분을 SK텔레콤과 함께 추진하게 될 것이며 이러한 양사간의 전략적 제휴에 따른 시너지 효과는 오는 연말 IMT-2000 사업권의 성공적 확보로 이어질 것으로 기대된다. 21세기 정보통신산업은 광대역 통신망으로 대변되는 하드 웨어와 인터넷 컨텐츠로 대변되는 소프트웨어가 서로 융화되는 방향으로 발전할 것이다. 이에 따라 고객의 서비스 만족도나 사업자 선택 기준은 기존 통화물질 중심에서, 사업자가 제공하는 컨텐츠의 다양성이나 편리성으로 변화하는 것이 국적을 바꾸는 것보다 어려운 시 대가 멀지 않은 미래에 도래할 것이다. 신세기 통신 과 SK 텔레콤에는 현재 1,300만명이 넘 는 고객이 있으며. 이들 고객은 어 이상 음성통화 중심의 이동전화 고객이 아니라 신세기 통신과 SK텔레콤이 함께 구축해 나갈 거대란 무선 네트워크 사회에서 정보화 시대를 살아 갈 회원들이다. '컨텐츠의 시대'가 개막되는 것이며, 신세기통신과 SK텔레콤은 선의의 경쟁 과 협력을 통해 이동인터넷 서비스의 컨텐츠를 개발해 나가게 될 것이다.

  • PDF

The Study of Web Services Adaptation in IPv6/IPv4 Coexistence Network (IPv6/IPv4 공존 환경에서의 웹서비스 적용에 관한 연구)

  • Lee, Won-Suk;In, Min-Kyo;Lee, Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.747-749
    • /
    • 2005
  • The popularity of web services within the IT industry continues to grow as the next generation web technologies. Web services are self-contained, self-describing, modular applications that can be published, located, and invoked across the Web. Web services will be core technology for e-business in the Web. IPv6 is sometimes also called the Next Generation Internet Protocol and is a new version of IP which is designed to be an evolutionary step from IPv4. In this paper, we define problems for adapting web services to IPv6 Environment. This paper survey and explain consideration issues that include standards, components, coexistence of IPv6 and IPv4, etc.

  • PDF

A QoS Improvement Scheme for Real-time Traffic using IPv6 Flow Labels (IPv6 플로우 레이블을 이용한 실시간 트래픽의 QoS개선 방안)

  • 이인화;김성조
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.787-798
    • /
    • 2003
  • The flow label field in IPv6 has been proposed to provide the QoS. Since the existing flow label specification scheme like random-number format utilizes the label only as the identifier of flow, it is not appropriate for providing differentiated services according to the characteristics of various types of real-time traffic. This paper proposes a hybrid scheme that makes use of the flow label fields as components of flow and QoS parameters as well. To be specific, this paper investigates a scheme that both guarantees the end-to-end service quality and utilizes efficiently backbone resources by allowing users to specify QoS parameters using flow labels. Assuming an MLPS-TE network as the backbone, we compare the performance of our proposed scheme with that of random-number scheme through simulation. The simulation result shows that our scheme is more efficient than the existing one in terms of the transmission rate as well as the resource utilization of the backbone.

Design of Optical Filter with Multilayer Slab/Fiber Structure (다층 슬랩-광섬유접속구조를 갖는 광필터의 설계)

  • Jeoung, Chan-Gwoun;Kang, Young-Jin;Kim, Sun-Youb
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1369-1375
    • /
    • 2007
  • The recent, a large capacity of telecommunication networks is required in order to it is in proportion to capacity of information communication increase and to satisfy a demand because of the demand about Internet, a multimedia service of internet, Video of internet protocol(VoIP), Audio/Video streaming. As a result, DWDM(Dense Wavelength Division Multiplexing)technologies are emerging to be a prevailing the method of solving it without additional optical fiber network building and high-speed equipment. Therefore this thesis proposed the optical filter of fiber/multilayer slab coupled structure combining it to multilayer slab waveguide by polishing the cladding of one side of fiber to design the optical filter having these functions. When a separation distance of fiber and slab was $3{\mu}m$, The optical filter proposed as the simulation result was satisfied with a DWDM filter characteristic with FWHM of 0.1nm on TM mode and TE mode as 32nm polarization independence in a communication window of $1.3{\mu}m$ when center wavelength was each ${\lambda}_0=1.274755{\mu}m$ and ${\lambda}_0=1.30591{\mu}m$.

  • PDF

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

Design and Implementation of Web Interface for Internet management System Using SNMP MIB-II (SNMP MIB-II를 이용한 인터넷 관리 시스템의 웹 인터페이스 설계 및 구현)

  • Yu, Seung-Geun;An, Seong-Jin;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.699-709
    • /
    • 1999
  • This paper is aimed at defining items of analysis using SNMP MIB-II for the purpose of managing the Internet based network running on TCP/IP protocol, and then utilize these items, in conjunction with various Web technology and JAVA to design and implement a Web based interface of a management system to analyze the performance and status of the Internet. Among the required items in order to accomplish this task are utilization, interface packet transmission rate, I/O traffic ratio, and so on. Based on these items, the actual analysis is carried out by the Web interface according to the type of analysis. For instance, the interface executes the function of real-time analysis, collection processing, elementary analysis and detailed analysis. The demand of the user is fed into the Web interface which carried out a real-time analysis with the client system which in turn will eventually produce the results of the analysis. In order words, the interface acts as a mediator server for the analysis system. Furthermore, a protocol for exchange of data and messages between the server and the analysis system, the MATP protocol, was also designed. Finally, the results obtained through the system presented in this paper were displayed on screen according to the type of analysis. The system realized in this paper uses We technology and is independent of platform and allows the user to determine the performance of Internet at his/her own host according to the selected items of analysis.

  • PDF

Communication Service Architecture for CORBA -Based Multimedia Multicast Application (CORBA 기반의 멀티미디어 멀티캐스트 애플리케이션을 위한 통신 서비스 아키텍쳐)

  • Ma, Yeong-Sik;Gang, U-Sik;An, Sun-Sin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.6
    • /
    • pp.771-781
    • /
    • 1999
  • 오늘날의 컴퓨팅 환경은 통신 네트워크의 복잡성과 다양한 멀티미디어 서비스 처리를 위해 객체지향 기술을 분산 시스템에 도입하고 통신망을 소프트웨어 계층적 모델로 구조화한 개방형 정보 통신망 구조 연구가 활발히 진행되고 있다. 본 논문은 분산환경에서 멀티미디어 스트림 데이타를 전송하기 위한 아키텍쳐에 관한 모델의 설계 및 구현에 관한 것으로 분산 환경에서 멀티미디어 스트림 데이타를 효율적으로 전송할 수 있는 구조를 제시하고 있다. 설계한 구조는 Point-to-Point와 멀티캐스트를 지원하며 컴퓨터 통신망에서 멀티캐스트 연결을 효율적으로 관리하고 추후 기능 확장 및 기능 변경이 용이하도록 모듈화하고 유연성을 가지는 연결 관리 구조를 설계하고 구현하였다. 신호기능은 CORBA(Common Object Request Broker Architecture)의 ORB를 이용하여 실현하였으며, 데이타 전송 기능은 TCP/IP연결을 이용하였다. 이렇게 신호처리 부분과 데이타 전송 부분을 독립적으로 만들어서 하부망 기술에 독립적인 연결 관리 구조를 채택하고 있으므로 향후 다른 환경에서도 신호처리 부분을 그대로 적용할 수 있다. 분산 객체 개념을 적용하여 연결 관리 기능을 분산 객체화 하였으며 각 분산 객체간 인터페이스를 OMG(Object Management Group) IDL(Interface Definition Language)로 정의함으로써 유연성을 갖도록 하였다.AbstractThis paper proposes communication service architecture to support dynamic communication configuration and multiple connection management which are required to handle a variety of multimedia multicast application. Our communication service architecture was designed to fulfil the objectives as the following:- To build a common networking system for various multimedia multicast services- To build a platform for rapid service development and provisioning- To provide service networking independent on transport network technologiesWe implemented communication service architecture based on Common Object Request Broker Architecture (CORBA) for multimedia multicast applications. Our communication service architecture is distributed and object-oriented for extensibility and easy modification. The interfaces between the distributed objects are specified in (Object Management Group) OMGs Interface Definition Language.