• Title/Summary/Keyword: Information network

Search Result 31,247, Processing Time 0.059 seconds

Agent for Home Server Management in Intelligent Smart Home Network

  • Moon, Seok-Jae;Shin, HyoYoung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.225-230
    • /
    • 2022
  • The intelligent home network system integrates various devices in the home into one communication network to provide information sharing, control, and operation environment between devices. This intelligent home network system operates around a home server. Home appliances in the era of the 4th industrial revolution will have numerous home servers in logical areas as the intelligent home network in the home accelerates. Therefore, the need for systematic management of home servers is emerging. We propose an agent system for efficient intelligent smart home server management. The agent system monitors the home server and operating environment for home server management of the intelligent smart home network. By referring to this monitored information, the service module of the home server is managed, and the home server is dealt with whether it is normal or not. In addition, by referring to the information collected by the service agent created in the group management server while migrating the home server, it is possible to deal with integrated meter reading, crime prevention, and topics. And when a new service is applied to the home server, it is registered in the management server and distributed to the home server through the agent, so that the intelligent smart home network can be efficiently managed.

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

A Study on ATM Network Management System Supporting M4 Interface (M4 Interface를 지원하는 ATM 네트워크 관리 시스템에 관한 연구)

  • Lee, Beom;Choi, Young-Su;Chung, Jin-Wook
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3367-3378
    • /
    • 1999
  • ATM technology, which acts as a representative high-speed bandwidth technology, plays an important role in Internet environment. ATM network, supporting QoS(Quality of Service) and various traffic characters in high speed, configures many VPC(Virtual Path Connection)/VCC(Virtual Channel Connection). It is important to guarantee the QoS of each connection and it is necessary for the network manager to search element affecting the QoS of VPC/VCC and to control ATM network correctly. In the paper, the management information of VPC/VCC, that ATM network manager Using the fault notification for ATM switch, we can manage the configuration, fault and performance of ATM network. Thus, we extracted the configuration, fault and performance monitoring item from the ATM-MIB and SNMP M4 Network Element View MIB. And we designed the ATM network configuration, fault and performance management system based on the extracted item.

  • PDF

Data-Hiding Method using Digital Watermark in the Public Multimedia Network

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.82-87
    • /
    • 2006
  • In spite of the rapid development of the public network, the variety of network-based developments currently raises numerous risks factors regarding copyright violation, the prohibition and distribution of digital media utilization, safe communication, and network security. Among these problems, multimedia data tend to increase in the distributed network environment. Hence, most image information has been transmitted in the form of digitalization. Therefore, the need for multimedia contents protection must be addressed. This paper is focused on possible solutions for multimedia contents security in the public network in order to prevent data modification by non-owners and to ensure safe communication in the distributed network environment. Accordingly, the Orthogonal Forward Wavelet Transform-based Scalable Digital Watermarking technique is proposed in this paper.

A ROI Based Rate Control Algorithm in H.264|AVC Optimized for Video Telephony (영상통화에 최적화된 관심영역 기반 H.264|AVC 비트 율 제어 방법)

  • Kim, Chang-Hee;Lim, Jeong-Yeon;Joo, Young-Ho;Kim, Ki-Mun;Byun, Jae-Woan;Kim, Mun-Churl
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.797-798
    • /
    • 2008
  • Visual quality of video telephony over 3G networks is not satisfactory due to limited bandwidths. Therefore, it is worthwhile to enhance subjective visual quality based on ROI coding. In this paper, we propose a rate-control algorithm for video telephony with ROI based H.264|AVC coding. The QP values are increasingly assigned in non-ROI away from the ROI so that graceful degradation of visual quality can be achieved, which is more visually pleasant.

  • PDF

Design and Implementation Web-based Network Traffic Monitoring System (웹 기반 네트워크 트래픽 모니터링 시스템의 설계 및 구현)

  • 안용학;박진호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.3
    • /
    • pp.64-71
    • /
    • 2001
  • In this paper we propose the network traffic monitoring system that can supported network and system operation, management, expansion, and design using network analysis and diagnosis to a network administrator. The proposed system consists of two parts: analysis server for collection and analysis of the network information. and supports real-time monitoring of network traffic, and client system shows user a graphical data that analyzed a returned result from the server This system implements web-based technology using java and contributes to enhance the effectiveness of network administrator's management.

  • PDF

Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks

  • Alruwaili, Rahaf Hamoud;Alanazi, Haifa Khaled;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.303-309
    • /
    • 2022
  • Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.

A Shortest Path Routing Algorithm using a Modified Hopfield Neural Network (수정된 홉필드 신경망을 이용한 최단 경로 라우팅 알고리즘)

  • Ahn, Chang-Wook;Ramakrishna, R.S.;Choi, In-Chan;Kang, Chung-Gu
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.386-396
    • /
    • 2002
  • This paper presents a neural network-based near-optimal routing algorithm. It employs a modified Hopfield Neural Network (MHNN) as a means to solve the shortest path problem. It uses every piece of information that is available at the peripheral neurons in addition to the highly correlated information that is available at the local neuron. Consequently, every neuron converges speedily and optimally to a stable state. The convergence is faster than what is usually found in algorithms that employ conventional Hopfield neural networks. Computer simulations support the indicated claims. The results are relatively independent of network topology for almost all source-destination pairs, which nay be useful for implementing the routing algorithms appropriate to multi -hop packet radio networks with time-varying network topology.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

FKP and VRS among Network RTK GNSS methods Accuracy Evaluation of Observation Methods (Network RTK GNSS방법 중 FKP와 VRS 관측 방법의 정확도 평가)

  • Jae-Woo, KIM;Do-Yeoul, MUN;Yeong-Jong, KIM
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.4
    • /
    • pp.200-209
    • /
    • 2022
  • Providing real-time location information is emerging as a major goal of the national industry. In order to provide such real-time location information (3D spatial information), it is essential to develop a technology for a satellite positioning method. Therefore, the country continues to make efforts to increase satisfaction with the needs of consumers by introducing the Network RTK GNSS method. In this study, among the Network RKT GNSS(Global Navigation Satellite System) methods provided by the National Geographic Information Service, continuous observation and single observation were measured at the integrated reference point using VRS(Virtual Reference Station) and FKP(Flӓachen-Korrektur Parameter) to evaluate accuracy. In addition, we aim to maximize efficiency by presenting accuracy on the rapidly increasing Network RTK GNSS method in the field.