• 제목/요약/키워드: Internet Generation

검색결과 1,399건 처리시간 0.024초

차세대 광 패킷 인터넷을 위한 통합 네트워크 제어 구조 (An Integrated Network Control Framework for the Next-Generation Optical Internet)

  • 박성용
    • 제어로봇시스템학회논문지
    • /
    • 제6권8호
    • /
    • pp.666-671
    • /
    • 2000
  • With the current advances in optical WDM (Wavelength Division Multiplexing) networking technologies and the increasing demand for network bandwidth the Next Generation Internet is expected to be a network that runs IP(Internet Protocol) directly over WDM-based optical networks. The network control architecture for the IP over WDM networks is different from that of traditional Internet since the underlying WDM devices have more constraints than electronic IP routers such as the lack of optical buffers and wavelength continuity property etc. In this paper we introduce several architectural models for implementing IP over WDM networks and propose an integrated network control framework for the IP over WDM networks. This framework leverages the traffic engineering control architecture for the MPLS (Multi-Protocol Label Switching) networks and is mainly developed for the IP over packet-switched WDM networks. We also report several preliminary simulation results of contention resolution schemes in the packet-switched WDM networks.

  • PDF

DiffServ-aware-MPLS 네트워크 성능 분석 (DiffServ-aware-MPLS Network Performance Analysis)

  • 조해성
    • 한국콘텐츠학회논문지
    • /
    • 제4권4호
    • /
    • pp.107-112
    • /
    • 2004
  • 최근 인터넷 서비스는 빠르게 진화하면서, 데이터의 고속화뿐 아니라 트래픽 소스의 특징에 따른 QoS(Quality of Service)의 보장 요구가 극대화 되어가고 있다. 이에 따라서 인터넷 서비스 기술 또한 급변해가고 있으며, 기존의 네트워크 서비스 기술에 QoS를 보장하는 기술이 개발되거나 또는 새로운 QoS를 보장하는 네트워크 모델이 제시되기도 한다. 본 논문에서는 QoS를 보장하기 위해 IETF(Internet Engineering Task Forc)에서 제시한 DiffServ-aware-MPLS 네트워크를 기존의 네트워크 모델과 비교 분석함으로써, 상대적 우수함을 보이며, 차세대 네트워크를 구성하는 방향을 제시하고자 한다.

  • PDF

미래 인터넷 서비스 환경을 위한 인증 시스템 분석 (Analysis of Authentication Systems for Future Internet Service Environments)

  • 박승철
    • 한국IT서비스학회지
    • /
    • 제10권2호
    • /
    • pp.163-176
    • /
    • 2011
  • In the current Internet environment, there may exist a number of independently-operating authentication systems even within a single organization, according to the service types and service providing entities. Current silo-style isolated authentication system model has revealed critical problems in the aspects of usability, cost-effectiveness, extensibility and flexibility, and privacy protection. Recently, several next generation authentication systems have been actively developed by leading industrial and standardization institutions. This paper firstly analyzes the problems of current Internet authentication system environments. And then, the underlying idea, operating procedures, and pros and cons of the newly developed next generation authentication systems are analyzed so as to provide the selection guidelines for the new authentication systems and drive further development directions for future Internet authentication systems.

보안 시스템 테스트를 위한 공격 발생 테스트슈트 구현 (Implementation of Attack Generation Test-Suite for Security System Testing)

  • 김환국;서동일;이상호
    • 한국사이버테러정보전학회:학술대회논문집
    • /
    • 한국사이버테러정보전학회 2004년도 제1회 춘계학술발표대회
    • /
    • pp.51-55
    • /
    • 2004
  • 현재 인터넷은 이미 일상 생활에 깊게 자리 잡았다. 이러한 인터넷을 이용해서 실생활에서 수행하여야만 했던 많은 일들을 인터넷을 통해 수행할 수 있게 되었고, 인터넷의 편리함 때문에 인터넷 사용자가 늘어났다. 그러나 인터넷 사용자의 증가와 더불어 인터넷을 통한 각종 침해사고 역시 크게 증가하였다. 따라서, 이러한 침해 공격에 대응하는 보안 시스템 개발의 기능을 테스트하기 위해 다양한 공격 패턴과 트래픽을 자동적으로 발생시키는 공격 발생 테스트 슈트가 필요하다. 본 논문에서는 다중 에이전트를 이용하여 다양한 공격 패턴 발생 테스트슈트의 설계방법과 구현 결과를 기술하였다.

  • PDF

요보호아동의 정보화 실태 분석: 부산지역을 중심으로 (Information Analyses of Child Who Needs Protection in Busan)

  • 김옥희
    • 가정과삶의질연구
    • /
    • 제20권5호
    • /
    • pp.149-166
    • /
    • 2002
  • In this study, 1 have analyzed the state of the use of information technology by the at-risk children who are residing in Husan metropolitan area. The ultimate goal of this study is to help ensure the healthy development of the children and improve the quality of their lives in this information-oriented society. For this research, 1 surveyed 183 children living in an institution or a low-income family in Busan metropolitan area. The survey questionnaire was designed to obtain information on the respondents, socio-demographic characteristics, computer-related conditions of the immediate and social environments, patterns of computer and Internet use, their experience and degree of so called, Net-generation syndrome, Internet addiction disorder, changes in social and familial life caused by Internet use, and exposure to pornographic materials. The results show that 95.9 % of at-risk children in Husan own a computer, 60.9 % of those computers being Pentium Ⅲ. A majority of the children (74.9 %) are connected to Internet at a high-speed, using such devices as LAN, ADSL or cables. About seventy-six percent of the children have used a PC and Internet less than two years. In other words, a majority of them have not used those for a long period of time. The main results of the research are summarized in the following: There is a significant difference among at-risk children in terms of experiences in computer and Internet use according to their grade levels. There is a gender difference in the amount of time spent on computer and Internet. Boys spend more time every week on computer and Internet than girls do. There is a significant difference in the pattern of computer and Internet use, according to the type of their risk, and grade level. The so-called 'Net Generation Syndrome' is not serious in this group. A majority of the at-risk children think that Internet is more interesting than TV. They hardly shop on Internet, and they don think the advertisements on Internet are a serious problem. Also, unlike many people assumptions, their desire to communicate through on-line chatting was very low. They do not tend to buy computer game programs, and Internet Addiction Disorder was not pronounced among them. The at-risk children rarely had an exposure to pornographic materials in the cyber space. However, the exposure was more frequent for institutionalized children than children in low-income families. These results point to a need for a policy to improve the welfare of at-risk children and guarantee their right to information.

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation

  • Kim, Aeyoung;Wang, Changda;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권7호
    • /
    • pp.2919-2937
    • /
    • 2020
  • Post-Quantum Cryptography (PQC) is rapidly developing as a stable and reliable quantum-resistant form of cryptography, throughout the industry. Similarly to existing cryptography, however, it does not prevent a third-party from using the secret key when third party obtains the secret key by deception, unauthorized sharing, or unauthorized proxying. The most effective alternative to preventing such illegal use is the utilization of biometrics during the generation of the secret key. In this paper, we propose a biometric-based secret key generation scheme for multivariate quadratic signature schemes, such as Rainbow. This prevents the secret key from being used by an unauthorized third party through biometric recognition. It also generates a shorter secret key by applying Principal Component Analysis (PCA)-based Confidence Interval Analysis (CIA) as a feature extraction method. This scheme's optimized implementation performed well at high speeds.

중국소비자 특성에 따른 기업의 성과제고 방안 (A Study on the performance of internet companies in Chinese Consumers)

  • 유승균;한수범
    • 통상정보연구
    • /
    • 제15권4호
    • /
    • pp.419-436
    • /
    • 2013
  • 본 연구는 중국진출 한국인터넷기업을 대상으로 중국내 성과제고를 위한 방안모색을 하고자 중국 소비자의 특성에 따른 성과를 실증분석한 후, 이를 토대로 제고방안을 제시하였다. 연구결과, 인터넷기업에 대한 소비자 인식, 접근성, 거래안정성 등이 성과제고에 유의미한 결과를 가져오는 것으로 나타났다. 이를 통해 중국진출 인터넷기업의 성과제고를 위해서 자사에 대한 브랜드 구축, 서버의 확장, 결제시스템에 대한 안정성 제고, 고객과의 소통을 위한 인적자원의 교육 및 훈련 등이 필요함을 제시하였다. 다만, 본 연구는 대부분 중국의 20대에 집중되어 있어 연구성과를 중국 전체소비자로 확장하기에는 다소 무리가 있다.

  • PDF

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.