• Title/Summary/Keyword: Logical network

Search Result 310, Processing Time 0.027 seconds

Auto-configurable Security Mechanism for NFV

  • Kim, HyunJin;Park, PyungKoo;Ryou, Jaecheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.786-799
    • /
    • 2018
  • Recently, NFV has attracted attention as a next-generation network virtualization technology for hardware -independent and efficient utilization of resources. NFV is a technology that not only virtualize computing, server, storage, network resources based on cloud computing but also connect Multi-Tenant of VNFs, a software network function. Therefore, it is possible to reduce the cost for constructing a physical network and to construct a logical network quickly by using NFV. However, in NFV, when a new VNF is added to a running Tenant, authentication between VNFs is not performed. Because of this problem, it is impossible to identify the presence of Fake-VNF in the tenant. Such a problem can cause an access from malicious attacker to one of VNFs in tenant as well as other VNFs in the tenant, disabling the NFV environment. In this paper, we propose Auto-configurable Security Mechanism in NFV including authentication between tenant-internal VNFs, and enforcement mechanism of security policy for traffic control between VNFs. This proposal not only authenticate identification of VNF when the VNF is registered, but also apply the security policy automatically to prevent malicious behavior in the tenant. Therefore, we can establish an independent communication channel for VNFs and guarantee a secure NFV environment.

Multi Event Server Architecture for Hierarchical Event Service under Ubiquitous Network Environment (유비쿼터스 네트웍 환경에서 계층적 이벤트 서비스를 위한 다중 이벤트 서버 아키텍처)

  • 신준헌;박준호;강순주;최준용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4B
    • /
    • pp.424-434
    • /
    • 2004
  • Ubiquitous network consists of various devices using several heterogeneous protocols and requires seamless communication between devices. This paper proposes a new hierarchical event service and multiple event server architecture to implement the service under ubiquitous environment. The proposed event service classifies devices by logical and physical location to abstract the idiosyncrasy of used protocols, and reduces network load. Due to the design consideration, the proposed architecture removes transfer of duplicated event data effectively. As a result, we can guarantee the reliable event delivery. The prototype multiple event server architecture was implemented according to the proposed idea and evaluated its performance under a home network test bed.

Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks

  • Anand, Anjali;Aggarwal, Himanshu;Rani, Rinkle
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.938-947
    • /
    • 2016
  • A mobile ad hoc network (MANET) is a collection of mobile nodes communicating in an infrastructure-less environment without the aid of a central administrating authority. Such networks entail greater dependency on synergy amongst the nodes to execute fundamental network operations. The scarcity of resources makes it economically logical for nodes to misbehave to preserve their resources which makes secure routing difficult to achieve. To ensure secure routing a mechanism is required to discourage misbehavior and maintain the synergy in the network. The proposed scheme employs a partially distributed dynamic model at each node for enhancing the security of the network. Supplementary information regarding misbehavior in the network is partially distributed among the nodes during route establishment which is used as a cautionary measure to ensure secure routing. The proposed scheme contemplates the real world scenario where a node may exhibit different kinds of misbehavior at different times. Thus, it provides a dynamic decision making procedure to deal with nodes exhibiting varying misbehaviors in accordance to their severity. Simulations conducted to evaluate the performance of the model demonstrate its effectiveness in dealing with misbehaving nodes.

A Dynamic Precedence Queue Mechanism of CAN for An Efficient Management of Automobile Network System (자동차 네트워크 시스템의 효율적 관리를 위한 CAN의 동적 선행대기 열 기법)

  • Choi Ho-Seek;Choi Hyo-Seek;Lee Jang-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.6
    • /
    • pp.614-620
    • /
    • 2006
  • Today the automobile has been changed from a mechanical system to an electronic control system fly the development of the electronic technology. In the automobile body, most of these electronic control devices are networked and managed fully by the CAN protocol. But, when a network system is overloaded, unexpected transmission delay for relative low priority objects occurs due to the static priority definition of the CAN protocol. To resolve this problem, this paper proposes a dynamic precedence queue mechanism that creates a queue for the low priority object and its relevant objects to be transmitted, which becomes urgent in an overloaded network system to keep the maximum allowable time delay. For the generated queue, the highest priority is assigned to transmit the queued objects within the shortest time. The mechanism is implemented in the logical link layer of CAN, which does not require any modification of the old CAN hardware. Effectiveness of the proposed mechanism is verified by the real experiments with an automobile network system.

A Study on Telecommunication Network Architecture for Intelligence Transportation System Based on DSRC Technology (DSRC 기술을 활용한 지능형 교통 시스템의 통신망 구조 연구)

  • Yee, Soung-Ryong;Choe, Kyung-Il;Lee, Hee-Sang;Kim, Yun-Bae
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.26 no.4
    • /
    • pp.345-353
    • /
    • 2000
  • ITS(Intelligent Transportation System) is an advanced system which can effectively handle the current transportation and tragic problems. In order to beneficially apply ITS to the current transportation infrastructure we need a telecommunication technology which guarantees high speed data transmission between the road side units and the on-board units in the vehicles. DSRC(Dedicated Short Range Communication) is considered as a promising technology since it has the capability of two-way communication and can serve to implement various ITS services. In this paper, we study an architecture of telecommunication network far ITS based on DSRC. We use the ISCNA(Information Systems and Communication Networks Architecture) framework for the method of approach. We first analyze the requirements for ITS services using DSRC in Korea, and then establish a logical architecture for the network. We also analyze the types of data and process between the network components. Based on these we propose an architecture for the telecommunication network for ITS. We also briefly discuss the simulation which we perform to validate the proposed network architecture.

  • PDF

Determinants of Writing Research According to International Standards in Web of Science Journals

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.94-102
    • /
    • 2021
  • The study aimed to define all the main determinants of writing a research paper in an integrated manner within the requirements of the science network journals, by introducing scientific research and the steps of writing a research paper, starting from choosing the title to writing the abstract, identifying the research problem, questions, importance and objectives of the study, how to choose previous studies, research methodology and tools, discussion and results In addition to determining the acceptable percentage of plagiarism for science network journals, recommendations, choosing appropriate references and choosing the appropriate references, in addition to determining the acceptable percentage of plagiarism for the journals of the Network of Science, the researcher used the method of analytical investigative research to find out the axes of the study and analyze different reference citation methods to deal with different sources of information (articles-books-theses-conference works-reviews), In addition to studying the most important international programs for measuring plagiarism ratios that are accredited within the journals of the Science Network, and the study concluded that the researcher must present original and innovative results, add an integrated and logical work, take into account all the scientific conditions in the design of the research, its steps and ethics, and take into account the international standards in citing Reference, taking into account the rates of plagiarism within Web of Science journals.

Modeling Causality in Biological Pathways for Logical Identification of Drug Targets

  • Park, Il;Park, Jong-C.
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2005.09a
    • /
    • pp.373-378
    • /
    • 2005
  • The diagrammatic language for pathways is widely used for representing systems knowledge as a network of causal relations. Biologists infer and hypothesize with pathways to design experiments and verify models, and to identify potential drug targets. Although there have been many approaches to formalize pathways to simulate a system, reasoning with incomplete and high level knowledge has not been possible. We present a qualitative formalization of a pathway language with incomplete causal descriptions and its translation into propositional temporal logic to automate the reasoning process. Such automation accelerates the identification of drug targets in pathways.

  • PDF

Snake Robot Motion Scheme Using Image and Voice (감각 정보를 이용한 뱀 로봇의 행동구현)

  • 강준영;김성주;조현찬;전홍태
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.127-130
    • /
    • 2002
  • Human's brain action can divide by recognition and intelligence. recognition is sensing voice, image and smell and Intelligence is logical judgment, inference, decision. To this concept, Define function of cerebral cortex, and apply the result. Current expert system is lack, that reasoning by cerebral cortex and thalamus, hoppocampal and so on. In this paper, With human's brain action, wish to embody human's action artificially Embody brain mechanism using Modular Neural Network, Applied this result to snake robot.

  • PDF

A Proposal of Multimedia Intelligent Database for Medical Diagnosis

  • MODEGI, Toshio;IISAKU, Shun-ichi
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1997.06a
    • /
    • pp.61-66
    • /
    • 1997
  • For constructing an intelligent multimedia database system for medical diagnosis, we are focusing on two technological points. One is a retrieval algorithm of databases, and the other is a coding algorithm of multimedia contents. For the first, previously we proposed a front-end database preprocessor called“keyword-network”, and in this paper we present its extended model providing an intelligent logical AND searching function especially for medical differential diagnosis. For the second, we present examples of multimedia intellectual coding methods for cardiovascular examination records.

  • PDF

Application of Dynamic Reliability Analysis Method to the CANDU Pressurizer System

  • Lee, Sook-Hyung;Oh, Se-Ki
    • Nuclear Engineering and Technology
    • /
    • v.30 no.3
    • /
    • pp.194-201
    • /
    • 1998
  • DYLAM (Dynamic Logical Analytical Methodology) and its related methodologies are reviewed and found to have many favorable characteristics. Previous studies have shown that the DYLAM methodology represents an appropriate tool to study dynamic analysis. A hybrid model which is a synthesis of the DYLAM model, a system thermodynamic simulation model and a neural network predicative model, is implemented and used to analyze dynamically the CANDU pressurizer system. This study demonstrates that the hybrid model for system reliability analyses is effective.

  • PDF