• Title/Summary/Keyword: Logical network

Search Result 309, Processing Time 0.026 seconds

A Case Study on Logical Network Separation through HCI method (HCI 방식을 통한 논리적 망분리 사례 연구)

  • Choi, Seoung Pyo;Shin, Sang Uk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.747-749
    • /
    • 2017
  • To protect financial services against danger of financial accidents and customer information leakage caused by malware, injection attack and so on, Financial Services Commission announced "Financial Networks Security Enhancement Comprehensive Plan", which suggests the guideline of protecting customer information and providing secure financial services by separating network topology and then makes the financial company use network partitioning system. In consequence of this policy, financial companies respectively chose between the physical partitioning mechanism or the logical partitioning mechanism according to their IT environment. This paper suggests an efficient infrastructure configuration plan for making the logical network partition, by comparison of a construction of traditional general equipment and an integrated HCI(Hyper Converged Infrastructure) through 'Hyper Converged' which is one of virualization techniques for developing currently, and the case study of the integrated HCI method.

  • PDF

Service Function Chaining Architecture for Distributed 5G Mobile Core Networks (분산 모바일 코어기반 5G 네트워크에서의 Service Function Chaining 적용구조)

  • Sun, Kyoungjae;Kim, Younghan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1914-1924
    • /
    • 2016
  • In this paper, considering virtualized Evolved Packet Core(vEPC) network for 5G mobile network, we propose architecture for supporting Service Function Chaining(SFC) in 5G mobile network. Using SFC in 5G network, dynamic path configuration and providing network services based on subscriber and traffic information. SFC technology provides logical ordered set of network functions and delivers packet through providing logical path over the physical network. Based on the perspective of 5G core network in distributed manner, we design hierarchical SFC architecture to manage SFC for global path including vEPC and SGi-LAN network, and internal path between virtualized network functions in each cloud. In this paper, we define architecture and call flow for establishing data path using SFC. Finally, we design testbed architecture for real implementation based on open source software.

Component-Based Software Architecture for Biosystem Reverse Engineering

  • Lee, Do-Heon
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.10 no.5
    • /
    • pp.400-407
    • /
    • 2005
  • Reverse engineering is defined as the process where the internal structures and dynamics of a given system are inferred and analyzed from external observations and relevant knowledge. The first part of this paper surveys existing techniques for biosystem reverse engineering. Network structure inference techniques such as Correlation Matrix Construction (CMC), Boolean network and Bayesian network-based methods are explained. After the numeric and logical simulation techniques are briefly described, several representative working software tools were introduced. The second part presents our component-based software architecture for biosystem reverse engineering. After three design principles are established, a loosely coupled federation architecture consisting of 11 autonomous components is proposed along with their respective functions.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Wavelength Division Mutiplexing Ring using Asymmetric Bilayered ShuffleNet (비대칭 이중층 셔플넷 토폴로지를 이용한 파장분할다중화 링)

  • 지윤규
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.5
    • /
    • pp.1-7
    • /
    • 2004
  • A regular logical topology requires little processing time for routing purposes which may be a desirable property for high-speed networks. Asymmetric bilayered ShuffleNet, proposed by us as a logical topology, can be used to a wavelength division multiplexing ring network to increase the network capacity compared to ShuffleNet. In this paper, asymmetric bilayered ShuffleNet is imbedded on a wavelength division multiplexing ring with the objective of minimizing the total number of wavelengths assigned.

Logical Reasoning and Emotional Response System using Structured Association Technique

  • Uozumi, Takashi;Kudo, Yasuo;Oobayashi, Yoshihide;Munakata, Tsunetsugu
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2002.05a
    • /
    • pp.30-33
    • /
    • 2002
  • There are several methods to implement the logical machine reasoning such as a frame theory and a production system of artificial intelligence. And these algorithms can explain the obtained result through the inference processes. However, emotional (KANSEI) patterns are not so easily implement. One of reason is that some emotional expression is the result of process from unconscious level to conscious level, and not easily identified the original unconscious causes. Therefore, a function of KANSEI database needs to structuralize unconscious level. Our approach is to develop the computerized counseling support system which can structuralize the unconscious brain functions from the view point of the psychology with focusing physiological and emotional responses. Especially, development of the algorithm that can form the network from unconscious to conscious using the image recollection is the application of the structured association technique (SAT). The developed system was implemented on the Web using CGI and emotional network database.

  • PDF

Implementation of Logical Volume Management for Storage Area Network (SAN을 위한 논리 볼륨 관리자 구현)

  • Kim, Hun;Lee, Hong-Seok;Choi, Sung-Chune;Youn, Hee-Yong;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.691-694
    • /
    • 2002
  • 현재 인터넷 환경은 다양한 멀티미디어 정보의 폭발적인 증가로 인해 정보의 효율적인 저장 및 관리, 가공을 위한 볼륨 관리자가 요구되고 있다. 따라서 본 논문은 대용량의 데이터 관리를 요구하는 SAN (Storage Area Network)환경에서 대용량 저장 장치 구성을 위한 LDP(Logical Disk Pool)를 설계하고 그 성능을 평가하였다. LDP는 여러 개의 물리적 디스크를 물리적 개념이 아닌 논리적 저장 공간의 개념을 사용하여 관리함으로써, 기존 물리 디스크의 크기 제한과 확장성 문제를 해결하여 SAN환경에 적합한 대용량 저장장치 구성을 가능하게 한다.

  • PDF

An Efficient Logical Volume Manager for SAN (SAN을 위한 효율적인 논리볼륨 관리자)

  • 최영희;남상수;오재철;유재수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.73-85
    • /
    • 2002
  • A new architecture coiled the Storage Area Network(SAN) was developed in response to the requirements of high availability of data, scalable growth, and system performance, In order to use SAN more efficiently, most SAN operating system support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually. A logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses, In this paper, we design and implement an efficient and flexible mapping method for logical volume manager. Additionally, to aid flexible mapping, we also design and implement free space management method, The mapping method in this paper supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add or remove storage devices to SAN even while the system is running.

  • PDF

A Study on the Determinant Process of Dominant Design of Smartphone Operating Systems (스마트폰 운영체제의 지배적 디자인 결정과정에 관한 연구)

  • Lee, Sang-Hyun;Park, Chul-Ju
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.127-139
    • /
    • 2014
  • The purpose of this research is to present the major factors which determine dominant design of Smartphone OS and to verify a logical causal relationship with them and user satisfaction. To achieve this goal, OS compatibility, OS enhancement, Installed base, and network effect were presented as determinants of Smartphone OS which serves as the basis for determining dominant design and their logical causal relationship with user satisfaction was empirically analyzed. The results of the research showed that OS compatibility and OS enhancements had a positive effect on the expansion of user base. Of the two factors, OS enhancement showed that it does not only expand the user base but also acts as the cause for the fortification of the network effect. Furthermore, it was shown that OS enhancement had a direct positive effect on user satisfaction. The findings of this research are significant in its academic contribution as well as its potential for practical application by presenting the logical causal relationship in the process of determining OS dominant design an area which was previously untouched by empirical testing.

A study on the implementation of MAP network interface for PC (PC를 위한 MAP 망 접속기 구현에 관한 연구)

  • 임용제;김덕우;정범진;추영열;권욱현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1988.10a
    • /
    • pp.390-395
    • /
    • 1988
  • The implementation of MAP(Manufacturing Automation Protocol) NIU(network interface uint) is studied and presented in this paper. Hardwares and system softwares for network management, user interface, and medium access control are developed. Also LLC(Logical Link Control) protocol is implemented. Afterwards, The operations of NIU using self-test functions are tested. Compatibility between interfaces according to IEEE 802.4 standard is also tested.

  • PDF