• Title/Summary/Keyword: MAC주소

Search Result 69, Processing Time 0.023 seconds

A Protocol Layer Model based on Integrated MAC for Underwater Multi-media Communication Routing (수중 다중 매체 통신 라우팅을 위한 통합 MAC 기반의 프로토콜 계층 모델)

  • Shin, DongHyun;Kim, Changhwa
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.156-159
    • /
    • 2020
  • 본 논문은 수중 다중 매체를 사용하는 수중 무선 통신 네트워크에서 수중 다중 매체 라우팅을 지원하는 프로토콜 계층 모델을 제안한다. 이 모델은 상향식 방식의 모델로써 각 물리 매체가 갖는 장점을 대부분 활용하여 수중 통신에 활용할 수 있는 장점이 있으며, 이 모델에 대한 프로토콜 계층 구조, 수중 노드와 수중 통신 매체에 부여되는 주소, 프로토콜 계층별 주요 기능과 인터페이스를 제시한다. 논문에서 제시된 수중 다중 매체를 위한 프로토콜 계층을 통해 수중 다중 매체 통신의 기반이 될 수 있으며, 제안한 프로토콜 계층 모델 기반으로 실제 구현 시 불안정한 수중 통신 환경에서 안정적으로 통신에 기여할 수 있을 것으로 기대된다.

Implementation of Security Algorithm to Preserve Copyright of Education Contents (학원 교육 콘텐츠 S/W 저작권 보호를 위한 알고리즘 구현)

  • Kang, Min-Jae;Pyoun, Do-Kil;Cheong, Sang-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.324-326
    • /
    • 2011
  • As development of education contents has become more active, it is not much that way to preserve copyright of S/W consuming contents. So this paper studied way to preserve copyright of S/W from MAC address of ethernet and hard disk volume serial number. This study realizes the simple but powerful security algorithm to preserve copyright. So this tightens to preserve copyright of S/W of education contents and will contributes to decrease damages because of using illegal S/W.

  • PDF

A Study of the Method for Subscriber-Aware and Fair Aggregation Scheme in Ethernet (이더넷에서 가입자 구별 및 공평한 접선에 관한 연구)

  • Kwon Tae-Hyun;Park Jong-Su;Park Dae-Geun;Lee Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7B
    • /
    • pp.602-607
    • /
    • 2006
  • A subscriber-oriented service became necessary for the QoS management due to the development of network. BcN(Broadband convergence Network) which incorporates communication, broadcasting and internet not only improves the quality of the communication and broadcasting service but also. aims at broadband service. Therefore, QoS management for each subscriber becomes more important. Not yet, however, the discussion for the subscriber oriented QoS management is not activated. Although, there are several techniques for subscriber distinction using flow information, IP information or MAC information, but they are only processed in layer 3 network. Actually, it is impossible to manage QoS of all subscriber's in layer 3 network. In this paper, we propose a method for QoS management scheme that does not need additional processes or large hardware in layer 2 network and analyze efficiency and overheads. We propose the first subscriber-oriented service method in layer 2 network that is applicable to either existing network or BcN.

A Study on the Performance Improvement in SEcure Neighbor Discovery (SEND) Protocol (보안 이웃 탐색 프로토콜 성능 향상 기법에 관한 연구)

  • Park, Jin-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.85-96
    • /
    • 2008
  • Neighbor Discovery(ND) protocol is used to exchange an information of the neighboring nodes on the same link in the IPv6 protocol environment. For protecting the ND protocol, firstly utilizing Authentication Header(AH) of the IPsec protocol was proposed. But the method has some problems-uses of key exchange protocol is not available and it is hard to distribute manual keys. And then secondly the SEcure Neighbor Discovery(SEND) protocol which protects all of the ND message with digital signature was proposed. However, the digital signature technology on the basis of public key cryptography system is commonly known as requiring high cost, therefore it is expected that there is performance degradation in terms of the availability. In the paper, to improve performance of the SEND protocol, we proposed a modified CGA(Cryptographically Generated Address) which is made by additionally adding MAC(Media Access Control) address to the input of the hash function. Also, we proposed cache mechanism. We compared performance of the methods by experimentation.

Low-Latency Implementation of Multi-channel in AoIP/UDP-based Audio Communication (AoIP/UDP 기반 오디오 통신의 다중 채널 Low-Latency 구현)

  • Seung-Do Yang;Jin-ku Choi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.59-64
    • /
    • 2023
  • Fire and disaster broadcasting systems are divided into analog, digital, and network-based digital public address systems, and important specifications in network-based digital public address systems are low-latency audio, high sampling rate, and multi-channel input and output. In the past, it has been widely used to the AoE method for distinguishing based on the MAC address of the data link layer. However, this method has a problem of increasing complexity and cost. This proposal is an AoIP/UDP method, which allows communication to be easily distinguished by IP address without the need for a separate redundant network, so that the network can be freely used and configured, and cost can be reduced by reducing complexity. After implementing the AoIP/UDP method, the experimental results showed that the cost was improved with the equivalent performance with 2.66ms latency.

A Joint Topology Discovery and Routing Protocol for Self-Organizing Hierarchical Ad Hoc Networks (자율구성 계층구조 애드혹 네트워크를 위한 상호 연동방식의 토폴로지 탐색 및 라우팅 프로토콜)

  • Yang Seomin;Lee Hyukjoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.905-916
    • /
    • 2004
  • Self-organizing hierarchical ad hoc network (SOHAN) is a new ad-hoc network architecture designed to improve the scalability properties of conventional 'flat' ad hoc networks. This network architecture consists of three tiers of ad-hoc nodes, i.e.. access points, forwarding nodes and mobile nodes. This paper presents a topology discovery and routing protocol for the self-organization of SOHAN. We propose a cross-layer path metric based on link quality and MAC delay which plays a key role in producing an optimal cluster-based hierarchical topology with high throughput capacity. The topology discovery protocol provides the basis for routing which takes place in layer 2.5 using MAC addresses. The routing protocol is based on AODV with appropriate modifications to take advantage of the hierarchical topology and interact with the discovery protocol. Simulation results are presented which show the improved performance as well as scalability properties of SOHAN in terms of through-put capacity, end-to-end delay, packet delivery ratio and control overhead.

Log-based Wireless Sensor Network Simulator (로그 기반 무선 센서 네트워크 시뮬레이터)

  • Cho, Min-Hee;Son, Cheol-Su;Kim, Won-Jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.845-848
    • /
    • 2008
  • In case of application test in wireless sensor network, there are many difficulties in power supplying to wireless sensor node, installing and deploying of sensor nodes, maintaining and debugging. For efficient development and maintenance of wireless sensor network-based application, a simulator is essentially needed. However, the existing wireless sensor network simulators are focused to distribution of MAC address, routing, power management, it is not suitable to test the function of application in host which processes message through sink node. In this paper, we designed and implemented a log-based simulator for application running in host connected sink node.

  • PDF

Research of Real Time Mutual Authentication System in Wireless Network (무선 네트워크상에서 실시간 상호인증시스템에 관한 연구)

  • Jung, Don-Chul;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.1996-2001
    • /
    • 2006
  • Open System Authentication Method, Shared Key Method, Mac Based Authentication Method are very hard to use in wireless network that needs security. So now, many researches have been performed about 802.1x and user authentication method applying PKI. but certificate verification protocol has been used abolished list called CRL since it's first usage of PKI, there were still has a problem about distribution point. This paper applied CVS to use CA direct not to use CRL and OSCP server in order to improve this problems. Also It suggested the system that can make authentication steps more shorter using authentication server and Mutual authentication system by public certificate(small size/low speed wireless terminal can access to wireless network fast and safely)

A Study on the Improvement of Wired and Wireless Network Survivability using Integrated IP Management (IP 통합 관리를 통한 유·무선 네트워크의 생존성 향상에 관한 연구)

  • Kim, Si-hung;Koo, Ja-Hwan;Park, Byung-Yeon;Park, Hark-Soo;Choi, Jang-Won;Lee, Jae Young
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.43-50
    • /
    • 2003
  • Computer Communications and networks have been revolutionized by technological advances in the last decade. There has been an increasing interest in the network security because of the growing popularity of Internet and the importance of networking in business area. With this growing interest, Network engineers come to more concern about improving network survivability. In this paper, we suggest the method that improves the survivability of wired and wireless network. To achieve this goal, we propose the integrated IP management with monitoring network nodes in the same network and controlling its activities.

  • PDF

Design of a System for Simultaneously Offering Layer 2 Switching and Layer 3 Routing Based on a Virtual Interface (가상 인터페이스 기반 2 계층 스위칭 및 3 계층 라우팅 동시 제공 시스템 설계)

  • Yoon, Hyeon-Sik;Song, Kwang-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1219-1222
    • /
    • 2005
  • 인터넷상의 망 장비는 크게 2 계층 스위치와 3 계층 라우터로 구분할 수 있으며, 2 계층 스위치는 IEEE 802.1D, IEEE 802.1Q 규격에 따라 수신된 이더넷(Ethernet) 프레임의 목적지 MAC 주소에 기반한 2 계층 스위칭 기능을 제공하며, 3 계층 라우터는 IETF 의 규격에 따라 수신된 이더넷 프레임의 목적지 IP 주소에 기반한 3 계층 라우팅 기능을 제공한다. 하지만 최근에는 기술의 발달에 따라서 엄연히 구분된 두 가지 기능을 하나의 시스템에서 제공하는 것에 대한 요구가 증가하게 되었다. 이에 본 논문에서는 가상 랜(VLAN) 기반의 2 계층 스위치에서 가상 인터페이스 기반의 라우팅 기능을 구현한 후, 라우팅 기능을 원하는 가상 랜 가입자에게 해당 가상 랜을 가상 인터페이스(Virtual Interface)에 맵핑하는 것에 의해서 3 계층 라우팅 기능을 제공하는 시스템 구조 및 제안된 시스템에서의 패킷 처리 절차를 제시하고자 한다. 본 논문에 제시된 방법에 의해서 가입자들은 저렴한 비용으로 인터넷 서비스를 제공받을 수 있으며, 망 사업자는 다른 가상 랜간의 통신을 위한 가상 랜 라우팅(VLAN Routing) 기능을 부가적으로 쉽게 제공할 수 있고, 해당 시스템의 인터페이스를 2 계층 스위치 포트 또는 3 계층 라우터 포트로 융통성있게 설정할 수 있다.

  • PDF