• 제목/요약/키워드: NETWORK

검색결과 58,662건 처리시간 0.061초

Practical Schemes for Tunable Secure Network Coding

  • Liu, Guangjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1193-1209
    • /
    • 2015
  • Network coding is promising to maximize network throughput and improve the resilience to random network failures in various networking systems. In this paper, the problem of providing efficient confidentiality for practical network coding system against a global eavesdropper (with full eavesdropping capabilities to the network) is considered. By exploiting a novel combination between the construction technique of systematic Maximum Distance Separable (MDS) erasure coding and traditional cryptographic approach, two efficient schemes are proposed that can achieve the maximum possible rate and minimum encryption overhead respectively on top of any communication network or underlying linear network code. Every generation is first subjected to an encoding by a particular matrix generated by two (or three) Vandermonde matrices, and then parts of coded vectors (or secret symbols) are encrypted before transmitting. The proposed schemes are characterized by tunable and measurable degrees of security and also shown to be of low overhead in computation and bandwidth.

시스템사고에 근거한 지역아동센터의 지역사회 연계 활성화방안 (Measures to Activate the Community Network of Community Child Centers Based on the Systems Thinking)

  • 조성숙
    • 한국시스템다이내믹스연구
    • /
    • 제16권2호
    • /
    • pp.33-52
    • /
    • 2015
  • This study aims to comprehensively understand the dynamics of the community network of Community Child Centers and further find out the measures to activate its community network based on the Systems Thinking. The contents of the study are as follows. Firstly, it examines the existing studies on the community network of Community Child Centers and presents the major variables to understand the situation of its community network. Secondly, it analyzes the structure of its causation in order to understand the dynamics of its community network. Lastly, it concludes with the suggestions to activate its community network based on its feedback structure presented in the causal loop diagrams. This study is expected to make a useful and basic material as the first research to dynamically understand the community network issue of the Community Child Centers.

BcN 제어망의 설계 프로세스 및 설계툴을 활용한 설계 예제 (Design Process of BcN Control Network and a Case Study Using a Network Design System)

  • 최정열;이재봉;우신정;심병권
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2007년도 학술대회
    • /
    • pp.341-345
    • /
    • 2007
  • Broadband Convergence Network (BcN) can provide a range of quality guaranteed broadband multimedia services through packet-based converged transport network. For providing new emerging application services in due season over BcN, it is important for network designers or planners to develop a new design methodology for BcN, which differs from legacy design processes applied to a single service network. This paper thus introduces a new design concept and detailed design processes for KT-BcN. We also present a design example of BcN control network using a design system that we have developed.

  • PDF

BcN 적합형 액세스네트워크 구조 (The Access Network Architecture for BcN Adapted)

  • 이상문
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2007년도 학술대회
    • /
    • pp.121-124
    • /
    • 2007
  • This article describes a function and structure of access network equipment under BcN environment. Access network until now have constructed separately to offer voice, data service. However, simplifies network structure, function that can do traffic concentration, subscriber certification, individual charging, QoS according to service and routing is required in BcN. In this paper, compare method offering by separate system with existing access network and method that offer integrating function inside system for structure of suitable access network to BcN and search structure of access network equipment for desirable access network of hereafter. Composition of this paper is as following. In Chapter 2, establishment history and structure of access network until present. In Chaprte 3, define suitable requirement and functions to BcN. And compare structure for access net work that is new with present. Last Chapter 4, suggests direction of structure of BcN access network and concludes conclusion.

  • PDF

U-TURN을 포함한 가로망 표현 및 최단경로의 구현 (Network Representation Schemes for U-TURN and Implementation in the Vine-Based Dijkstra Shortest Path Algorithm)

  • 최기주
    • 대한교통학회지
    • /
    • 제13권3호
    • /
    • pp.35-52
    • /
    • 1995
  • This paper reviews both network representation schemes of transportation network and algorithms for findings the shortest path between two points in the network. Two types of network representation schmes for considering U-Turn have been proposed along with some modifications of the vine-based Dijkstra shoretest path algorithm. The traditional Sioux-Fall network has been chosen and modified with the introduction of left-turn prohibitions and U-Turns for the purpose of evaluating the peroformance of two modified algorithms and network representation schemes(NA1 an d NA2 ). This type of modification in both network representation scheme (including network data) and algorithms is not only supposed to be needed for route guidance but supposed to contribute to finding more realistic path and estimating more accurate traffic voulume thorughout the entire network.

  • PDF

GIS를 이용한 네트워트 최적화 시스템 구축 (An implementation of network optimaization system using GIS)

  • 박찬규;이상욱;박순달;성기석;진희채
    • 경영과학
    • /
    • 제17권1호
    • /
    • pp.55-64
    • /
    • 2000
  • By managing not only geographical information but also various kinds of attribute data. GIS presents useful information for decision-makings. Most of decision-making problems using GIS can be formulated into network-optimization problems. In this study we deal with the implementation of network optimization system that extracts data from the database in GIS. solves a network optimization problem and present optimal solutions through GIS' graphical user interface. We design a nitwork optimization system and present some implementation techniques by showing a prototype of the network optimization system. Our network optimization system consists of three components : the interface module for user and GIS the basic network the program module the advanced network optimization program module. To handle large-scale networks the program module including various techniques for large sparse networks is also considered, For the implementation of the network optimization system we consider two approaches : the method using script languages supported by GIS and the method using client tools of GIS. Finally some execution results displayed by the prototype version of network optimization system are given.

  • PDF

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF

위성 DMB Dual Mode 신호전송에 따른 신호변환 Delay 측정 방법에 관한 연구 (The Study of Measuring Method for Signal Processing Delay to Dual Mode Signal Transmission for Satellite DMB System)

  • 이영수;최경호;이병석;조성민;임종태
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2004년도 하계학술대회
    • /
    • pp.31-34
    • /
    • 2004
  • 본 논문에서는 현재 위성 DMB 국내 표준으로 채택되어 있는 System E 방식의 Dual Mode 신호 전송에 따른 신호변환시 Time Delay측정 방법에 대해서 제안을 하였다. 제안된 방식의 경우 아날로그 방식이 아닌 디지털 방식으로 정확한 Time Delay 측정이 가능하다. 그리고 위성 DMB Gap Filler System의 입 출력 단자를 통하여 측정이 가능함으로 측정값에 대한 신뢰성 확보가 가능하며 자동측정 방식임으로 측정시 발생될 수 있는 Human Error를 최소화 할 수 있다는 장점을 가지고 있다.

  • PDF

Prevention of DDoS Attacks for Enterprise Network Based on Traceback and Network Traffic Analysis

  • Ma, Yun-Ji;Baek, Hyun-Chul;Kim, Chang-Geun;Kim, Sang-Bok
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.157-163
    • /
    • 2009
  • With the wide usage of internet in many fields, networks are being exposed to many security threats, such as DDoS attack and worm/virus. For enterprise network, prevention failure of network security causes the revealing of commercial information or interruption of network services. In this paper, we propose a method of prevention of DDoS attacks for enterprise network based on traceback and network traffic analysis. The model of traceback implements the detection of IP spoofing attacks by the cooperation of trusted adjacent host, and the method of network traffic analysis implements the detection of DDoS attacks by analyzing the traffic characteristic. Moreover, we present the result of the experiments, and compare the method with other methods. The result demonstrates that the method can effectively detect and block DDoS attacks and IP spoofing attacks.

차량 내 네트워크 기술 (In-Vehicle Network Technologies)

  • 이성수
    • 전기전자학회논문지
    • /
    • 제22권2호
    • /
    • pp.518-521
    • /
    • 2018
  • 차량 내부의 다양한 전자장치를 연결하는 차량 내 통신(IVN: in-vehicle network)은 실시간성, 저잡음성, 고신뢰성, 고유연성 등이 필요하며 CAN(controller area network), CAN-FD(CAN flexible data rate), FlexRay, LIN(local interconnect network), SENT(single edge nibble transmission), PSI5(peripheral sensor interface 5) 등 다양한 기술이 있다. 본 논문에서는 이들 기술의 동작 원리에 대해 살펴보고 각 기술의 적용 대상과 장단점에 대해 설명한다.