• Title/Summary/Keyword: Network

Search Result 58,991, Processing Time 0.059 seconds

A Remote Password Authentication scheme for Multiple Centers on Network (네트워크내의 다중센타를 위한 원격 암호 인증기법)

  • Jo, In-June
    • The Journal of Natural Sciences
    • /
    • v.8 no.1
    • /
    • pp.131-136
    • /
    • 1995
  • In this paper, We propose an efficient remote password authentication scheme that enables network users to access and open distributed network. Our authentication Scheme provides a pair of a center-supplied password and a user key for a network user. The center-supplied password is generated on the center, and the user key can be chosen by the network user. Each network user can access multiple centers through the open and distributed network by using single super smart card. The passwords generated by network centers are sent to the network users via secure channel, and put into their own supper smart card by themselves.

  • PDF

Analysis of a Departure Process on the Population Constrained Tandem Queueing Network with Constant Service Times (사용자수 제한과 상수 서비스시간을 갖는 개방형 대기행렬의 출력 프로세스에 관한 연구)

  • Young Rhee
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.25 no.1
    • /
    • pp.15-26
    • /
    • 2000
  • We consider an open tandem queueing network with population constraint and constant service times. The total number of customers that may be present in the network can not exceed a given value k. Customers arriving at the queueing network when there are more than k customers are forced to walt in an external queue. The arrival process to the queueing network is assumed to be arbitrary. It is known that the queueing network with population constrant and constant service times can be transformed into a simple network involving only two nodes. In this paper, the departure process from the queueing network is examined using this simple network. An approximation can be calculated with accuracy. Finally, validations against simulation data establish the tightness of these.

  • PDF

A Resource Management Scheme in Heterogeneous Access Network Architectures (이종 액세스 네트워크 구조에서 자원관리 방안)

  • Park, Sang-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.2
    • /
    • pp.83-92
    • /
    • 2005
  • Access networks connected in B3G networks provide its property network service. Hence, though mobile users may utilize only a network service from an access network, they can also use variety of network services from several access networks for their service satisfaction. To support heterogeneous changeable network service in access networks, the mobile terminal must implement heterogeneous system techniques so that it is able to change the network service by ISHO (Inter-System Handover) In this paper, we present the ISHO condition by the policy-based framework in B3G networks. Also, we propose an ISHO scheme to control network resources for the QoS management of a mobile session between UMTS and WLAN access networks. To support the QoS management, the proposed scheme is that it will be implemented before the resource exhaustion occurs to effect network performances.

  • PDF

A Reaction Scheme supporting the Reliable Service in Mobile Networks (이동망에서 서비스 보장을 위한 대응방안)

  • 박상준
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.2
    • /
    • pp.65-73
    • /
    • 2004
  • The capability to provide the network service must survive even if a significant network system element is disrupted. To sustain the network service under the system failure, network survivability mechanisms minimizing the impact of failures are needed. Also, since the mobile network has its unique characteristic, the survivability scheme for the vulnerability of the mobile network is required. This paper proposes a survivability scheme to support the reliable service of the wireless access point level (BS-base station system). By the survivability scheme, the mobile network can use an overlap BS of the cellular network architecture after a BS system failure. We analyze the performance of the proposed scheme using Markov model. Also, a computer simulation is used for the scheme analysis. The proposed scheme shows that the service of the mobile network can be provided under the BS system failure.

  • PDF

Signaling and Control Procedures Using Generalized MPLS Protocol for IP over an Optical Network

  • Um, Tai-Won;Choi, Jun-Kyun;Kim, Young-Ae;Lee, Hyeong-Ho;Jung, Hae-Won;Jong, Sang-Gug
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.69-81
    • /
    • 2002
  • This paper reviews the existing research activities on signaling and control procedures for IP over optical networks. We focus on the IP-centric signaling and control architecture based on the generalized multi-protocol label switching (GMPLS) protocol and analyze various scenarios and technical issues for deploying the IP over an optical network. We analyze the signaling and operations and administration and maintenance requirements for integrating an IP network and an optical network in order to cope with the high bandwidth and poor resource granularity of the optical network, including the optical cross-connect system. On the basis of network architecture and a reference configuration model, we investigate the GMPLS-based control architecture and interconnection model appropriate for controlling IP bandwidth and optical lambda resources. The signaling and control procedure based on GMPLS on optical user-network interface and network-network interface are comparatively investigated to provide the optical lightpath. We also study protection and restoration procedures to protect link failure when it applies to generalized MPLS signaling.

  • PDF

Embodiment of network printer system for multi OS (서로 다른 운영체제를 위한 Network Printer System의 구현)

  • Cha, Kyung-Hwan;Seo, Byeong-Eun;Yu, Young-Seok;Sin, Hyun-Sil
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.957-958
    • /
    • 2006
  • PC users could experience some inconvenience when they use their PC that was physically connected to network printers shared by other people in the network due to the overload. This paper shows how to resolve this kind of overload problem and established the embedded printer system based on embedded Linux system which performs the printer server in order for any users in the office to do printing work more smoothly via current network. It's own capabilities and functions were verified throughout the various tests in practical environment.

  • PDF

Optical Super-highway Network Maintenance and System Trends (초고속통신망 광케이블의 유지보수 및 시스템 발전방향)

  • Choi, Shin-Ho;Lee, Byeong-Wook;Park, Kap-Seok;Jang, Eun-Sang;Kim, Seong-Il
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2495-2497
    • /
    • 1998
  • Fiber optic facilities are increasingly being deployed in loop applications for both busines and residential areas. These facilities support a variety of communications services that include high speed data and video using leading technologies such as Synchronous Optical Network (SONET), Wavelength Division Multiplexing(WDM). This proliferation of fiber optic facilities combined with the increasing pressure on network operators to reduce costs are fostering increased automation to reduce labor costs associated with providing and maintaining communications services. Effective fiber management and accurate records can improve the reliability and integrity of the future telecommunications networks and the quality of customer services. This paper describes the trend forward and the need for the deployment of Fiber Administration System (FAS) into the operations enviroment of a typical network provider.

  • PDF

An Efficient Network Attack Visualization Using Security Quad and Cube

  • Chang, Beom-Hwan;Jeong, Chi-Yoon
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.770-779
    • /
    • 2011
  • Security quad and cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated in the security devices; however, it takes a lot of time to inspect and analyze them because the security devices generate an overwhelming amount of logs and security events. In this paper, we propose SQC, an efficient method for analyzing network security through visualization. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacks. In addition, by providing a detailed analysis of network attacks, this method can more precisely detect and distinguish them from normal events.

The new ICP state for the embedded network agent (내장형 Network Agent를 위한 새로운 TCP state의 제안)

  • 정진규;안광혁;진선일;홍석교;유영동
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.379-382
    • /
    • 2002
  • This paper describes an experiment on the embedded network agent. The embedded network agent is the device that will enable other devices to communicate over the Internet. Many devices have no way to communicate with other devices over the Internet The embedded network agent extends the stand-alone devices that have no TCP/IP protocol suite to the Internet, the global networks, without any hardware and software. To support the better efficiency, this parer proffers new TCP state diagram of the embedded network agent. This TCP state on the embedded network agent considers the status of the common devices behind the embedded network agent. Because of this consideration, the embedded network agent tenders an improved result to user.

  • PDF

A Study on Network Load Management in MANET (MANET 환경에서의 네트워크 부하관리에 관한 연구)

  • Kang, Kyeong-In;Bae, Park-Kyong;Jung, Chan-Hyeok
    • Journal of IKEEE
    • /
    • v.7 no.2 s.13
    • /
    • pp.127-134
    • /
    • 2003
  • Ad Hoc Networks, autonomous distributed network using routing scheme, does not operate properly owing to multi flow service when network load increases at specific network node. In this paper, we suggest traffic management routing protocol in Ad Hoc Network to reduce network traffic congestion and distribute network load in data transmission. Through test results of proposed algorithm under NS(Network Simulator)simulator environments . we acquired reduced network load and increased data transmission rate.

  • PDF