• 제목/요약/키워드: Network Architecture

검색결과 3,658건 처리시간 0.029초

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.

확장형 IPTV 아키텍처 구성을 위한 IPTV 네트워크 인프라스트럭쳐 연구 (An IPTV Network Infrastructure for Organizing an Extendible IPTV Architecture)

  • 정성욱
    • 한국정보전자통신기술학회논문지
    • /
    • 제9권5호
    • /
    • pp.465-471
    • /
    • 2016
  • IPTV의 실시간 멀티미디어 컨텐츠 공유를 위해서는 안정적인 네트워크망과 멀티미디어 사용자 단말이 필요하다. 따라서 FC-AL과 IPTV STB를 이용하여 실시간 고화질 IPTV 컨텐츠 공유 아키텍처를 구성할 수 있지만, 프로토콜의 제한성으로 일정수 이상의 크기를 가진 커뮤니티 네트워크를 구성하기에는 어려움이 있다. 따라서 본 논문에서는 FC Switch를 활용하는 확장가능한 FC-AL 다중루프 기반의 IPTV 컨텐츠 공유 아키텍처를 제안한다. 제안된 아키텍처는 15 msec이하의 우수한 시작지연 시간을 보여주며, 루프수를 증가함에 따라 선형증가하는 공유 IPTV 프로그램수를 보여준다. 또한, 실험을 통하여 다중루프에서의 우수한 시간이동 서비스를 지원함을 보여준다.

신경망을 이용한 유조선 기름 유출사고에 따른 환경비용 추정에 관한 연구 (Estimation of Environmental Costs Based on Size of Oil Tanker Involved in Accident using Neural Network)

  • 신성철;배정훈;김현수;김성훈;김수영;이종갑
    • 한국해양공학회지
    • /
    • 제26권1호
    • /
    • pp.60-63
    • /
    • 2012
  • The accident risks in the marine environment are increasing because of the tendency to build faster and larger ships. To secure ship safety, risk-based ship design (RBSD) was recently suggested based on a formal safety assessment (FSA). In the process of RBSD, a ship designer decides which risk reduction option is most cost-effective in the design stage using a cost-benefit analysis (CBA). There are three dimensions of risk in this CBA: fatality, environment, and asset. In this paper, we present an approach to estimate the environmental costs based on the size of an oil tanker involved in an accident using a neural network. An appropriate neural network model is suggested for the estimation,and the neural network is trained using IOPCF data. Finally,the learned neural network is compared with the cost regression equation by IMO MEPC 62/WP.13 (2011).

HiMang: Highly Manageable Network and Service Architecture for New Generation

  • Choi, Tae-Sang;Lee, Tae-Ho;Kodirov, Nodir;Lee, Jae-Gi;Kim, Do-Yeon;Kang, Joon-Myung;Kim, Sung-Su;Strassner, John;Hong, James Won-Ki
    • Journal of Communications and Networks
    • /
    • 제13권6호
    • /
    • pp.552-566
    • /
    • 2011
  • The Internet is a very successful modern technology and is considered to be one of the most important means of communication. Despite that success, fundamental architectural and business limitations exist in the Internet's design. Among these limitations, we focus on a specific issue, the lack of manageability, in this paper. Although it is generally understood that management is a significant and important part of network and service design, it has not been considered as an integral part in their design phase. We address this problem with our future Internet management architecture called highly manageable network and service architecture for new generation (HiMang), which is a novel architecture that aims at integrating management capabilities into network and service design. HiMang is highly manageable in the sense that it is autonomous, scalable, robust, and evolutionary while reducing the complexity of network management. Unlike any other management framework, HiMang provides management support for the revolutionary networks of the future while maintaining backward compatibility for existing networks.

ISDN용 전화가입자 - 망 간 접속에 관한 연구 -제 1 부 : ISDN용 회선 교환 Emulator구성에 관한 연구- (A Study on the ISDN Telephone User-Network Interface -Part 1: A Study on the Implementation of A Circuit Switching Emulator for ISDN-)

  • 박영덕;장진상;김영철;조규섭;박병철
    • 한국통신학회논문지
    • /
    • 제12권1호
    • /
    • pp.60-70
    • /
    • 1987
  • 근래 통신망의 발전 추세는 모든 서어비스를 종합적으로 처리해 줄 수 있는 ISDN으로 급속한 발전을 계속하고 있다. ISDN관련 연구는 다양한 분야가 있으나 그 중에서도 통신망의 중추가 될 교환기 및 가입자 전송 방식 즉 ISDN가입자/망 간 접속에 관한 연구가 커다란 비중을 차지하고 있다. 본 논문을 ISDN교환기 관련 권고안에 따른 ISDN교환기 구조에 대해 연구를 진행하였으며, 이에 기초한 ISDN용 교환 emulator를 설계 제작하여 봄으로서 가입자/망 간 신호 방식인 LAPD(Link Access Procedure on D-Channel), CCP(Call Control Procedure)등 ISDN에 필요한 교환기 관련 사항을 연구분석하였다.

  • PDF

온칩 네트워크 기반 멀티미디어 비디오 코덱 성능 분석 (Performance Analysis for Multimedia Video Codec on On-Chip Network)

  • 장준영;김원종;변경진;엄낙웅
    • 스마트미디어저널
    • /
    • 제1권1호
    • /
    • pp.27-35
    • /
    • 2012
  • 본 논문은 온칩 네트워크 기반 플랫폼을 이용한 멀티미디어 비디오 코덱의 성능 분석에 대해 기술한다. 최근에 멀티미디어 SoC 통신 구조로 등장한 온칩 네트워크(On-Chip Network)는 기존의 SoC 설계에 사용된 온칩 버스(On-Chip Bus) 구조의 문제점을 해결하는 통신 구조로서 데이터 통신의 병렬성 제공으로 인한 고성능, 재사용성, 확장성을 제공하는 통신 구조이다. 온칩 네트워크 기반 MPEG-4, H.264의 성능과 온칩 버스와 성능을 비교 분석하였다. 실험 결과, 온칩 네트워크 기반 MPEG-4, H.264의 성능이 온칩 버스에 비해 33~56%의 성능이 개선되었다.

  • PDF

SELFCON: An Architecture for Self-Configuration of Networks

  • Boutaba, Raouf;Omari, Salima;Singh Virk, Ajay Pal
    • Journal of Communications and Networks
    • /
    • 제3권4호
    • /
    • pp.317-323
    • /
    • 2001
  • Traditional configuration management involves complex labor-intensive processes performed by experts. The configuration tasks such as installing or reconfiguring a system, provisioning network services and allocating resources typically involve a large number of activities involving multiple network elements. The network elements may be associated with proprietary configuration management instrumentation and may also be spread across heterogeneous network domains thereby increasing the complexity of configuration management. This paper introduces an architecture for the self-configuration of networks (SELFCON). The proposed architecture involves a directory server, which is uses to maintain configuration information. The configuration information stared in the directory server is modeled using the standard DEN specification thereby allowing effective exchange of network, system and configuration management data among heterogeneous management domains. SELFCON associates configuration intelligence with the components of the network, rather than limit it to a centralized management station. The network elements are notified about related changes in configuration policies, based upon which, they perform self-configuration. SELFCON is able to provide automation of configuration management and also an effective unifying framework for enterprise management.

  • PDF

Optimal Video Streaming Based on Delivery Information Sharing in Hybrid CDN/P2P Architecture

  • Lee, Jun Pyo;Lee, Won Joo;Lee, Kang-Ho
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권9호
    • /
    • pp.35-42
    • /
    • 2018
  • In this paper, we propose an optimal streaming service method based on Hybrid CDN/P2P architecture. Recently, video streaming utilizes a CDN (Content Delivery Network) operation technique based on a Proxy Server, which is an end node located close to a user. However, since CDN has a fixed network traffic bandwidth and data information exchange among CDNs in the network is not smooth, it is difficult to guarantee traffic congestion and quality of image service. In the hybrid CDN/P2P network, a data selection technique is used to select only the data that is expected to be continuously requested among all the data in order to guarantee the QoS of the user who utilizes the limited bandwidth efficiently. In order to search user requested data, this technique effectively retrieves the storage information of the constituent nodes of CDN and P2P, and stores the new image information and calculates the deletion priority based on the request possibility as needed. Therefore, the streaming service scheme proposed in this paper can effectively improve the quality of the video streaming service on the network.

Self-Imitation Learning을 이용한 개선된 Deep Q-Network 알고리즘 (Improved Deep Q-Network Algorithm Using Self-Imitation Learning)

  • 선우영민;이원창
    • 전기전자학회논문지
    • /
    • 제25권4호
    • /
    • pp.644-649
    • /
    • 2021
  • Self-Imitation Learning은 간단한 비활성 정책 actor-critic 알고리즘으로써 에이전트가 과거의 좋은 경험을 활용하여 최적의 정책을 찾을 수 있도록 해준다. 그리고 actor-critic 구조를 갖는 강화학습 알고리즘에 결합되어 다양한 환경들에서 알고리즘의 상당한 개선을 보여주었다. 하지만 Self-Imitation Learning이 강화학습에 큰 도움을 준다고 하더라도 그 적용 분야는 actor-critic architecture를 가지는 강화학습 알고리즘으로 제한되어 있다. 본 논문에서 Self-Imitation Learning의 알고리즘을 가치 기반 강화학습 알고리즘인 DQN에 적용하는 방법을 제안하고, Self-Imitation Learning이 적용된 DQN 알고리즘의 학습을 다양한 환경에서 진행한다. 아울러 그 결과를 기존의 결과와 비교함으로써 Self-Imitation Leaning이 DQN에도 적용될 수 있으며 DQN의 성능을 개선할 수 있음을 보인다.

Optimization of Cyber-Attack Detection Using the Deep Learning Network

  • Duong, Lai Van
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.159-168
    • /
    • 2021
  • Detecting cyber-attacks using machine learning or deep learning is being studied and applied widely in network intrusion detection systems. We noticed that the application of deep learning algorithms yielded many good results. However, because each deep learning model has different architecture and characteristics with certain advantages and disadvantages, so those deep learning models are only suitable for specific datasets or features. In this paper, in order to optimize the process of detecting cyber-attacks, we propose the idea of building a new deep learning network model based on the association and combination of individual deep learning models. In particular, based on the architecture of 2 deep learning models: Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM), we combine them into a combined deep learning network for detecting cyber-attacks based on network traffic. The experimental results in Section IV.D have demonstrated that our proposal using the CNN-LSTM deep learning model for detecting cyber-attacks based on network traffic is completely correct because the results of this model are much better than some individual deep learning models on all measures.