• Title/Summary/Keyword: Network Centric

Search Result 444, Processing Time 0.027 seconds

An Analysis on Data Throughput of PicoCast Affected by Piconet Mutual Interference (피코넷 상호 간섭이 PicoCast 데이터 전송량에 미치는 영향 분석)

  • Chung, Jae-Kyong;Jeon, Sang-Yeop;Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.2
    • /
    • pp.40-49
    • /
    • 2015
  • PicoCast is a recently proposed short-range wireless communications technology that supports both low rate sensor/control data and high speed data such as voice and video traffic in the personal space, defined by the user-centric space of radius tens of meters, with one unified protocol. When the users are in the same area, personal spaces defined by each user may overlap. Since these PicoCast piconets may simultaneously operate, mutual interference is unavoidable. It is necessary to investigate the effect of mutual interference on data transmission and to conduct research on minimizing the interference among PicoCast devices. In this paper we analyze the effect of mutual interference between PicoCast piconets based on data throughput using OPNET network simulator. We have implemented the PicoCast protocol and measured the average throughput and packet loss rate.

A Study on Models for Technical Security Maturity Level Based on SSE-CMM (SSE-CMM 기반 기술적 보안 성숙도 수준 측정 모델 연구)

  • Kim, Jeom Goo;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.25-31
    • /
    • 2012
  • The SSE-CMM model is how to verify the level of information protection as a process-centric information security products, systems and services to develop the ability to assess the organization's development. The CMM is a model for software developers the ability to assess the development of the entire organization, improving the model's maturity level measuring. However, this method of security engineering process improvement and the ability to asses s the individual rather than organizational level to evaluate the ability of the processes are stopped. In this research project based on their existing research information from the technical point of view is to define the maturity level of protection. How to diagnose an information security vulnerabilities, technical security system, verification, and implementation of technical security shall consist of diagnostic status. The proposed methodology, the scope of the work place and the current state of information systems at the level of vulnerability, status, information protection are implemented to assess the level of satisfaction and function. It is possible that measures to improve information security evaluation based on established reference model as a basis for improving information security by utilizing leverage.

Design of the homomorphic encryption system for secure data management in the future battlefield environment (미래 전장환경에서 안전한 데이터 관리를 위한 준동형 시스템 설계)

  • Cha, HyunJong;Kim, JinMook;Ryou, HwangBin
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.51-56
    • /
    • 2014
  • Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.

Interference Influence Analysis on the Interoperability in the Combined Military Communication Systems (통합 군 통신 시스템에서 상호운용으로 인한 간섭 영향 분석)

  • Kim, Tae-Woo;Kim, Jung;Kwag, Young-Kil
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.3
    • /
    • pp.365-371
    • /
    • 2014
  • It is essential for the combined military weapon system to be equipped with interoperability for the efficient combat operation in the modern warfare environment. Since most of modern military systems utilize the electromagnetic wave for the radio communication in the network-centric warfare system, they can be vulnerable to the mutual interference among the adjacent combined military systems. In this paper, the typical radio communication systems are modeled with the modulation types of both spread and non-spread spectrum system. The various interference signals were generated for the simulation of the mutual interference influence from the adjacent radar and communication systems. The simulation results show that the detection performance of the victim communication receiver is seriously affected by the various interferences such as the types of modulation and the ratio of the overlapping bandwidth of the adjacent interferers. This result will be useful for defining the criteria of the interference protection in the combined military system for the interoperability in the future.

Standard Discovery Protocol for Supporting Interoperability between DDS Middlewares (DDS 미들웨어의 상호운용성 제공을 위한 표준 디스커버리 프로토콜)

  • Ahn, Sung-Woo;Choi, Jong-Woo;Choi, Yoon-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.205-208
    • /
    • 2011
  • In recent years, the user interest has increased for DDS (Data Distribution Service) which is a data centric middleware based on publish-subscribe communication as the demands for real-time data exchange in distributed systems have been growing rapidly. To reflect these needs, many vendors and research groups provide their DDS middleware. However, there has been a problem with interoperability between DDS middlewares because of a lack of common communication rules such as the message exchange and the discovery manner. For this reason, OMG defines RTPS (Real-Time Publish-Subscribe) specification which is the standard network protocol used to exchange data between different implementations of DDS. In this paper, we analyze and design the SDP (Simple Discovery Protocol) of RTPS which enable DDS middleware to provide interoperable discovery mechanism.

  • PDF

A Study on the Analysis of U.S.A Navy and R.O.K Military C4I System and Future Development (미해군과 한국군 C4I 체계 분석 및 발전 방향에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Jo, Yong-Gun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.59-66
    • /
    • 2011
  • The representative concept of the future war is NCW. The main point of NCW is that it is connected by networ ks and gathers the battlefield status in real time, managing and controlling it. This is most needed in the navy. Operations of the navy are carried out in wide areas, individually or together. During this process, sharing information between each warship should be essential. Furthermore in the case of the American navy, they see the entire world as the operation area so it is a representative example of NCW. The C4I system of the Korean army is separated a ccording to the difference of each army's tactics and weapon system, being developed and managed differently. The refore there is a problem of interoperability lacking in each system. This paper analyzes the developed C4I system of the American navy to analyze the problems of C4I system of the Korean army, and propose the future direction of its development.

Architecture and Server Selection for DHT-based Distributed CDN (해시 테이블 기반 분산형 CDN 구조 및 서버 선택 방안)

  • Jung, Jong-Hae;Oh, Gun-Young;Lee, Nam-Kyung;Yoon, Chang-Woo;Lee, Hyun-Woo;Ryu, Won;Lee, Sung-Chang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.217-228
    • /
    • 2011
  • In centralize CDN systems, the content server selection is performed by service node for every user request, and the selected node is notified to the user. In this paper, we present distributed CDN architecture and algorithm in which the request from a user is delivered to the content source by a P2P algorithm utilizing DHT(distributed hash table) through the overlay network and the user selects one of the source nodes based on real-time user-centric criteria. For this purpose, we propose a modified Pastry algorithm for contents registration, search and selection, in addition to the distributed architecture. The proposed architecture has the advantages of load balancing, traffic balancing, scalability, fault-tolerance due to the self-configuration, self-healing attributes of distributed architecture. Various simulation shows the feasibility of the proposed architecture and algorithm, and the performance is compared and discussed for the variations of the proposed scheme.

Multiagent Enabled Modeling and Implementation of SCM (멀티에이전트 기반 SCM 모델링 및 구현)

  • Kim Tae Woon;Yang Seong Min;Seo Dae Hee
    • The Journal of Information Systems
    • /
    • v.12 no.2
    • /
    • pp.57-72
    • /
    • 2003
  • The purpose of this paper is to propose the modeling of multiagent based SCM and implement the prototype in the Internet environment. SCM process follows the supply chain operations reference (SCOR) model which has been suggested by Supply Chain Counsil. SCOR model has been positioned to become the industry standard for describing and improving operational process in SCM. Five basic processes, plan, source, matte, deliver and return are defined in the SCOR model, through which a company establishes its supply chain competitive objectives. A supply chain is a world wide network of suppliers, factories, warehouses, distribution centers and retailers through which raw materials are acquired, transformed or manufactured and delivered to customers by autonomous or semiautonomous process. With the pressure from the higher standard of customer compliance, a frequent model change, product complexity and globalization, the combination of supply chain process with an advanced infrastructure in terms of multiagent systems have been highly required. Since SCM is fundamentally concerned with coherence among multiple decision makers, a multiagent framework based on explicit communication between constituent agents such as suppliers, manufacturers, and distributors is a natural choice. Multiagent framework is defined to perform different activities within a supply chain. Dynamic and changing functions of supply chain can be dealt with multi-agent by cooperating with other agents. In the areas of inventory management, remote diagnostics, communications with field workers, order fulfillment including tracking and monitoring, stock visibility, real-time shop floor data collection, asset tracking and warehousing, customer-centric supply chain can be applied and implemented utilizing multiagent. In this paper, for the order processing event between the buyer and seller relationship, multiagent were defined corresponding to the SCOR process. A prototype system was developed and implemented on the actual TCP/IP environment for the purchase order processing event. The implementation result assures that multiagent based SCM enhances the speed, visibility, proactiveness and responsiveness of activities in the supply chain.

  • PDF

An Attribute-Based Naming Architecture for Wireless Sensor Networks (무선 센서 네트워크를 위한 속성 기반 네이밍 구조)

  • Jung, Eui-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.95-102
    • /
    • 2007
  • Recently, a lot of researchers focus on the sensor middleware that hide the complexity of application developments and provide the abstraction of functions to upper application layer. Although there we several factors to design sensor middleware, the attribute-based naming is considered to be an essential factor among them. However, most existing researches were not designed to reflect the characteristics of sensor networks and have the limitation of attribute-based query extension. This study adopts the concept of Virtual Counterpart to suggest the structure there attribute-based naming is supported by virtual sensor nodes of the middleware on the sink node. Unlike traditional data-centric middleware in which individual sensor nodes process attribute-based query, virtual sensor nodes mapped to physical sensor nodes are running on the middleware of the sink node and process attribute-based query as a proxy of the physical sensor. This approach enables attribute-based naming independent of physical infrastructure and easy extensibility.

  • PDF

The impact of the Formation Factor of Loyalty Of Mongolian Consumers Attitudes toward M-Commerce

  • Altanzul, Ganbaatar;Lee, Dong-Man
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.135-140
    • /
    • 2008
  • Recently in the Mongolian wireless marketplace, many E-commerce companies have been making considerable investments in the technological development of M-commerce, taking competitive advantage of new business possibilities offered by Internet-based wireless technologies. In the Mongolian wireless marketplace, this new mobile environment opens the door for new and exciting market opportunities in mobile services and applications. In the near future, these companies will be looking toward M-commerce services as a supplemental source of revenue in the mobile marketplace. This paper examines the roles of M-commerce in the consumers' in order to promote the consumers' loyalty in the booming M-commerce. This paper contains theory that focuses on the basic concepts of the M-commerce environment, its wireless network technologies, and its applications infrastructure. Upon searching for references to assist us in establishing a market hypothesis, we discovered that few comprehensive studies on consumer perspective and behavior related to M-commerce services actually exist in the literature. In the area of M-commerce, many companies neglect the consumer perspective, concentrating only on technological factors only when formulating their market strategies. And, due to technological blindness, many companies were not able to succeed in end-user E-commerce services. Given that fact, this paper formulates a consumer-centric research model. In order to prove the research model, we chose the survey method which allows for the collection of large amounts of data from a sizeable population in a highly economical way. Through the survey, this paper defines consumer's attitudes towards M-commerce services by identifying potential Business-to-Commerce(B2C) applications and its primary target groups in terms of gender and age, and by investigating whether consumers recognize the value proposition of M-commerce applications and services. As shown in the data analysis and results, this research concludes that M-commerce development in Mongolia is still at its infancy, and that the implementation of M-commerce depends not only on technological progress, but also on consumer attitudes and their willingness to adopt M-commerce services. As well, other complex cross-cultural factors-socially, economically, culturally, et cetera-enter strongly into the equation.

  • PDF