• Title/Summary/Keyword: Network equipment

Search Result 1,247, Processing Time 0.022 seconds

Vibration Analysis of Network Communication Equipment (네트워크 통신장비의 진동 해석)

  • Lee Jae-Hwan;Kim Jin-Sup;Kim Young-Jung
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2006.04a
    • /
    • pp.467-472
    • /
    • 2006
  • The purpose of this paper is to check the structural safety of the network equipments by performing the static and dynamic finite element analysis. The stress and displacement of structures under static loading condition are evaluated to check whether satisfying the design requirement conditions. Since the computed natural frequencies are similar to the results of experiment. the model could be used for the response spectrum analysis where experimental acceleration value at each frequency are used as seismic input excitation. It is shown that the analysis results are a little bit larger than that of the experimental values. Also sensitivity analysis and optimization for the natural frequency are performed and it is found that the first natural frequency is very sensitive to the stiffness of the equipment.

  • PDF

Neural Network Time Series Modeling of Sensor Information of Plasma Deposition Equipment (플라즈마 증착 장비 센서 정보의 신경망 시계열 모델링)

  • Kim, You-Seok;Kim, Byung-Whan;Kwon, Gi-Chung;Han, Jeong-Hoon;Shon, Jong-Won
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.102-104
    • /
    • 2006
  • Auto-Correlated time series (ATS) model was constructed by using the backpropagation neural network. The performance of ATS model was evaluated with sensor information collected from a large volume, industrial plasma-enhanced chemical vapor deposition system. A total of 18 sensor information were collected. The effect of inclusion of past and future information were examined. For all but three sensor information with a large data variance demonstrated a prediction error less than 4%. By integrating ATS model into equipment software, process quality can be more stringently monitored while improving device throughput.

  • PDF

Analyzing Technology Competitiveness by Country in the Semiconductor Cleaning Equipment Sector Using Quantitative Indices and Co-Classification Network (특허의 정량적 지표와 동시분류 네트워크를 활용한 반도체 세정장비 분야 국가별 기술경쟁력 분석)

  • Yoon, Seok Hoon;Ji, Ilyong
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.85-93
    • /
    • 2019
  • Despite its matchless position in the global semiconductor industry, Korea has not distinguished itself in the semiconductor equipment sector. Semiconductor cleaning equipment is one of the semiconductor fabrication equipment, and it is expected to be more important along with the advancement of semiconductor fabrication processes. This study attempts to analyze technology competitiveness of major countries in the sector including Korea, and explore specialty sub-areas of the countries. For this purpose, we collected patents of semiconductor cleaning equipment during the last 10 years from the US patent database, and implemented quantitative patent analysis and co-classification network analysis. The result shows that, the US and Japan have been leading the technological progress in this sector, and Korea's competitiveness has lagged behind not only the leading countries but also its competitors and even latecomers. Therefore, intensive R&D and developing technological capabilities are needed for advancing the country's competitiveness in the sector.

Strengthening Authentication Through Content Centric Networking

  • Kim, Sung-Jin;Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.75-82
    • /
    • 2017
  • While the internet has evolved in terms of information sharing and efficiency, it is still prone to security attacks and remains vulnerable even when equipped with a security mechanism. Repeated patching against hacks involves excessive wear of system equipment and high costs. Methods of improving network security include the introduction of security equipment and network partitions, but they have not been fully effective. A fundamental solution is the Operation Content Network (OCN), which enables the strengthening of authentication. In this paper, Instead of following the existing TCP/IP system, OCN establishes an immunity-based security system through content-centric communications. Data transmission occurs over a Content Centric Network (CCN), which is provided with a protocol verified by the CCNx group. Areas protected by OCN rely only on CCN for communication without using any IP. As such, it defends the system against unknown attacks, including zero-day attacks.

Verification Methods of ATE for TICN System (전술정보통신체계 ATE 유효성 검증 방안)

  • Bak, HyeonJeong;Kim, JinSung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.4
    • /
    • pp.17-27
    • /
    • 2020
  • In this paper, we proposed verification methods to prove the effectiveness of automatic test equipment (ATE) for weapon systems. Since the test results from the unproven ATE is not reliable and its use is limited as objective data, it is essential to verify the test equipment in order to guarantee the quality level of the unit under test (UUT). Through the suggested methods, it is applied to the ATE of the tactical information communications network (TICN) system to confirm the verification results and to describe the validation results.

A Study on IEEE 802.15.4 for wireless Communication of Data in the Factory Automation System (공장자동화시스템에서 데이터 송수신의 무선화를 위한 IEEE 802.15.4에 관한 연구)

  • Lee, Hye-Rim;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.238-243
    • /
    • 2009
  • Now, the production process systems are largely based on automatic system using the wired network. The production process systems using wired network has disadvantage that it is expensive when the installed and replaced equipment. The each equipment happens to repair cost for control and management in production processes. And the replaced equipment has also the additional expense and breaks production process. These problems are solved through wireless communication between the industrial equipments. So, we propose wireless production process system based on IEEE 802.15.4 technology. It solves a complicated space and stops by replaced equipment in the factory. Then we simulated and analyzed IEEE 802.15.4 for Industrial Equipment based on Wireless Network.

  • PDF

Vulnerability Analysis of Network Communication Device by Intentional Electromagnetic Interference Radiation (IEMI 복사에 의한 네트워크 통신 장비의 취약성 분석)

  • Seo, Chang-Su;Huh, Chang-Su;Lee, Sung-Woo;Jin, In-Young
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.31 no.1
    • /
    • pp.44-49
    • /
    • 2018
  • This study analyzed the Vulnerability of Network Communication devices when IEMI is coupled with the Network System. An Ultra Wide Band Generator (180 kV, 700 MHz) was used as the IEMI source. The EUTs are the Switch Hub and Workstation, which are used to configure the network system. The network system was monitored through the LAN system configuration, to confirm a malfunction of the network device. The results of the experiment indicate that a malfunction of the network occurs as the electric field increases. The data loss rate increases proportionally with increasing radiating time. In the case of the Switch Hub, the threshold electric field value was 10 kV/m for all conditions used in this experiment. The threshold point causing malfunction was influenced only by the electric field value. The correlation between the threshold point and pulse repetition rate was not found. However, in case of the Workstation, it was found that as the pulse repetition rate increases, the equipment responds weakly and the threshold value decreases. To verify the electrical coupling of the EUT by IEMI, current sensors were used to measure the PCB line inside the EUT and network line coupling current. As a result of the measurement, it can be inferred that when the coupling current due to IEMI exceeds the threshold value, it flows through the internal equipment line, causing a malfunction and subsequent failure. The results of this study can be applied to basic data for equipment protection, and effect analysis of intentional electromagnetic interference.

Enhancement of Internal Network Security in Small Networks Using UTM and ELK Stack (UTM과 ELK Stack을 활용한 소규모 네트워크의 내부망 보안 강화방안)

  • Song Ha Min;DongHwi Lee
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.3-9
    • /
    • 2024
  • Currently, cyberattacks and security threats are constantly evolving, and organizations need quick and efficient security response methods. This paper proposes ways to strengthen internal network security by utilizing Unified Threat Management (UTM) equipment to improve network security and effectively manage and analyze the log data of the internal network collected through these equipment using Elastic Stack (Elasticsearch, Logstash, Kibana, hereinafter referred to as ELK Stack).

A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow (Netflow를 활용한 대규모 서비스망 불법 접속 추적 모델 연구)

  • Lee, Taek-Hyun;Park, WonHyung;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.11-18
    • /
    • 2021
  • To protect tangible and intangible assets, most of the companies are conducting information protection monitoring by using various security equipment in the IT service network. As the security equipment that needs to be protected increases in the process of upgrading and expanding the service network, it is difficult to monitor the possible exposure to the attack for the entire service network. As a countermeasure to this, various studies have been conducted to detect external attacks and illegal communication of equipment, but studies on effective monitoring of the open service ports and construction of illegal communication monitoring system for large-scale service networks are insufficient. In this study, we propose a framework that can monitor information leakage and illegal communication attempts in a wide range of service networks without large-scale investment by analyzing 'Netflow statistical information' of backbone network equipment, which is the gateway to the entire data flow of the IT service network. By using machine learning algorithms to the Netfllow data, we could obtain the high classification accuracy of 94% in identifying whether the Telnet service port of operating equipment is open or not, and we could track the illegal communication of the damaged equipment by using the illegal communication history of the damaged equipment.

The Design of a Link Aggregation Equipment Based on Packet Processing with Network Security Capability (네트워크 보안 기능을 갖는 패킷처리 기반의 링크 통합 장비 설계)

  • Shin, Jae-Heung;Kim, Hong-Ryul;Lee, Sang-Ha;Hur, Yong-Min;Lee, Sang-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.60 no.3
    • /
    • pp.150-154
    • /
    • 2011
  • The technology to build high speed network using low cost DSL in the areas where the cost to build high speed network is high and the network environment is not very accommodating is important in providing the high speed network that meets the user demand and utilizing the network resources in an efficient way. This study presents development of the link aggregation equipment that performs the access control and firewall functions for packet processing based LAN users. The equipments developed support up to 5 line link aggregation as opposed to current 2 line link aggregation. The equipments also allow the use of high speed network in the areas where the network environment is not very accommodating. Also, the fail-over function is added to each line to provide reliability and the self-security function is enhanced to protect the network from unauthorized use and prevents waste of network resources by authorized users.