• Title/Summary/Keyword: Network protection

Search Result 1,089, Processing Time 0.029 seconds

A Study of Connection Data transmission to the Firereciver Network and Telecommunication Network (화재수신기 Network과 통신Network 접속시 데이터 전송에 관한 연구)

  • Baek, Dong-Hyun;Ryu, Keun-Ho;Shin, Seung-Chul
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2012.04a
    • /
    • pp.393-396
    • /
    • 2012
  • 신호처리원과 그 방식은 네트웍 구성시 매우 중요하다. 따라서 대단위단지에서 많이 적용되고 있는 자동화재탐지설비의 화재수신기 네트웍과 통신네트웍에 접속시와 수신기에서 발생하는 통신 데이터를 일반 통신네트윅에 접속하여 발생하는 데이터전송시 문제점에 대하여 고찰한 것이다. 경보설비의 구성에서 중계기와 수신기간의 통신 형태를 측정하여 보편화된 통신방식을 사용하였다는 것을 알 수 있었으며 수신기에서 통신네트윅간의 연결은 수신기의 Ethernet 통신모듈을 통한 프로토콜 형태를 확인하였다.

  • PDF

Transformer Differential Relay by Using Neural-Fuzzy System

  • Kim, Byung Whan;Masatoshi, Nakamura
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.157.2-157
    • /
    • 2001
  • This paper describes the synergism of Artificial Neural Network and Fuzzy Logic based approach to improve the reliability of transformer differential protection, the conventional transformer differential protection commonly used a harmonic restraint principle to prevent a tripping from inrush current during initial transformer´s energization but such a principle can not performs the best optimization on tripping time. Furthermore, in some cases there may be false operation such as during CT saturation, high DC offset or harmonic containing in the line. Therefore an artificial neural network and fuzzy logic has been proposed to improve reliability of the transformer protection relay. By using EMTP-ATP the power transformer is modeled, all currents flowing ...

  • PDF

Consumer Protection in E-commerce: Synthesis Review of Related Books

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.413-419
    • /
    • 2022
  • To have a complete and comprehensive understanding of the research subject and to form an integrated legal framework for it, I have sought comprehensively to cover the major written literature on the issue under consideration. I also benefitted from a wide range of research and academic studies pertaining to the same topic, although that literature did not specifically address the issue of consumer rights in electronic contracting in the Saudi e-commerce system. Rather, it addressed only the civil and criminal protection of the consumer in e-commerce.

A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System (네트워크 보호체계에서 네트워크 주소변이 기술 적용에 대한 영향성 연구)

  • Suwon Lee;Seyoung Hwang;SeukGue Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.939-946
    • /
    • 2023
  • In the hyper-connected network, which network equipment is diverse and network structure is complex, the attack surface has also increased. In this environment, MTD(Moving Target Defense) technology is being researched as a method to fundamentally defend against cyber attacks by actively changing the attack surface. network-based MTD technologies are being widely studied. However, in order for network address mutation technology to be applied within the existing fixed IP-based system, research is needed to determine what impact it will have. In this paper, we studied the impact of applying network address mutation technology to the existing network protection system. As a result of the study, factors to be considered when firewall, NAC, IPS, and network address mutation technologies are operated together were derived, and elements that must be managed in network address mutation technology for interoperability with the network analysis system were suggested.

Efficient Protection/Restoration by Separation of Domains in Optical Networks (광 네트워크에서의 도메인 분리에 의향 효율적인 보호복구)

  • Yim Soon-Bin;An Hyun-Ki;Lee Tae-Jin
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.77-82
    • /
    • 2005
  • Protection of user service becomes increasingly important since even very short interruption of service due to link or node failure will cause huge data loss and incur tremendous restoration cost in high speed network environment. Thus fast and efficient protection and restoration is one of the most important issues to be addressed. Protection methods have been proposed to provide efficiency and stability in optical networks. In this paper, an original network is separated into several domains using Hamiltonian cycle. and link protection is performed on the cycles of the domains. We have shown that protection path length can be decreased up to $57{\%}$ with marginal increase of backup capacity. Our proposed method can provide high-speed protection with marginal increase of protection capacity.

Be study technical information protection in ubiqutious home networks (유비쿼터스 홈 네트워크에서의 정보보호 기술 연구)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.65-75
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at these papers, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS, DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding an external denial of service attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack like DoS, DDoS, IP Spoofing, and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

Energy-efficient Multicast Algorithm for Survivable WDM Networks

  • Pu, Xiaojuan;Kim, Young-Chon
    • Current Optics and Photonics
    • /
    • v.1 no.4
    • /
    • pp.315-324
    • /
    • 2017
  • In recent years, multicast services such as high-definition television (HDTV), video conferencing, interactive distance learning, and distributed games have increased exponentially, and wavelength-division multiplexing (WDM) networks are considered to be a promising technology due to their support for multicast applications. Multicast survivability in WDM networks has been the focus of extensive attention since a single-link failure in an optical network may result in a massive loss of data. But the improvement of network survivability increases energy consumption due to more resource allocation for protection. In this paper, an energy-efficient multicast algorithm (EEMA) is proposed to reduce energy consumption in WDM networks. Two cost functions are defined based on the link state to determine both working and protection paths for a multicast request in WDM networks. To increase the number of sleeping links, the link cost function of the working path aims to integrate new working path into the links with more working paths. Sleeping links indicate the links in sleep mode, which do not have any working path. To increase bandwidth utilization by sharing spare capacity, the cost function of the protection path is defined to use sleeping fibers for establishing new protection paths. Finally, the performance of the proposed algorithm is evaluated in terms of energy consumption, and also the blocking probability is evaluated under various traffic environments through OPNET. Simulation results show that our algorithm reduces energy consumption while maintaining the quality of service.

Performance of Ethernet Protection Switching System to Minimize Packet Loss (패킷 손실을 최소화할 수 있는 이더넷 망 보호 시스템의 성능 분석)

  • Lee, Beom-Jae;Lee, Chang-Min;Lee, Jae-Hwoon;Kang, Tae-Kyu
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.3
    • /
    • pp.68-74
    • /
    • 2008
  • Ethernet is the very successful technology in private local area network. Therefore, we can obtain the advantage to reduce network overhead due to such as protocol translation when to apply Ethernet to the public backbone network. However, in order to do that, it is required to restore the network within 50msec when link failure occurs, in order to provide seamless connections to end users. Currently, ITU-T standardized the automatic protection switching (APS) based Ethernet protection switching system. In this paper, we propose the improved Ethernet protection switching system to minimize the number of Ethernet frames lost when the network is restored from the failure. The proposed mechanism is analyzed by using simulation based on ns-2 and numerical results show that the proposed one provides superior performance.

Design of Pitch Limit Detection Algorithm for Submarine (잠수함의 종동요각 한계예측 알고리즘 설계)

  • Park, Jong-Yong;Kim, Nakwan;Shin, Yong-Ku
    • Journal of Ocean Engineering and Technology
    • /
    • v.30 no.2
    • /
    • pp.134-140
    • /
    • 2016
  • An envelope protection system is a control system that allows a submarine to operate freely using its own operational envelope without exceeding the structural limit, dynamic limit, and control input limit. In this paper, an envelope protection system for the pitch angle of a submarine is designed using a dynamic trim algorithm. A linear quadratic regulator and artificial neural network are used for the true dynamics approximation. A submarine maneuvering simulation program developed using experimental data is used to validate the designed envelope protection system. Simulation results show the effectiveness of the designed envelope protection system.

Forecasting Fish Communities in River Networks

  • Rashleigh, Brenda;White, Denis;Ebersole, Joe L.;Barber, Craig;Boxall, George;Brookes, Allen
    • Korean Journal of Ecology and Environment
    • /
    • v.45 no.2
    • /
    • pp.150-157
    • /
    • 2012
  • Fish communities in river networks provide significant ecosystem services that will likely decline under future land use and climate change. We developed a model that simulates the consequences to multiple populations of one or more fish species-a meta-community-from multiple stressors across a river network. The model is spatially-explicit and age-structured, with three components: habitat suitability; population dynamics, including species interactions; and movement across a spatial network. Although this model is simple, it can form the basis of fisheries assessments and may be incorporated into an integrated modeling system for watershed management and prediction.