• Title/Summary/Keyword: Network-based system

Search Result 10,975, Processing Time 0.038 seconds

DEVELOPMENT OF A NETWORK-BASED TRACTION CONTROL SYSTEM, VALIDATION OF ITS TRACTION CONTROL ALGORITHM AND EVALUATION OF ITS PERFORMANCE USING NET-HILS

  • Ryu, J.;Yoon, M.;SunWoo, M.
    • International Journal of Automotive Technology
    • /
    • v.7 no.6
    • /
    • pp.687-695
    • /
    • 2006
  • This paper presents a network-based traction control system(TCS), where several electric control units(ECUs) are connected by a controller area network(CAN) communication system. The control system consists of four ECUs: the electric throttle controller, the transmission controller, the engine controller and the traction controller. In order to validate the traction control algorithm of the network-based TCS and evaluate its performance, a Hardware-In-the-Loop Simulation(HILS) environment was developed. Herein we propose a new concept of the HILS environment called the network-based HILS(Net-HILS) for the development and validation of network-based control systems which include smart sensors or actuators. In this study, we report that we have designed a network-based TCS, validated its algorithm and evaluated its performance using Net-HILS.

A Study on Network detection technique using Human Immune System (인간 면역 체계를 이용한 네트워크 탐지기술 연구)

  • ;Peter Brently
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.03a
    • /
    • pp.307-313
    • /
    • 1999
  • This paper reviews and assesses the analogy between the human immune system and network intrusion detection systems. The promising results from a growing number of proposed computer immune models for intrusion detection motivate this work. The paper begins by briefly introducing existing intrusion detection systems (IDS's). A set of general requirements for network-based IDS's and the design goals to satisfy these requirements are identified by a careful examination of the literature. An overview of the human immune system is presented and its salient features that can contribute to the design of competent network-based IDS's are analysed. The analysis shows that the coordinated actions of several sophisticated mechanisms of the human immune system satisfy all the identified design goals. Consequently, the paper concludes that the design of a network-based IDS based on the human immune system is promising for future network-based IDS's

  • PDF

A Study on Network detection technique using Human Immune System (인간 면역 체계를 이용한 네트워크 탐지기술 연구)

  • ;Peter Brently
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.06a
    • /
    • pp.307-313
    • /
    • 1999
  • This paper reviews and assesses the analogy between the human immune system and network intrusion detection systems. The promising results from a growing number of proposed computer immune models for intrusion detection motivate this work. The paper begins by briefly introducing existing intrusion detection systems (IDS's). A set of general requirements for network-based IDS's and the design goals to satisfy these requirements are identified by a careful examination of the literature. An overview of the human immune system is presented and its salient features that can contribute to the design of competent network-based IDS's are analysed. The analysis shows that the coordinated actions of several sophisticated mechanisms of the human immune system satisfy all the identified design goals. Consequently, the paper concludes that the design of a novel network-based IDS based on the human immune system is promising for future network-based IDS's

  • PDF

Design and Implementation of the SNMP based Management System for SNMP&OSI Network (SNMP기반 SNMP/OSI 통합 망 관리 시스템 설계 및 구현)

  • Lee, Young-Jun
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.3
    • /
    • pp.57-64
    • /
    • 2003
  • If we are using SNMP based network management systems and we need to manage new OSI based network elements, we have to develop new network management system. Most of the networks, which are composed of diverse. heterogeneous network nodes, are managed by CMIP based management system. The development of new management system, however, is very costly. In this paper, we show the design and implementation of the SNMP based network management system with minor changes for the management of OSI network and network elements.

  • PDF

An Agent-based Network Management System Using Active Information Resources

  • Kinoshita, Tetsuo;Kitagata, Gen;Takahashi, Hideyuki;Sasai, Kazuto;Kalegele, Khamisi
    • International journal of advanced smart convergence
    • /
    • v.2 no.2
    • /
    • pp.10-15
    • /
    • 2013
  • An expert network administrator is not always stationed as disasters happen. In that case, it is desirable that a novice administrator is capable of taking part in network recovery operations as well. In this paper, an agent-based network management system in emergency situations is presented. We use the Active Information Resource based Network Management System (AIR-NMS) to relieve the human administrator from parts of her management tasks and present an interface that remotely can control this management system. The effectiveness of the system is demonstrated by experiments using a prototype system.

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

A Design and Implementation of Web-based Traffic Monitoring System for Management of Small-scale PC-room (소규모 실습실 관리를 위한 웹기반 트래픽 모니터링 시스템의 설계 및 구현)

  • Lee Kang-ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.127-131
    • /
    • 2004
  • In this paper, I propose the web-based network traffic monitoring system to monitor computers running MS Windows in the small-scale PC-room. The system can support network and system operation, management, expansion, and design using network analysis and diagnosis to a network administrator. The whole system consists of two parts: analysis server for collection and analysis of the network information. and supports real-time monitoring of network traffic, and the web-based interface system. a client system shows user a graphical data that analyzed a returned result from the server. This system implements web-based technology using java and contributes to enhance the effectiveness of network administrator's management activities in PC-room by controlling and monitoring.

  • PDF

Rule-based network fault self-recovery system (규칙 기반의 네트워크 장애 자기 복구 시스템)

  • Lee, Jae-Wook;Ahn, Seong-Jin;Chung, Jin-Wook
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.10 no.1
    • /
    • pp.83-93
    • /
    • 2006
  • This paper introduces rule-based reasoning (RBR) based self-recovery system for network fault in ubiquitous computing. This system is fault management system for fault recovery of rule-based for self-recovery in ubiquitous computing environment. We proposed rules of network fault recovery applied the system as a distinguished reason of network fault. And, in this paper, the network fault self-recovery system proved the rules that applied each situatpion through the simulation.

  • PDF

A Knowledge-based Network Management System Using Active Information Resources

  • Kinoshita, Tetsuo;Kitagata, Gen;Takahashi, Hideyuki;Sasai, Kazuto;Kalegele, Khamisi
    • International journal of advanced smart convergence
    • /
    • v.3 no.1
    • /
    • pp.1-6
    • /
    • 2014
  • An expert network administrator is not always stationed as disasters happen. In that case, it is desirable that a novice administrator is capable of taking part in network recovery operations as well. In this paper, aknowledge-based network management system in emergency situations is presented. We use the Active Information Resource based Network Management System (AIR-NMS) to relieve the human administrator from parts of her management tasks and present an interface that remotely can control this management system. The effectiveness of the system is demonstrated by experiments using a prototype system.