• Title/Summary/Keyword: Open Protocol

Search Result 479, Processing Time 0.027 seconds

Design and Implementation of Sinkhole Router based IP Tracing System (싱크홀 라우터 기반 IP 추적 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2733-2740
    • /
    • 2009
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhance its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. In this study, we proposed an advanced IP Tracing mechanism based on Bloom filter and Sinkhole routing mechanism. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the Tracing performance also can be enhanced compared with previously suggested mechanism.

A Protocol for interworking Open Web Application Store (개방형 웹 애플리케이션 스토어 연동을 위한 프로토콜)

  • Baek, Ji-Hun;Kim, Ji-Hun;Nam, Yong-Woo;Park, Sang-Won;Jeon, Jong-Hong;Lee, Seung-Yoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.70-72
    • /
    • 2012
  • 최근 휴대용 기기들이 대중화되어 한사람이 하나 이상의 휴대용 기기를 소지하고 있고 스마트폰 활용도 또한 늘어나는 추세이다. 때문에 폭발적인 스마트폰 응용 활용이 늘어나고 있지만 현재의 애플리케이션 스토어는 각 플랫폼별로 애플리케이션을 개발해줘야 하는 종속적인 면이 있다. 앱스토어는 크게 애플의 앱스토어와 구글의 안드로이드 마켓으로 양분되어 있고 각 플랫폼에 맞춰 애플리케이션이 개발되어야 한다. 각각의 플랫폼에 맞춰서 애플리케이션을 개발하면 비용도 더 들고 다른 소규모 플랫폼(Ex 바다)들은 애플리케이션 개발자들을 끌어 모아야만 자신들의 플랫폼에 맞는 애플리케이션이 나오는 단점이 있다. 각 플랫폼에 맞춰서 개발된 네이티브 애플리케이션의 범용성에 대한 해결책과 모바일에서의 다양한 요구사항을 수용하기 위해 웹 애플리케이션이 각광받고 있다. 웹 애플리케이션은 플랫폼에 종속되지 않고 어느 휴대용 기기에서도 동작하기 때문에 각 플랫폼별로 개발하지 않아도 된다. 따라서 웹 애플리케이션 스토어끼리의 연동 프로토콜을 통하여 애플리케이션들을 어느 웹 애플리케이션 스토어에서도 볼 수 있고 플랫폼에 구애받지 않는 거대한 시장이 생겨날 수 있다. 하지만 아직 웹 애플리케이션 스토어라는 표준이 없고 존재하는 웹 애플리케이션 스토어가 없다. 이를 위해 본 논문에서는 연동에 관한 프로토콜을 제안한다.

Study on the Sensor Gateway for Receive the Real-Time Big Data in the IoT Environment (IoT 환경에서 실시간 빅 데이터 수신을 위한 센서 게이트웨이에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.417-422
    • /
    • 2015
  • A service size of the IoT environment is determined by the number of sensors. The number of sensors increase means increases the amount of data generated by the IoT environment. There are studies to reliably operate a network for research and operational dynamic buffer for data when network congestion control congestion in the network environment. There are also studies of the stream data that has been processed in the connectionless network environment. In this study, we propose a sensor gateway for processing big data of the IoT environment. For this, review the RESTful for designing a sensor middleware, and apply the double-buffer algorithm to process the stream data efficiently. Finally, it generates a big data traffic using the MJpeg stream that is based on the HTTP protocol over TCP to evaluate the proposed system, with open source media player VLC using the image received and compare the throughput performance.

A Study on the Implementation of Web Server Patient Monitoring System using Point to Point Protocol (종단 대 종단 프로토콜을 사용하는 웹 서버 환자감시장치 구현에 관한 연구)

  • 최재석;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.463-467
    • /
    • 2000
  • In this paper, we have implemented the Web Server Patient Monitoring System using PPP. It is composed of two parts. The first part is the Analog board for acquiring ECG signals. The second part is the module for processing and transmitting the acquired signal. The second part is using PPP for dial-up networking, TCP/IP for Internet, HTTP for web browser and JAVA program for a Patient Monitoring Program in one chip. In home, it is not need to establish another network line because it uses a telephone line. And a user who want to monitor a patient's biosignal can monitor a patient without wholly open network because it is the network sewer. The Patient Monitoring Program runs on a web browser by downloaded JAVA codes when a user connect to this system. It can make the Home Patient Monitoring Program decrease cost. It can help to avoid the limitation of monitoring a patient.

  • PDF

Implementation of Bandwidth Broker and Router for End-to-end QoS in Differentiated Service Networks (종단간 QoS 보장을 위한 차별화 서비스 지원 대역 브로커 및 라우터 구현)

  • 최영수;박기현;이성협;이강원;채희성;한태만;조유제
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.125-135
    • /
    • 2003
  • In this paper, we developmed and implemented router and bandwidth broker that provides end-to-end QoS in differentiated service IP networks. Our design goal is to provide end-to-end premium service using the EF PHB. The bandwidth broker and router were implemented in the FreeBSD 4.6 platform. For the DiffServ router, we implemented QoS daemon, rollback managment routine, monitoring, and COPS-PR client. Also, Ive implemented bandwith broker which has SLS and resource management function, and signaling protocols for interfacing intra-and inter-domain. On the testbed, we have validated and evaluated the performance of the implemented DiffServ router and bandwidth broker using the inter-domain signaling protocol client in MS Windows platform. The test results show that the end-to-end QoS can be guaranteed for the inter-domain diffServ by the implemented system.

An Implementation of Priority Model of Real-Time CORBA (실시간 CORBA의 우선순위 모델 구현)

  • Park, Sun-Rei;Chung, Sun-Tae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.4
    • /
    • pp.59-71
    • /
    • 2001
  • The Current CORBA shows some limitations for its successful deployment in real time system applications. Recently, OMG adopted Real-Time CORBA specification, which is defined as an extension to CORBA. The goal of the Real-Time CORBA is to provide a standard for CORBA ORB implementations that support 'end to end predictability'. In order to support 'end-to-end predictability', Real Time CORBA specifies many components such as priority model, communication protocol configuration, thread management, and etc. Among them, 'priority model' is the most important mechanism for avoiding or bounding priority inversion in CORBA invocations. In this paper, we present our efforts on a design ,and implementation of the Priority Model in Real-Time CORBA specification. The implementation is done as an extension of omniORB2(v.3.0.0), a popular open source non real time ORB. Experiment results demonstrate that our priority model implementation shows better performance and predictability than the non real-time ORB.

  • PDF

Motor Learning Concepts Applied to Occupational Therapy With Adults With Hemiplegia (뇌졸중 편마비환자의 작업치료에 적용되는 운동학습의 원칙)

  • Shim, Sun-Hwa;Park, Ji-Hyuk
    • Therapeutic Science for Rehabilitation
    • /
    • v.1 no.2
    • /
    • pp.14-22
    • /
    • 2012
  • Introduction : The purpose of scholarly paper is to review of motor learning concepts and to examine in integration of motor learning research finding in occupational therapy services for adults with hemiplegia. Body : The principles of motor learning is stage of learning, type of task, practice and feedback. Depending on stage of learning, therapist need to apply of the principles. In early stage of learning, therapists should be promote patient's awareness about therapeutic goals, task performance environment and how to perform. Whole practice, blocked practice and constant practice improve performance skill. In the latter stage of learning, therapists have to design a intervention protocol for patient to use the implicit feedback. Random practice and open task facilitates performance skills. Conclusion : When establishing the a intervention plan for adults with hemiplegia, therapists should systematically developed the principles of motor learning. Intervention program must be established by applying the principles of motor learning in accordance with the learner's level of task performance, and modified depending on the therapeutic progress.

The Development of Tactical Training Evaluation System using WMN (WMN 기반 전술훈련 평가시스템(TTES) 개발)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.191-196
    • /
    • 2012
  • The tactical training system that was applied to wire at open terrain and field is no training accomplishment in conformity with battlefield situation portrayal. Therefore, this paper developed the tactical training and evaluation system for growing fruitfully that is installed as a tactical training monitoring system by USN WMN through controlled sensing interlock for collecting sensing data and guaranteed training equipment status and report training result for serviceability of manager. additionally we implemented controller for managing server of sending and manipulating of being gathered training data by sensor using USN and system as GUI methods. This system is easy for adapting new and improved protocol in order to processing many function of H/W and algorithms which is generated by controlled system is applicable easily.

OAuth based Proxy Delegation Service (OAuth 기반의 대리 인증서 위임 서비스)

  • Heo, Daeyoung;Hwang, Suntae
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.55-62
    • /
    • 2012
  • Grid web applications by standard Web technology are increasingly used to provide grid service to users as normal Web user interface and service. It is however difficult to integrate a grid security system such as Grid Security Infrastructure (GSI) into Web applications because the delegation way of standard Web security is not the same as the one of Grid security. This can be solved by allowing Web applications to get a Grid credential by using an online credential repository system such as MyProxy. In this paper, we investigate the problem that occurs when MyProxy, which assumes mutual trust between a user and Grid web application, is adapted for achieving security integration between Web and Grid, and we propose a new Grid proxy delegation service to delegate a Grid credential to the Web without assuming mutual trust. In the service, the X.509 proxy delegation process is added to OAuth protocol for credential exchange, and authentication can be done by an external service such as OpenID. So, users can login onto the Grid web application in a single sign-on manner, and are allowed to securely delegate and retrieve multiple credentials for one or more Virtual Organizations.

A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos (Kerberos 기반 하둡 분산 파일 시스템의 안전성 향상방안)

  • Park, So Hyeon;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.803-813
    • /
    • 2013
  • As the developments of smart devices and social network services, the amount of data has been exploding. The world is facing Big data era. For these reasons, the Big data processing technology which is a new technology that can handle such data has attracted much attention. One of the most representative technologies is Hadoop. Hadoop Distributed File System(HDFS) designed to run on commercial Linux server is an open source framework and can store many terabytes of data. The initial version of Hadoop did not consider security because it only focused on efficient Big data processing. As the number of users rapidly increases, a lot of sensitive data including personal information were stored on HDFS. So Hadoop announced a new version that introduces Kerberos and token system in 2009. However, this system is vulnerable to the replay attack, impersonation attack and other attacks. In this paper, we analyze these vulnerabilities of HDFS security and propose a new protocol which complements these vulnerabilities and maintains the performance of Hadoop.