• Title/Summary/Keyword: Open network

Search Result 1,727, Processing Time 0.032 seconds

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models (의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구)

  • Jo, Seongrae;Sung, Haengnam;Ahn, Byunghyuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.33-45
    • /
    • 2015
  • Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.

The Activation Plan of Chain Information Network And Efficent NDB Design (효율적인 NDB 설계 및 유통 정보 NETWORK 활성화 방안)

  • 남태희
    • KSCI Review
    • /
    • v.1 no.2
    • /
    • pp.73-94
    • /
    • 1995
  • In this paper, design of efficient NDB(Network Data Base) for the activation plan of chain information network. The DB structure build up, logical structure, store structure, physical structure, the data express for one's record, and the express using linked in the releation of data. Also express as hierarchical model on the DSD(Data Structure Diagram) from the database with logical structure. Each node has express on record type, the linked in course of connective this type, the infuence have efficent of access or search of data, in the design for connection mutually a device of physical, design for database, and construction a form of store for logical. Also activation of chain information network of efficent, using POS(Point Of Sale) system in OSI(Open Systems Interconnection) environment for network standardization, and build up network a design for system.

  • PDF

Interworking Status of Public Land Mobile Network According to Open Network Interconnection (상호접속에 따른 육상이동망 연동현황)

  • Hwang, G.
    • Electronics and Telecommunications Trends
    • /
    • v.10 no.3 s.37
    • /
    • pp.125-131
    • /
    • 1995
  • 공중육상이동통신망(PLMN)은 계속적으로 발전중에 있는 통신분야이다. 현재 다른 데이터 통신망의 추세를 비추어 볼 때, 이러한 공중육상이동통신망은 기존의 고정형 통신망인 공중교환전화망(PSTN)과 도입관계에 있는 종합정보 통신망(ISDN)과 연동이 필수적이라고 하겠다. 현재 데이터망과의 연동에 대한 개정작업은 진행중에 있다. 이러한 추세에 맞추어 새로운 서비스의 망간접속에 대한 연구가 필요하며 그에 따른 상호 접속 공정 경쟁의 국내 현황과 사업자간 협정을 분석하였다. 이 결과는 추후 망간연동에 대한 표준(안) 및 기준(안)을 작성하는데 기초자료로 사용할 계획이다.

System Architecture of Networked Digital Recorder for Digital TV Broadcasting Applied Services (서버형 디지털방송 응용서비스를 위한 네트워크 디지털 레코더 기술 개발)

  • Park, Byoung-Ha;Hong, Sung-Hye;Kim, Chan-Gyu;Hong, In-Hwa
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.288-290
    • /
    • 2004
  • Networked Digital Recorder(NDR) Platform is a system that owns contents jointly between tv viewers connected by the broadcast broadband convergence network. NDR suggests a new content distribution chain model that users can receive broadcast contents, share contents and sends contents by convergence network. This paper looks at the system requirements, service model and the overall system architecture of NDR platform.

  • PDF

무선인터넷망 개방이 무선인터넷 시장에 미칠 영향 -소비자 후생과 컨텐츠공급자 수익을 중심으로-

  • 박은영;이호무;안병훈
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.222-225
    • /
    • 2001
  • Policy introducing open access to the wireless network has been under discussion in the Korean mobile telecommunications industry. The policy, which directs mobile operators to allow mobile portals other than their own ones to access their network and subscribers, is expected to vitalize mobile Internet market through competition among portals. This study analyzes the impact of the policy in terms of welfare of mobile Internet users and profit of mobile contents providers. We also cover the influence of mobile Internet fee on anticipated results of the policy

  • PDF

Study on the wormhole detection and prevention algorithm for MANET (MANET에서 wormhole 공격의 탐지 및 방지를 위한 알고리즘에 대한 연구)

  • Kim, Jae-Honh;Kim, Se-Heon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.494-497
    • /
    • 2008
  • In Mobile ad hoc networks (MANET), nodes could transmit packets for each other to communicate beyond their transmission range without centralized control. Unlike infrastructure-based wireless networks, due to the unique characteristics of MANETs such as open network architecture, stringent resource constraints and highly dynamic network topology, networks are vulnerable to wormhole attacks launched through colluding nodes. In this paper, we develop an wormhole detection and prevention algorithm for MANET.

  • PDF

콘트롤스의 빌딩자동화 표준통신망 구축 방안

  • 장해성;강명웅;이근송
    • 월간 기계설비
    • /
    • s.112
    • /
    • pp.76-80
    • /
    • 1999
  • 네트워크는 어떤 공동의 목적을 위해 다수 지점간에 상호 연결된 통신형태를 말한다. 네트워크를 구현하고 표현하기 위한 방법은 여러가지가 있으나 대표적인 방법으로 프로토콜과 토폴로지를 들 수 있을 것이다. 프로토콜은 소프트웨어의 형태이며, 토폴로지는 하드웨어의 형태라고 할 수 있다. 이러한 것들의 집합을 네트워크 아키텍쳐(Network Architecture)라고 하는데, ISO(International Standard Organization)의 OSI(Open System Interconnection) 모델, IBM의 SNA(System Network Architecture)를 기준으로 사용자의 필요와 목적에 따라 다양한 형태로 표현되고 구현된 네트워크 아키텍쳐들이 있다.

  • PDF

A Fast Automatic Test Pattern Generator Using Massive Parallelism (대량의 병렬성을 이용한 고속 자동 테스트 패턴 생성기)

  • 김영오;임인칠
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.32B no.5
    • /
    • pp.661-670
    • /
    • 1995
  • This paper presents a fast massively parallel automatic test pattern generator for digital combinational logic circuits using neural networks. Automatic test pattern generation neural network(ATPGNN) evolves its state to a stable local minima by exchanging messages among neural network modules. In preprocessing phase, we calculate the essential assignments for the stuck-at faults in fault list by adopting dominator concept. It makes more neurons be fixed and the system speed up. Consequently. fast test pattern generation is achieved. Test patterns for stuck-open faults are generated through getting initialization patterns for the obtained stuck-at faults in the corresponding ATPGNN.

  • PDF

A Study on the Performance Analysis of Service Control Point (서비스제어시스템의 성능분석에 관한 연구)

  • 조한벽;권순준;임덕빈;김재련
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.13 no.22
    • /
    • pp.87-98
    • /
    • 1990
  • The performance analysis and capacity planning of Service Control Point which is real time response system is studied. The system is modeled by multiclass open queueing network. The analytical method is used to solve the queueing network. The solution of the model has product form solution. The focus of this paper is to investigate the capacity of system under the restriction of response time. To get the reasonable capacities, nonlinear programming problem is formulated and is solved by GINO. And the simulation model using SLAM II is formulated.

  • PDF