• Title/Summary/Keyword: Pass Network

Search Result 314, Processing Time 0.028 seconds

Tunnel Gateway Satisfying Mobility and Security Requirements of Mobile and IP-Based Networks

  • Jung, Youn-Chan;Peradilla, Marnel
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.583-590
    • /
    • 2011
  • Full-mesh IPSec tunnels pass through a black ("unsecure") network (B-NET) to any red ("secure") networks (RNETs). These are needed in military environments, because they enable dynamically changing R-NETs to be reached from a BNET. A dynamically reconfiguring security policy database (SPD) is very difficult to manage, since the R-NETs are mobile. This paper proposes advertisement process technologies in association with the tunnel gateway's protocol that sends 'hello' and 'prefix advertisement (ADV)' packets periodically to a multicast IP address to solve mobility and security issues. We focus on the tunnel gateway's security policy (SP) adaptation protocol that enables R-NETs to adapt to mobile environments and allows them to renew services rapidly soon after their redeployment. The prefix ADV process enables tunnel gateways to gather information associated with the dynamic changes of prefixes and the tunnel gateway's status (that is, 'down'/restart). Finally, we observe two different types of performance results. First, we explore the effects of different levels of R-NET movements on SP adaptation latency. Next, we derive the other SP adaptation latency. This can suffer from dynamic deployments of tunnel gateways, during which the protocol data traffic associated with the prefix ADV protocol data unit is expected to be severe, especially when a certain tunnel gateway restarts.

Measurements of the Ground Resistance using the Test Current Transition Method in Powered Grounding Systems (측정전류전이법을 이용한 운전중인 접지시스템의 접지저항 측정)

  • Lee, Bok-Hui;Eom, Ju-Hong;Kim, Seong-Won
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.51 no.8
    • /
    • pp.347-353
    • /
    • 2002
  • This paper presents an accurate method for measuring the ground resistance in powered grounding system. Most of substations and electric power equipments are interconnected to an extensive grounding network of overhead ground wires, neutral conductors of transmission lines, cable shields, and etc. The parasitic effects due to circulating ground currents and ground potential rise make a significant error in measuring the ground resistance. The test current transition method was proposed to reduce the effects of stray ground currents, ground potential rise and harmonic components in measurements of the ground resistance for powered grounding systems. The instrumental error of the test current transition method is decreased as the ratio of the test current signal to noise(S/N) increases. It was found from the test results that the proposed measuring method of the ground resistance is more accurate than the conventional fall-of-potential method or low-pass filter method, and the measuring error was less than 3[%]when S/N is 10.

The Modified Generalized Chebyshev Filter with Two Attenuation Poles in Stopband (저지 대역에 2개의 감쇠극을 갖는 변형된 Generalized Chebyshev Filter)

  • Kim In-Seon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.4 s.95
    • /
    • pp.438-446
    • /
    • 2005
  • In this paper, the modified generalized Chebyshev rational function is presented. The new element values of prototype low pass filter are obtained by network synthesis using this rational function. This proposed filter has an equal ripple passband as same as conventional generalized Chebyshev filter, but unlike conventional filter which has only one attenuation pole at finite frequency, the proposed filter has two different from each other attenuation pole in stopband. If the harmonic frequency is set to the second attenuation pole frequency, this harmonic is suppressed efficiently. Furthermore, since the location of the second attenuation pole can be arbitrary adjusted. our filters are very available for the realization of wide stopband, particularly.

The performance analysis of Reflective Semiconductor Optical Amplifier Modulator in WDM-PON system (파장분할다중 광가입자망을 위한 반사형 반도체 광증폭기 변조 성능 분석)

  • Shim Woo-Jin;Shin Yong-Sik;Park Yong-Gil
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.4 no.1
    • /
    • pp.15-21
    • /
    • 2005
  • One of the core technology in WDM-PON system is a generation and modulation technique of the optical source in Optical Network Unit (ONU). In this paper, we propose a reflective semiconductor optical amplifier (RSOA) as a modulator in WDM-PON system. Its performance is analyzed by simulation and actual experimentation. Using RSOA in WDM-PON system as a modulator, it obtains higher gain compared to the conventional SOA due to the double pass gain effect. Furthermore RSOA can provide high gain with comparatively low input power. This is very helpful when we set up the actually system because using lower input power, it can reduce the load of the driving circuit which makes very economical module structure. Therefore, when RSOA is used as a modulator, not only it gives noise suppression effect, but also provides certain amount of gain as well. In addition, comparing with conventional SOA which gives fairly large insertion loss, RSOA can provides more important merits.

  • PDF

Survey on the Korean MCS Systems and Development Issues (국내 MCS 시스템 현황 및 발전 방향)

  • Kim, Geon-Ung;Park, Gyei-Kark;Choi, Jo-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2019-2029
    • /
    • 2009
  • There are several MCS(Monitoring, Control and Surveillance) systems for maritime safety and security in Korea; VMS (Vessel Monitoring System) that based on the AIS(Automatic Identification System), and the LRIT(Long-Range Identification and Tracking), the Vessel Free Pass System that based on the RFID(Radio Frequency IDentification), the Fisheries Information Network that provided by the National Federation of Fisheries Cooperatives. This paper surveys the fundamental technologies of MCS systems, and compares the role and function of them. It also surveys the development direction of each systems and research topics for cooperation of them.

An Analysis Tool for Deriving Bounds on Delay and Buffer Size in Packet Networks (패킷 네트워크에서 지연과 버퍼 크기 한계를 추출할 수 있는 분석 도구)

  • 편기현;송준화;이흥규
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.641-648
    • /
    • 2003
  • In this paper, we propose a general analysis tool that derives guaranteed delay bounds for real-time sessions when those sessions pass through heterogeneous schedulers in general packet networks. This tool characterizes each different scheduler by a homogeneous service curve server. We show that service curve servers can characterize a strictly larger class of schedulers than LR servers. That is, we can characterize not only all LR servers but also RC-EDF and SC scheduler by service curve servers. Even with such advantage over LR servers, service curve servers provide accurate analysis results. We prove mathematically that if we analyze a network that can be analyzed by both LR servers and service curve servers,,both cases yield the same delay bound.

The Design of Ultra-Wide Band(UWB) Band Pass Filter with WLAN Notched Band of DGS(Defected Ground Structure)-Type (DGS형 무선 랜 차단대역을 포함하는 UWB(Ultra-Wide Band) 대역통과 여파기 설계)

  • Kim, Kab-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1909-1913
    • /
    • 2008
  • In this paper, A compact ultra-wideband(UWB) bandpass filter(BPF) with WLAN notched filter has been proposed. H-shared slot is studied and adopted to tighten the coupling of inter-digital capacitor in order to improve the BPF's performance. Three pairs of tapered defected ground structures(DGS) are formed to assign their transmission zeros towards the out of band signal, thereby suppressing the spurious passband. Also Meander line slot is de#eloped to reject the undesired wireless local-area network(WLAN) radio signals. That's combining these three structures we obtain a small sized UWB BPF.

The Optical Filtering Effect of a RSOA-based Broadband Light Source in a Bidirectional WDM-PON System (파장분할 다중화 수동광 네트워크에서 적용된 반사형 반도체 증폭기 기반의 광역선폭 광원의 광필터 특성 의존성)

  • Choi, Bo-Hun
    • Korean Journal of Optics and Photonics
    • /
    • v.22 no.3
    • /
    • pp.122-128
    • /
    • 2011
  • The AWG-filtering effect was investigated on a bidirectional 100-GHz-channel-spacing WDM-PON link using spectrum-sliced and RSOA-amplified light sources for downstream signals and a wavelength reuse technique for upstream signals. Signal performances of three different filtering AWGs, including Gaussian, trapezoidal, and rectangular types, were compared on link transmission with fiber nonlinear effects. As an extinction ratio of a downstream signal varied, the effect for both directional signals was analyzed and optimized. It was found that there was an optimal pass bandwidth of an AWG for the balance between relative intensity noise decrement and cross phase modulation noise increment as the bandwidth got wider.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Quantitative evaluation of through-thickness rectangular notch in metal plates based on lamb waves

  • Zhao, Na;Wu, Bin;Liu, Xiucheng;Ding, Keqin;Hu, Yanan;Bayat, Mahmoud
    • Structural Engineering and Mechanics
    • /
    • v.71 no.6
    • /
    • pp.751-761
    • /
    • 2019
  • Lamb wave technology is a promising technology in the field of structural health monitoring and can be applied in the detection and monitoring of defects in plate structures. Based on the reconstruction algorithm for the probabilistic inspection of damage (RAPID), a Lamb-based detection and evaluation method of through-thickness rectangular notches in metal plates was proposed in this study. The influences of through-thickness rectangular notch length and the angle between sensing path and notch length direction on signals were further explored through simulations and experiments. Then a damage index calculation method which focuses on both phase and amplitude difference between detected signals and baseline signals was proposed. Based on the damage index difference between two vertically crossed sensing paths which pass through the notch in a sensor network, the notch direction identification method was proposed. In addition, the notch length was determined based on the damage index distribution along sensing paths. The experimental results showed that the image reconstructed with the proposed method could reflect the information for the evaluation of notches.