• Title/Summary/Keyword: Path Protection

Search Result 190, Processing Time 0.024 seconds

A Survey for the Development of Professional Industrial Technology Protection : Focusing on key status and job path analysis (국내 산업기술보호 전문인력 육성을 위한 실태조사 : 주요 현황 및 직무 경로 분석을 중심으로)

  • Kim Mi Hee;Jung Yu Han
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.107-116
    • /
    • 2023
  • The management of professional manpower with expertise in performing specific tasks can be said to be a very important issue at the national level. Recently, interest in industrial technology protection experts continues to expand, but difficulties are growing due to the lack of policy evidence. Considering these points, this study conducted a fact-finding survey on personnel in charge of industrial technology protection, and through this, quantitative, qualitative, and job path analysis were performed for related job performers. These results are considered to be significant in that they can be used as basic information for fostering industrial technology protection experts in the future.

Analysis of the Bandwidth Consumed by Restoration Paths for Service Guarantee in the Protection Switching Scheme (보호 스위칭에 의한 경로 설정에 있어서 서비스 보장을 위한 복구 경로의 소비 대역 분석)

  • Lee, Hwang-Kyu;Hong, Sug-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.155-162
    • /
    • 2003
  • Fast restoration time and service guarantee are the important goals to achieve the network reliability. In the protection switching scheme, one way to guarantee service fro an application session if a network happens to fail is to establish the restoration path that amounts to the same bandwidth of the working path of the session at the same time. When we setup the restoration path, we can reduce the bandwidth consumption by the restoration path if the path can share the bandwidth required by the other paths. This paper explains the methods how to determine the shared bandwidth of the restoration path in the protection switching scheme, given the maximum bandwidth assigned to a link along the working path. We point out that such sharing algorithm can not reduce the bandwidth consumption by the restoration paths in some cases, which contradict the general conception. We explain why this can happen, and show the simulation results in real network topologies to prove our arguments. We explain the reason of the failure of the sharing effect by the simple sharing algorithm. Finally we propose the way of how we can overcome the failure of the sharing effect, using the complete sharing algorithm based on the link database and showing the results.

A Fast and Scalable Inter-Domain MPLS Protection Mechanism

  • Huang, Chang-Cheng;Messier, Donald
    • Journal of Communications and Networks
    • /
    • v.6 no.1
    • /
    • pp.60-67
    • /
    • 2004
  • With the fast growth of Internet and a new widespread interest in optical networks, the unparalleled potential of Multi-Protocol Label Switching (MPLS) is leading to further research and development efforts. One of those areas of research is Path Protection Mechanism. It is widely accepted that layer three protection and recovery mechanisms are too slow for today’s reliability requirements. Failure recovery latencies ranging from several seconds to minutes, for layer three routing protocols, have been widely reported. For this reason, a recovery mechanism at the MPLS layer capable of recovering from failed paths in 10’s of milliseconds has been sought. In light of this, several MPLS based protection mechanisms have been proposed, such as end-to-end path protection and local repair mechanism. Those mechanisms are designed for intra-domain recoveries and little or no attention has been given to the case of non-homogenous independent inter-domains. This paper presents a novel solution for the setup and maintenance of independent protection mechanisms within individual domains and merged at the domain boundaries. This innovative solution offers significant advantages including fast recovery across multiple nonhomogeneous domains and high scalability. Detailed setup and operation procedures are described. Finally, simulation results using OPNET are presented showing recovery times of a few milliseconds.

The development of EASI-based multi-path analysis code for nuclear security system with variability extension

  • Andiwijayakusuma, Dinan;Setiadipura, Topan;Purqon, Acep;Su'ud, Zaki
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3604-3613
    • /
    • 2022
  • The Physical Protection System (PPS) plays an important role and must effectively deal with various adversary attacks in nuclear security. In specific single adversary path scenarios, we can calculate the PPS effectiveness by EASI (Estimated Adversary Sequence Interruption) through Probability of Interruption (PI) calculation. EASI uses a single value of the probability of detection (PD) and the probability of alarm communications (PC) in the PPS. In this study, we develop a multi-path analysis code based on EASI to evaluate the effectiveness of PPS. Our quantification method for PI considers the variability and uncertainty of PD and PC value by Monte Carlo simulation. We converted the 2-D scheme of the nuclear facility into an Adversary Sequence Diagram (ASD). We used ASD to find the adversary path with the lowest probability of interruption as the most vulnerable paths (MVP). We examined a hypothetical facility (Hypothetical National Nuclear Research Facility - HNNRF) to confirm our code compared with EASI. The results show that implementing the variability extension can estimate the PI value and its associated uncertainty. The multi-path analysis code allows the analyst to make it easier to assess PPS with more extensive facilities with more complex adversary paths. However, the variability of the PD value in each protection element allows a significant decrease in the PI value. The possibility of this decrease needs to be an important concern for PPS designers to determine the PD value correctly or set a higher standard for PPS performance that remains reliable.

An Analysis of the ESD Protection Characteristic of Chip Varistors Using a Distributed Circuit (분산회로를 이용한 칩 바리스터의 ESD 보호 특성에 대한 분석)

  • Hong Sung-Mo;Lee Jong-Geun;Chung Duck-Jin;Kim Ju-Min
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.53 no.12
    • /
    • pp.589-595
    • /
    • 2004
  • The ESD protection characteristic of chip varistors on a circuit board can not be analyzed by using a conventional circuit simulator due to its microwave characteristic. Thus, by employing Agilent's microwave circuit simulator ADS, we showed that the ESD Protection characteristic or chip varistors can be investigated. order to got more precise simulation results, a chip varistor model was extracted from the electrical characteristic of a TDK's chip varistor and the distributed circuit based pattern was designed as the ESD propagation path. The simulation results showed that the ESD protection characteristic of a chip varistors can be improved drastically by reducing the ESD propagation path.

A Protection Path Setup Scheme for Effective Resource Use and Fast Path Recovery in MPLS Network (MPLS망에서 효율적인 자원 사용과 빠른 연결 복구를 위한 보호 경로 설정 방법)

  • 김미희;정민영;이재섭
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.381-383
    • /
    • 2000
  • 최근 인터넷의 트래픽이 다양해지고, 서비스 질 보장에 대한 사용자의 요구가 증가하며, 가상 사설망(VPN, Virtual Private Network)이나 트래픽 엔지니어링 등 향상된 IP 서비스가 요구되고 있다. 이러한 요구 사항을 충족시켜주기 위하여 IETF에서는 MPLS (Multiprotocol Label Switching) 기술을 표준화하고 있다. 다양한 서비스와 QoS 보장을 가능하게 하는 MPLS 망에서 신뢰성(Reliable) 보장은 또 하나의 중요한 문제이다. 본 논문에서는 이러한 MPLS 망의 신뢰성을 보장하기 위한 기존의 방법들을 설명하고 기존 방법의 문제를 해결하기 위해 선택적인 보호 연결(Protection Path) 설정방법을 제안한다. 본 논문에서 제안하는 보호 연결 설정방법은 과거의 특정 장애 정보를 이용하여 선택적으로 보호 연결을 미리 설정함으로써 빠른 연결 복구를 수행하게 하고 보호 연결 설정으로 인한 자원의 낭비를 최소화 하고자 하는 방법이다.

  • PDF

Protection and Restoration of GMPLS LSP using CR-LDP Detours (CR-LDP 우회를 통한 GMPLS LSP의 보호 및 복구)

  • 김진형;정재일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1051-1059
    • /
    • 2003
  • The key feature of GMPLS is the provision of network resources and the automatic set-up of a path. And the mechanism of protection and restoration of a path is presented when network component fails. This paper suggests CR-LDP Static Detour Mechanism and Dynamic Detour Mechanism. CR-LDP Detours are a mechanism to set up detour paths automatically at every node to protect working path. Hence suggested mechanism performance is compared with existing mechanisms by computer simulation.

RF protection technique of antenna tuning switch in all-off condition (전차단 상태에서 동작하는 안테나 튜닝스위치의 RF 보호기술)

  • Jhon, Heesauk;Lee, Sanghun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1567-1570
    • /
    • 2022
  • This paper, we presents a RF protection technique of antenna switch by improving the power handling capability in worst case environment mode for mobile phone applications without critical payment of circuit performances such as insertion loss, isolation and ACBV (AC breakdown voltage). By applying a additional capacitive path located in front of the antenna in cell-phone, it performs the effective reduction of input power in high voltage standing wave ratio (VSWR) condition. Under the all-path off condition which causes a high VSWR, it achieved 37.7dBm power handling level as high as 5.7dB compared to that of conventional one at 2GHz. In addition, insertion loss and isolation performances were 0.31dB and 42.72dB at 2 GHz, respectively which were almost similar to that of the conventional circuit. The proposed antenna switch was fabricated in 130nm CMOS SOI technology.

Privacy Behavioral Intention in Online Environment: Based on Protection Motivation Theory (온라인 환경에서 프라이버시 행동의도에 미치는 영향 - 보호동기이론을 중심으로 -)

  • Kim, Jongki;Kim, Sanghee
    • Informatization Policy
    • /
    • v.20 no.3
    • /
    • pp.63-85
    • /
    • 2013
  • Drawing on Protection Motivation Theory(PMT), this study attempts to clarify antecedents that influence the intention to protect individuals' privacy on the Internet. Protection motivation forms through individuals' cognitive appeal involving threat and efficacy. Then protection motivation causes privacy behavioral change. Protection motivation factors are established privacy trust and privacy risk, which are related to privacy attitude and belief. This proposed model is empirically analyzed by utilizing structural equation analysis(SEM). According to the result of the empirical analysis, it is founded that almost paths have statistically significant explanatory power except path from efficacy to privacy risk and path from privacy trust to privacy behavioral intention. This study shows powerful evidence of antecedent factors based on protection motivation of individuals' privacy behavioral intention in online environment.

  • PDF

ATM Network Survivability Enhancement Scheme using Disjoint VP Groups (분리 VP 그룹을 이용한 ATM 망 생존도 향상 방안)

  • Lee, Gil-Heung;Choe, Yong-Hun;Park, Won-Seo;Lee, Jae-Yong;Lee, Sang-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.949-956
    • /
    • 1999
  • 이 논문에서는 ATM (Asynchronous Transfer Mode) 방식의 초고속망의 장애 발생 시 이용자 연결의 QoS (Quality of Service)를 고려하여 복구할 수 있게 하는 보호 망 설계 방안을 제시한다. 제시한 설계 방안에 기초한 비용과 복구 특성을 분석과 모의 실험을 통해 알아본다. 제안하는 망에서의 복구는 분리 VP 그룹 (Disjoint Virtual Path Group, DVPG) 을 사용하는 상태 독립적 (State- independent) 방식으로 복구된다. ATM 망의 운용 및 보호 VP 할당과 용량 배정 문제를 정의하고 이를 바탕으로 최소의 비용을 갖는 VP 망을 설계한다. 망의 고장 시 기존 노드간의 VP 연결은 미리 할당된 링크 또는 노드 분리 보호 VP 경로를 따라 간단한 복구 알고리즘에 의해 빠르게 복구된다. QoS의 고려는 추가 비용을 필요로 하지만 정확한 이용자 연결의 복구를 실현하며, 분리 VP 그룹의 적용은 비용을 상승시키지만, 빠른 복구와 복수의 고장에 대처할 수 있는 방안이 된다.Abstract A cost evaluation of protection scheme for VP-based ATM network is presented here and its related characteristics are evaluated. The proposed and evaluated scheme is a state-independent restoration scheme using a disjoint path group. For fast and simple restoration of failed connections, link disjoint or node disjoint VP groups (DVPG) were utilized in this paper. A VP assignment and capacity planning problem is formulated. When failure occurs, the failed working VPs are switched to the protection VPs of disjoint path groups with a simple restoration scheme. And, cost evaluation and restoration characteristics are presented. The consideration of multiple QoS (Quality of Service) levels and disjoint path group protection scheme require additional network cost but acquire fit and fast restoration.