• Title/Summary/Keyword: TCP/IP.

Search Result 1,048, Processing Time 0.027 seconds

A Study regarding IP Traceback designs and security audit data generation. (IP 역추적 설계 및 보안감사 자료생성에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.53-64
    • /
    • 2007
  • Avoid at damage systems in order to avoid own IP address exposure, and an invader does not attack directly a system in recent hacking accidents at these papers, and use Stepping stone and carry out a roundabout attack. Use network audit Policy and use a CIS, AIAA technique and algorithm, the Sleep Watermark Tracking technique that used Thumbprints Algorithm, Timing based Algorithm, TCP Sequence number at network bases, and Presented a traceback system at TCP bases at log bases, and be at these papers Use the existing algorithm that is not one module in a system one harm for responding to invasion technology develop day by day in order to supplement the disadvantage where is physical logical complexity of configuration of present Internet network is large, and to have a fast technology development speed, and presentation will do an effective traceback system.

  • PDF

Minimizing Machine-to-Machine Data losses on the Offshore Moored Buoy with Software Approach (소프트웨어방식을 이용한 근해 정박 부이의 기계간의 데이터손실의 최소화)

  • Young, Tan She;Park, Soo-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.7
    • /
    • pp.1003-1010
    • /
    • 2013
  • In this paper, TCP/IP based Machine-to-Machine (M2M) communication uses CDMA/GSM network for data communication. This communication method is widely used by offshore moored buoy for data transmission back to the system server. Due to weather and signal coverage, the TCP/IP M2M communication often experiences transmission failure and causing data losses in the server. Data losses are undesired especially for meteorological and oceanographic analysis. This paper discusses a software approach to minimize M2M data losses by handling transmission failure and re-attempt which meant to transmit the data for recovery. This implementation was tested for its performance on a meteorological buoy placed offshore.

Performance Evaluation of TCP/IP on ATM LAM Testbed (ATM LAN 시험망에서 TCP/IP 프로토콜의 성능분석)

  • Jang, Woo-Hyun;Lee, Se-Yul;Hwang, Sun-Myung;Lee, Bong-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3634-3641
    • /
    • 1999
  • LAN Emulation and IPOA are the two most widei y accepted network protocols which allow to provide conventional LAN-based data services on ATM LAN environment. In this paper, the performance of IPOA and LAN Emulation on ATM LAN testbed is compared and the results are compared with performance of Ethernet as well. For performance comparison, metrics such as application throughput, latency, CPU usage are used. In addition, a network program that uses the socket based TCP/IP application programming interface to send large data files from client to server via ATM LAN switch is developed. IPOA provides lower latency and higher throughput than LAN Emulation while LAN Emulation consumes more CPU usage.

  • PDF

Smart Door Lock Systems using encryption technology (암호화 기법을 활용한 사물인터넷 기반의 스마트 도어락 시스템)

  • Lee, Sung-Won;Park, Seung-Min;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.27 no.1
    • /
    • pp.65-71
    • /
    • 2017
  • Since existing Internet of Things(IoT) is vulnerable, it may cause property damage due to the information leakage. Especially, the smart door lock system built on the IoT can cause more damage. To solve these problems, this paper classify the data generated by the sensor according to the condition and send an alarm message to the user's smartphone through Google Cloud Message (GCM). We made it possible to check the images in real time through the smartphone application and control the door lock using the TCP / IP protocol. Also, we applied OTP-Based Matrix SEED algorithm to door lock system to improve security.

IP Over USB for Improved QoS of UDP/IP Messages (UDP/IP 메시지 전송의 QoS 성능 향상을 위한 IP Over USB)

  • Jang, Byung-Chul;Park, Hyeon-Hui;Yang, Seung-Min
    • The KIPS Transactions:PartA
    • /
    • v.14A no.5
    • /
    • pp.295-300
    • /
    • 2007
  • The Linux-based embedded systems such as mobile telephones. PDAs and MP3 players are widely in use. USB(Universal Serial Bus) is the interface for data communication between the computers and these peripheral devices. Some embedded systems like intelligent home networking and multimedia streaming require guaranteed QoS(Quality of Service), which is needed for real time transmission of UDP/IP messages through USB. Although USB Ethernet driver is supported by USB Gadget API in Linux, it is unable to provide the desirable QoS required by each type or small embedded systems due to the unpredictability or TCP/IP Stack in Linux. This paper proposes IP-Over-USB to improve QoS of UDP/IP message transmission in the embedded systems using USB in Linux system.

A Study on Performance Evaluation based on Packet Dropping in ATM Network . New Scheme Proposal

  • Park, Seung-Seob;Yuk, Dong-Cheol
    • Journal of Navigation and Port Research
    • /
    • v.27 no.3
    • /
    • pp.283-288
    • /
    • 2003
  • Recently, the growth of applications and services over high-speed Internet increases, ATM networks as wide area back-bone has been a major solution. As the conventional TCP/IP suite is still the standard protocol used to support upper application on current. Internet, the issues regarding whether TCP/IP will operate efficiently on top of an ATM infrastructure and how to control its QoS still remain for studies. TCP uses a window-based protocol for flow control in the transport layer. When TCP uses the UBR service in ATM layer, the control method is only buffer management. If a cell is discarded in ATM layer, one whole packet of TCP will be lost; this fact occur the most TCP performance degradation. Several dropping strategies, such as Tail Drop, EPD, PPD, SPD, FBA, have been proposed to improve the TCP performance over ATM. In this paper, to improve the TCP performance, we propose a packet dropping scheme that is based on comparison with EPD, SPD and FBA. Our proposed scheme is applied to schemes discussed in the previous technology. Our proposed scheme does not need to know each connection's mean packet size. When the buffer exceeds the given threshold, it is based on comparison between the number of dropped packet and the approved packet. Our results are reported and discussed for comparing these discarding schemes under similar conditions. Although the number of virtual channel (VC) is increased, the simulation results showed that the proposed scheme can allocate more fairly each VC than other scheme.

Technical Prevention Scheme for the Information-Superhighway Infrastructure (초고속정보통신기반의 기술적 보호)

  • Park, Jeong-Hyeon;Kim, Seong-Yeon;Kim, Seong-Gyu;Park, Yeong-Ho
    • Electronics and Telecommunications Trends
    • /
    • v.12 no.3 s.45
    • /
    • pp.18-32
    • /
    • 1997
  • 초고속정보통신기반에서의 보호는 크게 사용자 측면, 서비스 측면, 네트워크 측면 그리고 관리 측면으로 분류할 수 있다. 본 논문에서는 이러한 측면들 가운데 초고속정보통신기반 보호기술이 가장 절실한 네트워크 측면에서의 보호를 크게 OSI, TCP/IP, ATM으로 나누어 검토하여, OSI 참조모델을 위한 NLSP와 TLSP방식, TCP/IP를 위한 IP보호 방식, 그리고 ATM 보호방식을 각각 제시했다.

Design and Implementation of TOE Module Supporting Binary Compatibility for Standard Socket Interfaces (표준 소켓 인터페이스에 대한 바이너리 호환성을 제공하는 TOE 지원 모듈의 설계 및 구현)

  • Kang Dong-Jae;Kim Chei-Yeol;Kim Kang-Ho;Jung Sung-In
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1483-1495
    • /
    • 2005
  • TCP/IP is the most commonly used protocol to communicate among servers, and is used in a wide range of applications. Unfortunately, Data transmission through TCP/IP places a very heavy burden on host CPUs. And it hardly makes another job to be processed. So, TOE(TCP/IP Offload Engine) is considered in many servers. But, most of TOE modules tends to not support binary compatibility for standard socket interfaces. So, it has problems that existing applications should be modified and recompiled to get advantage of TOE device. In this paper, to resolve upper problems, we suppose design and implementation of TOE module supporting binary compatibility for standard socket interfaces. Also, it can make a usage of multiple TOEs and NICs simultaneously.

  • PDF

Development of electro hydraulic ballast remote valve control system with diagnostic function using redundant modbus communication (이중화 모드버스 통신을 이용한 퍼지기반 고장진단기능을 가진 선박 밸러스트 전기유압식 원격밸브제어시스템 개발)

  • Kim, Jong Hyun;Yu, Yung Ho
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.3
    • /
    • pp.292-301
    • /
    • 2014
  • This paper describes development of distributed type independent electro-hydraulic ballast valve remote control system with diagnostic function based on fuzzy inference using redundant Modbus communication and ethernet Modbus TCP/IP. Diagnostic function estimate degradation of system components and diagnose system faults, which results in shortage of fault maintenance time and improvement of system safety. Slave devices which control each valve and master device which command, monitor and diagnose slave system are developed. Slave devices are connected to master device with redundant Modbus networks and master device is connected to ship's integrated control system with Modbus TCP/IP. Also this paper describes development of simulator to test and confirm whether developed system can be integrated with ship's integrated control and monitoring system.

A Direction of Convergence and Security of Smart Grid and Information Communication Network (스마트그리드(Smart Grid) 전력망과 정보통신망 융합 보안 방향)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.477-486
    • /
    • 2010
  • This Study suggests security directions to reconstruct separate network of Smart Grid and information communication network as one communications system and implement Smart Grid integrated information communication network. In addition, it suggests prevention directions to prevent future cyber attacks by reorganizing network as the key three-stage network and separating TCP/IP four layers that consist of existing information communication network from Smart Grid. Moreover, it suggests the foundation for the study and the test by providing current problems of Smart Grid, weak points, and three security models. This study is meaningful to suggest development directions and situations as a technology of future-oriented electric industries, integrate attacks and preventions of TCP/IP Layers with Smart Grid, and seek for a new technology of Smart Grid and future tasks for Smart Grid information security.