• 제목/요약/키워드: network protection system

검색결과 545건 처리시간 0.026초

Ethernet 기반 가입자망의 보호 및 절체에 대한 연구 (A study on the Protection/Restoration of High speed Ethernet in Optics Layer)

  • 신상배;조성대;박영일
    • 한국통신학회논문지
    • /
    • 제27권10C호
    • /
    • pp.933-936
    • /
    • 2002
  • 인터넷 사용의 급증으로 말미암아 패킷을 효과적으로 처리할 수 있는 이더넷 장비의 용량도 빠른 속도로 증가하고 있다. 한편 이더넷의 용량이 증가함에 따라 장치의 고신뢰성이 요구되고 있다. 본 논문에서는 현재 메트로 영역에서 사용되는 장치들에 적용 가능한 광링크 보호절체 방식을 제시하고 실험 결과를 보였다.

인공 면역계 기반 자율분산로봇 시스템의 협조 전략과 군행동 (Cooperative Strategies and Swarm Behavior in Distributed Autonomous Robotic Systems Based on Artificial Immune System)

  • 심귀보;이동욱;선상준
    • 제어로봇시스템학회논문지
    • /
    • 제6권12호
    • /
    • pp.1079-1085
    • /
    • 2000
  • In this paper, we propose a method of cooperative control (T-cell modeling) and selection of group behavior strategy (B-cell modeling) based on immune system in distributed autonomous robotic system (DARS). An immune system is the living bodys self-protection and self-maintenance system. these features can be applied to decision making of the optimal swarm behavior in a dynamically changing environment. For applying immune system to DARS, a robot is regarded as a B-cell, each environmental condition as an antigen, a behavior strategy as an antibody, and control parameter as a T-cell, respectively. When the environmental condition (antigen) changes, a robot selects an appropriate behavior strategy (antibody). And its behavior strategy is stimulated and suppressed by other robots using communication (immune network). Finally, much stimulated strategy is adopted as a swarm behavior strategy. This control scheme is based on clonal selection and immune network hypothesis, and it is used for decision making of the optimal swarm strategy. Adaptation ability of the robot is enhanced by adding T-cell model as a control parameter in dynamic environments.

  • PDF

IEMI 복사에 의한 네트워크 통신 장비의 취약성 분석 (Vulnerability Analysis of Network Communication Device by Intentional Electromagnetic Interference Radiation)

  • 서창수;허창수;이성우;진인영
    • 한국전기전자재료학회논문지
    • /
    • 제31권1호
    • /
    • pp.44-49
    • /
    • 2018
  • This study analyzed the Vulnerability of Network Communication devices when IEMI is coupled with the Network System. An Ultra Wide Band Generator (180 kV, 700 MHz) was used as the IEMI source. The EUTs are the Switch Hub and Workstation, which are used to configure the network system. The network system was monitored through the LAN system configuration, to confirm a malfunction of the network device. The results of the experiment indicate that a malfunction of the network occurs as the electric field increases. The data loss rate increases proportionally with increasing radiating time. In the case of the Switch Hub, the threshold electric field value was 10 kV/m for all conditions used in this experiment. The threshold point causing malfunction was influenced only by the electric field value. The correlation between the threshold point and pulse repetition rate was not found. However, in case of the Workstation, it was found that as the pulse repetition rate increases, the equipment responds weakly and the threshold value decreases. To verify the electrical coupling of the EUT by IEMI, current sensors were used to measure the PCB line inside the EUT and network line coupling current. As a result of the measurement, it can be inferred that when the coupling current due to IEMI exceeds the threshold value, it flows through the internal equipment line, causing a malfunction and subsequent failure. The results of this study can be applied to basic data for equipment protection, and effect analysis of intentional electromagnetic interference.

잊혀질 권리의 논의 동향과 우리나라 인터넷 법제의 수용과제 (Trend of Dispute on the Right to Be Forgotten and Acceptance Task of Internet Laws in Korea)

  • 정상기;김경열
    • 한국IT서비스학회지
    • /
    • 제12권1호
    • /
    • pp.131-141
    • /
    • 2013
  • Matters related to the right to be forgotten started the dispute Europe to introduce it first when Data Protection Directive established in 1995 proceeded revision. Relating to this, diverse disputes proceed on responding to personal information protection and internet laws in our nation. Especially as our National Assembly submitted the law regarding the promotion of information and communication network use and protection of information and amendment of copyright, it is necessary to look into the movement on introduction of law of right to be forgotten closely in detail. EU which attempted the institutionalization for the first time, relating to review of General Data Protection Regulation, proposed opinions such as the necessity to define subjects of personal information concretely and specifically and or protection target and balanced consideration on freedom of expression which is constitutional value. In the case of our nation, there was legislation attempt to introduce the regulation but it was limited in the form of fallen effectiveness without concrete and detailed review on internet law. To solve such problems, it is necessary to look into issues and matters to be considered required to accept right to be forgotten closely and discuss possibility of introducing right to be forgotten, conflicts between fundamental rights becoming issue, effect of goal achievement of personal information protection through the system introduction, and other rational acceptance method.

네트워크 배전계통용 백업 보호협조에 관한 연구 (Research on Backup Protective Coordination for Distribution Network)

  • 김우현;채우규;황성욱;김주용
    • KEPCO Journal on Electric Power and Energy
    • /
    • 제8권1호
    • /
    • pp.15-19
    • /
    • 2022
  • The radial distribution systems (RDS) commonly used around the world has the following disadvantages. First, when the DL is operated on a radial system, the line utilization rate is usually kept low. Second, if a fault occurs in the radial DL, a power outage of 3 to 5 minutes is occurring depending on the operator's proficiency and fault situation until the fault section is separated and the normal section is replaced. To solve this problem, Various methods have been proposed at domestic and foreign to solve this problem, and in Korea, research is underway on the advanced system of operating multiple linked DL always. A system that is electrically linked always, and that is built to enable high-speed communication during the protection coordination is named networked distribution system (NDS). Because the load shares the DL, the line utilization rate can be improved, and even if the line faults, the normal section does not need to be cut off, so the normal section does not experience a power outage. However, since it is impossible to predict in which direction the fault current will flow when a failure occurs in the NDS, a communication-based protection coordination is used, but there is no backup protection coordination method in case of communication failure. Therefore, in this paper, we propose a protective cooperation method to apply as a backup method when communication fails in NDS. The new method is to change TCC by location of CB using voltage drop in case of fault.

영상보안시스템에서의 데이터 보호를 위한 ECC(Elliptic Curve Cryptography) 연산알고리즘 비교분석 (A Comparative Analysis on ECC(Elliptic Curve Cryptography) Operation Algorit hm for Data Protection in Video security System)

  • 김종민;추현욱;이동휘
    • 융합보안논문지
    • /
    • 제19권5호
    • /
    • pp.37-45
    • /
    • 2019
  • 기술의 발전을 통해 기존 영상보안시스템들이 아날로드 방식의 CCTV에서 네트워크 기반 CCTV로 교체되어지고 있다. 이러한 기술 변화로 인해 네트워크를 이용한 도청 및 해킹에 대한 공격이 발생하게 되면 영상정보유출로 인해 개인 및 공공기관에 대한 피해는 막대하다 할 수 있다. 따라서 이러한 피해발생을 해결하기 위해 본 논문에서는 데이터 통신 과정에서 영상정보를 보호할 수 있는 ECC(Elliptic Curve Cryptography) scalar multiplication algorithm들을 비교 분석하여 영상시스템에서 최적화된 ECC scalar multiplication algorithm을 제안하고자 한다.

HVDC C&P 시스템의 네트워크 이중화 방법에 관한 연구 (A Study on Network Redundancy Method of HVDC C&P System)

  • Oh, Youngjin;Jung, Yong-Ho
    • 전력전자학회:학술대회논문집
    • /
    • 전력전자학회 2012년도 추계학술대회 논문집
    • /
    • pp.185-186
    • /
    • 2012
  • 본 논문에서는 HVDC C&P(High Voltage Direct Current Control and Protection) 시스템의 네트워크 이중화 방법을 제안한다. 본 논문에서 제안하는 HVDC C&P 시스템 네트워크 이중화 방법은 2개의 이더넷 라인을 제어기에 직접 연결하고, 연결된 라인으로 동시에 정보를 송신하여, 제어기에서 정보를 필터링하여 사용하는 방법을 사용한다. 또한 네트워크 라인의 효과적인 결선 체크를 위해 제어기간 송수신을 통해 네트워크 라인의 결선을 체크하는 방법을 사용한다. 위와 같은 방법은 HVDC C&P 시스템의 네트워크 안정성을 향상시키는 효과를 기대할 수 있다.

  • PDF

독일과 유럽의 전력계통연계 사례 및 한반도와 동북아지역 전력계통 연계검토 (Integration of the New Federal Laender into the Interconnected West European Power System)

  • 윤갑구
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1997년도 추계학술대회 논문집 학회본부
    • /
    • pp.177-181
    • /
    • 1997
  • Many countries are trying to develope the sustainable energy and environmental protection through a more concrete international cooperation. In this paper, the necessity and technical & economical feasibility on the interconnection of power systems in the South Korea, North Korea and North East Asia Region are emphasized with reference to the interconnection between the integrated power system according to the reunification of Germany and the Western European Power System. The Germany has a similar experience of separation and disconnection of their power system what happened in the Korean peninsula. Particularly the Power Economics And Clean Environment Network that could contribute to the PEACE promotion. Through the PEACE NETWORK PROJECT, the interconnection of power systems in North-Eastern Asia should be discussed in serious.

  • PDF

컴퓨터 네트워크의 데이터 보호방식 (A Method for Data Security in Computer Network)

  • 류수항;최병욱
    • 대한전자공학회논문지
    • /
    • 제22권3호
    • /
    • pp.6-10
    • /
    • 1985
  • 본 논문에서는 컴퓨터 네트워크 상에서 전송되는 데이타 또는 다수이용자 시스템 (multi-user system)에서 file을 보호하기 위해 이용되고 있는 cryptography에 대하여 논한다. 본 system은 conventional cry-ptography의 키를 Public key cryptography로 관리함으로서 처리속도가 빠르고 키의 관리가 용이하며 새로운 인증자 함수에 의해 확실한 서명문을 얻을 수 있다.

  • PDF

Vehicles Auto Collision Detection & Avoidance Protocol

  • Almutairi, Mubarak;Muneer, Kashif;Ur Rehman, Aqeel
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.107-112
    • /
    • 2022
  • The automotive industry is motivated to provide more and more amenities to its customers. The industry is taking advantage of artificial intelligence by increasing different sensors and gadgets in vehicles machoism is forward collision warning, at the same time road accidents are also increasing which is another concern to address. So there is an urgent need to provide an A.I based system to avoid such incidents which can be address by using artificial intelligence and global positioning system. Automotive/smart vehicles protection has become a major study of research for customers, government and also automotive industry engineers In this study a two layered novel hypothetical approach is proposed which include in-time vehicle/obstacle detection with auto warning mechanism for collision detection & avoidance and later in a case of an accident manifestation GPS & video camera based alerts system and interrupt generation to nearby ambulance or rescue-services units for in-time driver rescue.