• Title/Summary/Keyword: network resiliency

Search Result 23, Processing Time 0.026 seconds

Technology and Standardization Trends of Carrier Ethernet (캐리어 이더넷 기술 및 표준화 동향)

  • Kang, T.K;Cheung, T.S.;Yu, J.H.
    • Electronics and Telecommunications Trends
    • /
    • v.24 no.3
    • /
    • pp.78-90
    • /
    • 2009
  • 이더넷(Ethernet)은 본래 캠퍼스, 기업이나 가정 등 근거리의 LAN 영역에 주로 사용되는 기술이었으나 플러그 앤 플레이(plug and play)와 같은 단순함(simplicity), 적은 설치 비용 및 쉬운 운용 등을 장점으로, 통신 사업자 및 운용자(carrier)의 고유영역인 MAN/WAN에서도 사용 가능한 메트로 이더넷 및 캐리어 이더넷(Metro/Carrier Ethernet)으로 빠른 속도로 진화 발전하고 있는 상황이다. 캐리어 이더넷은 탄력성(resiliency), 신뢰성(reliability), 확장성(scalability), 관리성(manageability) 등과 같은 특징을 중요시하는 통신 사업자 환경에서 이더넷 기반 서비스를 제공할 수 있는 확장된 이더넷 기술을 의미한다. 본 고에서는 캐리어 이더넷 기술에 대한 정의와 관련 서비스를 소개하고, MEF, IEEE 802, ITU-T, IETF 등 국제 기구 및 연관 포럼에서 진행중인 캐리어 이더넷 기술의 표준화 동향을 살펴보고자 한다.

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher

  • Marpaung, Jonathan A.P.;Ndibanje, Bruce;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.237-245
    • /
    • 2014
  • In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv's Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the algorithm, and introducing a key refreshment scheme. Our contribution brings improvements to previous countermeasures making the implementation resistant to higher-order attacks. Four functional metrics, namely resiliency, robustness, resistance, and scalability, were used for the assessment. Finally, performance costs were measured using memory usage and execution time. In this work, it was demonstrated that although attacks can be feasibly carried out on unprotected systems, the proposed countermeasures can also be feasibly developed and deployed on resource-constrained devices, such as wireless sensors.

Variation for Mental Health of Children of Marginalized Classes through Exercise Therapy using Deep Learning (딥러닝을 이용한 소외계층 아동의 스포츠 재활치료를 통한 정신 건강에 대한 변화)

  • Kim, Myung-Mi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.725-732
    • /
    • 2020
  • This paper uses variables following as : to follow me well(0-9), it takes a lot of time to make a decision (0-9), lethargy(0-9) during physical activity in the exercise learning program of the children in the marginalized class. This paper classifies 'gender', 'physical education classroom', and 'upper, middle and lower' of age, and observe changes in ego-resiliency and self-control through sports rehabilitation therapy to find out changes in mental health. To achieve this, the data acquired was merged and the characteristics of large and small numbers were removed using the Label encoder and One-hot encoding. Then, to evaluate the performance by applying each algorithm of MLP, SVM, Dicesion tree, RNN, and LSTM, the train and test data were divided by 75% and 25%, and then the algorithm was learned with train data and the accuracy of the algorithm was measured with the Test data. As a result of the measurement, LSTM was the most effective in sex, MLP and LSTM in physical education classroom, and SVM was the most effective in age.

Disaster Resilience in Self-Organized Interorganizational Networks: Theoretical Perspectives and Assessment

  • Jung, Kyujin
    • Journal of Contemporary Eastern Asia
    • /
    • v.15 no.1
    • /
    • pp.98-110
    • /
    • 2016
  • Building resilient community is often a complicated process to be gained by interorganizational collaboration. Since patterns of interorganizational relations among governments and sectors are constantly changing due to internal and external factors in the field of emergency management, understanding the dynamic nature of interorganizational collaboration is a critical step for improving a community’s ability to bounce back from a catastrophic event. From two theoretical perspectives, this research aims to examine the essential role of working across levels of governments and sectors in building resilient community by focusing on sources of community resiliency and a strong commitment. The empirical evidence highlights the importance of studying resilience as a way to understand the motivation and incentive for organizations to work jointly during emergency response. The study of organizational resilience also draws attention for the importance of various forms of interorganizational collaboration such as formal and informal relations. It also highlights how local organizations can utilize their relations to seek resources without necessarily jeopardizing their ability to perform their core organizational functions.

Performance of a RBSN under RCP Scenarios in Korea

  • Kwon, You Jeong;Seo, Yongwon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.124-124
    • /
    • 2018
  • 본 연구에서는 과거 강우자료 (1971-2000)와 대표농도경로 RCP 4.5와 8.5 (2071-2100)를 사용하여 RBSN(Rain Barrel sharing Network)의 효과를 비교 검토 하였다. IPCC 5차 평가 보고서에 의하면 앞으로의 기후변화에 있어 우리나라의 강수량은 온실가스 배출량을 저감에 관계없이 증가할 것으로 예상된다. 이것은 활용가능한 수자원이 늘어나지만, 장마와 집중호우로 인한 피해가 증가할 수도 있는 점을 나타낸다. 이와 같은 미래 기후 변화에 효과적으로 대응하기 위한 방법으로 RBSN을 적용하여 과거 강우자료와 온실가스 시나리오 하에서의 성능을 비교하였다. RBSN의 성능을 평가하는 기준으로 신뢰성, 복원탄력성, 취약성을 사용하였다. 분석 결과 RBSN 적용 시 네트워크의 증가에 따른 신뢰성과 취약성은 기후변화 시나리오 하에서 각각 3.44%, 49.18% 향상되었고, 복원 탄력성이 16.73% 감소하는 것으로 나타났다.

  • PDF

A Resource-Optimal Key Pre-distribution Scheme for Secure Wireless Sensor Networks

  • Dai Tran Thanh;Hieu Cao Trong;Hong Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1113-1116
    • /
    • 2006
  • Security in wireless sensor networks is very pressing especially when sensor nodes are deployed in hostile environments. To obtain security purposes, it is essential to be able to encrypt and authenticate messages sent amongst sensor nodes. Keys for encryption and authentication must be agreed upon by communicating nodes. Due to resource limitations and other unique features, obtaining such key agreement in wireless sensor network is extremely complex. Many key agreement schemes used in general networks, such as trusted server, Diffie-Hellman and public-key based schemes, are not suitable for wireless sensor networks [1], [2], [5], [7], [8]. In that situation, key pre-distribution scheme has been emerged and considered as the most appropriate scheme [2], [5], [7]. Based on that sense, we propose a new resource-optimal key pre-distribution scheme utilizing merits of the two existing key pre-distribution schemes [3], [4]. Our scheme exhibits the fascinating properties: substantial improvement in sensors' resource usage, rigorous guarantee of successfully deriving pairwise keys between any pair of nodes, greatly improved network resiliency against node capture attack. We also present a detailed analysis in terms of security and resource usage of the scheme.

  • PDF

An Implementation on the XOR-ACC of Multimedia Fingerprinting using Neural Network (신경망을 이용한 멀티미디어 핑거프린팅의 XOR-ACC 구현)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.1-8
    • /
    • 2011
  • In multimedia fingerprinting field, it is many used a code based on BIBD, which has a strong resiliency of anti-collusion. When a collusion-attack code is generated with a logical XOR operation using the code based on BIBD, then some cases are occurred that a colluded code could be generated to the same fingerprint of non-colluder on the other hand, the colluder is decided to the non-colluder so that he would be excepted in the colluder tracing. For solving the serious problem of the wrong decision of the colluder tracing in this paper, XOR-ACC is implemented using multi-layer perceptron neural network among (AND, OR, XOR and Averaging)-ACC by the measured correlation coefficient. Through the experiment, it confirms that XOR-ACC efficiency of multimedia fingerprinting code{7,3,1} based on BIBD is improved to 88.24% from the conventional 41.18%, so that a ratio of the colluder tracing is also improved to 100% from the conventional 53%. As a result, it could be traced and decided completely a sectional colluder and non-colluder about the collusion attacks.

Lessons from constructing and operating the national ecological observatory network

  • Christopher McKay
    • Journal of Ecology and Environment
    • /
    • v.47 no.4
    • /
    • pp.187-192
    • /
    • 2023
  • The United States (US) National Science Foundation's (NSF's) National Ecological Observatory Network (NEON) is a continental-scale observation facility, constructed and operated by Battelle, that collects long-term ecological data to better understand and forecast how US ecosystems are changing. All data and samples are collected using standardized methods at 81 field sites across the US and are freely and openly available through the NEON data portal, application programming interface (API), and the NEON Biorepository. NSF led a decade-long design process with the research community, including numerous workshops to inform the key features of NEON, culminating in a formal final design review with an expert panel in 2009. The NEON construction phase began in 2012 and was completed in May 2019, when the observatory began the full operations phase. Full operations are defined as all 81 NEON sites completely built and fully operational, with data being collected using instrumented and observational methods. The intent of the NSF is for NEON operations to continue over a 30-year period. Each challenge encountered, problem solved, and risk realized on NEON offers up lessons learned for constructing and operating distributed ecological data collection infrastructure and data networks. NEON's construction phase included offices, labs, towers, aquatic instrumentation, terrestrial sampling plots, permits, development and testing of the instrumentation and associated cyberinfrastructure, and the development of community-supported collection plans. Although colocation of some sites with existing research sites and use of mostly "off the shelf" instrumentation was part of the design, successful completion of the construction phase required the development of new technologies and software for collecting and processing the hundreds of samples and 5.6 billion data records a day produced across NEON. Continued operation of NEON involves reexamining the decisions made in the past and using the input of the scientific community to evolve, upgrade, and improve data collection and resiliency at the field sites. Successes to date include improvements in flexibility and resilience for aquatic infrastructure designs, improved engagement with the scientific community that uses NEON data, and enhanced methods to deal with obsolescence of the instrumentation and infrastructure across the observatory.

Design and Implementation of Linear Protection Switching for Fast Restoration in Carrier-class Ethernet Networks (캐리어 이더넷 망에서 빠른 절체를 위한 선형 프로텍션 스위칭 기능 설계 및 구현)

  • Ahn, Kye-Hyun;Kim, Kwang-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.883-891
    • /
    • 2009
  • This paper proposes Ethernet linear protection switching technology in order to provide the SONET/SDH-like resiliency over Metro Ethernet Networks. The proposed design is made of an architecture with a control processor board and several data processing boards, where the control processor board is independent of data processing board, providing a flexible solution for carrier Ethernet system. However, it leads an increasing message delay between inter-processors. In this paper, we implement and confirm a restoration of failed transport connections withing 50 millisecond in spite of increasing message delay between the control processing board and data processing board providing carrier-class network survivability.

Reliable Methods of Interoperability between Packet Transport Networks and IP Networks (고신뢰성을 보장하는 패킷전달망-IP망 상호연동 방법)

  • Lee, Kwang-Koog;Lee, Hosong;Lee, Youngwuk;Jeong, Kitae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.34-40
    • /
    • 2014
  • With the economical data service delivery, the packet transport network (PTN) technologies have emerged as an important player in the next-generation transport networks. As the PTN continues to make such considerable progress, it is being challenged by network providers who need rapid and reliable recovery capabilities to guarantee the availability of their services. This paper introduces several fault detection mechanisms for a client signal failure in packet transport networks and proposes a reliable transmission method of IP flows from routers using the combination of Ethernet services. Based on the first fault detection methods, client signal fault is detected within tens or hundreds of milliseconds. It enables the client network devices to perform their own recovery processes within one second. The second mechanism enables failed Ethernet services to be bypassed via other Ethernet services over disjoint paths, so as to contribute on reducing packet loss of IP traffic.