• 제목/요약/키워드: network scope

검색결과 329건 처리시간 0.025초

유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구 (A study on unmanned watch system using ubiquitous sensor network technology)

  • 위겸복
    • 안보군사학연구
    • /
    • 통권7호
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF

불안정한 주문 패턴의 수요에 대응하는 재고 관리 기법을 응용한 생산계획 수립 방법 (The Way of Production Planning Using the Inventory Control Method, Responding the Demand Fluctuation)

  • 배병곤;조중현;강경식
    • 대한안전경영과학회지
    • /
    • 제9권3호
    • /
    • pp.119-125
    • /
    • 2007
  • As competition in manufacturing enterprise is contested, the scope of safely production planning, manufacturing enterprise should ensure, has been reduced. The more upstream of SCM, the more reduction of scope of production planning. As a result, order fluctuation is more sharply contested. Through improving the logistics network, it is best way that the end user's demand information is conveyed to upstream of SCM, but it is difficult in fact. In this paper, it mention the way of robustic adjustment, in the suppliers' point of view, the end user's demand information is dammed up, as they postpone responding the customer's order as a possible. And it will show the result of appling the way, as a case study.

이더넷 네트워크의 시간 동기화 검증을 위한 IEEE 1588v2 PTP 구현 (Implementation of IEEE 1588v2 PTP for Time Synchronization Verification of Ethernet Network)

  • 김성진;고광만
    • 정보처리학회논문지A
    • /
    • 제19A권4호
    • /
    • pp.181-186
    • /
    • 2012
  • 분산 환경의 계측 및 제어 시스템에서 분산된 디바이스들의 복잡한 동기화 구조를 해결하기 위한 기술의 필요성이 요구되며 그러한 분산시스템 환경에서 시간 동기화를 위해 IEEE 표준인 정밀 클럭 동기화 프로토콜(Precision Clock Synchronization Protocol)을 사용함으로써 문제를 해결 할 수 있다. 본 논문에서는 정확한 시간 동기화를 계측하기 위해 지연 요청-응답(Delay Request-Response) 메커니즘을 이용하여 IEEE 1588v2 PTP를 계측하고 제어 할 수 있는 기능을 BlueScope BL6000A에 구현하였다.

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권10호
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

확장된 군 통신망에 적용되는 VoIPv6 성능분석 (Performance Evaluation of VoIPv6 in a Large-Scaled u-Army Network)

  • 김기범;민상원
    • 한국통신학회논문지
    • /
    • 제36권8B호
    • /
    • pp.897-903
    • /
    • 2011
  • 본 논문에서는 현재 육군에서 진행하고 있는 VoIPv6 네트워크 구축 사업에 적용될 예정인 네트워크를 시뮬레이션을 통해 성능을 예측하고 그 결과를 도출하였다. 본 논문의 시뮬레이션에 앞서 선행하였던 첫 번째 u-Army 시뮬레이션의 경우 실험 부대 내로 범위를 한정하여 VoIPv6 네트워크의 성능을 측정하였다면 이번 시뮬레이션에서는 범위를 확장하여 사단 전체에 적용하였을 경우 설계한 VoIPv6 네트워크가 어느 정도의 성능이 나오고 실제 육군의 요구사항에 부합하는지를 예측하는 시뮬레이션이다. 시뮬레이션은 사단에 실제 적용할 네트워크를 모델링하여 사용하였고, 서비스를 사용하는 다양한 상황을 가정하고 시뮬레이션 조건으로 적용하여 네트워크에서 어느 정도까지 서비스를 제공할 수 있는 지를 시뮬레이션 하였다. 도출된 결과는 네트워크의 성능을 예측하여 향후 전군으로 적용될 경우 군 상황과 규모에 적합한 네트워크 구축에 도움을 줄 것이다

Location Based Concierge Service with Spatially Extended Topology for Moving Objects

  • Lee, Byoung-Jae
    • Spatial Information Research
    • /
    • 제17권4호
    • /
    • pp.445-454
    • /
    • 2009
  • 이 연구는 센서 네트워크를 통한 단순한 정보 전달을 넘어서서 유비쿼터스 컴퓨팅 환경에서의 진정한 상황인식 위치 기반 서비스를 구현하기 위한 방법에 대한 제안을 하고자 한다. 그러기 위해, 이 글에서는 점 개체의 영향력 범위에 대한 새로운 형식의 접근이 소개된다. 여기서, 영향력 범위란 점 개체 주변에 점 개체로 인해 어떤 현상이나 사건이 발생한 가능성이 있는 구역을 설정한 것을 뜻한다. 점 개체는 이러한 영향력 범위설정을 통해 공간적으로 확장 될 수 있다. 이러한 점 개체를 Spatially Extended Point (SEP) 개체라 한다.SEP와 그 주변 환경 사이의 위상적 관계의 점진적 변화 조합은 그 개체의 정성적 공간 행위를 표현하는데 이용될 수 있다. 이렇게 표현된 정성적 공간 행위들은 좀더 구체적이고 적합한 정보를 사용자에게 제공하는데 필요한 기준으로 쓰일 수 있다.

  • PDF

The Improved Estimation of the Least Upper Bound to Search for RSA's Private key

  • Somsuk, Kritsanapong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.2074-2093
    • /
    • 2022
  • RSA is known as one of the best techniques for securing secret information across an unsecured network. The private key which is one of private parameters is the aim for attackers. However, it is exceedingly impossible to derive this value without disclosing all unknown parameters. In fact, many methods to recover the private key were proposed, the performance of each algorithm is acceptable for the different cases. For example, Wiener's attack is extremely efficient when the private key is very small. On the other hand, Fermat's factoring can quickly break RSA when the difference between two large prime factors of the modulus is relatively small. In general, if all private parameters are not disclosed, attackers will be able to confirm that the private key is unquestionably inside the scope [3, n - 2], where n is the modulus. However, this scope has already been reduced by increasing the greatest lower bound to [dil, n - 2], where dil ≥ 3. The aim of this paper is to decrease the least upper bound to narrow the scope that the private key will remain within this boundary. After finishing the proposed method, the new scope of the private key can be allocated as [dil, dir], where dir ≤ n - 2. In fact, if the private key is extremely close to the new greatest lower bound, it can be retrieved quickly by performing a brute force attack, in which dir is decreased until it is equal to the private key. The experimental results indicate that the proposed method is extremely effective when the difference between prime factors is close to each other and one of two following requirement holds: the first condition is that the multiplier of Euler totient function is very close to the public key's small value whereas the second condition is that the public key should be large whenever the multiplier is far enough.

Study on The Development of Basic Simulation Network for Operational Transient Analysis of The CANDU Power Plant

  • Park, Jong-Woon;Lim, Jae-cheon;Suh, Jae-seung;Chung, Ji-bum;Kim, Sung-Bae
    • 한국원자력학회:학술대회논문집
    • /
    • 한국원자력학회 1995년도 추계학술발표회논문집(1)
    • /
    • pp.423-428
    • /
    • 1995
  • Simulation models have been developed to predict the overall behavior of the CANDU plant systems during normal operational transients. For real time simulation purpose, simplified thermal hydraulic models are applied with appropriate system control logics, which include primary heat transport system solver with its component models and secondary side system models. The secondary side models are mainly used to provide boundary conditions for primary system calculation and to accomodate plant power control logics. Also, for the effective use of simulation package, hardware oriented basic simulation network has been established with appropriate graphic display system. Through validation with typical plant power maneuvering cases using proven plant performance analysis computer code, the present simulation package shows reasonable capability in the prediction of the dynamic behavior of plant variables during operational transients of CANDU plant, which means that this simulation tool can be utilized as a basic framework for full scope simulation network through further improvements.

  • PDF

Perspective Framework on the Fourth-Generation Mobile Communication Systems

  • Kim, Jin-Young;Kim, Duk-Kyung;Park, Seong-Soo;Lee, Goon-Seop;Ryu, Si-Hoon;Chang, Myung-Rae;Koo, Jun-Mo
    • Journal of Communications and Networks
    • /
    • 제4권4호
    • /
    • pp.321-335
    • /
    • 2002
  • Emergence of the fourth generation mobile communication system (4G system) is now in its dawn. This article proposes a perspective framework on the 4G system, and discusses various kinds of system aspects and technological requirements in terms of novel service features, spectrum management, radio access technologies, wired access integration, core network, and mobile terminal. The focus of the article is to define the scope and features of the 4G system in an overall system/network viewpoint. From the foreseeable development trends, it is highly expected that whatever emerges in the 4G system will be some kind of constantly evolving and grand recursive concatenation of all the existing system/network developments.

Developing Measures for Empirical Research on Economic Activities of the Convergence Generation: Exploratory Approach

  • Park, Ki-Ho
    • 디지털융복합연구
    • /
    • 제9권1호
    • /
    • pp.61-70
    • /
    • 2011
  • Ultimately, this research will focus on the activity traits of future customers in the convergence age. To accomplish that, firstly, researcher develop measures for assessing the convergence level of digital devices and digital services. Next, this will investigate the behavioral traits of people who use specific devices or services on the internet or mobile networks. This study proposed five convergence measures each for devices and services. For digital devices, measures such as converged functions, accessibility to network, portability, immediate communicability, and expandibility of functions were utilized. For digital measures such as scope of users, newness, social network level, ease-of use on mobile networks, and expandibility of information were used. We believe that the research results can provide insights for those wishing to explore the convergence level of devices and services and those developing high-level converged devices and digital services.