• 제목/요약/키워드: network system

검색결과 21,905건 처리시간 0.044초

Web-based Application Service Management System for Fault Monitoring

  • Min, Sang-Cheol;Chung, Tai-Myoung;Park, Hyoung-Woo;Lee, Kyung-Ha;Pang, Kee-Hong
    • Journal of Electrical Engineering and information Science
    • /
    • 제2권6호
    • /
    • pp.64-73
    • /
    • 1997
  • Network technology has been developed for very high-speed networking and multimedia data whose characteristics are the continuous and bursty transmission as well as a large amount of data. With this trend users wish to view the information about the application services as well as network devices and system hardware. However, it is rarely available for the users the information of performance or faults of the application services. Most of information is limited to the information related network devices or system hardware. Furthermore, users expect the best services without knowing the service environments in the network and there is no good way of delivering the service related problems and fault information of application services in a high speed network yet. In this paper we present a web-based application management system that we have developed for the past year. It includes a method to build an agent system that uses an existing network management standards, SNMP MIB and SNMP protocols. The user interface of the system is also developed to support visualization effects with web-based Java interface which offers a convenient way not only to access management information but also to control networked applications.

  • PDF

자동차 네트워크 시스템의 효율적 관리를 위한 CAN의 동적 선행대기 열 기법 (A Dynamic Precedence Queue Mechanism of CAN for An Efficient Management of Automobile Network System)

  • 최호식;최효식;이장명
    • 제어로봇시스템학회논문지
    • /
    • 제12권6호
    • /
    • pp.614-620
    • /
    • 2006
  • Today the automobile has been changed from a mechanical system to an electronic control system fly the development of the electronic technology. In the automobile body, most of these electronic control devices are networked and managed fully by the CAN protocol. But, when a network system is overloaded, unexpected transmission delay for relative low priority objects occurs due to the static priority definition of the CAN protocol. To resolve this problem, this paper proposes a dynamic precedence queue mechanism that creates a queue for the low priority object and its relevant objects to be transmitted, which becomes urgent in an overloaded network system to keep the maximum allowable time delay. For the generated queue, the highest priority is assigned to transmit the queued objects within the shortest time. The mechanism is implemented in the logical link layer of CAN, which does not require any modification of the old CAN hardware. Effectiveness of the proposed mechanism is verified by the real experiments with an automobile network system.

RFID 출입통제시스템과 연동한 네트워크 이중 접근통제 시스템 (Network 2-Factor Access Control system based on RFID security control system)

  • 최경호;김종민;이대성
    • 융합보안논문지
    • /
    • 제12권3호
    • /
    • pp.53-58
    • /
    • 2012
  • 내부에 있는 정보를 보호하기 위한 노력들 중 하나인 네트워크 접근통제 시스템의 적용은 내부 사용자들의 효과적 제어 및 자동적인 네트워크 관리와 보안을 가능하게 한다. 그러나 이미 허가된 PC 또는 모바일 기기로 위장하거나 자리를 비운 사용자의 인가된 시스템을 이용하여 내부 네트워크에 접속할 수 있는 문제점이 있다. 또한 허가된 PC 또는 모바일 기기의 악성코드 감염으로 인해 사용자가 직접 사용하는 시간 이외에도 동작하여 비의도적인 정보유출 및 내부 네트워크 공격 등이 발생할 수 있다. 따라서 내부 네트워크에 접속을 허가 받은 이가 인가된 장비를 이용하여 접근정책에 따른 통신을 수행하고 있는지를 확인해야 한다. 이를 위해 본 연구에서는 RFID 출입통제시스템과 연동한 네트워크 이중 접근통제 시스템을 제안한다. 제안된 시스템은 내부 네트워크 접속 시 이중인증을 수행함으로써 허가된 사용자가 인가된 장비를 이용하여 통신을 수행하는 환경을 제공한다.

모바일 로봇 및 네트워크 카메라 기반 지능형 감시 시스템 설계 (A Design of Intelligent Surveillance System Based on Mobile Robot and Network Camera)

  • 박정현;이민영;심귀보
    • 한국지능시스템학회논문지
    • /
    • 제18권4호
    • /
    • pp.476-481
    • /
    • 2008
  • 보안이 중요시되는 공간에서 지능형 감시 시스템의 필요성이 점차 중요시되고 있다. 본 논문에서는 embedded Linux 기반의 Mobile Robot에 Network Camera를 탑재하여 침입자를 추적할 수 있는 시스템 구현에 목적을 두고 있다. Network Camera부터 Wireless Lan을 이용하여 서버로 영상을 전송하고, 서버에서 블록매칭 알고리즘을 이용하여 침입자의 이동경로를 파악하며 침입자에 대한 방향 정보를 전송하여 침입자를 추적한다. 로봇이 침입자를 추적함에 따라 침입자의 유효 영상을 얻는다. 본 논문에 의해서 구현된 시스템은 다른 감시 시스템과 연동하여 지능형 감시 시스템으로서 신뢰성을 더할 수 있다.

CD-ROM 네트워크 시스템 개발(開發)을 통한 정보(情報) 서비스 - 한국통신(韓國通信) CDLIB 시스템을 중심(中心)으로 - (CD-ROM Network System Development for Information Services - Focusing on the KT CDLIB System -)

  • 안현수;이상엽
    • 정보관리연구
    • /
    • 제25권3호
    • /
    • pp.1-27
    • /
    • 1994
  • 한국통신연구(韓國通信硏究)센터에서 구축한 CD-ROM 네트워크 시스템인 CDLIB(CD-ROM Library)에서는 연구센터 내 근거리통신망(近距離通信網)(TRAN)에 접속된 모든 이용자들이 여러 대의 CB-ROM 드라이브와 이 드라이브에 놓인 디스크에 저정(貯藏)된 대량의 정보를 공유(共有)할 수 있도록 하였다. CDLIB 시스템은 CD-ROM 네트워크 서버와 파일 서버 그리고 이용자들이 네트워크를 통하여 CD-ROM 디스크를 검색할 수 있도록 해주는 소프트웨어로 구성되어 있으며, 이 시스템은 근거리통신망(近距離通信網) 환경에서 CD-ROM 자원을 공유(共有)하는 데 있어서 비용대(費用對) 효과면(效果面)에서 유리하고, 높은 시스템 성능(性能)을 얻을 수 있는 장점(長點)을 가지고 있다.

  • PDF

Configuration design of the trainset of a high-speed train using neural networks

  • Lee, Jangyong;Soonhung Han
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2001년도 The Pacific Aisan Confrence On Intelligent Systems 2001
    • /
    • pp.116-121
    • /
    • 2001
  • Prediction of the top(service) speeds of high-speed trains and configuration design to trainset of them has been studied using the neural network system The traction system. The traction system of high-speed trains is composed of transformers, motor blocks, and traction motors of which locations and number in the trainset formation should be determine in the early stage of train conceptural design. Components of the traction system are the heaviest parts in a train so that it gives strong influence to the top speeds of high-speed trains. Prediction of the top speeds has been performed mainly with data associated with the traction system based on the frequently used neural network system-backpropagation. The neural network has been trained with the data of the high-speed trains such as TGV, ICE, and Shinkanse. Configuration design of the trainset determines the number of trains motor cars, traction motors, weights and power of trains. Configuration results from the neural network are more accurate if neural networks is trained with data of the same type of trains will be designed.

  • PDF

Bluetooth Network for Distributed Autonomous Robotic System

  • Whang, Se-Hee;Sim, Kwee-Bo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.2346-2349
    • /
    • 2005
  • Distributed Autonomous Robotic System (DARS) is defined as a system that independent autonomous robots in the restricted environments infer their status from pre-assigned conditions and operate their jobs through the cooperation with each other. In the DARS, a robot contains sensor part to percept the situation around themselves, communication part to exchange information, and actuator part to do a work. Especially, in order to cooperate with other robots, communicating with other robots is one of the essential elements. Because Bluetooth has many advantages such as low power consumption, small size module package, and various standard protocols, Bluetooth is rated as one of the efficient communicating technologies which can apply to small-sized robot system. In this paper, we will develop Bluetooth communicating system for autonomous robots such as DARS robots. For this purpose, The Bluetooth communication system must have several features. The first, this system should be separated from other robot parts and operate spontaneously and independently. In other words, this communication system should have the ability to organize and maintain and reorganize a network scheme. The next, this system had better support any kinds of standard interfaces in order to guarantee flexible applicability to other embedded system. We will discuss how to construct and what kind of procedure to develop the network system.

  • PDF

Mailing List Characteristic from Electronic Mail

  • Khaitiyakun, N.;Khunkitti, A.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.917-921
    • /
    • 2004
  • Principle of mailing list was distributed messages to all subscribers in one time. But mailing list operation has constructed a network traffic problem. Because mailing list manager distributed mails without concentrate on subscriber network. If our network has many of subscribers, there will be redundant data in traffic channel. Submailing list has purpose to reduce problems. Analyses of mailing list characteristic in electronic mail were a feature of submailing list system, which manage by human hand (Network Administrator). That will cause trouble for network traffic if Network Administrator could not seek for mailing list characteristic from e-mails in due time. This article will present ideas and recognize methodology for automatic working in submailing list system. Recognize step begin with capture process, which use to trap e-mail information from transfer channel. Next process is preparing raw data into recognition format. Then the third one is recognize part and find out confidential factor. The last process is make decision and determine which electronic mail has properties of mailing list characteristic. Afterward deliver result to submailing list for carry on.

  • PDF

Strengthening Authentication Through Content Centric Networking

  • Kim, Sung-Jin;Park, Jae-Kyung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권4호
    • /
    • pp.75-82
    • /
    • 2017
  • While the internet has evolved in terms of information sharing and efficiency, it is still prone to security attacks and remains vulnerable even when equipped with a security mechanism. Repeated patching against hacks involves excessive wear of system equipment and high costs. Methods of improving network security include the introduction of security equipment and network partitions, but they have not been fully effective. A fundamental solution is the Operation Content Network (OCN), which enables the strengthening of authentication. In this paper, Instead of following the existing TCP/IP system, OCN establishes an immunity-based security system through content-centric communications. Data transmission occurs over a Content Centric Network (CCN), which is provided with a protocol verified by the CCNx group. Areas protected by OCN rely only on CCN for communication without using any IP. As such, it defends the system against unknown attacks, including zero-day attacks.

Separating VNF and Network Control for Hardware-Acceleration of SDN/NFV Architecture

  • Duan, Tong;Lan, Julong;Hu, Yuxiang;Sun, Penghao
    • ETRI Journal
    • /
    • 제39권4호
    • /
    • pp.525-534
    • /
    • 2017
  • A hardware-acceleration architecture that separates virtual network functions (VNFs) and network control (called HSN) is proposed to solve the mismatch between the simple flow steering requirements and strong packet processing abilities of software-defined networking (SDN) forwarding elements (FEs) in SDN/network function virtualization (NFV) architecture, while improving the efficiency of NFV infrastructure and the performance of network-intensive functions. HSN makes full use of FEs and accelerates VNFs through two mechanisms: (1) separation of traffic steering and packet processing in the FEs; (2) separation of SDN and NFV control in the FEs. Our HSN prototype, built on NetFPGA-10G, demonstrates that the processing performance can be greatly improved with only a small modification of the traditional SDN/NFV architecture.