• 제목/요약/키워드: networking

검색결과 3,312건 처리시간 0.034초

콘텐츠 중심 네트워크를 위한 안전한 패킷 단편화 기술 (Secure Fragmentation Technique for Content-Centric Networking)

  • 현상원
    • 정보보호학회논문지
    • /
    • 제27권4호
    • /
    • pp.831-841
    • /
    • 2017
  • 본 논문에서는 콘텐츠 중심 네트워크(CCN, Content-Centric Networking)를 위한 안전한 패킷 단편화(fragmentation) 기술을 제안한다. 제안하는 기술은 패킷조각(fragment)들에 대한 불법적인 위변조 가능성을 차단하고, 패킷조각 수신 시 높은 확률로 즉각적인 신뢰성 검증을 제공함으로써 검증 지연을 악용한 DoS 공격으로부터 높은 안전성을 제공한다. 본 논문의 성능 분석 결과는 약간의 부하 증가만으로 제안하는 기술이 기존 기술보다 훨씬 더 높은 안전성을 제공함을 보여준다.

청해부대 대해적작전의 네트워크작전(NCO) 효과 사례연구 (A Chunghae Unit Study on the NCO Effectiveness of Anti-piracy Operation)

  • 정완희
    • 한국군사과학기술학회지
    • /
    • 제17권6호
    • /
    • pp.744-750
    • /
    • 2014
  • In this paper, I have measured NCO(Network Centric Operation) Effectiveness of Anti-piracy Operation at the Chunghae Unit. For quantitative analysis, Network Centric Operations Conceptual Framework(U.S Office of Force Transformation) is applied. In accordance with the framework, the Chunghae unit anti-piracy operation scenario is analysed. The scenario is devided with two case(only voice communication and networking). The element of analysis be composed of the organic information, networking, share-ability, and individual information. As a result of analysis, the individual information of first case(only voice) gets 0.59 points. The other side, second case (networking) gets 1 points. This means that NCO has effect on the Chunghae Unit's mission. In addition, I stated the tactics advantage of NCO related a fighting power.

마이크로컴퓨터의 네트워크화 여부가 보안 위협 인식에 미치는 영향 : 군조직을 대상으로 (The Effects of Microcomputer Networking on the Perception of Threats to Security : the Military User크s Case)

  • 이찬희;김준석;서길수
    • 정보기술과데이타베이스저널
    • /
    • 제6권2호
    • /
    • pp.1-18
    • /
    • 1999
  • The purpose of this study was to identify the effect of microcomputer networking on user perception of potential threats to security employing user attitudes as a moderating variable. A research model consisting of microcomputer networking as the independent variable, user perception of potential threats to security as the dependent variable, and user attitude toward security control as the moderating variable was developed through literature review. The results of this study provide an empirical evidence of the importance of environmental change(information systems networking) on user perception of potential threats to security. Further-more the result imply that in order to improve security performance through the reinforcement of user perception of threats to security in the organization, user attitudes should be made favorable.

  • PDF

전력선통신 기반 유비쿼터스 네트워킹을 위한 디지털 신호 전송에 관한 연구 (Study of digital transmission for ubiquitous networking based on power line communication)

  • 김지형;윤지훈;설동호;김관웅;김용갑
    • 한국전기전자재료학회:학술대회논문집
    • /
    • 한국전기전자재료학회 2009년도 하계학술대회 논문집
    • /
    • pp.480-481
    • /
    • 2009
  • In the paper we study for the ubiquitous networking based on power line communication technology with digital signal transmission. The necessity of research for using resources in the network effectively is being increase as network to use the PLC with smart grid networking. The data rate has compared with implemented modem 250Mbps in the pixel resolution and bandwidth, which has degraded with 80%. We also proposed for design of high-definition digital signal transceiver, which has used in the network between digital multimedia with PLC. Using resources in the network effectively can be also verified with this research.

  • PDF

KREONET에서의 네트워크 분석 인프라 구축 연구 (Network Analysis Infrastructure for KREONET)

  • 김국한;이만희;곽재승;변옥환;진용옥
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2001년도 추계학술발표논문집 (하)
    • /
    • pp.1375-1378
    • /
    • 2001
  • 네트워크에 흐르는 트래픽 측정을 효율적으로 함으로서 트래픽의 종류와 양을 알 수 있고, 이를 기반으로 측정 네트워크의 트래픽 특성과 상태를 파악할 수 있다. 본 고에서는 초고속 연구망 환경에 적합한 네트워크 분석 인프라(NAI) 구축을 제시한다. NAI 구성은 네트워크 링크를 모니터링하는 수동적 측정 방법 MRTG 와 NAVI, 그리고 인위적으로 트래픽을 발생시켜 그 결과를 분석하는 능동적 측정 방법 PingER 와 AMP 두 가지 종류로 나뉜다. 현재 초고속 연구망에서 적용중인 네트워크 트래픽 분석 측정 도구 하나씩 알아보고, 국내 외로 링크된 네트워크 트래픽의 특성과 상태를 균형적으로 분석 할 도구에 대한 모델을 알아본다.

  • PDF

Wireless Sensors Module for Remote Room Environment Monitoring

  • Lee, Dae-Seok;Chung, Wan-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.449-452
    • /
    • 2005
  • For home networking system with a function of air quality monitoring, a wireless sensor module with several air quality monitoring sensors was developed for indoor environment monitoring system in home networking. The module has various enlargements for various kinds of sensors such as humidity sensor, temperature sensor, CO2 sensor, flying dust sensor, and etc. The developed wireless module is very convenient to be installed on the wall of a room or office, and the sensors in the module can be easily replaced due to well designed module structure and RF connection method. To reduce the system cost, only one RF transmission block was used for sensors' signal transmission to 8051 microcontroller board in time sharing method. In this home networking system, various indoor environmental parameters could be monitored in real time from RF wireless sensor module. Indoor vision was transferred to client PC or PDA from surveillance camera installed indoor or desired site. Web server using Oracle DB was used for saving the visions by web-camera and various data from wireless sensor module.

  • PDF

ATM VP 중계망의 성능 시험을 위한 OPNET 기반의 시뮬레이션 모델 구현 (Implementation of OPNET-based simulation model for the performance evaluation of ATM VP Transit network)

  • 구수용;김영탁
    • 한국시뮬레이션학회논문지
    • /
    • 제8권4호
    • /
    • pp.125-136
    • /
    • 1999
  • In the forthcoming public ATM/B-ISDN, the efficient resource management with pre-planned transit networking which public domain NNI signaling is essential to maintain high network utilization and to assure QoS to the multimedia service users. For this purpose the transit networks must be managed according to the bearer service capability which is defined by ATM Forum and ITU-T. In this paper, we introduce an implementation of ATM transit networking with ATM VP-XC(Virtual Path cross-connect) and US(Network Management System). The functions of ATM VP-XC and NMS have been simulated with OPNET 6.1 modules. We implemented the F4 OAM functions of ATM VP connection according to the ITU-T 1.610 recommendation. Also, the ATM VP transit networking is managed by the NMS according to the connection management architecture of the TWN(Telecommunications Management Network) /TINA ( Telecommunications Information Networking Architecture).

  • PDF

Facilitating Data Source Movement with Time-Division Access in Content-Centric Networking

  • Priyono, Olivica;Kong, In-Yeup;Hwang, Won-Joo
    • 한국멀티미디어학회논문지
    • /
    • 제17권4호
    • /
    • pp.433-440
    • /
    • 2014
  • Wireless communication offers the flexibility to the node movement at the spatial dimension more than the wire communication not only in IP architecture but also in Content-Centric Networking. Although it gives such advantage, the intra-domain movement of a node especially the data source node affects the communication to the access point node which in the end affects the acceptance ratio of the client node that requests the data packets from the data source node. In this paper, we use time-division access method to maintain the acceptance ratio of the client node as the effect of the intra-domain data source node movement in Content-Centric Networking. The simulation result shows that the acceptance ratio of the client node can be maintained using the time-division access method as long as the interval access time is less than the coherence time.

Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking

  • Wang, Kai;Bao, Wei;Wang, Yingjie;Tong, Xiangrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4641-4657
    • /
    • 2017
  • Named Data Networking (NDN) has emerged and become one of the most promising architectures for future Internet. However, like traditional IP-based networking paradigm, NDN may not evade some typical network threats such as malicious data aggregates (MDA), which may lead to bandwidth exhaustion, traffic congestion and router overload. This paper firstly analyzes the damage effect of MDA using realistic simulations in large-scale network topology, showing that it is not just theoretical, and then designs a fine-grained MDA mitigation mechanism (MDAM) based on the cooperation between routers via alert messages. Simulations results show that MDAM can significantly reduce the Pending Interest Table overload in involved routers, and bring in normal data-returning rate and data-retrieval delay.

정보중심네트워크 기반의 Pub/Sub 통신 연구동향 (Survey on Publish/Subscribe Communication Technologies based on Information Centric Networking)

  • 정희영;김선미
    • 전자통신동향분석
    • /
    • 제33권5호
    • /
    • pp.86-94
    • /
    • 2018
  • Information-Centric Networking (ICN) has been recognized as a new networking technology for the upcoming data-centric 4th industrial revolution based society. In addition, it has noted that Pub/Sub-style communication is rapidly growing in areas including big data processing and microservice as well as the existing Internet of Things and social networking technologies. Therefore, ICN is highly needed to efficiently support Pub/Sub-style communication for successful deployment as a next-generation network infrastructure technology. This paper summarizes the recent research trends of Pub/Sub communication technologies over ICN, and discusses future research issues.