• Title/Summary/Keyword: telecommunications network

Search Result 1,807, Processing Time 0.03 seconds

Architecture of Network Security Control Server for applying Security Policy Model (보안정책모델을 적용한 네트워크보안제어서버 구조)

  • Bang, Hyo-Chan;Kim, Ki-Young;Kim, Geon-Lyang;Jang, Jong-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.993-996
    • /
    • 2001
  • 본 논문에서는 정책기반 네트워크보안 프레임워크의 전체적인 구조와 주요 아키텍쳐에 대해서 논하고 특히 보안정책 서버의 역할을 담당하는 네트워크보안제어서버의 구조와 메커니즘에 대해 구체적으로 기술한다.

  • PDF

Interfacing Network Technology to Introduce the Very High-speed Information and Communications Network into Home Network (초고속정보통신망의 홈네트웍으로의 효과적 유입을 위한 인터페이스 네트워크 구축 기술)

  • Lee, Sang-Mu;Lee, Young-Hwan;Ryu, Myung-Joo;Suh, Tae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1395-1398
    • /
    • 2002
  • 최근 초고속정보통신망 구축 기반이 확장되면서 동시에 댁내에서의 네트워킹을 가능케하는 홈네트워킹 기술들이 대두되고 있다. 이 두 가지 네트워크 기반의 원활한 연결을 위하여는 그 중간에서의 인터페이싱을 해줄 수 있는 효과적 네트워크 설비 구축 기술이 요구된다. 본 논문에서는 기존의 전화망 시기에서부터 시작하여 근래 다양한 정보통신 서비스를 위한 새로운 기술 패러다임의 적용에 따른 댁내 영역에서의 IDF(Intermediate Distribution Frame) 기술의 진화 내용과 개선 방향을 제시한다.

  • PDF

The Relationship between Economic Activity and Telecommunications Service Expenditure

  • Cho, Sang-Sup;Kim, Byung-Woon
    • Proceedings of the Technology Innovation Conference
    • /
    • 2003.02a
    • /
    • pp.63-77
    • /
    • 2003
  • In this paper, we investigate the co-movements of the real GDP cycle and the telecommunications service expenditure cycle over 1980 through 2000 in Korea. We used several appropriate statistical tools to characterize and to compare the co-movements between the two aforementioned variables. The statistics presented in this paper are common, easy to Interpret and capture important visual, descriptive information and the dynamics of data that would be lost if one focused only on the unconditional correlation coefficients of de-trended data. This paper examines four possible characteristics for the co-movements of real GDP and telecommunications service expenditure in Korea. The first is that in low frequency, the cyclical movements in telecommunications service expenditure are very similar to the cyclical movements in real GDP, The second is that in the high frequency, the estimated stationary cyclical telecommunications service expenditure is not closely related to the estimated stationary cyclical real GDP. Third, according to co-spectra analysis, the strong relationships between the variables are found in the mid-term frequency and as such this empirical finding has important implications for telecommunications policy and telecommunications service implementation strategies. Finally, in the short-term period, our empirical results support telecommunications network theories such as path dependence properties, lock-in, positive feedback externality, and network externality.

  • PDF

Influence Analysis of Telecommunications Network in Electronic Government (전자정부에 정보통신망이 미치는 영향 분석)

  • 박민수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.2
    • /
    • pp.347-356
    • /
    • 2000
  • This paper was studied on influence analysis of Telecommunications Network in Electronic Government. Analysis method was studied of Policy Delphi. The five kinds of telecommunications network influence in Electronic Government is National Information Infrastructure Networt, Local Area Network, Integrated Services Digital Network Public Switched Telephone Network, and Cable TV Network. The five kinds of telecommunications network service influence in Electronic Government is Telecommuting Service, Internet Service, PC Telecommunications Networt Video Conference Service and Electronic Data Interchange Service. The five kinds of telecommunications influence in Electronic Government is as follow: First Telecommuting Service must be Constructed. Second, Public Administration Service must be improved. Third. citizen must be participated in decision making. Fourth, Public Administration duty service must be digitalizing. Fifth, Video Conference Service must be improved.

  • PDF

Scalable Network Architecture for Flow-Based Traffic Control

  • Song, Jong-Tae;Lee, Soon-Seok;Kang, Kug-Chang;Park, No-Ik;Park, Heuk;Yoon, Sung-Hyun;Chun, Kyung-Gyu;Chang, Mi-Young;Joung, Jin-Oo;Kim, Young-Sun
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.205-215
    • /
    • 2008
  • Many control schemes have been proposed for flow-level traffic control. However, flow-level traffic control is implemented only in limited areas such as traffic monitoring and traffic control at edge nodes. No clear solution for end-to-end architecture has been proposed. Scalability and the lack of a business model are major problems for deploying end-to-end flow-level control architecture. This paper introduces an end-to-end transport architecture and a scalable control mechanism to support the various flow-level QoS requests from applications.

  • PDF

WORM-HUNTER: A Worm Guard System using Software-defined Networking

  • Hu, Yixun;Zheng, Kangfeng;Wang, Xu;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.484-510
    • /
    • 2017
  • Network security is rapidly developing, but so are attack methods. Network worms are one of the most widely used attack methods and have are able to propagate quickly. As an active defense approach to network worms, the honeynet technique has long been limited by the closed architecture of traditional network devices. In this paper, we propose a closed loop defense system of worms based on a Software-Defined Networking (SDN) technology, called Worm-Hunter. The flexibility of SDN in network building is introduced to structure the network infrastructures of Worm-Hunter. By using well-designed flow tables, Worm-Hunter is able to easily deploy different honeynet systems with different network structures and dynamically. When anomalous traffic is detected by the analyzer in Worm-Hunter, it can be redirected into the honeynet and then safely analyzed. Throughout the process, attackers will not be aware that they are caught, and all of the attack behavior is recorded in the system for further analysis. Finally, we verify the system via experiments. The experiments show that Worm-Hunter is able to build multiple honeynet systems on one physical platform. Meanwhile, all of the honeynet systems with the same topology operate without interference.

Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph

  • Dai, Fangfang;Zheng, Kangfeng;Wu, Bin;Luo, Shoushan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1920-1937
    • /
    • 2015
  • Network environment has been under constant threat from both malicious attackers and inherent vulnerabilities of network infrastructure. Existence of such threats calls for exhaustive vulnerability analyzing to guarantee a secure system. However, due to the diversity of security hazards, analysts have to select from massive alternative hardening strategies, which is laborious and time-consuming. In this paper, we develop an approach to seek for possible hardening strategies and prioritize them to help security analysts to handle the optimal ones. In particular, we apply a Risk Flow Attack Graph (RFAG) to represent network situation and attack scenarios, and analyze them to measure network risk. We also employ a multi-objective genetic algorithm to infer the priority of hardening strategies automatically. Finally, we present some numerical results to show the performance of prioritizing strategies by network risk and hardening cost and illustrate the application of optimal hardening strategy set in typical cases. Our novel approach provides a promising new direction for network and vulnerability analysis to take proper precautions to reduce network risk.

Topology-aware Virtual Network Embedding Using Multiple Characteristics

  • Liao, Jianxin;Feng, Min;Li, Tonghong;Wang, Jingyu;Qing, Sude
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.145-164
    • /
    • 2014
  • Network virtualization provides a promising tool to allow multiple heterogeneous virtual networks to run on a shared substrate network simultaneously. A long-standing challenge in network virtualization is the Virtual Network Embedding (VNE) problem: how to embed virtual networks onto specific physical nodes and links in the substrate network effectively. Recent research presents several heuristic algorithms that only consider single topological attribute of networks, which may lead to decreased utilization of resources. In this paper, we introduce six complementary characteristics that reflect different topological attributes, and propose three topology-aware VNE algorithms by leveraging the respective advantages of different characteristics. In addition, a new KS-core decomposition algorithm based on two characteristics is devised to better disentangle the hierarchical topological structure of virtual networks. Due to the overall consideration of topological attributes of substrate and virtual networks by using multiple characteristics, our study better coordinates node and link embedding. Extensive simulations demonstrate that our proposed algorithms improve the long-term average revenue, acceptance ratio, and revenue/cost ratio compared to previous algorithms.

Trends in Network and AI Technologies (네트워크와 AI 기술 동향)

  • Kim, Tae Yeon;Ko, Namseok;Yang, Sunhee;Kim, Sun Me
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.5
    • /
    • pp.1-13
    • /
    • 2020
  • Recently, network infrastructure has evolved into a BizTech agile autonomous network to cope with the dynamic changes in the service environment. This survey presents the expectations from two different perspectives of the harmonization of network and artificial intelligence (AI) technologies. First, the paper focuses on the possibilities of AI technology for the autonomous network industry. Subsequently, it discusses how networks can play a role in the evolution of distributed AI technologies.

Terabit WDM Optical Transmission System Technology (테라비트급 WDM 광전송시스템 기술)

  • Lee H.J.;Kwon Y.;Joo M.J.;Ko J.S.;Lee J.H.
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2002.08a
    • /
    • pp.135-136
    • /
    • 2002
  • 테라비트급 WDM 광전송시스템은 채널당 10Gb/s의 전송속도를 갖는 채널을 파장분할다중하여 하나의 광섬유로 전송하는 시스템이다. 시스템의 주요 영역으로는 광을 송수신하는 광트랜스폰더, 다채널의 광신호를 다중/역다중 하는 광 다중화기/역다중화기, 광신호를 증폭하기 위한 광증폭기, 그리고 광분기 삽입기 등으로. 구성된다. 우리가 구성하는 테라비트급 WDM 광전송시스템은 구조 변경없이 TM 및 ADM 방식을 수용한다. 시스템의 신뢰성을 위해 종속망 절체 및 광학적 계층에서의 보호절체 방식으로 1+1 OCh 및 1+1 OMS 절체 기능을 선택적으로 수용할 수 있어 시스템 운영에 따라 효율적이고 경제적인 망 운영을 할 수 있다. 감시채널은 시스템 유지보수에 필요한 신호(PMI, FDI, BDI 등) 및 시스템 DCC용으로 되어 있으며, WDM 망에 적합한 감시 체계를 설계하였다.

  • PDF