슬라이드 제목 없음
|
|
- 기석 기
- 6 years ago
- Views:
Transcription
1 정보보호심포지움 2002 글로벌네트워크보안제어기술 장종수 ETRI, 네트워크보안연구부
2 목 차 1. 환경변화및정보보호요구사항 네트워크환경변화 서비스환경변화 사이버테러동향 정보보호서비스환경변화 정보보호시장의변화 정보보호요구사항의변화 2. 글로벌네트워크보안제어기술 정책기반보안관리기술 보안관리정보모델 네트워크보안서비스 보안관리메커니즘 정보전달프로토콜 3. 결론
3 네트워크환경변화 미래네트워크 (NGN) 의모습 - 모든네트워크이인터넷의하부구조로통합 A B 전전자교환기 데이터 액세스 G/W 음성 음성 + 데이터 트렁크 G/W VoP Programmable SoftSwitch 인터넷 트렁크 G/W 음성 + 데이터 전전자교환기 음성 데이터 액세스 G/W A B
4 네트워크구조측면의진화 인터넷을기반으로하는통신망의융합이본격적으로진행 방송, 통신, 정보, 문화간의영역파괴 인터넷 Infrastructure 는새로운미래형네트워크 (NGN) 으로발전 인터넷기반망은전용회선에의한단순한연결에서백본망, 액세스망, 구내망으로구분 발전 백본망 : 전국의주요지역의 POP 및대형 IDC 간을연결 액세스망 : POP 에서가입자의라우터나모뎀간을연결 구내망 : LAN, 홈네트워크등가입자내부망 유무선통합 Backbone의등장 Gateway 또는 Special-purpose Router 기반망구성 정보단말의무선화확산 Paradigm Shift
5 서비스환경변화 미래사회의서비스제공모습 Everything Over IP IP Over Any Networks 모든정보통신서비스는인터넷을통하여제공 유무선통합 or 복합형서비스제공을위한미들웨어서비스요구 Every Application 메일, 전화, 신문, 방송, 영화, Middleware (Network Service) IP Every Network 상거래등 Resource 관리, QoS 제어, Naming 서비스, Mobility 지원, 세션관리, Network 보안서비스등 인터넷프로토콜 ATM, LAN, FR, SMDS, SONET, Wireless, Modems, 위성등
6 서비스기술발전추세 데이타서비스뿐만아니라기존의정보통신서비스를전송할수있는기술적기반을이미확보 인터넷서비스의보편화, 상업화 인터넷기반으로서비스의수렴화 임무대행및에이전트서비스의활성화 Mbps 급의멀티캐스팅, VoIP, ASP, Grid, 3D 등멀티미디어형가상현실및원격협업서비스로발전 멀티미디어실시간서비스의확산 문자형쌍방향서비스 (Kbps) Interactive 가상현실서비스 (Mbps) 상호교신성서비스의확산 전자정부, 전자거래등안전한서비스의제공요구의증가 Paradigm Shift
7 정보보호심포지움 2002 사이버테러동향 사이버테러변화모습 해킹및바이러스기술의급속한확산및통합화경향 해킹기술영역바이러스기술영역
8 변화추이 해킹기술과바이러스기술의통합화 (Blended Attack) System Attack 에서 Network/Service Attack 으로변모 Hacktivism 확장 : 개인적목적 -> 정치 / 사회, 군사 / 산업적목적 멀티미디어 Contents 에대한침해증가 Worm & DDoS Attack Infrastructure Attack 시도 Wireless Hacking 등장 해킹 / 바이러스는자동화, 지능화, 대중화, 분산화, 대규모화, 은닉화경향 Paradigm Shift
9 정보보호서비스환경변화 미래정보보호서비스 지식정보화사회는시스템및네트워크레벨의신뢰가중요 현재사회 미래사회를위한정보보호통합인프라구축필요 VPN 암호기술침입탐지항침입차단 PKI 바이러스 바이러스해킹시스템침해개인정보침해 Bio + IT 차세대인터넷 IMT-2000 디지털방송 정보통신기반보호법 저작권침해 전자정부 T-commerce M-commerce 사이버테러 네트워크파괴 신용파괴 가상사회 정보전 지식정보화사회
10 미래정보보호서비스및산업발전추세 정보보호서비스의통합화경향 정보보호와네트워크기술의통합화 정보보호기능간의통합화 성능보장형정보보호서비스 Biometric 기술의수용 인프라보호측면의정보보호기술의확산 인터넷 Infrastructure Protection 요구증가 통신망및서비스에독립적인정보보호필요 무선인터넷환경에서의정보보호필요성증가 GoS(Grade of Security Service) Easy Security 지능형, 능동형정보보호 Paradigm Shift
11 기본네트워크보안 개별보안제품의운용 : 바이러스백신, 방화벽,IDS 등 통합보안관리제품운용 : ESM Crypto, PKI, VPN, V ESM IDS IDS V Contents Server 로드밸런싱 FW V Work Group V Virus Vaccine 코어망 액세스망액세스망 액세스망액세스망 시스템간, 네트워크간, 사업자간연동불가 다양한공격에대한안전한보안관리불가 사이버공격에대한탐지및대응의실시간성부재 단품위주의소규모망기반의보안제품치중
12 단일제품보안의한계 보안제품의문제점 개별적인보안장비및소프트웨어에지나치게의존 이기종정보보호시스템의산재 각기다른다양한보안정책의적용 보안제품의복잡성증가및운영상의어려움 운영자실수에의한위험증가 다양한보안위협에대한효율적이고체계적인대응능력요구 급속한보안환경변화대처에어려움
13 정보보호시장의변화 정보통신환경변화에따른새로운정보보호제품군출현 통신분야에서정보보호가부가기능에서핵심요소기능으로부각 보안기능별제품에서통합보안형태의제품으로발전 네트워크차원의정보보호서비스의중요성이증가 방어적인정보보호제품에서능동적인정보보호제품으로발전 BT-IT 융합기술발전에따른생체인식시장의급성장 단일기능보안제품 -VPN -IDS - Firewall - 백신 통합기능보안제품 - 통합 VPN - ESM - Secure 엔진 능동감지형보안제품 - 능동보안기술 - 광정보보호기술 - All IP 유무선통합보안기술 과거 현재 미래
14 IDS Firewall 보안제품변화방향 Integrated, Networked, Managed, H/W-based, Intelligent & Multiple Security Node 침입차단시스템 침입탐지시스템 IPS H/W-based Firewall Global IDS 보안관리시스템 가상사설망시스템 Advanced ESM ESM Integrated Security System Global ESM VPN Integrated VPN Security G/W High-Performance Security G/W Network Vaccine Digital Vaccine Secure Router Router Active Security Node Vaccine 라우터 미래형보안장치 항바이러스제품
15 네트워크측면 - 초고속처리능력 - 네트워크장비와연동성 -Policy 기반제어성 - 정보보호인프라구축 정보보호요구사항의변화 정보통신및서비스의파라다임변화를수용 미래형네트워크 / 서비스에적합한복합형정보보호서비스시스템 서비스측면 - 사용자요구반영가능 - 응용서비스별차등서비스 사이버테러측면 - 해킹기술진화에부응 - 네트워크공격에대응 정보보호측면 - 보안서비스통합화 - 해킹에능동적으로대응 High Performance Secure Node 화 표준인터페이스 Security Management Leveled Security Service Grade of Security 해킹탐지기법의다양화 Network Security Service Secure Networking Network Security Integrated Security Easy Security Active Security
16 미래정보보호서비스규격 Network Security Service Secure Transaction & Secure Information Delivery Inter-operability among heterogeneous systems Integration of Security & Network Node Infrastructure Protection Integrated Security Service Integrated Security System(Server, Node) Security Management for Secure Networking Easy Security Service Quality-proven & Grade of Service Paradigm Adaptive Contents Security & Digital Right Management Active Security Service Intelligent Sensing & Dynamic Policy Enforcement Dynamic Service Co-relation Wireless & Wired Hacking Detection & Protection Global Network Security Management
17 글로벌네트워크보안제어기술 개념 네트워크레벨에서차별화된보안서비스제공 네트워크보안관리 / 제어구조및프레임워크제공 보안서비스 : Protection, Security Solution, Management Protection : ISP Network, ISP s Customer Network, Principal Equipments (Intrusion Detection & Response) Security Solution : VPN Service, Authentication Service, PMI Service Management : Policies(Detection, Response, Operation, ), Traffic Measuring, Global Security Management, 보안관리프레임워크 Security Management Architecture Security Management Information Model Network Security Service Definition Security Management Mechanism Security Control/Management Protocol
18 POP xdsl 기반액세스망 Edge Point Edge Router Access Network 글로벌보안제어네트워크 무선기반액세스망 Security Overlay Network Edge Point Edge Point Security Extranet MPLS Switch Access Router Access Gateway 차세대통신망 Access Network ATM Switch Edge Router ATM 단말 Office Edge Gateway PON 기반액세스망 Edge Point NAP Internet 2 Security Infra Contents Factory POP Access Gateway Access Network Cam-Net Abilene 관제서비스 1472 Cam-Net Cam-Net 2
19 정책기반보안관리구조 IETF Policy WG Policy Framework 정책프레임워크에따른체계적, 종합적보안제어관리 : 광역망차원의보안구조확립 경보정보및통계정보공유 : 상호보완적사이버테러대응체제구축 광역망액세스점에서유해트래픽차단방안제공
20 정책프레임워크기능컴포넌트 Policy Server Policy Management Tool Alternate Policy Comm. Path Notification Status & Conf. Policy Consumer (Policy Decision Point) Policy Protocol Policy Target (Policy Enforcement Point) Repository Access Protocol - User Interface (Policy Editing) - Policy Translation, Rule Validation - Conflict Detection, Notification Generation - Management Information Repository - Policy Transform - Device Adaptors - Network Element Interface Policy Repository (Directory Server, DB) - Policy Rules
21 보안정책서버 : 네트워크규모의침입분석및대응메커니즘 망의구성정보, 상태정보, 주요관리요소정보, 트래픽통계정보, 차등네트워크보안서비스제공메커니즘 체계적인보안정보관리체계및도메인간협력메커니즘 DMTF CIM, IETF PCIM Security Management Networking 보안노드 : 패킷센서, 패킷분석엔진, 트래픽측정엔진고성능화 실시간분석및능동적인대응메커니즘 경보정보의축약및안전한전달프로토콜 낮은 False Alarm 및 Packet Loss 사용자평면과보안관리자평면의성능적독립성유지
22 보안관리정보모델 DMTF CIM (Common Information Model) IETF PCIM (Policy Core Information Model) Policy domain 내에서논리적으로중앙집중적인관리 System/Device 집합의정책기반구성제공 Protocol, device, Vendor independence 상호동작용이등확장성있는정책의표현 ManagedElement(abstract) [PCIM] Policy (abstract) [PCIM] PolicySet (abstract) [PCIMe] PolicyGroup [PCIM] PolicyRule [PCIM] PolicyCondition (abstract) [PCIM] CompoundPolicyCondition [PCIMe] PolicyPacketMonitoringCondition(abstract) [NSPIM] PolicyOnePacketCondition [NSPIM] PolicyLinearPacketCondition [NSPIM] PolicyRepeatedPacketCondition [NSPIM] PolicyIPFragmentationCondition [NSPIM] SimplePolicyCondition [PCIMe] PolicyComparisonCondition (abstract) [NSPIM] PolicyTwoVariableComparisonCondition [NSPIM] PolicyVariableValueComparisonCondition [NSPIM] PolicyAction (abstract) [PCIM] PolicyPayloadMatchingCondition [NSPIM] CompoundPolicyAction [PCIMe] PolicyIntrusionReponseAction (abstract) [NSPIM] PolicyAlertAction (abstract) [NSPIM] PolicyAggregatedAlertAction [NSPIM] PolicyMessageStoreAction [NSPIM] PolicyMessageShowAction [NSPIM] PolicyBlockPermitAction (abstract) [NSPIM] SimplePolicyAction [PCIMe] PolicyVariable (abstract) [PCIMe] 클래스상속계층구조 PolicyPacketBlockAction [NSPIM] PolicySessionBlockAction [NSPIM] PolicyExplicitVariable [PCIMe] PolicyImplicitVariable (abstract) [PCIMe] subtree of more specific classes [PCIMe, NSPIM] PolicyValue (abstract) [PCIMe] subtree of more specific classes [PCIMe]
23 UML 을통한 Smurf 정책규칙모델링 ( 예 ) 6001 Pattern [Smurf:IcmpAnomaly;2;6;MStore MShow] while(3:1-20:2) { icmp any > _homenet_br (CTYPE:8) } (MESSAGE: "smurf 를이용한서비스거부공격이시도됨 ") PolicyConditionInPolicyCondition PolicyVariableValueComparisonCondition Operator : "==" PolicyOnePacketCondition ConditionListType:CNF PolicyConditionInPolicyRule PolicyConditionInPolicyCondition PolicyRule PolicyRulename:"Smurf" Priority:2 IntrusionImpact:6 PolicyKeywords:{LADON6001} PolicyActionInPolicyRule PolicyConditionInPolicyCondition PolicyAggregatedAlertAction ShortDescription:"smurf" 를이용한서비스거부공격이시도됨 PolicyVariableValueComparisonCondition Operator : "==" PolicyValueInComparisonCondition PolicyVariableInComparisonCondition PolicyVariableInComparisonCondition PolicyValueInComparisonCondition PolicyTwoVariableComparisonCondition Operator : "==" PolicyIPProtocolVariable PolicyICMPTypeVariable PolicyIntegerValue IntegerList : {8} PolicyIntegerValue IntegerList : {_ICMP} PolicyValueInComparisonCondition PolicyVariableInComparisonCondition PolicyDestinationIPv4Variable PolicyReapatedPacketCondition FirstTimeInterval:1 FirstBoundOfNumberOfPackets:3 SecondTimeInterval:2, SecondBoundOfNumberOfPackets:20 PolicyOnePacketConditionInRepeatedPacketCondition PolicyHomenetBroadcastVriable PolicyActionInPolicyAction PolicyMessageStoreAction PolicyActionInPolicyAction PolicyMessageShowAction
24 네트워크보안서비스 사용자가요구하는수준으로차별화된보안서비스를제공하기위한 Grade of Security Service
25 보안관리메커니즘 (1) 차별화된네트워크서비스 Security Level Management Service Intrusion Detection, Vulnerability Check, Intrusion Protection, Traceback Zone-based, System-based, Class-based Prevention Security Level Assurance Service SLA(QoS, Security Service Level) Routing Service Provisioning based on Security Service Level Flow-based, Session-based Assurance Provision
26 보안관리메커니즘의동작원리 NSL2 Security Level Management Service 입력패킷의목적지주소의보안등급에따라 차별화된탐지및대응기법 / 수준적용 보안관리네트워킹을통한인터도메인협력체계 NSL3 NSL1 Security Management Plane NSL3 NSL1 NSL3 Policy Server Group (ESM, CA, AAA, BB, NMS, RS, CS ) Networking Equipment Or Security related Equipment (Router, Switch, Firewall, IDS, ) User Plane NSL2 NSL3 NSL3
27 보안관리메커니즘 (2) Qbone to specify and deploy the QBone Premium Service (QPS), an interdomain virtual leased-line IP service built on diff-serv forwarding primitives Simple Inter-domain Bandwidth Broker Signaling (SIBBS) proposed by Internet2 community QBone Signaling Design Team has been working since 2000 Cisco, Siemens, Deutsche Telekom,CITI University of Michigan, etc. Characteristics of SIBBS NNI protocol defined for communication between inter-domain BB TCP is transport Fundamental messages: Resource Allocation Request Resource Allocation Answer Simple request-response protocol Requires some basic authentication Supports setup, modification, takedown Intended to be flexible and extensible
28 Inter-domain Policy Framework Hitachi, GMD FOKUS (INET conference 2000) Two architectures PS Domain A [Flat architecture] PS Domain B SPS: Super Policy Server Domain A SPS Policy exchange protocol Policy advertisement phase (e.g. resource information) BGP4 protocol is recommended Policy request-response and/or notification phase COPS protocol is recommended PS PS Domain B [Hierarchical architecture]
29 정책전달프로토콜 COPS(Common Open Policy Service) 프로토콜 IETF 의 RAP WG 에서제안 정책서버 (PDP: Policy Decision Point) 와클라이언트 (PEP: Policy Enforcement Point) 사이의 TCP 기반정책정보전달프로토콜 Client/Server Model: requests, updates, deletes -> decisions extensible: 자체수정없이다양한클라이언트타입지원 COPS-RSVP, COPS-PR, Security 제공 : message level, IPSEC, TLS Network Node PEP LPDP COPS Policy Server PDP
30 경보전달프로토콜 IAP(Intrusion Alert Protocol) IETF 의 IDWG 에서제안 침입탐지구성요소들사이 (sensor/analyzers 와 managers) 에침입경보데이터 (Intrusion alert data) 를교환하기위한응용계층의프로토콜 전달되는경보는 IDMEF( Intrusion Detection Message Exchange Format) 에서명세 수송계층프로토콜로 TCP 사용 Communication Mode Request-Response Pairs 로이루어짐 Two major phases: Connection setup phase(tcp Setup, Security Setup, Channel Setup) Data transport phase
31 경보전달프로토콜 IDXP(Intrusion Detection Exchange Protocol) IETF 의 IDWG 에서제안 BEEP(Blocks Extensible Exchange Protocol) 의 profile 로명세됨. BEEP: generic application protocol framework for connectionoriented, asynchronous interactions. exchange data: IDMEF message, unstructured text, binary data Alert data 의 security-sensitive 한특성상 BEEP security profile(sasl/tls) 을기반으로동작 주요한 IDXP Profile Elements IDXP-Greeting: identifies an analyzer/ manager at end of a BEEP channel Option: convey optional channel parameters IDMEF-Message: carries the structured information to be exchanged
32 결 정보보호는가입자망이나해당보안관리자만의문제가아님 네트워크및서비스진화동향에따른네트워크보안제어프레임워크개발이필요 인프라에서의유해정보에대한통계적분석이필요함 망간의유기적협력을통한글로벌대응체계의구축이필요함 망간교환되는정보보호관련정보의표준화및교환의무화를위한방안이필요함 론
PBNM CIM(Common Information Model) DEN, COPS LDAP 21 CIM (Common Information Model) CIM, specification schema [7]
(Policy-Based Network Management Technology) ((ksok, dsyun)@ktcokr) PBNM CIM(Common Information Model) DEN, COPS LDAP 21 CIM (Common Information Model) CIM, specification schema [7] 1 CIM core model hierarchy
More information歯이시홍).PDF
cwseo@netsgo.com Si-Hong Lee duckling@sktelecom.com SK Telecom Platform - 1 - 1. Digital AMPS CDMA (IS-95 A/B) CDMA (cdma2000-1x) IMT-2000 (IS-95 C) ( ) ( ) ( ) ( ) - 2 - 2. QoS Market QoS Coverage C/D
More information歯I-3_무선통신기반차세대망-조동호.PDF
KAIST 00-03-03 / #1 1. NGN 2. NGN 3. NGN 4. 5. 00-03-03 / #2 1. NGN 00-03-03 / #3 1.1 NGN, packet,, IP 00-03-03 / #4 Now: separate networks for separate services Low transmission delay Consistent availability
More informationUDP Flooding Attack 공격과 방어
황 교 국 (fullc0de@gmail.com) SK Infosec Co., Inc MSS Biz. Security Center Table of Contents 1. 소개...3 2. 공격 관련 Protocols Overview...3 2.1. UDP Protocol...3 2.2. ICMP Protocol...4 3. UDP Flood Test Environment...5
More information歯김병철.PDF
3G IETF byckim@mission.cnu.ac.kr kckim@konkuk.ac.kr Mobile IP WG Seamoby WG ROHC WG 3G IETF 3G IETF Mobile IP WG 3GIP Seamoby WG ROHC WG MIP WG / NAI Mobile IP / AAA IPv4 / MIP WG RFC2002bis MIPv6 INRIA
More information歯III-2_VPN-김이한.PDF
VPN 2000. 2. 23 yihan@kt.co.kr kr VPN 2 (1) (Private WAN) ( Virtual Private Networks ) Headquarters Public Network VPN Telecommuter Branch Office Mobile Worker 3 4 VPN VPN ( ) / Outsourcing Outsourcing
More information네트워크 안정성을 지켜줄 최고의 기술과 성능 TrusGuard는 국내 최초의 통합보안솔루션으로서 지난 5년간 약 4천여 고객 사이트에 구축 운영되면서 기술의 안정성과 성능면에서 철저한 시장 검증을 거쳤습니다. 또한 TrusGuard는 단독 기능 또는 복합 기능 구동 시
네트워크 보안도 안철수연구소입니다 통합 보안의 No.1 파트너, AhnLab TrusGuard 네트워크 환경을 수호하는 최고의 통합 보안 시스템 고성능 방화벽ㆍVPN Security 기술과 고품질 Integrated Security 기술의 강력한 결합 네트워크 안정성을 지켜줄 최고의 기술과 성능 TrusGuard는 국내 최초의 통합보안솔루션으로서 지난 5년간
More informationCisco SDN 3.0 DDoS DDoS Cisco DDoS Real Demo 2008 Cisco Systems, Inc. All rights reserved. 2
SDN DDoS (whchoi@cisco.com) Cisco Systems Korea 2008 Cisco Systems, Inc. All rights reserved. 1 Cisco SDN 3.0 DDoS DDoS Cisco DDoS Real Demo 2008 Cisco Systems, Inc. All rights reserved. 2 Cisco SDN 3.0
More informationVoice Portal using Oracle 9i AS Wireless
Voice Portal Platform using Oracle9iAS Wireless 20020829 Oracle Technology Day 1 Contents Introduction Voice Portal Voice Web Voice XML Voice Portal Platform using Oracle9iAS Wireless Voice Portal Video
More informationPCServerMgmt7
Web Windows NT/2000 Server DP&NM Lab 1 Contents 2 Windows NT Service Provider Management Application Web UI 3 . PC,, Client/Server Network 4 (1),,, PC Mainframe PC Backbone Server TCP/IP DCS PLC Network
More information354-437-4..
357 358 4.3% 5.1% 8.2% 6.2% 5.6% 6% 5% 5.3% 96.1% 85.2% 39.6% 50.8% 82.7% 86.7% 28.2% 8.0% 60.0% 60.4% 18,287 16,601 (%) 100 90 80 70 60 50 40 86.6% 80.0% 77.8% 57.6% 89.7% 78.4% 82.1% 59.0% 91.7% 91.4%
More informationthesis
CORBA TMN Surveillance System DPNM Lab, GSIT, POSTECH Email: mnd@postech.ac.kr Contents Motivation & Goal Related Work CORBA TMN Surveillance System Implementation Conclusion & Future Work 2 Motivation
More information2005 2004 2003 2002 2001 2000 Security Surveillance Ubiquitous Infra Internet Infra Telematics Security Surveillance Telematics Internet Infra Solutions Camera Site (NETWORK) Monitoring & Control
More informationNetwork seminar.key
Intro to Network .. 2 4 ( ) ( ). ?!? ~! This is ~ ( ) /,,,???? TCP/IP Application Layer Transfer Layer Internet Layer Data Link Layer Physical Layer OSI 7 TCP/IP Application Layer Transfer Layer 3 4 Network
More informationSLA QoS
SLA QoS 2002. 12. 13 Email: really97@postech.ac.kr QoS QoS SLA POS-SLMS (-Service Level Monitoring System) SLA (Service Level Agreement) SLA SLA TM Forum SLA QoS QoS SLA SLA QoS QoS SLA POS-SLMS ( Service
More information제20회_해킹방지워크샵_(이재석)
IoT DDoS DNS (jaeseog@sherpain.net) (www.sherpain.net) DDoS DNS DDoS / DDoS(Distributed DoS)? B Asia Broadband B Bots connect to a C&C to create an overlay network (botnet) C&C Provider JP Corp. Bye Bye!
More information歯김한석.PDF
HSN 2001 Workshop Session IX Service Providers and Business Model Future Business Models for Telecom Industry 1. Internet Economy 2. E-business 3. Internet Economy 4.? 1 1. Internet Economy 1.1 Internet
More information슬라이드 제목 없음
(JTC1/SC6) sjkoh@knu.ac.kr JTC1 JTC1/SC6/WG7 ECTP/RMCP/MMC (JTC1/SC6) 2/48 JTC1 ISO/IEC JTC1 Joint Technical Committee 1 ( ) ISO/TC 97 ( ) IEC/TC 83 ( ) Information Technology (IT) http://www.jtc1.org
More informationService-Oriented Architecture Copyright Tmax Soft 2005
Service-Oriented Architecture Copyright Tmax Soft 2005 Service-Oriented Architecture Copyright Tmax Soft 2005 Monolithic Architecture Reusable Services New Service Service Consumer Wrapped Service Composite
More information歯Documents\심포지엄\산업경
ssmin @seri.org david@chugye.ac.k r 7000 6000 5000 4000 3000 2000 1000 4000 3500 3000 2500 2000 1500 1000 500 0 90 91 92 93 94 95 96 97 98 99 2000 0 S/W 1 2 3 SDH/WDM xdsl, PCS, 33~56Kbps CATV
More information이도경, 최덕재 Dokyeong Lee, Deokjai Choi 1. 서론
이도경, 최덕재 Dokyeong Lee, Deokjai Choi 1. 서론 2. 관련연구 2.1 MQTT 프로토콜 Fig. 1. Topic-based Publish/Subscribe Communication Model. Table 1. Delivery and Guarantee by MQTT QoS Level 2.1 MQTT-SN 프로토콜 Fig. 2. MQTT-SN
More informationNetwork of Networks l RingNet l 02 안녕하십니까? 링네트 대표이사 입니다. 링네트는 SI/NI 컨설팅, 설치, 유지보수, Security, IP Telephony, 모바일 네트워크, 서버, 스토리지, 가상화 등 Cloud 사업을 통해 더 빠르
System Integration Network Integration Cloud Computing Security Solution SMART Service (주) 링네트 Network of Networks l RingNet l 02 안녕하십니까? 링네트 대표이사 입니다. 링네트는 SI/NI 컨설팅, 설치, 유지보수, Security, IP Telephony,
More informationMicrosoft PowerPoint - 4-TPS Network Architecture.ppt
Business Opportunity with TPS 전홍범 hbjeon@kt.co.kr 연구개발본부 목차 Telecom의위기 New Opportunities Managed Service 결언 Telecom 의위기 Telecom Collapse Market Trends 500,000 jobs lost in last two years of the top 5 money
More informationSwitching
Switching 강의의목표 Switching/Switching Network의필요성을이해한다. 세가지대표적교환기술에열거하고그차이를설명할수있다. 각교환기술의장, 단점을비교하여설명할수있다. Packet Switching 에서 Fairness 문제와 Pipelining 을 패킷크기와연계하여설명할수있다. Soft Switch 개념을이해하고설명할수있다. 교재 Chapter
More informationModel Investor MANDO Portal Site People Customer BIS Supplier C R M PLM ERP MES HRIS S C M KMS Web -Based
e- Business Web Site 2002. 04.26 Model Investor MANDO Portal Site People Customer BIS Supplier C R M PLM ERP MES HRIS S C M KMS Web -Based Approach High E-Business Functionality Web Web --based based KMS/BIS
More information1.LAN의 특징과 각종 방식
0 Chapter 1. LAN I. LAN 1. - - - - Switching - 2. LAN - (Topology) - (Cable) - - 2.1 1) / LAN - - (point to point) 2) LAN - 3) LAN - 2.2 1) Bound - - (Twisted Pair) - (Coaxial cable) - (Fiber Optics) 1
More informationthesis
( Design and Implementation of a Generalized Management Information Repository Service for Network and System Management ) ssp@nile nile.postech.ac..ac.kr DPE Lab. 1997 12 16 GMIRS GMIRS GMIRS prototype
More informationꠏꠏꠏꠏ ꠏꠏꠏꠏ ꠏꠏꠏꠏ A4 SPA RCcenter 20 00 SPARC center 2000 ꡔꡕ Web Browser Internet ( HTTP ) ( HTTP ) (Z39.50 ) / DB/ DB ( HTTP) Web Server Doc Server KAIST DB PC
More informationPWR PWR HDD HDD USB USB Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC DDNS (
PWR PWR HDD HDD USB USB Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC DDNS (http://ddns.hanwha-security.com) Step 1~5. Step, PC, DVR Step 1. Cable Step
More informationMstage.PDF
Wap Push June, 2001 Contents About Mstage What is the Wap Push? SMS vs. Push Wap push Operation Wap push Architecture Wap push Wap push Wap push Example Company Outline : (Mstage co., Ltd.) : : 1999.5
More informationSecurity Overview
May. 14, 2004 Background Security Issue & Management Scope of Security Security Incident Security Organization Security Level Security Investment Security Roadmap Security Process Security Architecture
More informationuntitled
BcN 2004.9 sgkwon@empal.com 1.... 1 2. BCN?... 1 2.1.... 1 2.2.... 2 2.3.... 2 3.... 2 3.1.... 2 3.1.1.... 2 3.1.1.1. NGI(Next Generation Internet: )... 2 3.1.1.2. Internet2... 3 3.1.2.... 4 3.1.2.1. eeurope2005...
More informationuntitled
3 IBM WebSphere User Conference ESB (e-mail : ljm@kr.ibm.com) Infrastructure Solution, IGS 2005. 9.13 ESB 를통한어플리케이션통합구축 2 IT 40%. IT,,.,, (Real Time Enterprise), End to End Access Processes bounded by
More informationTTA Verified : HomeGateway :, : (NEtwork Testing Team)
TTA Verified : HomeGateway :, : (NEtwork Testing Team) : TTA-V-N-05-006-CC11 TTA Verified :2006 6 27 : 01 : 2005 7 18 : 2/15 00 01 2005 7 18 2006 6 27 6 7 9 Ethernet (VLAN, QoS, FTP ) (, ) : TTA-V-N-05-006-CC11
More informationSubnet Address Internet Network G Network Network class B networ
Structure of TCP/IP Internet Internet gateway (router) Internet Address Class A Class B Class C 0 8 31 0 netid hostid 0 16 31 1 0 netid hostid 0 24 31 1 1 0 netid hostid Network Address : (A) 1 ~ 127,
More informationUSB USB DV25 DV25 REC SRN-475S REC SRN-475S LAN POWER LAN POWER Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl C
USB USB DV25 DV25 REC SRN-475S REC SRN-475S LAN POWER LAN POWER Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC Step 1~5. Step, PC, DVR Step 1. Cable Step
More informationP2P Content Distribution Technologies
차세대융합형 미래형 식별체계연구 Jaeyoung Choi Seoul National University 목차 1 2 현재의움직임 융합형식별체계의정의및설명 3 미래형식별체계의정의및설명 4 결론 2/25 현재의움직임 User-friendly Service Interface 서비스 / 네트워크융합 현실세계와인터넷세계의융합 3/25 서비스 / 네트워크의융합 ENUM
More information/ TV 80 () DAB 2001 2002 2003 2004 2005 2010 Analog/Digital CATV Services EPG TV ( 60 ) TV ( Basic, Tier, Premiums 60 ) VOD Services Movies In Demand ( 20 ) Education N- VOD (24 ) Digital Music
More information요 약 문 1. 제목 : 개인정보 오남용 유출 2차 피해 최소화 방안 2. 연구의 배경 개인정보란 살아 있는 개인에 관한 정보로서 개인을 알아볼 수 있는 정보로 해당 정보만으로는 특정 개인을 알아볼 수 없더라도 다른 정보와 쉽게 결합하여 알아볼 수 있는 것을 포함한다.
개인정보 오남용 유출 2차 피해 최소화 방안 최종보고서 수행기관 : 숭실대학교 산학협력단 2015. 10. 요 약 문 1. 제목 : 개인정보 오남용 유출 2차 피해 최소화 방안 2. 연구의 배경 개인정보란 살아 있는 개인에 관한 정보로서 개인을 알아볼 수 있는 정보로 해당 정보만으로는 특정 개인을 알아볼 수 없더라도 다른 정보와 쉽게 결합하여 알아볼 수 있는
More informationMicrosoft PowerPoint - 인소프트.ppt
SOA 기반 망 관리시스템 SOA 기반망관리시스템 인소프트 기술이사 임 옥수 목차 회사 소개 Multi-Layer 망 관리개념 전략적 중점 개발 사항 SOA 기반 망관리 시스템 개발 방향 Page 2 회사 소개 (1/2) IP/MPLS/ATM/전송망 관리 NMS/EMS 개발 공급 발전소 관제 및 제어시스템 분야 연구 망관리 분야 타 도메인 관리 분야 관제/QoS
More information1. 회사소개 및 연혁 - 회사소개 회사소개 회사연혁 대표이사: 한종열 관계사 설립일 : 03. 11. 05 자본금 : 11.5억원 인 원 : 18명 에스오넷 미도리야전기코리 아 미도리야전기(일본) 2008 2007 Cisco Premier Partner 취득 Cisco Physical Security ATP 취득(진행) 서울시 강남구 도심방범CCTV관제센터
More informationTTA Journal No.157_서체변경.indd
표준 시험인증 기술 동향 FIDO(Fast IDentity Online) 생체 인증 기술 표준화 동향 이동기 TTA 모바일응용서비스 프로젝트그룹(PG910) 의장 SK텔레콤 NIC 담당 매니저 76 l 2015 01/02 PASSWORDLESS EXPERIENCE (UAF standards) ONLINE AUTH REQUEST LOCAL DEVICE AUTH
More information歯A1.1함진호.ppt
The Overall Architecture of Optical Internet ETRI ? ? Payload Header Header Recognition Processing, and Generation A 1 setup 1 1 C B 2 2 2 Delay line Synchronizer New Header D - : 20Km/sec, 1µsec200 A
More information歯V-2_VoIP와지능망-홍융기.PDF
VoIP 1 VoIP VoIP VoIP/IN VoIP/IN 2 Traffic Data Voice Voice Data over Voice Time Data Voice over Data 3 End-user Demands Lower cost voice services MultiMedia services Simplification Carrier Demands Regulatory
More informationOUR INSIGHT. YOUR FUTURE. Disclaimer Presentation ( ),. Presentation,..,,,,, (E).,,., Presentation,., Representative.( ). ( ).
OUR INSIGHT. YOUR FUTURE. Disclaimer Presentation ( ),. Presentation,..,,,,, (E).,,., Presentation,., Representative.( ). ( ). Investor Relations 2016 Contents Prologue Chapter1. 네트워크 솔루션 전문기업 Chapter2.
More information歯Cablexpert제안서.PDF
: CableXpert TM TEL:02-576-0471 / E-mail : lab@dakos.net 1. (CableXpert TM :CME1100 ) (PSTN) 100,. (CableXpert TM ).,,.... : : 324-1 2 : 02-576-0471 : 02-576-0474 : (E-mail : jangpo@dakos.net) 3. 1) S/W
More information1217 WebTrafMon II
(1/28) (2/28) (10 Mbps ) Video, Audio. (3/28) 10 ~ 15 ( : telnet, ftp ),, (4/28) UDP/TCP (5/28) centralized environment packet header information analysis network traffic data, capture presentation network
More information04_오픈지엘API.key
4. API. API. API..,.. 1 ,, ISO/IEC JTC1/SC24, Working Group ISO " (Architecture) " (API, Application Program Interface) " (Metafile and Interface) " (Language Binding) " (Validation Testing and Registration)"
More informationchapter4
Basic Netw rk 1. ก ก ก 2. 3. ก ก 4. ก 2 1. 2. 3. 4. ก 5. ก 6. ก ก 7. ก 3 ก ก ก ก (Mainframe) ก ก ก ก (Terminal) ก ก ก ก ก ก ก ก 4 ก (Dumb Terminal) ก ก ก ก Mainframe ก CPU ก ก ก ก 5 ก ก ก ก ก ก ก ก ก ก
More information강의지침서 작성 양식
정보화사회와 법 강의지침서 1. 교과목 정보 교과목명 학점 이론 시간 실습 학점(등급제, P/NP) 비고 (예:팀티칭) 국문 정보화사회와 법 영문 Information Society and Law 3 3 등급제 구분 대학 및 기관 학부(과) 전공 성명 작성 책임교수 법학전문대학원 법학과 최우용 2. 교과목 개요 구분 교과목 개요 국문 - 정보의 디지털화와 PC,
More informationecorp-프로젝트제안서작성실무(양식3)
(BSC: Balanced ScoreCard) ( ) (Value Chain) (Firm Infrastructure) (Support Activities) (Human Resource Management) (Technology Development) (Primary Activities) (Procurement) (Inbound (Outbound (Marketing
More informationPowerPoint 프레젠테이션
Post - Internet Marketing Contents. Internet Marketing. Post - Internet Marketing Trend. Post - Internet Marketing. Paradigm. . Internet Marketing Internet Interactive Individual Interesting International
More informationDBPIA-NURIMEDIA
논문 10-35-03-03 한국통신학회논문지 '10-03 Vol. 35 No. 3 원활한 채널 변경을 지원하는 효율적인 IPTV 채널 관리 알고리즘 준회원 주 현 철*, 정회원 송 황 준* Effective IPTV Channel Control Algorithm Supporting Smooth Channel Zapping HyunChul Joo* Associate
More informationuntitled
Cable Modem 2004.10 sgkwon@empal.com 1.... 1 2. CABLE MODEM?... 2 2.1.... 2 2.2. /... 3 2.3.... 4 3.... 5 3.1.... 5 3.1.1. TV, 2009 4 3... 5 3.1.2. TV Broadband... 5 3.1.3. NGNA... 6 3.2.... 7 3.2.1. TV
More information미래인터넷과 창조경제에 관한 제언 65 초록 과학기술과의 융합을 통해 창조경제를 이루는 근간인 인터넷은 현재 새로운 혁신적 인터넷, 곧 미래인터넷으로 진화하는 길목에 있다. 창조와 창업 정신으로 무장하여 미래인터넷 실현에 범국가적으로 매진하는 것이 창조경제 구현의 지름
미래인터넷과 창조경제에 관한 제언 김대영 Internet & Security Policy Review 김대영 충남대학교 정보통신공학과 교수, dykim@cnu.kr 본 내용은 KISA의 공식적인 견해가 아님을 밝히며, 인용시 출처를 명시하여 주시기 바랍니다. 미래인터넷과 창조경제에 관한 제언 65 초록 과학기술과의 융합을 통해 창조경제를 이루는 근간인 인터넷은
More information15_3oracle
Principal Consultant Corporate Management Team ( Oracle HRMS ) Agenda 1. Oracle Overview 2. HR Transformation 3. Oracle HRMS Initiatives 4. Oracle HRMS Model 5. Oracle HRMS System 6. Business Benefit 7.
More informationMicrosoft PowerPoint - 2.Catalyst Switch Intrastructure Protection_이충용_V1 0.ppt [호환 모드]
Catalyst Switch Infrastructure Protection Cisco Systems Korea SE 이충용 (choolee@cisco.com) Overview DoS (Denial of Service) 공격대상 - Server Resource - Network Resource - Network devices (Routers, Firewalls
More informationFuture direction of NMS
Future Direction of Network and Service Management : Telco s Perspective 2006.10.19~20 Jae Hyoung Yoo KT Network Technology Laboratory Page No. - 1 Page 1 Overview 1. The Need for More Advanced Network
More informationMicrosoft PowerPoint - ch13.ppt
chapter 13. 네트워크보안과 ACL 한빛미디어 -1- 학습목표 계층별네트워크보안이슈 시스코라우터의 ACL 시스코라우터의 ACL 설정 한빛미디어 -2- 계층별네트워크보안이슈 데이터링크계층보안 ARP 스푸핑 MAC 플러딩 한빛미디어 -3- 계층별네트워크보안이슈 방화벽 [ 그림 ] 방화벽구조 한빛미디어 -4- 계층별네트워크보안이슈 침입탐지시스템 (IDS)
More informationBackup Exec
(sjin.kim@veritas.com) www.veritas veritas.co..co.kr ? 24 X 7 X 365 Global Data Access.. 100% Storage Used Terabytes 9 8 7 6 5 4 3 2 1 0 2000 2001 2002 2003 IDC (TB) 93%. 199693,000 TB 2000831,000 TB.
More informationIntra_DW_Ch4.PDF
The Intranet Data Warehouse Richard Tanler Ch4 : Online Analytic Processing: From Data To Information 2000. 4. 14 All rights reserved OLAP OLAP OLAP OLAP OLAP OLAP is a label, rather than a technology
More information통신서비스품질평가보고서 2017 Evaluation Report for the Quality of Communication Services
www.nia.or.kr 2017 통신서비스품질평가보고서 2017 Evaluation Report for the Quality of Communication Services www.nia.or.kr 2017 통신서비스품질평가보고서 2017 Evaluation Report for the Quality of Communication Services www.nia.or.kr
More informationvm-웨어-앞부속
VMware vsphere 4 This document was created using the official VMware icon and diagram library. Copyright 2009 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright
More informationSamsung SDS Enterprise Cloud Networking CDN Load Balancer WAN
Samsung SDS Enterprise Cloud Networking CDN Load Balancer WAN Enterprise Cloud Networking CDN (Content Delivery Network) 전 세계에 배치된 콘텐츠 서버를 통해 빠른 전송을 지원하는 서비스 전 세계에 전진 배치된 CDN 서버를 통해 사용자가 요청한 콘텐츠를 캐싱하여
More informationMicrosoft PowerPoint - L4-7Switch기본교육자료.ppt
L4-7 Switch 기본교육자료 Pumpkin Networks. Inc. http://www.pumpkinnet.co.kr (Tel) 02-3280-9380 (Fax) 02-3280-9382 info@pumpkinnet.co.kr 기본개념 L4/L7 Switch 란? -2- 기본개념 - Switching & Routing Switching & Routing
More informationSK IoT IoT SK IoT onem2m OIC IoT onem2m LG IoT SK IoT KAIST NCSoft Yo Studio tidev kr 5 SK IoT DMB SK IoT A M LG SDS 6 OS API 7 ios API API BaaS Backend as a Service IoT IoT ThingPlug SK IoT SK M2M M2M
More information°í¼®ÁÖ Ãâ·Â
Performance Optimization of SCTP in Wireless Internet Environments The existing works on Stream Control Transmission Protocol (SCTP) was focused on the fixed network environment. However, the number of
More information슬라이드 제목 없음
21 ETRI 2001. 9. 12. jwyang@etri.re.kr .. (2002.2 ), (, 2002 ). 1 : 2 : 3 : 9 15. ( ) 1 ( download) 1 (2002.2 ), 1 1 ( ) ( ) 1 ( ) 1 (TOEIC, TOEFL, TEPS ) 1 ( ) 305-350 161 E-mail : eakang@etri.re.kr Tel
More information<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770>
327 Journal of The Korea Institute of Information Security & Cryptology ISSN 1598-3986(Print) VOL.24, NO.2, Apr. 2014 ISSN 2288-2715(Online) http://dx.doi.org/10.13089/jkiisc.2014.24.2.327 개인정보 DB 암호화
More informationRFID USN_K_100107
U B I Q U I T O U S S O L U T I O N RFID/USN C O N T E N T S LEADING YOU TOWARD A GREATER FUTURE THAN YOU IMAGINE WONDERFUL UBIQUITOUS WORLD 04 RFID/USN 05 06 LEADING RFID/USN SOLUTION PEOPLE PRODUCT PROCESS
More informationNetwork Security - Wired Sniffing 실습 ICNS Lab. Kyung Hee University
Network Security - Wired Sniffing 실습 ICNS Lab. Kyung Hee University Outline Network Network 구조 Source-to-Destination 간 packet 전달과정 Packet Capturing Packet Capture 의원리 Data Link Layer 의동작 Wired LAN Environment
More informationAV PDA Broadcastin g Centers Audio /PC Personal Mobile Interactive (, PDA,, DMB ),, ( 150km/h ) (PPV,, ) Personal Mobile Interactive Multimedia Broadcasting Services 6 MHz TV Channel Block A Block
More informationfinal_thesis
CORBA/SNMP DPNM Lab. POSTECH email : ymkang@postech.ac.kr Motivation CORBA/SNMP CORBA/SNMP 2 Motivation CMIP, SNMP and CORBA high cost, low efficiency, complexity 3 Goal (Information Model) (Operation)
More informationPortal_9iAS.ppt [읽기 전용]
Application Server iplatform Oracle9 A P P L I C A T I O N S E R V E R i Oracle9i Application Server e-business Portal Client Database Server e-business Portals B2C, B2B, B2E, WebsiteX B2Me GUI ID B2C
More informationAnalyst Briefing
. Improve your Outlook on Email and File Management iseminar.. 1544(or 6677)-3355 800x600. iseminar Chat... Improve your Outlook on Email and File Management :, 2003 1 29.. Collaboration Suite - Key Messages
More information<303833315FC1A4BAB8B9FDC7D02031362D325FC3D6C1BEBABB2E687770>
개인정보보호법의 보호원칙에 대한 벌칙조항 연구 A Legal Study of Punishments in Terms of Principles of Private Informaion Protection Law 전동진(Jeon, Dong-Jin)*19) 정진홍(Jeong, Jin-Hong)**20) 목 차 Ⅰ. 들어가는 말 Ⅱ. OECD 개인정보 보호원칙과의 비교
More informationF1-1(수정).ppt
, thcho@kisaorkr IPAK (Information Protection Assessment Kit) IAM (INFOSEC Assessment Methodology) 4 VAF (Vulnerability Assessment Framework) 5 OCTAVE (Operationally Critical Threat, Asset, and Vulnerability
More informationMicrosoft PowerPoint 통신과 통신망.ppt
통신과통신망 (Communication & Networks) Yang-Sae Moon Department of Computer Science Kangwon National University, Korea 1 통신 (Communication) 이란? 어원 : 라틴어의 Communication 은 공유한다 는의미 정의 : 일반적으로통신은송신자와수신자사이에전송매체
More information슬라이드 1
PKI Kerberos SAML & Shibboleth OpenID Cardspace & ID 2 < > (= ) password, OTP, bio, smartcard, pki CardSpace, ID What you have.., 2 factor, strong authentication 4 (SSO) Kerberos, OpenID 5 Shared authentication
More informationMultimedia PC Mobile Multimedia terminal Mixed( + + ) service Overlay - TSR, TES, WDM, etc -, / Multiaccess Business Model - any media, but the same service - Open, Service Portability -PSTN/IN/Internet
More information1?4?옥?-32
* (ICT),,,,,.., * . ) ( ),, (, ).,,,,., (cyber security).,,. ), ),,,,,,.,,.,.,,...,,, ) (William Gibson) (Neuromancer). ) ; ;.,.. ),,,.,,,,. ..,..,.,...,..,.,..,,,..,.,,,.. . ). (ubiquitous),,. (,, ).
More informationETL_project_best_practice1.ppt
ETL ETL Data,., Data Warehouse DataData Warehouse ETL tool/system: ETL, ETL Process Data Warehouse Platform Database, Access Method Data Source Data Operational Data Near Real-Time Data Modeling Refresh/Replication
More informationChapter11OSPF
OSPF 111 OSPF Link state Interior Gateway Protocol OSPF 1988 IETF OSPF workgroup OSPF RFC 2383 version 2 Chapter OSPF Version 2 OSPFIGP AS 1 1111 Convergence Traffic Distance Vector Link state OSPF (Flooding),
More informationIntro to Servlet, EJB, JSP, WS
! Introduction to J2EE (2) - EJB, Web Services J2EE iseminar.. 1544-3355 ( ) iseminar Chat. 1 Who Are We? Business Solutions Consultant Oracle Application Server 10g Business Solutions Consultant Oracle10g
More informationDW 개요.PDF
Data Warehouse Hammersoftkorea BI Group / DW / 1960 1970 1980 1990 2000 Automating Informating Source : Kelly, The Data Warehousing : The Route to Mass Customization, 1996. -,, Data .,.., /. ...,.,,,.
More information1. 정보보호 개요
정보보호개론 16. VPN( 가상사설망 ) 1 목포해양대해양컴퓨터공학과 가상사설망 (VPN) (1) 공중망을사설망처럼이용할수있도록사이트양단간암호화통신을지원하는장치 원격사용자가공중망및인터넷을통해내부망의시스템사용시, 공중망구간에서의도청으로인한정보유출을방지하기위해사용자와내부망간암호화통신을지원 가상사설망의장점 저비용으로광범위한사설네트워크의구성이가능 기업네트워크관리및운영비용이절감됨
More information1ºÎ
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 28 X1 TTC Comm MPMHAPT TTCouncil AIC PHS ARIB MoU CIAJ MITF MMAC INSTAC JEIDA OITDA JISC GMM CG APT ASTAP Trade Associations EP TC 1
More informationTCP.IP.ppt
TCP/IP TCP/IP TCP/IP TCP/IP TCP/IP Internet Protocol _ IP Address Internet Protocol _ Subnet Mask Internet Protocol _ ARP(Address Resolution Protocol) Internet Protocol _ RARP(Reverse Address Resolution
More informationuntitled
(*) (*) pie H.264 VC-1 CAS DRM TCS itv M/W ACAP Advanced Common Application Platform ATSC Specific OCAP OpenCable Applications Platform Cable Specific GEM Globally Executable MHP DVB Specific MHP
More information기타자료.PDF
< > 1 1 2 1 21 1 22 2 221 2 222 3 223 4 3 5 31 5 311 (netting)5 312 (matching) 5 313 (leading) (lagging)6 314 6 32 6 321 7 322 8 323 13 324 19 325 20 326 20 327 20 33 21 331 (ALM)21 332 VaR(Value at Risk)
More information<4D F736F F F696E74202D FB5A5C0CCC5CDC5EBBDC5B0FA20B3D7C6AEBFF6C5A9205BC8A3C8AF20B8F0B5E55D>
2011 년봄학기데이터통신 Chapter 01 데이터통신과네트워크 1 순서 1. 데이터통신과네트워크의개념 2. 컴퓨터네트워크의유형 3. 네트워크표준화 4. 인터넷표준화활동 5. 유무선네트워크의발전및진화 Copyright(c)2011 by Hyun-Ho Choi 2 Section 01 데이터통신과네트워크의개념 데이터통신 (Data Communication) 두개이상의통신장치사이에서전송미디어
More informationistay
` istay Enhanced the guest experience A Smart Hotel Solution What is istay Guest (Proof of Presence). istay Guest (Proof of Presence). QR.. No App, No Login istay. POP(Proof Of Presence) istay /.. 5% /
More information141124 rv 브로슈어 국문
SMART work MOBILE office Home Office 원격제어에 대한 가장 완벽한 해답, 스마트워크 및 모바일 오피스를 위한 최적의 솔루션 시간과 공간의 한계를 넘어서는 놀라운 세계, 차원 이 다른 원격제어 솔루션을 지금 경험해보십시오! RemoteView? 리모트뷰는 원거리의 내 PC 또는 관리할 서버에 프로그램 설치 후, 인터넷을 통해 언제
More informationMicrosoft PowerPoint - 06-IPAddress [호환 모드]
Chapter 06 IP Address IP Address Internet address IP 계층에서사용되는식별자 32 bit 2 진주소 The address space of IPv4 is 2 32 or 4,294,967,296 netid 와 hostid 로구분 인터넷에서호스트와라우터를유일하게구분 IP Address Structure 2-Layer Hierarchical
More information歯박사
2000. 10. 30. ETRI Introduction Clearing. Internet Clearing,,,. B2C B2B,,. Gartner Group Non-EDI B2B ecommerce 2000 1240, 2003 7467 B2B Biller 70% e-billing, 2003 electronic Bill presentment 40 IDC Report
More informationPowerPoint 프레젠테이션
2003 CRM (Table of Contents). CRM. 2003. 2003 CRM. CRM . CRM CRM,,, Modeling Revenue Legacy System C. V. C. C V.. = V Calling Behavior. Behavior al Value Profitability Customer Value Function Churn scoring
More information소프트웨어 융합 개론
소프트웨어융합개론 의개념 컴퓨터, 즉컴퓨팅기능을가진시스템들이물리적인매체로서로연결되어데이터를교환하는시스템들의모임 단말시스템 (end system), 중개시스템 (intermediate system) ISP (Internet Service Provider) 개인이나기업체에게인터넷접속서비스를제공하는회사 Internet: a network of networks 단말네트워크와코아네트워크
More information<3230303520BBEABEF7B5BFC7E228C3D6C1BE292E687770>
2 1) 1. 5 2. 6 2.1 6 2.2 7 2.3 13 2.4 16 2.5 19 2.6 25 2.7 28 3. 32 3.1 33 3.2 42 46 1.,,,. 2004 13 4,841 0.6%. 2004,,. *, (02) 570 4491, sky@kisdi.re.kr( : ) * *, (02) 570 4164, milip@kisdi.re.kr( :,
More information본교재는수업용으로제작된게시물입니다. 영리목적으로사용할경우저작권법제 30 조항에의거법적처벌을받을수있습니다. [ 실습 ] 스위치장비초기화 1. NVRAM 에저장되어있는 'startup-config' 파일이있다면, 삭제를실시한다. SWx>enable SWx#erase sta
[ 실습 ] 스위치장비초기화 1. NVRAM 에저장되어있는 'startup-config' 파일이있다면, 삭제를실시한다. SWx>enable SWx#erase startup-config Erasing the nvram filesystem will remove all configuration files Continue? [confirm] ( 엔터 ) [OK] Erase
More informationOfficeServ 솔루션 OfficeServ 솔루션 OfficeServ는 삼성전자의 기업형 IP 솔루션으로서 음성과 데이터, 유선과 무선이 융합된 미래 오피스형 솔루션입니다. OfficeServ 7400/7200 삼성전자가 다년간 쌓아 온 기간망 사업 경험 및 모바일
Unlimited Connectivity, Enterprise Convergence Unlimited Connectivity, Enterprise Convergence SMB IP 중소용량 IP-PBX SYSTEM Solution 네트워크사업부 Enterprise 영업팀 경기도 수원시 영통구 삼성로 129 E-mail : jh1.park@samsung.com
More information