DOI QR코드

DOI QR Code

망 분리 가상 컴퓨터 환경 제공 방법 및 시스템

Method and system for providing virtual computer environment for the network division

  • 윤태호 (광주대학교 전기전자공학과)
  • Yoon, Tae-Ho (Dept. of Electrical & Electronic Engineering, GwangJu University)
  • 투고 : 2015.09.03
  • 심사 : 2015.10.23
  • 발행 : 2015.10.31

초록

본 논문은 망 분리 가상 컴퓨터 환경 제공 방법 및 시스템을 제공한다. 본 가상 컴퓨터 환경 제공 방법은 가상 기능 수행을 위해 필요한 가상 자원 요청을 생성하는 단계 및 가상 자원 등록 요청을 네트워크 프로토콜 포맷으로 변환하여 네트워크를 통해 전송하는 단계를 포함한다. 이로 인해, 등록 처리 절차가 조합형 망 분리 가상 컴퓨팅 자원 할당과 임의 시간 동안 가상 컴퓨터를 사용하기 위해서, 서버와 클라이언트 또는 휴대폰 사이에서 가능해졌다. 언제든, 인터넷에 접속해 내 컴퓨터와 동일한 환경에서 업무를 처리 할 수 있게 된다.

In this paper, to provide a method and system for providing a network separation virtual machine environment. How to provide this virtual machine environment include phase generating necessary virtual resource requirement for the perform of virtual function and transfer to network changing protocol about request of registration virtual resource. For this reason, Registration procedure is to use a virtual machine for a virtual computing resource allocation and separation combined network any time, it became possible between servers and clients, or mobile phone. At any time, it is possible to process the work in the same environment as in a computer to access the Internet.

키워드

참고문헌

  1. S. Lim, G. Kim, and T. Kang, "Application Program Virtualization based on Desktop Virtualization," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, Dec. 2010, pp. 595-601.
  2. S. Lee and H. Yoon, "The Study on Development of Technology for Electronic Government of S. Korea with Cloud Computing analysed by the Application of Scenario Planning," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 6, Dec. 2012, pp. 1245-1258. https://doi.org/10.13067/JKIECS.2012.7.6.1245
  3. C. Jeong and T. Kang, "Performance Comparison of Vitualization Domain in User Level Virtualization," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 11, Nov. 2013, pp. 1741-1747. https://doi.org/10.13067/JKIECS.2013.8.11.1741
  4. W. Seo, M. Jeon, and D. Park, "A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 5, Oct. 2012, pp. 1041-1051. https://doi.org/10.13067/JKIECS.2012.7.5.1041
  5. D. Kang, M. Jeon, and C. Kim, "Zero-day Attack, Virtual Honeynet, High-Interaction Hoenypot, Client Honeypot, Attack Visualization" J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 6, June 2013, pp. 863-872. https://doi.org/10.13067/JKIECS.2013.8.6.863
  6. K. Nam, "A Study on the Office Management Service Platform based on M2M/IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 12. 2014, pp. 1405-1413. https://doi.org/10.13067/JKIECS.2014.9.12.1405
  7. D. Ryu, "Development of BLE Sensor Module based on Open Source," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 3. 2015, pp. 419-424. https://doi.org/10.13067/JKIECS.2015.10.3.419
  8. M. Kang, "Platform Design of Unity Launcher for the IoT Beacon based 3D Position," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 4. 2015, pp. 477-482. https://doi.org/10.13067/JKIECS.2015.10.4.477
  9. M. Albano, S. Chessa, F. Nidito, and S. Pelagatti, "Dealing with nonuniformity in data centric storage for wireless sensor networks," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 8, 2011, pp. 1398-1406. https://doi.org/10.1109/TPDS.2011.18