• Title/Summary/Keyword: 네트워크 이론

Search Result 1,114, Processing Time 0.024 seconds

Packet Scheduling Scheme for Multiple Switches in SDN Environment (SDN 환경에서 다중 스위치를 위한 패킷 스케줄링 기법)

  • Lim, Hwan-Hee;Yoo, Seung-Eon;Lee, Byung-Jun;Kim, Kyung-Tae;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.93-94
    • /
    • 2019
  • 최근 클라우드 서비스가 급속도로 등장하고 있으며 이러한 서비스는 기존의 IP 네트워크를 사용한다. 기존의 네트워크는 댜앙한 트래픽 패턴에 대해 비 효율적이고 복잡한 구조를 가지고 있는 문제가 있다. 이러한 문제를 해결하기 위해 SDN 기술이 도입되어 널리 보급되고 있다. 클라우드 서비스 센터에서는 SDN 기술을 채택하여 많은 성과를 이루고 있지만 패킷 스케줄링 같은 분야는 아직 초기단계이다. 또한 SDN 환경에서 각 네트워크 노드로부터 데이터와 관련된 스위치에 효율적으로 전달하는 것이 중요한 이슈로 부각되고 있으며 본 논문에서는 큐잉이론을 적용한 패킷 스케줄링 기법을 제안한다.

  • PDF

동시입력이 있는 병렬네트워크의 과부하 확률 추정

  • 권민희;이지연
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2000.11a
    • /
    • pp.247-252
    • /
    • 2000
  • 동시입력이 있는 병렬 네트워크에서 총 손님의 수가 특정한 값을 초과하여 과부하가 발생하는 확률을 추정하고자 한다. large deviation 이론을 적용하여 추정을 위한 최적의 확률 측도를 찾고 이를 이용하여 과부하 확률의 중요 샘플링 추정량을 구한다.

  • PDF

Accuracy Analysis of Time Synchronization in Wireless Sensor Networks (무선 센서 네트워크에서 시각 동기 정확도 분석)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1487-1495
    • /
    • 2013
  • Time synchronization is a prerequisite in wireless sensor network applications such as object tracking, consistent state update, duplication detection, and temporal order delivery. This paper analyze time synchronization accuracy of pair-wise time synchronization algorithm which is a typical time synchronization model of time synchronization method in wireless sensor networks. In addition, the analyzed results are verified by simulations. These results can be utilized for performance improvement or development of time synchronization in wireless sensor networks.

Game Theoretic Approach to Selfish Replica Allocation over a Mobile Ad Hoc Network (모바일 애드혹 네트워크 환경에서 이기적 복제본 할당 문제에 대한 게임이론적 접근)

  • Yeom, Ji-Yeon;Shim, Kyu-Sun;Choi, Jae-Ho;Lee, SangKeun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.16-19
    • /
    • 2010
  • 최근 무선 컴퓨팅 환경과 무선 단말기관련 기술의 발전으로 인해 모바일 애드혹 네트워크관련 연구가 활발하게 이루어지고 있다. 모바일 애드혹 네트워크에서는 노드들이 자유롭게 이동하기 때문에 네트워크가 빈번하게 분리되며, 이로 인해 데이터 접근성 저하문제가 발생한다. 기존 연구에서는 데이터 접근성이 저하되는 문제를 해결하기 위해 다양한 복제본 할당 기법이 연구되었다. 그러나, 지금까지 연구된 복제본 할당기법들은 모바일 애드혹 네트워크 환경의 제한된 자원으로 인한 노드들의 이기적인 행동에 대해 고려하지 않았다. 본 논문은 모바일 애드혹 네트워크 상의 노드들이 자신의 이득을 위해 협력이 아닌 이기적인 행동을 택하게 되는 과정을 게임이론을 통해 설명하고, 수익함수 조절을 통해 노드들의 이기적인 행동을 억제할 수 있는 방안을 제시한다.

Analysis of Personal Information Data Flow Structure based on Network Theory (네트워크 이론을 적용한 개인정보 유통구조 분석)

  • Lee, Jae-Geun;Kim, Hyun Jin;YOUM, Heung Youl;Kang, Sang-ug
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.17-34
    • /
    • 2014
  • The study on the structure of personal information flows is very important because government can measure and respond the risks caused by companies which collect personal information from other personal data users to operate their business. Recently, as the value of personal information is increasing, number of companies which intend to process a large scale of personal information is increasing too. Accordingly, the issue on the structure of personal data flow has become important for the leading personal information processors which receive far more personal information from others to comply the personal information protection laws. However, research on this issue has rarely performed so far. Therefore, this study proposes a framework for personal information data flow structure based on network theory. Theoretically, the results of the study may contribute to extending the application areas of the network theory to personal information area. Practically, the study may contribute to assisting regulatory authorities to find and monitor personal information processors.

Simulation-based Network Vulnerability Analysis Using the SIMVA (SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석)

  • 유용준;이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.13-19
    • /
    • 2004
  • 본 논문은 SIMVA(Simulation Vulnerability Analyzer)를 이용한 시뮬레이션 기반의 네트워크 취약성 분석을 주목적으로 한다 SIMVA는 네트워크 상태를 감시하고, 이를 토대로 취약성을 분석하기 위하여 개발된 S/W로서, SES/MB (System Entity Structure / Model Base) 프레임워크 및 DEVS(Discrete Event System Specification) 이론을 적용하여 네트워크 보안 모델링을 수행할 수 있으며, 취약성 메트릭스를 통하여 정량적으로 취약성을 분석할 수 있다. 본 연구에서는 SIMVA를 이용하여 최근 네트워크 보안 문제에 심각한 영향을 미치는 슬래머 웜 공격 시나리오에 대한 취약성 분석을 수행함으로써 SIMVA의 검증 및 적용 가능성을 제시한다.

  • PDF

The Effect of SNS Use on the Social Network: Moderating Effect of the Gender (SNS 이용이 사회적 네트워크에 미치는 영향: 성별 조절효과를 중심으로)

  • Han, Su-Young;Choi, Moon-Hyeong;Park, Mi-Kyung;Lee, Hong-Jae
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.3
    • /
    • pp.133-156
    • /
    • 2013
  • The purposes of this study are (1) to examine the relationships among attitude on SNS use, subjective norm, perceived behavioral control, and SNS use, (2) to analyze effect of SNS use on bonding network and bridging network, (3) to consider moderating effect of the gender on the relationship between SNS use and Social network. We conducted a survey for 20-30's SNS user. The results of analysis using the Structural Equation Model(SEM) represent that attitude on SNS use, subjective norm, and perceived behavioral control are significant determinants of the SNS use. SNS use affects bonding network and bridging network. An interesting result was observed that the gender had moderating effect on the relationship between SNS use and social network. Based on these results, we suggest theoretical and practical implications of this study.

An Empirical Study on the Relationships among Safeguarding Mechanism, Relationship Learning, and Relationship Performance in Technology Cooperation Network by Applying Resource Based Theory (자원기반이론을 적용한 기술협력 네트워크에서 보호 메커니즘, 관계학습, 관계성과의 관계에 대한 실증연구)

  • Kang, Seok-Min
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.45-66
    • /
    • 2016
  • Firms can make scale of economy and scope of economy by internalizing and using new advanced technology and knowledge from technology cooperation network, decrease risk and cost with partner firm of technology cooperation network, and increase market advantage of product & strengthen firms' position in the market. Due to the advantages of technology cooperation network, the related studies have focused on the positive effect of technology cooperation network. However, the related studies investigating the relationship between technology cooperation network and firm performance have only examined the role of technology cooperation network. Safeguarding mechanism, relationship learning, and relationship performance are categorized into the process of technology cooperation network, and this categorization is applied as resources, capability, and performance by resource based view. The empirical results are reported as belows. First, relationship specific investment and relationship capital positively affect on relationship learning as capability. Second, information sharing, common information understanding, and relationship specific memory development positively affect on long-term orientation, but information sharing has no impact on efficiency and effectiveness. Third, relationship specific investment positively affects on relationship capital and efficiency and effectiveness have positive effects on long-term orientation. Applying technology cooperation network in asymmetric technology dependency with resource based theory, this study suggested the importance of both safeguarding and relationship learning by investigating the relationship among safeguarding, relationship learning, and relationship performance. And it is worthy that this study investigated how firms' behavior change affects relationship performance in the relationship of technology cooperation partner.

  • PDF

A Review of Research on Social Network Services Using the New Media Evolutionary Model (뉴미디어 발전단계모델을 적용한 소셜네트워크 서비스 분야의 연구동향분석)

  • Kwak, Hyun;Lee, Ho Geun
    • Informatization Policy
    • /
    • v.18 no.3
    • /
    • pp.3-24
    • /
    • 2011
  • The purpose of this paper is to indicate possible future research directions for social network services(SNS) by reviewing past and recent trends in SNS studies. The framework used for the analysis is the New Media Evolutionary Model(NMEM) proposed by Wimmer and Dominick, a four-phase system for research on new media development. Although early forms of SNS emerged in the late 1990s, most research in this field has been published in the past five years. We searched for SNS-related articles published from 2006 to August 2011 from academic journal archives in information systems, communication, marketing, and other fields, and classified them according to the NMEM to analyze the current state of SNS research. Researchers in this field have so far focused on the first two phases of the model(the media itself and use of the media), but little research has been conducted on the third(effects of the media) and fourth phases(improvements in the media). Although SNS research is still in its early stages, we suggest the need for more studies on the effects of SNS and how it can be improved. Very few studies test existing theories or build new theories related to SNS. Thus, a more rigorous approach towards SNS research is warranted, and future research should focus on theory building and testing.

  • PDF

Analysis of Keywords in national river occupancy permits by region using text mining and network theory (텍스트 마이닝과 네트워크 이론을 활용한 권역별 국가하천 점용허가 키워드 분석)

  • Seong Yun Jeong
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.185-197
    • /
    • 2023
  • This study was conducted using text mining and network theory to extract useful information for application for occupancy and performance of permit tasks contained in the permit contents from the permit register, which is used only for the simple purpose of recording occupancy permit information. Based on text mining, we analyzed and compared the frequency of vocabulary occurrence and topic modeling in five regions, including Seoul, Gyeonggi, Gyeongsang, Jeolla, Chungcheong, and Gangwon, as well as normalization processes such as stopword removal and morpheme analysis. By applying four types of centrality algorithms, including stage, proximity, mediation, and eigenvector, which are widely used in network theory, we looked at keywords that are in a central position or act as an intermediary in the network. Through a comprehensive analysis of vocabulary appearance frequency, topic modeling, and network centrality, it was found that the 'installation' keyword was the most influential in all regions. This is believed to be the result of the Ministry of Environment's permit management office issuing many permits for constructing facilities or installing structures. In addition, it was found that keywords related to road facilities, flood control facilities, underground facilities, power/communication facilities, sports/park facilities, etc. were at a central position or played a role as an intermediary in topic modeling and networks. Most of the keywords appeared to have a Zipf's law statistical distribution with low frequency of occurrence and low distribution ratio.