• 제목/요약/키워드: Access Networking

검색결과 302건 처리시간 0.02초

비윤리적 정보공유 딜레마와 사회적 네트워킹 관계에서 정보접근 모니터링의 영향력 (The Impact of Information Access Monitoring between Dilemma of Unethical Information Sharing and Social Networking)

  • 정병호
    • 디지털산업정보학회논문지
    • /
    • 제14권2호
    • /
    • pp.91-105
    • /
    • 2018
  • The purpose of this study is to examine an immoral effectiveness decrease by information access monitoring between ethical dilemma and unethical information-sharing behavior. Firms are raising the demand of confidential information management and are highlighting the ethical awareness of organizational members. The individuals in organization are concerned information sharing for future-oriented social networking. To prevent their immoral behavior, Firms should consider investing the information access monitoring. This system is aiming at log verification of movement, storage and deletion on information and will reduce an ethical conflict and unethical behavior on employees. I used the structural equation methodology for this empirical study. The research model constructs the voluntary and involuntary dilemma of information sharing on the two independent-variables, the unethical information behavior and the improper networking reinforcement on the two dependent-variables and the information access monitoring the one mediating-variables. This model tests the power effect of direct path, indirect path and total path. According to the study, the two ethical dilemma of information sharing provided a high influence to the unethical sharing action and to the inappropriate social networking strengthens. However, the mediating role of information access monitoring shows the effect weakens of independent and dependent variables. Thus, the mediating variables appeared to be important for the controlling role of an unethical behavior and improper social networking. Ultimately, The firms will need to invest the information access monitoring for a compulsory ethics behavior of organizational members. In addition, this can hinder networking enhancements for future opportunistic behaviors.

Facilitating Data Source Movement with Time-Division Access in Content-Centric Networking

  • Priyono, Olivica;Kong, In-Yeup;Hwang, Won-Joo
    • 한국멀티미디어학회논문지
    • /
    • 제17권4호
    • /
    • pp.433-440
    • /
    • 2014
  • Wireless communication offers the flexibility to the node movement at the spatial dimension more than the wire communication not only in IP architecture but also in Content-Centric Networking. Although it gives such advantage, the intra-domain movement of a node especially the data source node affects the communication to the access point node which in the end affects the acceptance ratio of the client node that requests the data packets from the data source node. In this paper, we use time-division access method to maintain the acceptance ratio of the client node as the effect of the intra-domain data source node movement in Content-Centric Networking. The simulation result shows that the acceptance ratio of the client node can be maintained using the time-division access method as long as the interval access time is less than the coherence time.

A reinforcement learning-based network path planning scheme for SDN in multi-access edge computing

  • MinJung Kim;Ducsun Lim
    • International journal of advanced smart convergence
    • /
    • 제13권2호
    • /
    • pp.16-24
    • /
    • 2024
  • With an increase in the relevance of next-generation integrated networking environments, the need to effectively utilize advanced networking techniques also increases. Specifically, integrating Software-Defined Networking (SDN) with Multi-access Edge Computing (MEC) is critical for enhancing network flexibility and addressing challenges such as security vulnerabilities and complex network management. SDN enhances operational flexibility by separating the control and data planes, introducing management complexities. This paper proposes a reinforcement learning-based network path optimization strategy within SDN environments to maximize performance, minimize latency, and optimize resource usage in MEC settings. The proposed Enhanced Proximal Policy Optimization (PPO)-based scheme effectively selects optimal routing paths in dynamic conditions, reducing average delay times to about 60 ms and lowering energy consumption. As the proposed method outperforms conventional schemes, it poses significant practical applications.

NDN에서 Off-Path 콘텐츠 접근기법들에 대한 성능 비교 연구 (A Comparative Study on Off-Path Content Access Schemes in NDN)

  • 이준석;김도형
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제10권12호
    • /
    • pp.319-328
    • /
    • 2021
  • 인터넷에서의 대용량 콘텐츠들에 대한 서비스가 일반화됨에 따라 기존 TCP/IP 프로토콜에서의 비효율적인 데이터 전송에 대한 문제점들이 제기되었고, 그 결과로 정보중심네트워크 (Information-centric networking) 패러다임이 새롭게 제시되었다. 정보중심네트워크에서는 IP와 같은 위치 식별자를 대신하여 콘텐츠 이름을 통해 콘텐츠 접근이 이루어지며, 네트워크 노드들 (e.g., 라우터)은 캐시를 활용하여 전송중인 콘텐츠들을 저장하여 이후 발생하는 사용자 요청들에 대한 서비스를 수행할 수 있다. 사용자 요청이 멀리 위치한 콘텐츠 서버가 아닌 가까운 네트워크 캐시에서 서비스될 수 있게 됨에 따라 서비스 지연 감소, 네트워크 대역폭의 효율적 사용, 서비스 확장성 확보 등의 이점이 소개되었다. 그런데 이와 같은 정보중심네트워크에서의 이점들은 캐시에 저장되어 있는 콘텐츠가 얼마나 적극적으로 활용될 수 있느냐에 의해 결정될 수 있다. 본 논문에서는 1) 정보중심네트워크의 대표적인 아키텍쳐 중의 하나인 Named-data Networking (NDN) 에서의 콘텐츠 접근 기법에 대해 소개하고, 2) 특별히 라우팅 경로를 벗어나 캐시되어 있는 콘텐츠들을 접근할 수 있도록 하기 위해 제안된 기법들에 대한 리뷰를 진행하며, 3) ndnSIM 시뮬레이터를 활용해 이들 기법들에 대한 성능 비교 평가를 진행한다.

대규모 유선 액세스 네트워크 환경에서 에너지 소모량과 안티그리닝 영향도 추정 모델링 기법 (Estimation Modelling of Energy Consumption and Anti-greening Impacts in Large-Scale Wired Access Networks)

  • 서유화;김기영
    • 한국통신학회논문지
    • /
    • 제41권8호
    • /
    • pp.928-941
    • /
    • 2016
  • 유선 데이터 네트워크(wired data network) 영역에서 가장 많은 에너지를 요구하는 영역은 액세스 네트워크(access network) 영역이다. 오늘날 그린 네트워킹(Green networking)은 유선 데이터 네트워크에서도 통합적인 에너지 관리를 통해 에너지 낭비와 $CO_2$ 배출 감소를 유도하기 위해 주요 관심분야가 되었다. 그러나 유선 액세스 네트워크의 에너지 소모량과 $CO_2$ 배출에 의한 환경적 영향에 대해서는 널리 알려져 있지 않으며, 그에 따른 범용적이고 정량적인 평가 기준도 매우 부족하다. 본 논문에서는 유선 액세스 네트워크의 에너지 소모량을 추정하는 기존의 모델링 기법들의 문제점을 비교 분석하고 하향식(top-down) 접근법을 이용하여 대규모 유선 액세스 네트워크의 에너지 소모량을 추정하는 모델링 기법을 제안한다. 또한 제안 모델로부터 도출된 추정치를 이용하여 액세스 네트워크들이 환경에 미치는 영향도를 산출하는 모델을 제안한다. 그리고 실제 사례를 적용하여 기존 모델과 제안 모델로부터 산출한 추정치와 해당 사례에 대한 기존의 조사와 실측 데이터와 비교 평가 한다.

기계학습을 이용한 유선 액세스 네트워크의 에너지 소모량 예측 모델 (Prediction Model of Energy Consumption of Wired Access Networks using Machine Learning)

  • 서유화;김은회
    • 한국정보전자통신기술학회논문지
    • /
    • 제14권1호
    • /
    • pp.14-21
    • /
    • 2021
  • 그린 네트워킹(Green networking)은 유선 데이터 네트워크(Wired data network)에서 통합적인 에너지 관리를 통해 에너지 낭비와 CO2 배출 감소를 유도하기 위해 주요 관심분야가 되었다. 그러나 액세스 네트워크(access networks)는 유선 데이터 네트워크 영역에서 사용자 단말을 제외하면 가장 많은 에너지를 소비하는 영역임에도 불구하고 그 범위가 매우 광대하여 통합적인 관리가 어렵고, 그 에너지 소모량과 에너지 절약 잠재성을 예측하기가 매우 어렵다. 본 논문에서는 기존의 다양한 수학적 예측 모델과 실험 및 실측 데이터를 이용하여 유선 액세스 네트워크의 에너지 소모량 데이터를 수집하고 머신러닝(Machine learning)의 지도학습을 이용한 다중 선형 회귀모델을 생성한다. 또한 생성한 모델로부터 다양한 실험을 통해 회귀모델의 성능을 최적화하여 유선 액세스 네트워크의 에너지 소모량을 예측하였고 생성한 회귀모델은 널리 알려진 평가 지표를 통해 성능을 평가하였다.

Flow-Aware Link Dimensioning for Guaranteed-QoS Services in Broadband Convergence Networks

  • Lee, Hoon;Sohraby, Khosrow
    • Journal of Communications and Networks
    • /
    • 제8권4호
    • /
    • pp.410-421
    • /
    • 2006
  • In this work, we propose an analytic framework for dimensioning the link capacity of broadband access networks which provide universal broadband access services to a diverse kind of customers such as patient and impatient customers. The proposed framework takes into account the flow-level quality of service (QoS) of a connection as well as the packet-level QoS, via which a simple and systematic provisioning and operation of the network are provided. To that purpose, we first discuss the necessity of flow-aware network dimensioning by reviewing the networking technologies of the current and future access network. Next, we propose an analytic model for dimensioning the link capacity for an access node of broadband convergence networks which takes into account both the flow and packet level QoS requirements. By carrying out extensive numerical experiment for the proposed model assuming typical parameters that represent real network environment, the validity of the proposed method is assessed.

국방정보체계의 서비스 품질(QoS) 보장을 위한 정책기반(Policy-Based)네트워킹 적용에 관한 연구 (A study on the Application of Policy-Based Networking for QoS in The Defense Information System)

  • 김광영;이승종
    • 한국국방경영분석학회지
    • /
    • 제29권1호
    • /
    • pp.57-75
    • /
    • 2003
  • Policy-based networking offers a network manager the ability to manage the network in a holistic and dynamic fashion rather than force a network manager to manage the network by dealing with each device individually. Policy-based networking is focusing on users and applications instead of emphasizing devices and interfaces. An important part of the policy-based networking is to simplify the task of administration and management for different disciplines. The Defense Information System(DIS) of today are complex and heterogeneous systems. Operational needs are not a trivial task and Quality of Service(QoS) is not generally guaranteed. So, important data may be missed or congested by trivial data. Policy-based networking provide a way to support QoS and simplify the management of multiple devices deploying complex technologies. This paper suggest implementation of policy-based networking in DIS to improvement of performance, and implementation is progressed step by step. Especially this paper is focusing on the providing QoS with policy-based networking using Lightweight Directory Access Protocol(LDAP) Server.

A Quantitative Analysis of System-Level Performance of the Wireless LAN in Digital Home Environments

  • Son, Byoung-Hee;Kim, Hag-Bae
    • Journal of Ubiquitous Convergence Technology
    • /
    • 제2권1호
    • /
    • pp.51-55
    • /
    • 2008
  • A digital home is a ubiquitous environment that is expected to be realized in the near future. All information appliances in a house are connected to each other through wired and/or wireless home networks. Authenticated user can access the various services provided by the digital home, and the access is not restricted by equipment, time, or location. The technologies that form the digital home can be grouped into two categories: wired networking technologies and wireless networking technologies. For the purpose of ubiquitous environments, wireless-networks offer suitable and seamless high-quality services. A wireless LAN can be created simply by equipping a single access point. For that reason, the cost of establishing such a network is low and using it is easy. Of course, there is an exciting new wireless technology. It is the Ultra Wide Band (UWB). However, it is not enough to bring wireless convenience, although offering a broad range of high-speed data transfer capabilities, Because of unstable. Thus, of the wireless-networking systems, we focus on the wireless LAN. We quantitatively analyze its capabilities. The dynamic and adaptive wireless LAN provides a foundation for the evolution toward the next generation of wireless and adaptive networks. The difference between wired LAN and wireless LAN in upload and download rates is small. Although the wireless LAN experiences a greater loss rate than the wired LAN, the difference is minimal. We conclude that a wireless LAN is suitable for use in an apartment environment.

  • PDF

홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술 (Adaptive Convergence Security Policy and Management Technology of Home Network)

  • 이상준;김이강;류승완;박유진;조충호
    • 산업경영시스템학회지
    • /
    • 제34권4호
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.