• Title/Summary/Keyword: Access Networking

Search Result 302, Processing Time 0.025 seconds

Adaptive Streaming Media Service Based on Frame Priority Considering Battery Characteristics of Mobile Devices (이동단말기의 배터리 특성을 고려한 프레임 우선순위 기반 적응적 스트리밍 미디어 서비스)

  • Lee, Joa-Hyoung;Lim, Dong-Sun;Lim, Hwa-Jung;Jung, In-Bum
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.6
    • /
    • pp.493-504
    • /
    • 2007
  • With the advance and proliferation of computer and wireless network technology, it is common to access to network through the wireless network using mobile device. The ratio of using the streaming media out of many applications through the network is increasing not only in the wired network but also in the wireless network. The streaming media is much bigger than other contents and requires more network bandwidth to communicate and more computing resources to process. However the mobile devices have relatively poor computing resource and low network bandwidth. If the streaming media service is provided for mobile devices without any consideration about the network bandwidth and computing power, it is difficult for the client to get the service of high quality. Since especially mobile devices are supported with very limited energy capacity from the battery, the streaming media service should be adjusted to the varying energy state of mobile devices to ensure the complete playback of streaming media. In this paper, we propose a new method to guarantee the complete playback time of the streaming media for the mobile clients by dynamically controlling transmitted frame rate to the client according to the estimated available time of mobile device using battery model reflecting the characteristic of the battery. Since the proposed method controls the number of frames transmitting to the client according to the energy state of the mobile device, the complete playback time is guaranteed to mobile clients.

Implementation of ATM/Internet Gateway System for Real Time Multimedia Service (실시간 멀티미디어 서비스를 위한 ATM/Internet 게이트웨이 시스템의 구현)

  • Han Tae-Man;Jeong You-Hyeon;Kim Dong-Won
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.799-806
    • /
    • 2004
  • A growing diversity of pervasive devices is gaming access to the Internet and other information. However, much of the rich multimedia contents cannot be easily handled by the client devices because of the limited communication, processing, storage and display capabilities. The in-tegration of voice, data and video service modified the target of networking technologies. Networks must have some the capabilities for in-tegration of various services and also for QoS support as required by each of those service. Because of these reasons, we developed EAGIS(Efficient ATM Gateway for real time Internet Service) to provide seamless multimedia service between the ATM network and the Internet. EAGIS consists of the interworking unit, content server, transcoding server, and the serveice broker to provide seamless multimedia service be-tween the ATM network and the Internet. In this paper, we design the architecture and transcoding service scenario of the EAGIS. When the RTP is used for the bi-directional communication, transcoding time is configured by the time-stamp of RTCP. When HTTP is used for unidirec-tional communication, self-timer is used. By using these reference time, standard transcoding method is applicable according to the frame trans-mission rate and network traffic load. And we can also assure the QoS of the multiple users` effective bandwidth by our algorithm.

Security of Ethernet in Automotive Electric/Electronic Architectures (차량 전자/전기 아키텍쳐에 이더넷 적용을 위한 보안 기술에 대한 연구)

  • Lee, Ho-Yong;Lee, Dong-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.39-48
    • /
    • 2016
  • One of the major trends of automotive networking architecture is the introduction of automotive Ethernet. Ethernet is already used in single automotive applications (e.g. to connect high-data-rate sources as video cameras), it is expected that the ongoing standardization at IEEE (IEEE802.3bw - 100BASE-T1, respectively IEEE P802.3bp - 1000BASE-T1) will lead to a much broader adoption in future. Those applications will not be limited to simple point-to-point connections, but may affect Electric/Electronic(EE) Architectures as a whole. It is agreed that IP based traffic via Ethernet could be secured by application of well-established IP security protocols (e.g., IPSec, TLS) combined with additional components like, e.g., automotive firewall or IDS. In the case of safety and real-time related applications on resource constraint devices, the IP based communication is not the favorite option to be used with complicated and performance demanding TLS or IPSec. Those applications will be foreseeable incorporate Layer-2 based communication protocols as, e.g., currently standardized at IEEE[13]. The present paper reflects the state-of-the-art communication concepts with respect to security and identifies architectural challenges and potential solutions for future Ethernet Switch-based EE-Architectures. It also gives an overview and provide insights into the ongoing security relevant standardization activities concerning automotive Ethernet. Furthermore, the properties of non-automotive Ethernet security mechanisms as, e.g., IEEE 802.1AE aka. MACsec or 802.1X Port-based Network Access Control, will be evaluated and the applicability for automotive applications will be assessed.

Structural Equation Model for Korea Internet Infrastructure Customer Satisfaction Index(KIICSI) (구조방정식을 이용한 초고속 국가망 서비스의 고객만족도 평가체계 개발)

  • Shin Sun Young;Shin Sang-Chul;Moon Tae Hee;Sohn So Young
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.220-235
    • /
    • 2005
  • Internet Service Quality has been constantly the center of attention to Internet Service Providers. The KII project plan (Korea Information Infrastructure) aims to build broadband backbone networks mainly through optical fiber cables and ATM switches and to Provide the government ministries, local authorities and non-profit organizations with high-speed, highly capable broadband access to these networks at reasonable rates. The KB service model, however, is different from other Internet Service models much in the same way SP (Service Provider) and NP (Network Provider) differ from each other. In this paper, we evaluate KII service according to various customer satisfaction indicators under the methodologies and categories as put forth in both the ACSI (American Customer Satisfaction Index) and SEM (Structural Equation Model). We use a structural equation model (SEM) to demarcate the Korea Information Infrastructure Customer Satisfaction Index (KIICSI) in relation to network service quality. The results of our study suggest some strategies for the KII Project need to be modified and effectively implemented in order to increase the satisfaction level of the KII customers.

A Global Korean Networking Strategy for Tourism-related Firms' Internationalization (관광관련기업의 국제화를 위한 글로벌 코리안 네트워킹 전략)

  • Kim, Min-Sook;Bang, Ho-Yeol
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.55-79
    • /
    • 2012
  • The previous studies based on a resource-based view of firm highlighted the role of resources within a firm in creating and sustaining competitive advantage. Recent research, however, the relational view points to the importance of inter-firm sources(or relational capital) in creating firm competitiveness. In international business field, the studies on born-global firms also states that when firms are lack of ownership-specific advantages in their internationalization process, they resort to the external partners and social networks to complement their resource scarcity. By adopting the relational view and born-global firms concept, a network-based approach needs to be applied to explain the international strategy of Korean service firms. This is because most of Korean service firms own less ownership-specific advantages than global competitors. This study proposes Korean firms' global network building and exploiting strategy to enhance their international stages of development. The network, for example, Global Korean Tourism Network, enables network members access to the valuable resources and capabilities they are lack of when undergoing internationalization process. This study's contribution is along two dimension. First, even global Korean network is emerging as a major issue in recent years, we could not figure out how to build global Korean network for service firms. This studies gives an answer. Second, we derived what benefits can be gained from the network if Global Korean Tourism Network is developed for hotel, tourism, convention firms' internationalization.

  • PDF

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.

Web Prefetching Scheme for Efficient Internet Bandwidth Usage (효율적인 인터넷 대역폭 사용을 위한 웹 프리페칭 기법)

  • Kim, Suk-Hyang;Hong, Won-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.3
    • /
    • pp.301-314
    • /
    • 2000
  • As the number of World Wide Web (Web) users grows, Web traffic continues to increase at an exponential rate. Currently, Web traffic is one of the major components of Internet traffic. Also, high bandwodth usage due to Web traffic is observed during peak periods while leaving bandwidth usage idle during off-peak periods. One of the solutions to reduce Web traffic and speed up Web access is through the use of Web caching. Unfortunately, Web caching has limitations for reducing network bandwidth usage during peak periods. In this paper, we focus our attention on the use of a prefetching algorithm for reducing bandwidth during peak periods by using off-peak period bandwidth. We propose a statistical, batch, proxy-side prefetching scheme that improves cache hit rate while only requiring a small amount of storage. Web objects that were accessed many times in previous 24 hours but would be expired in the next 24 hours, are selected and prefetched in our scheme. We present simulation results based on Web proxy and show that this prefetching algorithm can reduce peak time bandwidth using off-peak bandwidth.

  • PDF

IBN-based: AI-driven Multi-Domain e2e Network Orchestration Approach (IBN 기반: AI 기반 멀티 도메인 네트워크 슬라이싱 접근법)

  • Khan, Talha Ahmed;Muhammad, Afaq;Abbas, Khizar;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.23 no.2
    • /
    • pp.29-41
    • /
    • 2020
  • Networks are growing faster than ever before causing a multi-domain complexity. The diversity, variety and dynamic nature of network traffic and services require enhanced orchestration and management approaches. While many standard orchestrators and network operators are resulting in an increase of complexity for handling E2E slice orchestration. Besides, there are multiple domains involved in E2E slice orchestration including access, edge, transport and core network each having their specific challenges. Hence, handling of multi-domain, multi-platform and multi-operator based networking environments manually requires specified experts and using this approach it is impossible to handle the dynamic changes in the network at runtime. Also, the manual approaches towards handling such complexity is always error-prone and tedious. Hence, this work proposes an automated and abstracted solution for handling E2E slice orchestration using an intent-based approach. It abstracts the domains from the operators and enable them to provide their orchestration intention in the form of high-level intents. Besides, it actively monitors the orchestrated resources and based on current monitoring stats using the machine learning it predicts future utilization of resources for updating the system states. Resulting in a closed-loop automated E2E network orchestration and management system.

A Study for Factors Influencing the Usage Increase and Decrease of Mobile Data Service: Based on The Two Factor Theory (모바일 데이터 서비스 사용량 증감에 영향을 미치는 요인들에 관한 연구: 이요인 이론(Two Factor Theory)을 바탕으로)

  • Lee, Sang-Hoon;Kim, Il-Kyung;Lee, Ho-Geun;Park, Hyun-Jee
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.97-122
    • /
    • 2007
  • Conventional networking and telecommunications infrastructure characterized by wires, fixed location, and inflexibility is giving way to mobile technologies. Numerous research reports point to the ultimate domination of wireless communication. With the increasing prevalence of advanced cell-phones, various mobile data services (hereafter MDS) are gaining popularity. Although cellular networks were originally introduced for voice communications, statistics indicate that data services are replacing the matured voice service as the growth engine for telecom service providers. For example, SK Telecom, the Korea's largest mobile service provider, reported that 25.6% of revenue and 28.5% of profit came from MDS in 2006 and the share is growing. Statistics also indicate that, in 2006, the average revenue per user (ARPU) for voice didn't change but MDS grew seven percents from the previous year, further highlighting its growth potential. MDS is defined "as an assortment of digital data services that can be accessed using a mobile device over a wide geographic area." A variety of MDS have been deployed, with a few reaching the status of killer applications. Many of them need to access the Internet through the cellular-phone infrastructure. In the past, when the cellular network didn't have acceptable bandwidth for data services, SMS (short messaging service) dominated MDS. Now, Internet-ready, next-generation cell-phones are driving rich digital data services into the fabric of everyday life, These include news on various topics, Internet search, mapping and location-based information, mobile banking and gaming, downloading (i.e., screen savers), multimedia streaming, and various communication services (i.e., email, short messaging, messenger, and chaffing). The huge economic stake MDS has on its stakeholders warrants focused research to understand associated dynamics behind its adoption. Lyytinen and Yoo(2002) pointed out the limitation of traditional adoption models in explaining the rapid diffusion of innovations such as P2P or mobile services. Also, despite the increasing popularity of MDS, unexpected drop in its usage is observed among some people. Intrigued by these observations, an exploratory study was conducted to examine decision factors of MDS usage. Data analysis revealed that the increase and decrease of MDS use was influenced by different forces. The findings of the exploratory study triggered our confirmatory research effort to validate the uni-directionality of studied factors in affecting MDS usage. This differs from extant studies of IS/IT adoption that are largely grounded on the assumption of bi-directionality of explanatory variables in determining the level of dependent variables (i.e., user satisfaction, service usage). The research goal is, therefore, to examine if increase and decrease in the usage of MDS are explained by two separate groups of variables pertaining to information quality and system quality. For this, we investigate following research questions: (1) Does the information quality of MDS increase service usage?; (2) Does the system quality of MDS decrease service usage?; and (3) Does user motivation for subscribing MDS moderate the effect information and system quality have on service usage? The research questions and subsequent analysis are grounded on the two factor theory pioneered by Hertzberg et al(1959). To answer the research questions, in the first, an exploratory study based on 378 survey responses was conducted to learn about important decision factors of MDS usage. It revealed discrepancy between the influencing forces of usage increase and those of usage decrease. Based on the findings from the exploratory study and the two-factor theory, we postulated information quality as the motivator and system quality as the de-motivator (or hygiene) of MDS. Then, a confirmative study was undertaken on their respective role in encouraging and discouraging the usage of mobile data service.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.