• Title/Summary/Keyword: Connecting Information

Search Result 1,013, Processing Time 0.024 seconds

A Study on the Representations of an Bell Chamber in Namhansansung (남한산성 종(鐘)과 종각(鐘閣) 복원을 위한 연구)

  • Lee, Jin-Hyang;Kim, Dae-Ho;Lee, Jae-Keun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.28 no.4
    • /
    • pp.120-126
    • /
    • 2010
  • As the importance of an historical area is getting increased in these days, the reconstruction of an bell chamber in Namhansansung has significant historial, educational and cultural meaning. The purpose of this study, as a study on an bell chamber in Namhansansung, is to assume an original location of the bell chamber and identify the size and shape of the original bell chamber through literature study, site inspection, and analysis on old maps. In addition, this study could provide useful information when new bell chamber is constructed. According to the literature study, site inspections(5 times) and analysis on old maps, the original bell chamber is assumed to locate near current Oroji tea house at the rotary, where was in the area of Hanggung. With regard to the traffic system, it is assume that there was an old road along with the current local road No.342 connecting the South Gate with North Gate and a Y or T shape intersection connecting the site of old bell chamber with the north. In addition, there was a government office street from the old bell chamber to Hanggung. The shape of old bell chamber is assumed to have Paljak or Woojingak roof. Samo roof was not found in all the five maps. Regarding the direction of bell chamber, three maps indicate that it faces the East and two maps show that it faces the South. Therefore, it is assumed that the length and width of the roof have similar size. However, a new bell chamber should face the East, which is the same direction with Hanggung. As there is a record which states that a bell in the Cheonheoungsa, Seonggeosan, Cheonan was used as a Namhansansung's bell when the Cheonheoungsa was closed, this study suggests that new Namansansung's bell should be built, considering histroical value and artistry of Cheonheoungsa's bell. This study is a basic research for the reconstruction of Namhansansung in 2009. However, as reconstruction of historical assets should be based on thorough historical evidences. Therefore, more detail researches by a indicator analysis are left for the topic of future studies.

A Study on the Change of Road in the Changdeokgung Palace Rear Garden between Modern and Contemporary Period (근현대기 창덕궁 후원의 동선 변화에 관한 연구)

  • HA, Taeil;KIM, Choongsik
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.2
    • /
    • pp.120-135
    • /
    • 2021
  • Changdeokgung Rear Garden is an important place to show the essence of the garden culture of the Joseon Dynasty. In the garden landscape experience, the restoration of the road completes the system of connecting the main spaces. Therefore, the restoration of the road requires accurate understanding of its creation, extinction, and maintenance. The purpose of this study was to detail the changes in the path that occurred in the Changdeokgung Palace Rear Garden from the late Joseon Dynasty to the modern and contemporary period by analyzing literature and drawing materials. For a time-series analysis, "Donggwoldo" and "Donggwoldohyeong" produced in the Joseon Dynasty, along with "Changdeokgung Plan Drawing" produced in modern and contemporary times, and aerial photographs were used. Drawings and photographs of different coordinate systems were transformed into one coordinate system in the geographic information system ArcGIS to compare changes in the movements of different periods. The results of the study are as follows. First, a total of 37 sections have been used since Japanese colonial era, of which 13 have been maintained, 14 have disappeared, and 10 have been newly established. Among the extinction sections, the road north of Neungheojeong Pavilion is considered to be an urgent place to connect the space to the garden and restore it to enjoy the scenery. In the new section, it seems necessary to establish a new alternative road or shorten the section for the connecting section between Daebodan and Okryucheon. Second, it was revealed that the biggest and most frequent changes to the road system in the garden were Japanese colonial era and renovations in the 1970s. It is worth noting the changes in the road since the 1970s, rather than Japanese colonial era, where it was difficult to manage the gardens independently. The access road to Okryucheon remained in its original shape until the 1990s, but it was renovated to its current shape due to misperception of the original shape. A project is needed to find out the cause of the change in this period and restore the damaged original shape. The biggest achievement of this study is that it revealed the changes in the garden path of Changdeokgung Palace in modern and contemporary times. The biggest achievement of this study is that it revealed the changes in the road of Changdeokgung Palace Rear Gardens in modern and contemporary times. However, there is a limitation that it has not been able to clearly present the location and shape that should be restored because it has not found data on landscaping plans or maintenance. In order to restore the road using the data revealed in this study, it seems necessary to consider realistic problems such as current space utilization, viewing system, disaster prevention and maintenance.

Knowledge Extraction Methodology and Framework from Wikipedia Articles for Construction of Knowledge-Base (지식베이스 구축을 위한 한국어 위키피디아의 학습 기반 지식추출 방법론 및 플랫폼 연구)

  • Kim, JaeHun;Lee, Myungjin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.43-61
    • /
    • 2019
  • Development of technologies in artificial intelligence has been rapidly increasing with the Fourth Industrial Revolution, and researches related to AI have been actively conducted in a variety of fields such as autonomous vehicles, natural language processing, and robotics. These researches have been focused on solving cognitive problems such as learning and problem solving related to human intelligence from the 1950s. The field of artificial intelligence has achieved more technological advance than ever, due to recent interest in technology and research on various algorithms. The knowledge-based system is a sub-domain of artificial intelligence, and it aims to enable artificial intelligence agents to make decisions by using machine-readable and processible knowledge constructed from complex and informal human knowledge and rules in various fields. A knowledge base is used to optimize information collection, organization, and retrieval, and recently it is used with statistical artificial intelligence such as machine learning. Recently, the purpose of the knowledge base is to express, publish, and share knowledge on the web by describing and connecting web resources such as pages and data. These knowledge bases are used for intelligent processing in various fields of artificial intelligence such as question answering system of the smart speaker. However, building a useful knowledge base is a time-consuming task and still requires a lot of effort of the experts. In recent years, many kinds of research and technologies of knowledge based artificial intelligence use DBpedia that is one of the biggest knowledge base aiming to extract structured content from the various information of Wikipedia. DBpedia contains various information extracted from Wikipedia such as a title, categories, and links, but the most useful knowledge is from infobox of Wikipedia that presents a summary of some unifying aspect created by users. These knowledge are created by the mapping rule between infobox structures and DBpedia ontology schema defined in DBpedia Extraction Framework. In this way, DBpedia can expect high reliability in terms of accuracy of knowledge by using the method of generating knowledge from semi-structured infobox data created by users. However, since only about 50% of all wiki pages contain infobox in Korean Wikipedia, DBpedia has limitations in term of knowledge scalability. This paper proposes a method to extract knowledge from text documents according to the ontology schema using machine learning. In order to demonstrate the appropriateness of this method, we explain a knowledge extraction model according to the DBpedia ontology schema by learning Wikipedia infoboxes. Our knowledge extraction model consists of three steps, document classification as ontology classes, proper sentence classification to extract triples, and value selection and transformation into RDF triple structure. The structure of Wikipedia infobox are defined as infobox templates that provide standardized information across related articles, and DBpedia ontology schema can be mapped these infobox templates. Based on these mapping relations, we classify the input document according to infobox categories which means ontology classes. After determining the classification of the input document, we classify the appropriate sentence according to attributes belonging to the classification. Finally, we extract knowledge from sentences that are classified as appropriate, and we convert knowledge into a form of triples. In order to train models, we generated training data set from Wikipedia dump using a method to add BIO tags to sentences, so we trained about 200 classes and about 2,500 relations for extracting knowledge. Furthermore, we evaluated comparative experiments of CRF and Bi-LSTM-CRF for the knowledge extraction process. Through this proposed process, it is possible to utilize structured knowledge by extracting knowledge according to the ontology schema from text documents. In addition, this methodology can significantly reduce the effort of the experts to construct instances according to the ontology schema.

The Effects of the Level of Use of LIS by Functions and the Linkage of Logistics Activities on the Logistics Performance (통합물류정보시스템의 활용이 물류성과에 미치는 영향에 관한 연구)

  • Shim, Kyu-Yeol;Lee, Hyun-Ki;Kim, Woo-Hyun
    • Journal of Global Scholars of Marketing Science
    • /
    • v.8
    • /
    • pp.375-402
    • /
    • 2001
  • While the national economy has rapidly grown, both insufficience in indirect capital facilities of society and attempt to avoid having a logistical job as one of the so-called dirty, difficult and dangerous jobs have resulted in the leak of labor in the logistical industry. First of all, it was shown that the functional utilization level of the logistical information system had a partial effect on the logistical performance, that the reduction of logistical costs was influenced by the information system of connecting and supporting functions, and that the improvement of customer service was significantly influenced by only the supporting-function system. Second, the logistical performance was partially influenced by the linkage between logistical activities, only the customer linkage had a significant effect on the reduction of logistical costs, and the improvement of customer service was influenced by the intra-company linkage. Third, in verifying a hypothesis that the logistical information system's functional utilization level and organizational structure would interact with each other and have an effect on the logistical performance, it was shown that based on their mutual interaction at a normalized level this center's functional information system had a significant effect on the reduction of logistical costs. Fourth, in testing a hypothesis that both the linkage between logistical activities and logistical organization structure would interact with each other and would have an effect on the logistical performance, it was shown that their interaction at a normalized level was significant concerning only the reduction of logistical costs, while there was I10 its significance in the customer service. In proving a hypothesis that the linkage between logistical activities and logistical strategy patterns would interact with each other and would have an effect on the logistical performance, it was shown in a differentiated, aggressive investment one among variously patterned logistical strategies that the customer linkage had a significant effect on the reduction of logistical costs, and in the improvement of customer service that the supplier linkage had a remarkable impact. It also was shown that in case of the cost reduction and offensive control strategy, the customer linkage had a remarkable effect, and th at in the improvement of customer service the intra-company and customer linkage had a significant effect. In the marketing and customer service strategy, finally, there was no any significant influence while the customer linkage had a significant impact in the improvement of customer service. Accordingly, whether or not individual companies utilize the logistical information system's functional utilization levels well will have an effect on their logistical performance, and how their supply chain management is well-linked will affect their logistical performance.

  • PDF

A Study on Intuitive IoT Interface System using 3D Depth Camera (3D 깊이 카메라를 활용한 직관적인 사물인터넷 인터페이스 시스템에 관한 연구)

  • Park, Jongsub;Hong, June Seok;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.137-152
    • /
    • 2017
  • The decline in the price of IT devices and the development of the Internet have created a new field called Internet of Things (IoT). IoT, which creates new services by connecting all the objects that are in everyday life to the Internet, is pioneering new forms of business that have not been seen before in combination with Big Data. The prospect of IoT can be said to be unlimited in its utilization. In addition, studies of standardization organizations for smooth connection of these IoT devices are also active. However, there is a part of this study that we overlook. In order to control IoT equipment or acquire information, it is necessary to separately develop interworking issues (IP address, Wi-Fi, Bluetooth, NFC, etc.) and related application software or apps. In order to solve these problems, existing research methods have been conducted on augmented reality using GPS or markers. However, there is a disadvantage in that a separate marker is required and the marker is recognized only in the vicinity. In addition, in the case of a study using a GPS address using a 2D-based camera, it was difficult to implement an active interface because the distance to the target device could not be recognized. In this study, we use 3D Depth recognition camera to be installed on smartphone and calculate the space coordinates automatically by linking the distance measurement and the sensor information of the mobile phone without a separate marker. Coordination inquiry finds equipment of IoT and enables information acquisition and control of corresponding IoT equipment. Therefore, from the user's point of view, it is possible to reduce the burden on the problem of interworking of the IoT equipment and the installation of the app. Furthermore, if this technology is used in the field of public services and smart glasses, it will reduce duplication of investment in software development and increase in public services.

Digital Humanities, and Applications of the "Successful Exam Passers List" (과거 합격자 시맨틱 데이터베이스를 활용한 디지털 인문학 연구)

  • LEE, JAE OK
    • (The)Study of the Eastern Classic
    • /
    • no.70
    • /
    • pp.303-345
    • /
    • 2018
  • In this article, how the Bangmok(榜目) documents, which are essentially lists of successful passers for the civil competitive examination system of the $Chos{\breve{o}}n$ dynasty, when rendered into digitalized formats, could serve as source of information, which would not only lets us know the $Chos{\breve{o}}n$ individuals' social backgrounds and bloodlines but also enables us to understand the intricate nature that the Yangban network had, will be discussed. In digitalized humanity studies, the Bangmok materials, literally a list of leading elites of the $Chos{\breve{o}}n$ period, constitute a very interesting and important source of information. Based upon these materials, we can see how the society -as well as the Yangban community- was like. Currently, all data inside these Bangmok lists are rendered in XML(eXtensible Makrup Language) format and are being served through DBMS(Database Management System), so anyone who would want to examine the statistics could freely do so. Also, by connecting the data in these Bangmok materials with data from genealogy records, we could identify an individual's marital relationship, home town, and political affiliation, and therefore create a complex narrative that would be effective in describing that individual's life in particular. This is a graphic database, which shows-when Bangmok data is punched in-successful passers as individual nodes, and displays blood and marital relations in a very visible way. Clicking upon the nodes would provide you with access to all kinds of relationships formed among more than 90 thousand successful passers, and even the overall marital network, once the genealogical data is input. In Korea, since 2005 and through now, the task of digitalizing data from the Civil exam Bangmok(Mun-gwa Bangmok), Military exam Bangmok (Mu-gwa Bangmok), the "Sa-ma" Bangmok and "Jab-gwa" Bangmok materials, has been completed. They can be accessed through a website(http://people.aks.ac.kr/index.aks) which has information on numerous famous past Korean individuals. With this kind of source of information, we are now able to extract professional Jung-in figures from these lists. However, meaningful and practical studies using this data are yet to be announced. This article would like to remind everyone that this information should be used as a window through which we could see not only the lives of individuals, but also the society.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

Edge to Edge Model and Delay Performance Evaluation for Autonomous Driving (자율 주행을 위한 Edge to Edge 모델 및 지연 성능 평가)

  • Cho, Moon Ki;Bae, Kyoung Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.191-207
    • /
    • 2021
  • Up to this day, mobile communications have evolved rapidly over the decades, mainly focusing on speed-up to meet the growing data demands of 2G to 5G. And with the start of the 5G era, efforts are being made to provide such various services to customers, as IoT, V2X, robots, artificial intelligence, augmented virtual reality, and smart cities, which are expected to change the environment of our lives and industries as a whole. In a bid to provide those services, on top of high speed data, reduced latency and reliability are critical for real-time services. Thus, 5G has paved the way for service delivery through maximum speed of 20Gbps, a delay of 1ms, and a connecting device of 106/㎢ In particular, in intelligent traffic control systems and services using various vehicle-based Vehicle to X (V2X), such as traffic control, in addition to high-speed data speed, reduction of delay and reliability for real-time services are very important. 5G communication uses high frequencies of 3.5Ghz and 28Ghz. These high-frequency waves can go with high-speed thanks to their straightness while their short wavelength and small diffraction angle limit their reach to distance and prevent them from penetrating walls, causing restrictions on their use indoors. Therefore, under existing networks it's difficult to overcome these constraints. The underlying centralized SDN also has a limited capability in offering delay-sensitive services because communication with many nodes creates overload in its processing. Basically, SDN, which means a structure that separates signals from the control plane from packets in the data plane, requires control of the delay-related tree structure available in the event of an emergency during autonomous driving. In these scenarios, the network architecture that handles in-vehicle information is a major variable of delay. Since SDNs in general centralized structures are difficult to meet the desired delay level, studies on the optimal size of SDNs for information processing should be conducted. Thus, SDNs need to be separated on a certain scale and construct a new type of network, which can efficiently respond to dynamically changing traffic and provide high-quality, flexible services. Moreover, the structure of these networks is closely related to ultra-low latency, high confidence, and hyper-connectivity and should be based on a new form of split SDN rather than an existing centralized SDN structure, even in the case of the worst condition. And in these SDN structural networks, where automobiles pass through small 5G cells very quickly, the information change cycle, round trip delay (RTD), and the data processing time of SDN are highly correlated with the delay. Of these, RDT is not a significant factor because it has sufficient speed and less than 1 ms of delay, but the information change cycle and data processing time of SDN are factors that greatly affect the delay. Especially, in an emergency of self-driving environment linked to an ITS(Intelligent Traffic System) that requires low latency and high reliability, information should be transmitted and processed very quickly. That is a case in point where delay plays a very sensitive role. In this paper, we study the SDN architecture in emergencies during autonomous driving and conduct analysis through simulation of the correlation with the cell layer in which the vehicle should request relevant information according to the information flow. For simulation: As the Data Rate of 5G is high enough, we can assume the information for neighbor vehicle support to the car without errors. Furthermore, we assumed 5G small cells within 50 ~ 250 m in cell radius, and the maximum speed of the vehicle was considered as a 30km ~ 200 km/hour in order to examine the network architecture to minimize the delay.

An Analysis of the Healing Effects of Forest Therapy and Horticultural Therapy (숲치유와 원예치료의 치유효과 분석)

  • Park, Sun-A;Jeong, Moon-Sun;Lee, Myungwoo
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.43 no.3
    • /
    • pp.43-51
    • /
    • 2015
  • Stresses from desolate urban environments cause illnesses and worsen health conditions of urban residents, while natural environments have a positive influence on human. Natural healing programs such as forest therapy and horticultural therapy can be differentiated by the characteristic of activity space. However, previous studies of healing programs have focused on either forest therapy or horticulture therapy and there is a limit to comprehending the effects of adopting and connecting various healing programs. This study compares and analyzes the physiological and psychological effects of forest therapy and horticultural therapy to identify the effects and differences by types of healing programs. The before and after effects of horticultural therapy and forest therapy are measured by experiment and survey for 5 days with 5 subjects in each program. For physiological reaction, blood pressure, pulse, and cortisol levels are measured and the profile of moods states(POMS) is used to measure psychological reaction. Collected data are analyzed with the analysis of variance(ANOVA) and Paired-Sample T-test in SPSS 18.0. The results of this study are as follows: 1) forest therapy and horticultural therapy show positive effects in physiological and physiological aspects, 2) forest therapy is more effective than horticultural therapy in physiological relaxation and stress mitigation, 3) horticultural therapy has a tendency to alleviate depression more effectively than forest therapy. In conclusion, this study contributes to providing fundamental information for the development of healing programs and design guidelines for healing spaces through identifying the characteristics of each healing program.

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.