• Title/Summary/Keyword: IP Strategy

Search Result 112, Processing Time 0.027 seconds

Differentiated Lambda Establishment and Wavelength Assignment based on DMS model for QoS guarantees in DWDM Next Generation Internet Backbone Networks (DWDM 차세대 인터넷 백본망에서 DMS 모델 기반의 차등화된 파장할당 및 LSP 설정)

  • Kim, Sung-Un;Lee, Jun-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9B
    • /
    • pp.760-773
    • /
    • 2003
  • The Internet is evolving from best-effort service toward an integrated or differentiated service framework with quality-of-service (QoS) assurances that are required for new multimedia service applications. Given this increasing demand for high bandwidth Internet with QoS assurances in the coming years, an IP/MPLS-based control plane combined. with a wavelength-routed dense-wavelength division multiplexing (DWDM) optical network is seen as a very promising approach for the realization of future re-configurable transport networks. This paper proposes a differentiated lambda establishment process for QoS guarantees based on the differentiated MPLS service (DMS) model. According to the QoS characteristics of wavelength in optical links and the type of used Optical Cross-Connect (OXC) nodes in DWDM next generation optical Internet backbone network, a differentiated wavelength assignment strategy that considers QoS recovery capability is also suggested.

A Study of Advanced Internet Strategy for Future Industry

  • Park, Jae-Kyung;Lee, Hyung-Su;Kim, Young-Ja
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.87-95
    • /
    • 2020
  • In this paper, we examine the problems of the current Internet due to the development of network services and the expansion of network bandwidth. The current Internet has been used for a long time because it is composed of TCP / IP, but fundamental problems such as bandwidth, transmission rate, and security have not been solved. Therefore, the future network must be prepared through continuous investment and maintenance. In order to overcome this problem, we will propose a way to overcome the above problems and upgrade by converting the current Internet Protocol into the next generation network. Currently, many researches on next-generation networks have been conducted, but there are not many studies in Korea, and research on next-generation networks will be a very important task for the future development of the Internet service industry at the national level. In this paper, we propose an advanced internet environment through the advantages of various next generation protocols.

A Competitiveness Analysis on Business Resources of 'TVING' in Korean OTT Market: Focusing on Resource-based Theory and VRIO Framework (국내 OTT 시장에서 '티빙' 경영자원의 경쟁력 분석: 자원준거이론(RBT) 및 VRIO 분석 모형을 기반으로)

  • Vickie Jinhee Yu;Ilhan Hong;Kenneth Chi Ho Kim
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.147-172
    • /
    • 2023
  • This study aims to review the competitiveness of 'TVING', a Korean OTT player in Korean market. For this, this study extracts core business resources of TVING focusing on resource-based theory, and analyzes their competitiveness under VRIO framework. TVING has 4 tangible and intangible resources respectively and 1 human resource. Tangible resources of TVING are technology(recommendation, compression), content(original, exclusive, discriminative non-exclusive), production studio, and paid-subscribers. Intangible resources are content planing capability, distribution network(local, global), marketing promotion·PR, sales), brand preference. And human resource of TVING creates IP professionalism of the company. As a result of VRIO analysis, discriminative non-exclusive content, production studios, and domestic service channels are the most powerful resources of TVING to 'sustain competitive advantage'. Technology, original content, planning capability and IT professionalism bring 'temporary competitive advantage', while exclusive content, the number of paid-subscribers, global service network, and promotion capabilities are not core resources with staying in competitive rank stages. By the way, TVING has potential users for sales of KT and LGU+ thanks to partnership and M&A, but this is not effectively used at the organization level yet. The meaning of this study can be found in that this evaluated competitiveness by each resource of TVING and arranged its implications.

Distribution Remote Management System Design and Program Development Based on ADWHM(Advanced Digital Watt-Hour Meter) (차세대 디지털 적산전력계에 기반한 배전원격관리시스템 설계 및 프로그램 개발)

  • Ha Bok-Nam;Ko Yun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.4
    • /
    • pp.185-192
    • /
    • 2005
  • This paper proposes a DRMS(Distribution Remote Management System) which can enhance highly the economics of automatic metering system and the power quality supplied to the electric customer improving the efficiency of the meter reading, voltage management and load management work by realizing the remote meter reading, the remote voltage management and the remote load management based on the ADWHM(Advanced Digital Watt Hour Meter). The DRMS is designed so that the voltage management and load management work in remote site can be processed by collecting the voltage pattern and current pattern as well as watt hour data from all ADWHMs one time every month regularly or from special ADWHMS several time irregularly, A new on-line voltage and load management strategy based on the ADWHM is designed by analyzing the existing voltage management and load management process. Also, DRMS is designed so that watt-hour data, voltage pattern data, load pattern data and power factor data can be collected selectively according to the selection of user to assist effectively the methodology. Remote management program and database of the DRMS are implemented based on Visual C++, MFC and database library of MS. Also, DRMS is designed so as to communicate with the ADWHM using RS232C-TCP/IP converter and ADSL. The effectiveness of the remote metering function is proven by collecting and analyzing the data after ADWHMs installed in any site. The developed strategy and program also is verified through the simulation of voltage management and load management.

Korean Students' Perceptions of Free-talking and International Professors' Role Recognition

  • Kim, Nahk-Bohk
    • English Language & Literature Teaching
    • /
    • v.17 no.3
    • /
    • pp.119-139
    • /
    • 2011
  • Free-talking in Korea has recently been emphasized as a way of improving students' speaking ability outside of the classroom. The purpose of this study is to examine perceptions of free-talking, to understand what type of roles were played by or allotted between Korean students and international professors (IPs) and to look for effective speaking strategies for utilizing free-talking. Participants of this study were 68 university students and 23 IPs. The data collected through a survey type of questionnaire were analyzed by this researcher and the main findings indicate that students and IPs have somewhat different viewpoints about their concepts of free-talking. Students expressed varying viewpoints depending on their experience and class (year). In terms of the benefits, usefulness, and satisfaction of free-talking, students and IPs seem to be in more agreement with each other although the two groups have conflicting perceptions in the particular operation of free-talking, especially in terms of preparation and feedback. Students stated that they feel anxious, nervous, and that they struggle with peer pressure while free-talking. However, they feel that through free-talking they build up confidence and increase their speaking ability. Regarding roles, most professors play a helpful role as a guide or facilitator while students want professors to provide more suitable materials and to tutor them by means of appropriate feedback and strategies as well-prepared teachers like a prompter, participant or tutor in the timely manner. Finally, this paper proffers a few practical suggestions for activating free-talking and a discussion of the pedagogical implications.

  • PDF

A Efficient Strategy to Schedule Packets in Channel based Network (고속의 채널 기반 네트웍에서 효율적인 패킷 스케줄링 기법)

  • Kim, Young-Hwan;Go, Jae-Jin;Jeon, Ki-Man
    • Annual Conference of KIPS
    • /
    • 2003.11a
    • /
    • pp.455-458
    • /
    • 2003
  • 네트워크 사용자의 급속한 증가로 네트워크 내의 부하를 감당하기에는 많은 어려움을 가져왔다. 이와 같은 이유로 기존의 TCP/IP 에서 세션을 통하여 노드들 간의 통신을 연결하는 방식에서 현재는 하나의 채널을 통해 고속의 I/O 가 가능하도록 하는 기술의 많이 연구되고 있다. 그 대표적인 것으로 인피니밴드가 있다. 인피니밴드는 프로세싱 노드와 입출력 장치 사이의 통신, 프로세스간 통신에 대한 산업 표준이 되고 있고 프로세싱 노드와 입출력 장치를 연결하기 위해 스위치 기반의 상호 연결은 전통적인 버스 입출력을 대체하는 새로운 입출력 방식을 사용한다. 또한 인피니밴드는 서버 시스템에서 요구하는 여러 특징 중에서 어플리케이션에게 QoS (Quality of Service)을 보장할 수 있는 메커니즘을 포함하고 있다. 본 논문에서는 어플리케이션에서 요구하는 각 트레픽의 요구 대역폭 크기에 따라 구분하여 효율적인 중재 테이블의 구성을 통해 데이터 전송에 있어 QoS 에 합당하게 출력포트를 통해 나갈 수 있도록 중재 테이블을 관리하는 기법을 제안하고 이를 NS-2 (Network Simulator)을 이용하여 성능 평가를 했다. 특히 기존 인피니밴드에서의 중재 테이블을 이용한 패킷 처리량과 본 논문에서 제안한 중재 테이블 구성 방식을 이용한 패킷 처리량을 비교했으며 성능평가 결과는 기존의 인피니밴드에서의 패킷 처리량에 비해 약 19% 향상된 결과를 나타냈다.

  • PDF

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Location Error Analysis of an Active RFID-Based RTLS in Multipath and AWGN Environments

  • Myong, Seung-Il;Mo, Sang-Hyun;Yang, Hoe-Sung;Cha, Jong-Sub;Lee, Heyung-Sub;Seo, Dong-Sun
    • ETRI Journal
    • /
    • v.33 no.4
    • /
    • pp.528-536
    • /
    • 2011
  • In this paper, we analyze the location accuracy of real-time locating systems (RTLSs) in multipath environments in which the RTLSs comply with the ISO/IEC 24730-2 international standard. To analyze the location error of RTLS in multipath environments, we consider a direct path and indirect path, in which time and phase are delayed, and also white Gaussian noise is added. The location error depends strongly on both the noise level and phase difference under a low signal-to-noise ratio (SNR) regime, but only on the noise level under a high SNR regime. The phase difference effect can be minimized by matching it to the time delay difference at a ratio of 180 degrees per 1 chip time delay (Tc). At a relatively high SNR of 10 dB, a location error of less than 3 m is expected at any phase and time delay value of an indirect signal. At a low SNR regime, the location error range increases to 8.1 m at a 0.5 Tc, and to 7.3 m at a 1.5 Tc. However, if the correlation energy is accumulated for an 8-bit period, the location error can be reduced to 3.9 m and 2.5 m, respectively.

A Study on Preparation Plan against National Industrial Technology Outflow (국가 산업기술유출 대비 방안 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.55-62
    • /
    • 2009
  • Industrial Security is a management activity protecting industrial asset of enterprise by application of security elements(physical, IP, conversion security tools) and can be understood as a comprehensive term including software aspect(establishment of policy and strategy, maintenance operation, post- response act, etc.) as well as the operation of hardware elements. In this paper, after recognizing the definition and relative concept of industrial security, the role and its relative laws of the industrial security organizations, the management system and the reality, I will find some problems and submit a reform measure. Furthermore I would like to propose the policy direction to enhance the national competitiveness and to become one of the advanced nations in 21st industrial security through the effective industrial security activities of our enterprises.

  • PDF

A Study on the Brand-based Warehouse Management in Online Clothing Shops (온라인 쇼핑몰의 브랜드 중심 창고관리 기법에 대한 연구)

  • Song, Yong-Uk;Ahn, Byung-Hyuk
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2011
  • As the sales volume of online shops increases, the job burden in the back-offices of the online shops also increases. Order picking is the most labor-intensive operation among the jobs in a back-office and mid-size pure click online shops are experiencing the time delay and complexity in order picking nowadays while fulfilling their customers' orders. Those warehouses of the mid-size shops are based on manual systems, and as order pickings are repeated, the warehouses get a mess and lots of products in those warehouses are getting missing, which results in severe delay in order picking. To overcome this kind of problem in online clothing shops, we research a methodology to locate warehousing products. When products arrive at a warehouse, they are packed into a box and located on a rack in the warehouse. At this point, the operator should determine the box to be put in and the location on the rack for the box to be put on. This problem could be formulated as an Integer Programming model, but the branch-and bound algorithm to solve the IP model requires enormous computation, and sometimes it is even impossible to get a solution in a proper time. So, we relaxed the problem, developed a set of heuristics as a methodology to get a semi-optimum in an acceptable time, and proved by an experiment that the solutions by our methodology are satisfactory and acceptable by field managers.