• 제목/요약/키워드: Information Centric Network

검색결과 347건 처리시간 0.026초

네트워크형 조직 이론에 근거한 혁신 효과 증대 방안 연구 (Improving Process Innovation Effectiveness through Network Centric Organization)

  • 이춘열;강재화
    • 한국디지털정책학회:학술대회논문집
    • /
    • 한국디지털정책학회 2006년도 춘계학술대회
    • /
    • pp.65-75
    • /
    • 2006
  • This paper presents rationales for a network centric organization and their impacts on organizational effectiveness. A network centric organization shows characteristics that may be used to improve organizational effectiveness and process innovations. However, some conditions are to be satisfied to build a network centric organization. This paper summarizes such pre-conditions for a network centric organization. Korea is evaluated to be a good place to build a network centric organization because of its successful adoption of IT.

  • PDF

네트워크 중심 작전 환경을 위한 정보 브로커 아키텍처 설계 및 평가 (Design and Evaluation of Information Broker Architecture for Network-Centric Operational Environment)

  • 박제준;강동수
    • 정보과학회 논문지
    • /
    • 제43권6호
    • /
    • pp.668-677
    • /
    • 2016
  • 효율적인 네트워크 운용으로 정보우위를 선점하는 것은 지휘결심의 속도를 가속화 하여 임무달성을 가능하게 하는 핵심 요소이다. 네트워크 중심전(NCW, Network-Centric Warfare) 개념의 등장 이후, 한국군은 정보공유 효과를 향상하기 위해 네트워크 중심 작전 환경(NCOE, Network-Centric Operational Environment)을 구축하여 효율적 정보공유 능력을 갖추고자 한다. 본 논문에서는 한국군 정보공유 환경의 제한을 극복하고, 미래 확장성과 정보공유 가능성을 극대화하기 위한 정보 브로커 아키텍처를 설계한다. 정보 브로커는 사용자와 정보 제공자 사이에서 중간자로 존재하며, 중재 및 관리 기능과 함께 보안의 기능을 제공한다. 또한 제시된 정보 브로커 아키텍처는 기존 아키텍처 설계관점 평가를 통해 일관성을 검증하고, 운용 아키텍처 설계 개념이 구현된 것을 확인하였다.

Energy-Efficient Power Control for Underlaying D2D Communication with Channel Uncertainty: User-Centric Versus Network-Centric

  • Ding, Jianfeng;Jiang, Lingge;He, Chen
    • Journal of Communications and Networks
    • /
    • 제18권4호
    • /
    • pp.589-599
    • /
    • 2016
  • Most existing resource management problem models arise from the original desire of allocating resources in either a user-centric or network-centric manner. The difference between their objectives is obvious: user-centric methods attempt to optimize the utility of individual users, whereas network-centric models intend to optimize the collective utilities of the entire network. In this paper, from the above two aspects, we analyze the robust power control problem in device-to-device (D2D) communication underlaying cellular networks, where two types of channel uncertainty set (e.g., ellipsoidal and column-wise) are considered. In the user-centric method, we formulate the problem into the form of a Stackelberg game, where the energy efficiency (EE) of each user is the ingredient of utility function. In order to protect the cellular user equipment's (CUE) uplink transmission, we introduce a price based cost function into the objectives of D2D user equipment (DUE). The existence and uniqueness of the game with the influence of channel uncertainty and price are discussed. In the network-centric method, we aim to maximize the collective EE of CUEs and DUEs. We show that by the appropriate mathematical transformation, the network-centric D2D power control problem has the identical local solution to that of a special case of the user-centric problem, where price plays a key role. Numerical results show the performance of the robust power control algorithms in the user-centric and network-centric models.

SD-ICN: Toward Wide Area Deployable Software Defined Information Centric Networking

  • Xing, Changyou;Ding, Ke;Hu, Chao;Chen, Ming;Xu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2267-2285
    • /
    • 2016
  • Information Centric Networking that uses content name instead of IP address as routing identifier can handle challenges such as traffic explosion and user mobility, but it also suffers from scalability and incompatibility problems. In this paper by combining the concept of software defined networking and Internet end to end arguments, we propose a wide area deployable software defined information centric networking service model named SD-ICN. SD-ICN employs a dual space structure that separates edge service network and core transmission network. The enhanced SDN techniques are used in edge service network in order to implement intelligent data routing and caching, while traditional IP technique is reserved in core transmission network so as to provide wide area high speed data transmission. Besides, a distributed name resolution system based on the cooperation of different controllers is also presented. The prototype experiments in our campus network show that SD-ICN can be deployed in a scalable and incremental way with no modification of the core network, and can support typical communication modes such as multicast, mobility, multihoming, load balancing, and multipath data transmission effectively.

Robust $H_{\infty}$ Power Control for CDMA Systems in User-Centric and Network-Centric Manners

  • Zhao, Nan;Wu, Zhilu;Zhao, Yaqin;Quan, Taifan
    • ETRI Journal
    • /
    • 제31권4호
    • /
    • pp.399-407
    • /
    • 2009
  • In this paper, we present a robust $H_{\infty}$ distributed power control scheme for wireless CDMA communication systems. The proposed scheme is obtained by optimizing an objective function consisting of the user's performance degradation and the network interference, and it enables a user to address various user-centric and network-centric objectives by updating power in either a greedy or energy efficient manner. The control law is fully distributed in the sense that only its own channel variation needs to be estimated for each user. The proposed scheme is robust to channel fading due to the immediate decision of the power allocation of the next time step based on the estimations from the $H_{\infty}$ filter. Simulation results demonstrate the robustness of the scheme to the uncertainties of the channel and the excellent performance and versatility of the scheme with users adapting transmit power either in a user-centric or a network-centric efficient manner.

Mitigating Cache Pollution Attack in Information Centric Mobile Internet

  • Chen, Jia;Yue, Liang;Chen, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5673-5691
    • /
    • 2019
  • Information centric mobile network can significantly improve the data retrieving efficiency by caching contents at mobile edge. However, the cache pollution attack can affect the data obtaining process severely by requiring unpopular contents deliberately. To tackle the problem, we design an algorithm of mitigating cache pollution attacks in information centric mobile network. Particularly, the content popularity distribution statistic is proposed to detect abnormal behavior. Then a probabilistic caching strategy based on abnormal behavior is applied to dynamically maintain the steady-state distribution for content visiting probability and achieve the purpose of defense. The experimental results show that the proposed scheme can achieve higher request hit ratio and smaller latency for false locality content pollution attack than the CacheShield approach and the baseline approach where no mitigation approach is applied.

Cross-layer Video Streaming Mechanism over Cognitive Radio Ad hoc Information Centric Networks

  • Han, Longzhe;Nguyen, Dinh Han;Kang, Seung-Seok;In, Hoh Peter
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권11호
    • /
    • pp.3775-3788
    • /
    • 2014
  • With the increasing number of the wireless and mobile networks, the way that people use the Internet has changed substantively. Wireless multimedia services, such as wireless video streaming, mobile video game, and mobile voice over IP, will become the main applications of the future wireless Internet. To accommodate the growing volume of wireless data traffic and multimedia services, cognitive radio (CR) and Information-Centric Network (ICN) have been proposed to maximize the utilization of wireless spectrum and improve the network performance. Although CR and ICN have high potential significance for the future wireless Internet, few studies have been conducted on collaborative operations of CR and ICN. Due to the lack of infrastructure support in multi-hop ad hoc CR networks, the problem is more challenging for video streaming services. In this paper, we propose a Cross-layer Video Streaming Mechanism (CLISM) for Cognitive Radio Ad Hoc Information Centric Networks (CRAH-ICNs). The CLISM included two distributed schemes which are designed for the forwarding nodes and receiving nodes in CRAH-ICNs. With the cross-layer approach, the CLISM is able to self-adapt the variation of the link conditions without the central network controller. Experimental results demonstrate that the proposed CLISM efficiently adjust video transmission policy under various network conditions.

유비쿼터스 환경에서의 NCW 정보보호 대책 (A Study on the Network Centric Warfare Information Security for Ubiquitous Network Computing)

  • 권문택
    • 융합보안논문지
    • /
    • 제10권3호
    • /
    • pp.15-22
    • /
    • 2010
  • 본 연구는 유비쿼터스 환경에서 네트워크 중심전(NCW)을 원활하게 실시하기 위해 필요한 정보보호 대책을 제시하기 위한 것이다. 대책을 도출하기 위해 우선 유비쿼터스 환경에서 NCW가 구현 되었을 때 예상되는 전투양상을 전장기능별로 조명해보고, 유비쿼터스 환경에서 일어날 수 있는 정보보호 위협의 특징을 도출하였다. 이러한 특징을 바탕으로 위협을 해결하기 위한 국방 정보보호 대응 방안을 제시하였다. 본 연구에서 제시한 대응방안을 바탕으로 추후 세부 실행과제를 도출한다면 보다 완벽한 NCW 개념 실현을 위한 국방정보보호 대책이 마련될 수 있을 것이다.

Strengthening Authentication Through Content Centric Networking

  • Kim, Sung-Jin;Park, Jae-Kyung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권4호
    • /
    • pp.75-82
    • /
    • 2017
  • While the internet has evolved in terms of information sharing and efficiency, it is still prone to security attacks and remains vulnerable even when equipped with a security mechanism. Repeated patching against hacks involves excessive wear of system equipment and high costs. Methods of improving network security include the introduction of security equipment and network partitions, but they have not been fully effective. A fundamental solution is the Operation Content Network (OCN), which enables the strengthening of authentication. In this paper, Instead of following the existing TCP/IP system, OCN establishes an immunity-based security system through content-centric communications. Data transmission occurs over a Content Centric Network (CCN), which is provided with a protocol verified by the CCNx group. Areas protected by OCN rely only on CCN for communication without using any IP. As such, it defends the system against unknown attacks, including zero-day attacks.

무선 Content-Centric Network에서의 Interest-Data Handshaking의 효율성에 대한 연구 (Research on Efficiency of Interest-Data Handshaking in Wireless Content-Centric Networks)

  • 이승진;박찬민;김병서
    • 한국인터넷방송통신학회논문지
    • /
    • 제14권2호
    • /
    • pp.81-86
    • /
    • 2014
  • 최근 주목을 받고 있는 Information Centric Network 구조 중 하나인 Content Centric Network (CCN)을 무선망에서 실질적으로 운영하기 위한 연구가 활발히 진행 되고 있다. 무선망에서 CCN을 운영을 위한 연구 결과들 중 가장 주목할 만한 것으로 Enhanced-Content-centric multiHop wireless NETwork(E-CHANET)이 있다. E-CHANET은 무선망의 특성을 고려하여 효율적 데이터 전송을 위한 방법을 제안하고 있다. E-CHANET에서는 하나의 데이터 파켓 전송 요청을 위하여 Interest 파켓을 전송하여야만 한다. 본 논문에서는 Interest와 데이터 파켓의 전송에 대한 효율성에 대하여 시뮬레이션을 통해 한번의 Interest로 모든 데이터 파켓을 전송하는 방식과 비교 분석하였다. 시뮬레이션 결과를 통하여 E-CHANET의 방식이 신뢰성을 증가시키기는 하나 전 파켓의 다운로드 시간을 많이 증가 시켜 비효율성이 있음을 확인하였다.