• Title/Summary/Keyword: Information network service provider

Search Result 265, Processing Time 0.026 seconds

Realizing an Object-Oriented Informationalization for Activity-Based Business Processing (활동기반 업무처리를 위한 객체기반 정보화)

  • Hwang, Jong-Ho
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.309-321
    • /
    • 2013
  • In current complex nature of management with task-structures, a method to reach the enterprise's informationalization success is not common. To satisfy these various requirement, improving the usability of information technology (IT) is a key factor which defining the level of organizational requirement first. Imposing an IT-solution which has excess service of the organization's previous task-environment, procedure and scope is not effective to SME-level unit, which unit could not have a formal organization structure and task structure. SME level informationalization will be success if each function realizes easier on the task-employee's viewpoint. Achieving this objective, a solution provider or department must reflect their work characteristics of nature which has least level of work performing resistance. It is most useful system for SME level unit, if a provider develops single programs which based on task activities, and each program can configure network-linking.

Interconnecting Methods of Web based IPTV Contents Provider to IMS and Its Characteristics (IMS 네트워크에 웹기반 IPTV 콘텐츠 사업자 접속 방식 및 특성)

  • Kim, Hyun-Ji;Han, Chi-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.6
    • /
    • pp.49-57
    • /
    • 2010
  • In the near future IPTV services will be emerged the various types through Internet, but IMS based IPTV service is one of the very attractive IPTV services. This paper describes the interconnecting architectures of Web based IPTV contents provider to IMS(IP Multimedia System) network and describes the three difference architectures as method to find its IP address. One is the architecture using DNS or HSS to find IP address of Web based IPTV contents provider and connecting gateway function to I-CSCF in IMS. The other is the architecture connecting gateway AS to ISC interface of S-CSCF in IMS. This paper describes the characteristics of traffic generating due to interconnect the Web contents provider, and the traffic model of each architectures. The proposed each architecture is emulated the session establishment delay characteristics in CoD service of IPTV by the simulation. This paper shows that the architecture connecting gateway AS to ISC interface of S-CSCF is the excellent method compare to other two methods in view of the session establishment delay.

The MNM Service Model - Refined Views on Generic Service Management

  • Garschhammer, Markus;Hauck, Rainer;Kempter, Bernhard;Radisic, Igor;Roelle, Harald
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.297-306
    • /
    • 2001
  • In the last couple of years service management has gained more and more momentum in the research community. Nowadays, as complexity of IT-services is increasing, these services are usually composed of interdependent, layered services hosted by various providers. Therefore, a strong cooperation of providers involved in service provisioning is needed, especially regarding their management processes and systems. One important step is to establish a common understanding about service-related terms in order to be able to specify service functionality and the resulting management tasks. Additionally, means to analyze and identify the necessary actors and the corresponding inter- and intra-organizational relationships are needed. This paper presents an extended version of the MNM service model which provides a generic model defining commonly needed service-related terms, concepts and structuring rules in a general and unambiguous way. Furthermore, we demonstrate the application of the MNM service model by modeling a riser help desk service based on a concrete scenario. The experience gained from modeling is used to discuss the benefits of service modeling in general.

  • PDF

Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service (소셜 네트워크 서비스를 위한 선별적 암호화 기능을 제공하는 관계 기반 동적 접근제어 모델)

  • Kwon, Keun;Jung, Youngman;Jung, Jaewook;Choi, Younsung;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.59-74
    • /
    • 2014
  • The social network service is a online service letting users express the personality and enhancing the human network. However, these features result in side effects which diffuse personal information and make users access to treacherous information. Therefore, various access control models have been proposed. However, the access control mechanisms which encrypt data are only able to be applied for controlling access from direct node, and the access control mechanisms without data encryption allow service provider to access all the information. Moreover, both mechanisms do not consider dynamic changes in reliability of the users. In this paper, we propose relationship-based dynamic access control model including encryption of sensitive data, which consider the characteristics of SNS and improves the security of SNS.

Provision of a Novel Unlicensed Access Relay Station in IEEE 802.16-based Broadband Wireless Access Networks (IEEE 802.16 기반의 무선 액세스 망에서 Unlicensed 대역 액세스 릴레이에 대한 설계)

  • Choi, W.;Shon, T.S.;Choi, H.H.;Lee, Y.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.169-177
    • /
    • 2007
  • Existing wireless access (mobile) routers are based commonly on the network address and port translation (NAPT) technique which permits simultaneously sharing a subscriber's connection to the network with multiple users. However, the NAPT architecturally makes the users invisible on the network side, thus becoming a user-oriented connection technique. In this paper, we propose a novel service provider-oriented unlicensed nomadic access relay station (WiNNERS) for helping wireless broadband network service providers to make their business more lucrative by accommdating unlicensed band users as subscribers into their network. The WiNNERS offers service providers the capability to directly manage each of the unlicensed band users at the network side. This direct management allows the service providers to flexibly and simply handle QoS, access control, and billing for each user. In order to distinguish each of the unlicensed band users the WiNNERS constructs a virtual tunnel from each user's terminal to the network access router using connection identifiers which is defined for service flow management within the WiBro system, Consequently, our proposed service provider-oriented relay station can be included into the WiBro network system with minimum modifications.

Research on data analysis method of KTX TORNAD network system (고속열차(KTX)의 TORNAD 네트워크시스템 데이터 분석방법 연구)

  • Kim, Hyeong-In;Jung, Sung-Youn;Kim, Hyun-Shik;Jung, Do-Won;Kim, Han-Dou
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1032-1038
    • /
    • 2008
  • KTX train system is composed of TORNAD* network for transmitting information of train's internal equipments and OBCS which proceed information within train. OBCS of one trainset consisted of 28 equipments takes intelligent and dynamic composition according to equipment handling, train command and control flow. Each OBCS which is installed within trainset handle and supervise mutually action information about equipments, transmit it to driver to transmit information about train operation and preventive management. This mutual supervision and information transmission use KTX TORNAD* network system. TORNAD* network system is the one which is uniquely developped by GEC ALSTHOM, the KTX trainset manafacturing provider and this field is excluded from technical know-how transfer item. Through the research on analysis method of KTX TORNAD* system data structure which is operating on Seoul-Pusan Line, I hope that this thesis can contribute to train network system's standardization after applying it to improvement of train network system maintenance, enhancing quality of train service and applying it to future Korean rolling stock network system development.

  • PDF

An Efficient Service Function Chains Orchestration Algorithm for Mobile Edge Computing

  • Wang, Xiulei;Xu, Bo;Jin, Fenglin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4364-4384
    • /
    • 2021
  • The dynamic network state and the mobility of the terminals make the service function chain (SFC) orchestration mechanisms based on static and deterministic assumptions hard to be applied in SDN/NFV mobile edge computing networks. Designing dynamic and online SFC orchestration mechanism can greatly improve the execution efficiency of compute-intensive and resource-hungry applications in mobile edge computing networks. In order to increase the overall profit of service provider and reduce the resource cost, the system running time is divided into a sequence of time slots and a dynamic orchestration scheme based on an improved column generation algorithm is proposed in each slot. Firstly, the SFC dynamic orchestration problem is formulated as an integer linear programming (ILP) model based on layered graph. Then, in order to reduce the computation costs, a column generation model is used to simplify the ILP model. Finally, a two-stage heuristic algorithm based on greedy strategy is proposed. Four metrics are defined and the performance of the proposed algorithm is evaluated based on simulation. The results show that our proposal significantly provides more than 30% reduction of run time and about 12% improvement in service deployment success ratio compared to the Viterbi algorithm based mechanism.

Defense Techniques of PT-DoS Attacks By Delay Access Control on Mobile PSCN Environment (지연접속 제어를 통한 모바일 PSCN 환경의 PT-DoS 공격에 대한 방어 기법)

  • Joo, Eun-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.910-913
    • /
    • 2012
  • 통신기술의 발달과 스마트 폰의 급격한 보급으로 인하여 모바일 환경은 음성 데이터 기반의 환경에서 인터넷 데이터 기반의 환경으로 급격히 변화되었다. 이로 인하여 음성 서비스 처리 위주의 음성 데이터 기반 모바일 환경은 대용량 동영상 서비스, 인터넷, 메신저 등의 유선 네트워크 환경과 같은 다양한 서비스가 요구되는 환경으로 변화되었다. 이러한 환경 변화로 인하여 모바일 네트워크는 무선 네트워크상의 취약점 뿐 만 아니라 유선환경의 네트워크 취약점을 동시에 지니는 환경으로 변화되었고, 이로 인한 다양한 새로운 취약점들이 부각되기 시작하였다. 본 논문에서는 이와 같이 새롭게 부각되고 있는 모바일 Packet Switched Core Network(PSCN) 환경에서 Service Provider(SP)의 Service Recover로 인해 유발되는 Paging Table Denial of Service(PT-DoS)를 효율적으로 제어하기 위한 Delay Access Control(DAC) 기반의 QoS를 이용한 방법을 설계/구현하였다. 그리고 실험을 통해, PT-DoS를 차단하여 PSCN 공격을 미연에 방지하는 효과를 확인하였다.

A Study on the Establishment of the Logistics Information System for Third Party Logistics (제3자 물류업체를 위한 물류 정보시스템 구축방안에 관한 연구)

  • Lee, Choong-Bae;Park, Jung-Min
    • International Commerce and Information Review
    • /
    • v.5 no.2
    • /
    • pp.135-156
    • /
    • 2003
  • With the increasing recognition of logistics as a source of potential competitive advantage by companies, there has been a rapid growth in the logistics service industry. In particular increased globalization by multinational corporations has prompted consideration of outsourcing logistics service to third party logistics firms. This paper aims to seek the way to establish logistics information system by the case study of company 'D'. The G-Project, aiming to establish global supply chain including information network was required to form integrated logistics information system between manufacturer and logistics provider. The results should have considerable value to both global manufacturers and logistics providers.

  • PDF

An MPLS VPN with Mobility Support (이동성을 지원하는 MPLS 방식 가상사설망)

  • Lee, Young-Seok;Choi, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.225-232
    • /
    • 2001
  • In this paper, we describe a mechanism that supports the mobility service for VPN(Virtual Private Network) users on MPLS(Multiprotocol Label Switching) network. The MPLS VPN considered in this study is controlled by CE(Customer Edge) routers. In such a VPN, CE routers have additional functions to support mobile VPN users, i.e., Home Agent function, foreign Agent function, Correspondent Agent function. This mechanism is applied when a VPN node moves to other site of the saute VPN, or when it moves to other site of a different VPN, or to a non-VPN site. We perform a simulation study to compare the performance of CE based MPLS VPN with that of PE(Provider Edge) based MPLS VPN with mobility support.

  • PDF