• Title/Summary/Keyword: Information network service provider

Search Result 265, Processing Time 0.024 seconds

IP Address Auto-configuration for Mobile Ad Hoc Networks (이동 애드 혹 네트워크를 위한 인터넷 프로토콜 주소 자동 설정 기법)

  • Choi, Nak-Jung;Joung, Uh-Jin;Kim, Dong-Kyun;Choi, Yang-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3A
    • /
    • pp.297-309
    • /
    • 2007
  • We introduce two distributed IP address auto-configuration mechanisms for mobile ad hoc networks. RADA (Random ADdress Allocation) is based on random IP address selection, while LiA (Linear Address Allocation) assigns new addresses sequentially, using the current maximum IP address. An improved version of LiA, hewn as LiACR (Linear Address Allocation with Collision Resolution) further reduces the control overhead. Simulation results show that, when many nodes join a network during a short period, RADA assigns addresses more quickly than LiA and LiACR. However, RADA uses the address space less efficiently, due to its random allocation of IP addresses. Hence, RADA is particularly useful in battlefield scenarios or rescue operations where fast setup is needed, while LiA and LiACR are more suitable for ad hoc networks that are moderate, confined and subject to some form of governance control, such as that orchestrated by a wireless service provider.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.

Design of Traffic Control Scheme for Supporting the Fairness of Downstream in Ethernet-PON (이더넷 기반 광가입자망에서 공평성 보장을 위한 하향 트래픽 제어 기법 설계)

  • Han Kyeong-Eun;Park Hyuk-Gu;Yoo Kyoung-Min;Kang Byung-Chang;Kim Young-Chon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.5 s.347
    • /
    • pp.84-93
    • /
    • 2006
  • Ethernet-PON is an emerging access network technology that provides a low-cost method of deploying optical access lines between OLT and ONUs. It has a point-to-multipoint and multipoint-to-point architecture in downstream and upstream direction, respectively. Therefore, downstream packets are broadcast from an OLT toward all ONUs sithout collision. On the other hand, since alt ONUs share a common channel, the collision may be occurred for the upstream transmission. Therefore, earlier efforts on Ethernet-PON have been concentrated on an upstream MAC protocol to avoid collision. But it is needed to control downstream traffic in practical access network, where the network provider limits available bandwidth according to the number of users. In this paper, we propose a traffic control scheme for supporting the fairness of the downstream bandwidth. The objective of this algorithm is to guarantee the fairness of ONUs while maintaining good performance. In order to do this, we define the service probability that considers the past traffic information for downstream, the number of tokens and the relative size of negotiated bandwidth. We develop the simulation model for Ethernet-PON to evaluate the rate-limiting algorithm by using AWESIM. Some results are evaluated and analyzed in terms of defined fairness factor, delay and dropping rate under various scenario.

A Design of Hybrid Implementation Server System for Network Game (네트워크 게임을 위한 하이브리드 분산 서버 시스템 설계에 관한 연구)

  • 배재환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.455-459
    • /
    • 2003
  • In the great motive power which promotes the Game of future to develop. three main factors focus on 3D Graphics, Network and Virtual Reality. the Network technique as necessary elemental technique in Next-generation on-line game is being researched largely. However, from viewing the features of on-line game, if many users meet in same server, it not only causes heavy load to the server and brings inconvenience to the users, but also increases expense to the service provider and creates a problem which is to put up server or not. A proposal is going to do hybrid distributed system a client hardly depends on server for this paper, and to be able to enjoy a network game through information alternating current between clients. depended on the existing server, and the most message processing did a design in order to achieve between clients. A design way to propose is as follows. Primarily it was done in order proposed a message grade anger process way, and to be able to manage server or a client according to importance of message, and, with the second, did a Client-Server method and a Pear-to-Pear method at the same time, and a chase did efficiency. Third is going to propose other problem solving way by message grade anger in multi-anger and a security section of a message cue.

  • PDF

Hybrid Mobile IP Protocol for Service Session Continuity between WiBro and HSDPA (WiBro와 HSDPA 망간 서비스 연속성을 제공하기 위한 Hybrid Mobil IP 프로토콜)

  • Kim, Sung-Jin;Choi, Woo-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.223-228
    • /
    • 2008
  • Recently, various types of wireless access networks, such as WLAN, WiBro and HSDPA, etc, have been successfully deployed by commercial service providers (i.e., KT, KTF). In this situation, there are many efforts to provide high quality of services to guarantee seamless mobility between heterogeneous networks. The IP layer mobility protocols are efficient mechanisms to provide seamless mobility between IP based heterogeneous networks as well as homogeneous networks. However, to apply IP mobility protocols in real heterogeneous networks (i.e., WiBro and HSDPA), we must consider not only the basic features of techniques of wireless access networks (i.e., Data rate, Coverage, Quality of Service) but also the problem of real environment of service provider (i.e., Expanse cost to change the access network). Due to this reason, it is difficult to satisfy required conditions by using only one IP mobility protocol in real heterogeneous networks. Therefore, in this paper, we propose an efficient mobility protocol to solve the complex problems that are occurred in real heterogeneous networks. The proposed protocol, so-called, "Hybrid Mobile IP" tries to provide a synergy effect by integrating Client Mobile IPv4 (CMIPv4) and Proxy Mobile IPv4 (PMIPv4), and using the two mobility protocols selectively according to the situation of real heterogeneous networks.

  • PDF

Interactive Usage of Social Media for Contents Provider : Focusing on Twitter Activities of the TV Series (콘텐츠 공급자의 양방향적인 소셜 미디어 활동 연구 사례: TV 드라마 <한니발>의 트위터 활동을 중심으로)

  • Nam, Myoung Hee;You, Eun-Soon
    • Journal of Digital Contents Society
    • /
    • v.16 no.4
    • /
    • pp.565-573
    • /
    • 2015
  • The development of social media in the 2000s led the unspecified individuals to band together for common interests. Social networking services served as a far-reaching tool for sharing different thoughts and interpretation of the pop culture and helped people build up close relations driven by their common interests for certain works of the pop culture. This Study introduces the TV Series as a case that displays specific patterns of communication between its producer and viewers. Producer Bryan Fuller of the Series as well as key production staffs were quite active on social networking sites with the understanding of what the audience desired and the willingness to sympathize with them, which were eagerly welcomed by the dedicated audience whose number, though, was not big. For the Hannibal production team, SNS was a means for them to just be consumers who appreciate the work instead of solely being the content provider. Their approach is quite different from unilateral marketing approaches employed in the past. Through this case, the Study aims to suggest that social networking sites serve as a powerful medium connecting producers and viewers or as an information hub, and that how interactive contents shall be delivered in the new media environment to be effective.

Users' Privacy Concerns in the Internet of Things (IoT): The Case of Activity Trackers (사물인터넷 환경에서 사용자 프라이버시 우려에 관한 연구: 운동추적기 사례를 중심으로)

  • Bae, Jinseok;Jung, Yoonhyuk;Cho, Wooje
    • Knowledge Management Research
    • /
    • v.16 no.3
    • /
    • pp.23-40
    • /
    • 2015
  • Despite much interest and investment in the Internet of Things (IoT) which expand the Internet to a ubiquitous network including objects in the physical world, there is growing concerns of privacy protections. Because the risk of privacy invasion is higher in IoT environments than ever before, privacy need to be a key issue in the diffusion of IoT. Considering that the privacy concern is a critical barrier for user to adopt information technologies, it is important to investigate users' privacy concerns related to IoT applications. From the triad perspective (i.e., risk on technology, risk on service provider, and trust on legislation), this study aims to examine users' privacy concerns in the context of activity trackers.

Internet Interconnection settlement model under Asymmetric Network Value Environment (비대칭적 네트워크 가치 환경에서의 인터넷망 대가정산 모형)

  • Lee, Sang Woo;Ko, Chang Youl;Choi, Sun Me
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.123-132
    • /
    • 2014
  • Internet is composed of many independent networks referred to as Internet Service Providers (ISPs) and each provider is generally interconnected based on a commercial agreement. Though many countries are engaged in deregulation in internet interconnection, there is still debate whether the large ISPs are unwilling to peer with small providers, have incentives to lower the quality of data transmission of transit operators or set the interconnection charge regarding the actual costs incurred by the interconnection. Korean government introduced regulations in internet interconnection after observing noticeable anti-competitive behaviors from 2005. This paper analyzes whether there is margin squeeze problem/market concentration, and suggests political proposals in Korean regulation status.

A study of Artificial Intelligence (AI) Speaker's Development Process in Terms of Social Constructivism: Focused on the Products and Periodic Co-revolution Process (인공지능(AI) 스피커에 대한 사회구성 차원의 발달과정 연구: 제품과 시기별 공진화 과정을 중심으로)

  • Cha, Hyeon-ju;Kweon, Sang-hee
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.109-135
    • /
    • 2021
  • his study classified the development process of artificial intelligence (AI) speakers through analysis of the news text of artificial intelligence (AI) speakers shown in traditional news reports, and identified the characteristics of each product by period. The theoretical background used in the analysis are news frames and topic frames. As analysis methods, topic modeling and semantic network analysis using the LDA method were used. The research method was a content analysis method. From 2014 to 2019, 2710 news related to AI speakers were first collected, and secondly, topic frames were analyzed using Nodexl algorithm. The result of this study is that, first, the trend of topic frames by AI speaker provider type was different according to the characteristics of the four operators (communication service provider, online platform, OS provider, and IT device manufacturer). Specifically, online platform operators (Google, Naver, Amazon, Kakao) appeared as a frame that uses AI speakers as'search or input devices'. On the other hand, telecommunications operators (SKT, KT) showed prominent frames for IPTV, which is the parent company's flagship business, and 'auxiliary device' of the telecommunication business. Furthermore, the frame of "personalization of products and voice service" was remarkable for OS operators (MS, Apple), and the frame for IT device manufacturers (Samsung) was "Internet of Things (IoT) Integrated Intelligence System". The econd, result id that the trend of the topic frame by AI speaker development period (by year) showed a tendency to develop around AI technology in the first phase (2014-2016), and in the second phase (2017-2018), the social relationship between AI technology and users It was related to interaction, and in the third phase (2019), there was a trend of shifting from AI technology-centered to user-centered. As a result of QAP analysis, it was found that news frames by business operator and development period in AI speaker development are socially constituted by determinants of media discourse. The implication of this study was that the evolution of AI speakers was found by the characteristics of the parent company and the process of co-evolution due to interactions between users by business operator and development period. The implications of this study are that the results of this study are important indicators for predicting the future prospects of AI speakers and presenting directions accordingly.