• Title/Summary/Keyword: Internal Network Information

Search Result 506, Processing Time 0.025 seconds

An Architecture for User Level End-to-end QoS using Overlay in NGN (NGN에서 오버레이를 이용한 사용자 관점의 End-to-end QoS 지원 구조)

  • Lee Jihyun;Lim Kyungshik;Oh Hangseok;Nam Taekyong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.781-792
    • /
    • 2005
  • This study proposes an Architecture for user level End-to-end Quality of Service(QoS) using overlay In Next Generation Network(NGN). Inexisting NGNs, the IMS of a control plane provides user QoS through direct traffic control and resource-reservation over the IP packet transport network of a user plane. Further, a set of torrent studies are ongoing not only to maximize the QoS for users, but also to minimize the quality deterioration for supporting the user End-to-end QoS. Along with that, an extended QoS in user level must be considered, for Instance, differentiating service quality to support users' expectation, providing optimized contents by users' equipments, and so forth. Accordingly, the Overlay Service Network Architecture proposed by this study provides protocol adaptation for maximum throughput on transport layer by using the most efficient transport layer protocol to various network circumstances. Also, the Overlay Service Network Architecture on application layer distributes processing delay from the data transformation process of the user equipment to the network, and it is capable of intermediate processing depending on user service level. application service feature, and equipment circumstance as well. Thus, this study mainly proposes the Overlay Service Network Architecture for user level end-to-end QoS in NGN with the quality control features both on the transport layer and the application layer, an internal component feature, and a service scenario providing the QoS linking with 3GPP.

End-to-end Packet Statistics Analysis using OPNET Modeler Wireless Suite (OPNET Modeler Wireless Suite를 이용한 종단간 패킷 통계 분석)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.265-278
    • /
    • 2011
  • The objective of this paper is to analyze and characterize end-to-end packet statistics after modeling and simulation of WiFi (IEEE 802.11g) and WiMAX (IEEE 802.16e) of a virtual wireless network using OPNET Modeler Wireless Suite. Wireless internal and external network simulators such as Remcom's Wireless InSite Real Time (RT) module, WinProp: W-LAN/Fixed WiMAX/Mobile WiMAX, and SMI system, are designed to consider data transfer rate based on wireless propagation signal strength. However, we approached our research in a different perspective without support for characteristic of these wireless network simulators. That is, we will discuss the purpose of a visual analysis for these packets, how to receive each point packets (e.g., wireless user, base station or access point, and http server) through end-to-end virtual network modeling based on integrated wired and wireless network without wireless propagation signal strength. Measuring packet statistics is important in QoS metric analysis among wireless network performance metrics. Clear packet statistics is an especially essential metric in guaranteeing QoS for WiMAX users. We have found some interesting results through modeling and simulation for virtual wireless network using OPNET Modeler Wireless Suite. We are also able to analyze multi-view efficiency through experiment/observation result.

An Empirical Study on the Influence of Internal and External Characteristics on the Social Business Participation and the Moderating Effects of Psychological Contract (Social Business 참여에 영향을 주는 내.외재적 특성과 심리적 계약의 조절효과에 대한 실증연구)

  • Kim, Sang-Hyun;Kim, Geun-A
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.1-19
    • /
    • 2011
  • Following the growth of e-Business, there has been a recent increase of interest in promoting Social Business (s-Business) based on Social Network Service(SNS). As the introduction of the Internet brought about the increasing number of its users followed by the growing market of e-Commerce, online games, and e-Learning, the increasing number of SNS users has opened the new markets combining the existing industrial fields with SNS, and it developed into a revenue model beyond the mere sharing of information. Despite such industrial and social environments, understanding of new social business technology from the aspect of business has been insufficient, and the empirical study on participation in the social business has been scant as well. Thus, the main purpose of this study is to investigate the s-Business in detail and to study the factors giving influence to the users' participation in s-Business. This study proposes six variables(Self-Empowerment, Job Relevance, Formation of Social Capital, Relative Advantage, Shared Value, Relationship Specified Investment) and the moderating effects of Psychological Contract as influential factors closely related with s-Business. A total of 362 data from a survey were analyzed by using Structural Equation Modeling(SEM). Result showed that all factors with the exception of Job Relevance have meaningful influence on the intention to participate in s-Business. The implication of the findings suggests to compliment limitations of the existing researches, and to prepare the theoretical foundation for promoting s-Business participation in addition to further suggesting directionality from the view point of the users of the social business-relevant studies.

Correlation Analysis between BLE-based RSSI and SoC Internal or Local Temperature (BLE 기반 RSSI와 SoC 내부 또는 국부 온도의 상관관계)

  • Kim, Seong-Chang;Lee, Min-Jeong;Oh, Sung-Bhin;Kim, Jun-Su;Kim, Jin-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.89-91
    • /
    • 2022
  • Wireless sensor networks(WSN), which are mainly used for indoor positioning, rely on the accuracy of RSSI. This RSSI is sensitive to several factors that cause interference, and there are foreign studies showing that temperature has a large effect on RSSI in indoor/outdoor environment among several factors. The temperature of the indoor space is uneven due to heat sources or air cooling systems indoors, and temperature changes frequently occur at certain locations. In particular, in case of an indoor fire, the accurate positioning system is required to guide an evacuation route, but a high temperature is locally formed due to a fire around the receiver, so the RSSI value could be influenced. In this paper, the effect on RSSI is studied by analyzing the correlation between SoC internal/local temperature and RSSI.

  • PDF

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

A Data-Driven Approach and Network Analysis of Technological Innovation Resources in SMEs (데이터 기반 접근법을 활용한 중소기업 기술혁신자원의 네트워크 분석)

  • Kyung Min An;Young-Chan Lee
    • Knowledge Management Research
    • /
    • v.24 no.4
    • /
    • pp.103-129
    • /
    • 2023
  • This study aims to analyze the network structure of technological innovation resources in SMEs, especially manufacturing firms, and reveal the differences between innovative and non-innovative firms. The study first analyzes connection centrality, flow-mediated centrality, and power centrality for all firms, and derives structural equivalence through CONCOR analysis. Then, the network structure of innovative and non-innovative firms was compared and analyzed according to innovation performance and creation. The results show that entrepreneurship and corporate innovation strategy have a significant impact on the analysis of technological innovation resources of all firms. According to the CONCOR analysis, the innovation resources of SMEs are organized into seven clusters, which can be defined as intrinsic product innovation resources, competitive advantage promotion resources, cooperative activities resources, information system resources, and innovation protection resources. The network analysis of innovative and non-innovative firms showed that innovative firms focused on enhancing competitiveness and improving quality, while non-innovative firms tended to focus more on existing products and customers. In addition, innovative firms had eight clusters, while non-innovative firms had six clusters, suggesting that innovative firms utilize resources diversely to pursue structural change and new value creation, while non-innovative firms operate technological innovation resources in a more stable form. This study emphasizes the importance of entrepreneurship and corporate innovation strategy in SMEs' technological innovation, and suggests that strong internal efforts are needed to increase innovativeness. These findings have important implications for strategy formulation and policy development for technological innovation in SMEs.

A Study on the Improvement of Collection, Management and Sharing of Maritime Traffic Information (해상교통정보의 수집, 관리 및 공유 개선방안에 관한 연구)

  • Shin, Gil-Ho;Song, Chae-Uk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.515-524
    • /
    • 2022
  • To effectively collect, manage, and share the maritime traffic information, it is necessary to identify the technology trends concerning this particular information and analyze its current status and problems. Therefore, this study observes the domestic and foreign technology trends involving maritime traffic information while analyzing and summarizing the current status and problems in collecting, managing, and sharing it. According to the data analysis, the problems in the collecting stage are difficulties in collecting visual information from long-distance radars, CCTVs, and cameras in areas outside the LTE network coverage. Notably, this explains the challenges in detecting smuggling ships entering the territorial waters through the exclusive economic zone (EEZ) in the early stage. The problems in the management stage include difficult reductions and expansions of maritime traffic information caused by the lack of flexibility in storage spaces mostly constructed by the maritime transportation system. Additionally, it is challenging to deal with system failure with system redundancy and backup as a countermeasure. Furthermore, the problems in the sharing stage show that it is difficult to share information with external operating organizations since the internal network is mainly used to share maritime transportation information. If at all through the government cloud via platforms such as LRIT and SASS, it often fails to effectively provide various S/W applications that help use maritime big data. Therefore, it is suggested that collecting equipment such as unmanned aerial vehicles and satellites should be constructed to expand collecting areas in the collecting stage. In the management and sharing stages, the introduction and construction of private clouds are suggested, considering the operational administration and information disclosure of each maritime transportation system. Through these efforts, an enhancement of the expertise and security of clouds is expected.

A Study on the Enhancement Process of the Telecommunication Network Management using Big Data Analysis (Big Data 분석을 활용한 통신망 관리 시스템의 개선방안에 관한 연구)

  • Koo, Sung-Hwan;Shin, Min-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6060-6070
    • /
    • 2012
  • Real-Time Enterprise (RTE)'s key requirement is that it should respond and adapt fast to the change of the firms' internal and external situations including the change of market and customers' needs. Recently, the big data processing technology to support the speedy change of the firms is spotlighted. Under the circumstances that wire and wireless communication networks are evolving with an accelerated rate, it is especially critical to provide a strong security monitoring function and stable services through a real-time processing of massive communication data traffic. By applying the big data processing technology based on a cloud computing architecture, this paper solves the managerial problems of telecommunication service providers and discusses how to operate the network management system effectively.

Efficient Regular Expression Matching Using FPGA (FPGA를 이용한 효율적 정규표현매칭)

  • Lee, Jang-Haeng;Lee, Seong-Won;Park, Neung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.583-588
    • /
    • 2009
  • Network intrusion detection system (NIDS) monitors all incoming packets in the network and detects packets that are malicious to internal system. The NIDS should also have ability to update detection rules because new attack patterns are unpredictable. Incorporating FPGAs into the NIDS is one of the best solutions that can provide both high performance and high flexibility comparing with other approaches such as software solutions. In this paper we propose and design a novel approach, prefix sharing parallel pattern matcher, that can not only minimize additional resources but also maximize the processing performance. Experimental results showed that the throughput for 16-bit input is twice larger than for 8-bit input but the used LEs/Char in FPGA increases only 1.07 times.

Optimized Design of Mobile Communication Antenna In the Underground Area (지하공간에서의 이동통신 셀 설계에 관한 연구)

  • Oh, Sung-Kyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.27-32
    • /
    • 2008
  • In the signals-shadowed areas, In order to providing the suitable signals reception level repeaters are used for relay the signals. Repeater receives the weak signals and amplifies it up to required power level, The amplified signals get radiated by the various methods. Both antenna distribution and LCX(Leakage Coaxial Cable) are typical methods in the repeater and BTS signals radiation. Their applications are depended on the environment condition and frequency band. Generally the antenna distribution are used for the mobile telecommunication networks which use the higher frequency band than 500MHz. On the other side, LCX distribution is suitable to the frequency band under 500MHz. The network plan of repeater in FM, T-DMB, Fire Radio and Internal subway communication network are the typical LCX application fields. Cell planning with repeaters are based on the free space loss, LCX connection loss and actual field data. The actual field data can be the most important factor to design the network planning.