• Title/Summary/Keyword: Internal Network Information

Search Result 502, Processing Time 0.026 seconds

QuLa: Queue and Latency-Aware Service Selection and Routing in Service-Centric Networking

  • Smet, Piet;Simoens, Pieter;Dhoedt, Bart
    • Journal of Communications and Networks
    • /
    • v.17 no.3
    • /
    • pp.306-320
    • /
    • 2015
  • Due to an explosive growth in services running in different datacenters, there is need for service selection and routing to deliver user requests to the best service instance. In current solutions, it is generally the client that must first select a datacenter to forward the request to before an internal load-balancer of the selected datacenter can select the optimal instance. An optimal selection requires knowledge of both network and server characteristics, making clients less suitable to make this decision. Information-Centric Networking (ICN) research solved a similar selection problem for static data retrieval by integrating content delivery as a native network feature. We address the selection problem for services by extending the ICN-principles for services. In this paper we present Queue and Latency, a network-driven service selection algorithm which maps user demand to service instances, taking into account both network and server metrics. To reduce the size of service router forwarding tables, we present a statistical method to approximate an optimal load distribution with minimized router state required. Simulation results show that our statistical routing approach approximates the average system response time of source-based routing with minimized state in forwarding tables.

The Effect of Team Members' Psychological Characteristics and Knowledge Network Characteristics among Team Members on Team Performance (팀 구성원의 심리적 다양성과 구성원 간 지식네트워크 특성이 팀 성과에 미치는 효과: 학습 분위기의 조절효과를 중심으로)

  • Moon, Yun-Ji;Kang, So-Ra
    • The Journal of Information Systems
    • /
    • v.20 no.1
    • /
    • pp.1-20
    • /
    • 2011
  • This study investigated the factors that facilitate knowledge creation of team with the aspect of knowledge management. We considered two characteristics which are team members' psychological characteristics (achievement needs and conflict emotion) and knowledge network characteristics among team members (internal cohesion and external bridging) and verified the relationship between these characteristics and team performance. Furthermore, we examined whether these characteristics have a different effect on team performance according to the mastery climate. This study performed a survey targeting team members in knowledge based firms and 376 final surveys to be used as a sample in this study. The result showed that team members' psychological characteristics and knowledge network characteristics among Team members have an influence on team performance significantly. In addition, the master climate moderated the relationship between team members' psychological characteristics and team performance.

The Influence of Virtuality on Social Network: A Multi-level Approach

  • Suh, A-Young;Shin, Kyung-Shik;Kim, Min-Soo
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.52-63
    • /
    • 2008
  • Virtuality is a product of the information age, and as it plays a larger role in the activities of individuals, groups and organizations, the issue of how human behavior varies between virtual and physical space has become one of the most important questions facing the management environment of today. The purpose of this article is to examine how virtuality shapes individuals' social relationships within and outside their work groups. We developed a conceptual framework that explores the links between virtuality and social network based on computer-mediated communication theory and social network theory. Using data from 172 individuals of 42 project teams in 5 global business consulting firms, we tested cross-level hypotheses. The results of hierarchical linear modeling (HLM) indicate that virtuality significantly influences individual's internal tie strength as well as external bridging ties. The results also show the effects of virtual process via CMC vary along with the virtual context.

  • PDF

Network separation construction method using network virtualization (네트워크 가상화를 이용한 망 분리 구축 방법)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1071-1076
    • /
    • 2020
  • The importance of network separation is due to the use of the Internet with existing business PCs, resulting in an internal information leakage event, and an environment configured to allow servers to access the Internet, which causes service failures with malicious code. In order to overcome this problem, it is necessary to use network virtualization to separate networks and network interconnection systems. Therefore, in this study, the construction area was constructed into the network area for the Internet and the server farm area for the virtualization system, and then classified and constructed into the security system area and the data link system area between networks. In order to prove the excellence of the proposed method, a network separation construction study using network virtualization was conducted based on the basis of VM Density's conservative estimates of program loads and LOBs.

The Effect of Centralities of Alliance Network on Innovation Performace in Korean Defense Industry (한국 방위산업 제휴네트워크 중심성이 혁신성과에 미치는 영향)

  • Ahn, Hoil;Kim, Changone;Lee, Heesang
    • Journal of Korea Technology Innovation Society
    • /
    • v.18 no.2
    • /
    • pp.292-317
    • /
    • 2015
  • As modern science and technology and warfare become to be advanced and precise, the weapon systems becomes more complex based on state-of-the-art technology. Therefore, firms in the defense industry continue to accelerate research and development for up-to-date weapon systems with high complexity which urge the firms to collaborate with the external organizations to obtain the knowledge required and eventually to reduce costs and risk. This study tries an empirical study about the effect of collaboration on the innovation performances from the network analysis perspective. By surveying collaboration relationships among 530 firms in the Korean defense industry, we analyzed the alliance network of the defense industry. Network centrality including degree, closeness, and betweenness centralities is investigated and then the relationship among the network centrality property, internal R&D capabilities and innovation is analysed. The results show that firms with high internal R&D capabilities place the firm at center of the network. On the other hand, except for the firms with highly connected centrality, no relationship was found between the internal R&D capabilities and its performance and in turn. these capabilities had both direct and indirect effects on innovation performances through mediated collaboration among firms. This study implied that Korean firms with a high internal R&D capabilities in the defense industry which utilize knowledge, information and resources within the network more frequently show more innovative performance. This result claims the policy makers to participate more firms in fostering open innovation for the defense industry.

A Study on DLP System for Preventing Internal Information Leakage (내부정보유출방지를 위한 DLP시스템 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.121-126
    • /
    • 2018
  • The development of modern ICT and network technologies has made the business environment smart.and under such circumstances, a great deal of data is being generated, stored and used. The important information that becomes an energy source for corporate management creates economic profit and value and is also utilized as a basis for strong influence. Therefore, important information must ensure its availability and convenience while ensuring confidentiality and integrity, which is the basic objective of information protection. However, most companies are seeing more and more incidents of serious damage due to the leakage of important internal information. In this study, we deal with the Data Loss Prevention (DLP) technologies and solutions to prevent internal information leakage and establish stable data security and information protection management.

  • PDF

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

Supporting X Applications through the Firewall (방화벽을 통한 X 응용프로그램의 지원에 관한 연구)

  • Lee, Dong-Heon;Hong, Chang-Yeol;Kim, Yeong-Gon;Park, Yang-Su;Lee, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1319-1326
    • /
    • 1997
  • The Internet is a very convenient neteork, but not always a So.many orvanizations often require administrative security policies when they want to connect with ther organizations thtough a pubic network.A firewall is one way of protecting an internal network from the untrusted extemal network with a mechanism for selectively permiting or blocking traffic between the intermal network and the extermal network. The firewall also provides some limited Intemet access such as Ftp.Telet, etc.Usually , through a firewall system, X applications running on the extermal network may not access an X display on the intermal network.Thus, X applications run-ning on the extemal network are not supported through the usual firewall.In this paper, we propose a method of suppoting X application programs effedtively dffectvely through the firewall, overcoming this restriction.

  • PDF

Delay-Constrained Bottleneck Location Estimator and Its Application to Scalable Multicasting

  • Kim, Sang-Bum;Youn, Chan-Hyun
    • ETRI Journal
    • /
    • v.22 no.4
    • /
    • pp.1-12
    • /
    • 2000
  • Designing a reliable multicast-based network that scales to the size of a multicast group member is difficult because of the diversity of user demands. The loss inferences of internal nodes by end-to-end measurements do not require the use of complete statistics because of the use of maximum likelihood estimation. These schemes are very efficient and the inferred value converges fast to its true value. In the theoretical analysis, internal delay estimation is possible but the analysis is very complex due to the continuity property of the delay. In this paper, we propose the use of a bottleneck location estimator. This can overcome the analytical difficulty of the delay estimation using the power spectrum of the packet interarrival time as the performance metric. Both theoretical analysis and simulation results show that the proposed scheme can be used for bottleneck location inference of internal links in scalable multicasting.

  • PDF

A study on the environment-controlling system by members on the basis of HNS (HNS기반의 구성원별 자동 환경 제어 시스템에 관한 연구)

  • 황선주;조대제;임한규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.720-723
    • /
    • 2003
  • So far the study of digital home has mainly been made up of the network technology and the sorority system, but the application to consider the discriminatory characteristics of the individual family members has been interested in comparison with the necessity. The system proposed in this study is to get the information of the internal users through the access-controlling system. The controller offers the discriminatory environment by activating the database of the internal users and controls the sub-system of the home-network. The suggested system can automatically offer the discriminatory environment among the family members by limiting TV programs or channels according to the users' age, by offering other internet environment according to the users, by putting restrictions on telephone numbers, or by restricting the settling right of the home-shopping companies.

  • PDF