• Title/Summary/Keyword: Network Overload

Search Result 238, Processing Time 0.029 seconds

The Effect of Individual's Flow and Stress on Subjective Well-being in Social Network Services (소셜 네트워크 서비스에서 사용자의 플로우와 스트레스가 주관적 안녕감에 미치는 영향)

  • Koh, Joon;Lee, Sung-Jun;Lou, Liguo
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.211-226
    • /
    • 2016
  • Most of the SNS users argue that they feel techno-stress or digital fatigue when they use SNS. As the relationships in the SNS expand, users may feel work overload, digital fatigue, and techno-stress which are caused by the time and effort for the retaining the existing relationships established via SNS. The SNS activities require users' time and effort to update their profiles and the current news of them, responding to online friends' contents. Thus, more relationships they have, more stress they can feel. This study tries to examine the key factors that can affect subjective well-being of individuals in Social Network Service (SNS) usage. Therefore, this study, based on the previous literature, investigates what the sources of SNS stress are and how SNS stress and flow affect subjective well-being of SNS users. Major findings of this study from an empirical analysis with 201 SNS user respondents who have accessed SNS at least one time within one month are as follows. First, perceived opportunity cost and reputation recognition in SNS usage were found to have significant effects on negative emotion. Second, individual's flow in SNS was significantly affected by challenges and interactions, and had a significant impact on positive emotion. However, SNS users' flow did not show a positive relationship with their satisfaction of life. This study contributes to the expansion of theoretical discussion about the effect of individual's SNS usage on quality of life in validating whether SNS usage can bring individuals subjective well-being. Implications of the study findings and future research directions are also discussed.

A Feedback Control Model for ABR Traffic with Long Delays (긴 지연시간을 갖는 ABR 트래픽에 대한 피드백제어 모델)

  • O, Chang-Yun;Bae, Sang-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1211-1216
    • /
    • 2000
  • Asynchronous transfer mode (ATM) can be efficiently used to transport packet data services. The switching system will support voice and packet data services simultaneously from end to end applications. To guarantee quality of service (QoS) of the offered services, source rateot send packet data is needed to control the network overload condition. Most existing control algorithms are shown to provide the threshold-based feedback control technique. However, real-time voice calls can be dynamically connected and released during data services in the network. If the feedback control information delays, quality of the serviced voice can be degraded due to a time delay between source and destination in the high speed link. An adaptive algorithm based on the optimal least mean square error technique is presented for the predictive feedback control technique. The algorithm attempts to predict a future buffer size from weight (slope) adaptation of unknown functions, which are used fro feedback control. Simulation results are presented, which show the effectiveness of the algorithm.

  • PDF

An ABR Service Traffic Control of Using feedback Control Information and Algorithm (피드백 제어 정보 및 알고리즘을 이용한 ABR 서비스 트래픽제어)

  • 이광옥;최길환;오창윤;배상현
    • Journal of Internet Computing and Services
    • /
    • v.3 no.3
    • /
    • pp.67-74
    • /
    • 2002
  • Asynchronous transfer mode (ATM) can be efficiently used to transport packet data services. The switching system will support voice and packet data services simultaneously from end to end applications. To guarantee quality of service (QoS) of the offered services, source rate to send packet data is needed to control the network overload condition. Most existing control algorithms are shown to provide the threshold-based feedback control technique. However, real-time voice calls can be dynamically connected and released during data services in the network. If the feedback control information delays, quality of the serviced voice can be degraded due to a time delay between source and destination in the high speed link, An adaptive algorithm based on the optimal least mean square error technique is presented for the predictive feedback control technique. The algorithm attempts to predict a future buffer size from weight (slope) adaptation of unknown functions, which are used for feedback control. Simulation results are presented, which show the effectiveness of the algorithm.

  • PDF

A Building Method of High Availability Protection Architecture in Next Generation Network (NGN) Information Security System (차세대통신망(NGN) Infrastructure에서의 정보보호시스템 고가용성 차단구조 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.483-489
    • /
    • 2007
  • The high availability of information security system shall be primarily studied in relation to the Next Generation Network(NGN) Information Security infrastructure, because it is very important to maintain availability at each moment as a variety of intrusions occur continuously. The high availability of the security system can be realized with the topology and configuration properly defined to fully utilize the recovery function of the security system in the thoroughly planned optimized method. The active-active high availability on the NGN information security infrastructure system in is assured by letting the failover mechanism operate upon the entire structure through the structural design and the implementation of functions. The proposed method reduces the system overload rating due to trouble packets and improves the status of connection by SNMP polling trap and the ICMP transport factor by ping packet.

  • PDF

A Method on Retrieving Personalized Information Based on Mutual Trust in Real and Online World (현실과 가상 세계에서 상호 신뢰도에 기반한 개인화 정보의 식별 방법)

  • Kim, Myeonghun;Kim, Sangwook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.5
    • /
    • pp.257-266
    • /
    • 2017
  • Two remarkable problems of recent online social network are information overflow and information overload. Since the mid-1990s, many researches to overcome these issues have been conducted with information recommender systems and context awareness based personalization techniques, the importance of trust or relationship between users to discover influential information has been increasing as recent online social networks become huge. But almost researches have not regarded trust or relationship in real world while reflecting them in online world. In this paper, we present a novel method how to discover influential and spreadable information that is highly personalized to a user. This valuable information is extracted from an information set that consists of lots of information user missed in the past, and we assumes important information is likely to exist in this set.

A Study on the Real-Time Certificate Status Verification System Using VDN (VDN을 이용한 실시간 인증서 상태 검증 시스템의 관한 연구)

  • Lee, Kwang-Hyoung;Kim, Hyun-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.5
    • /
    • pp.858-865
    • /
    • 2006
  • A certificate that is issued by the certification authority can be revoked within the period of validity by various reasons such as the loss of private key, disqualification or the change in key. Therefore, the certificate status verification must precede prior to use Currently, the CRL or the OCSP methods are used in most cases. But the CRL system can't guarantee the present status of the certificate, and the OCSP generates heavy network traffic by checking or requesting certificate status in real-time using high-capacity messages. In this paper, we propose a system that requests the certificate verification by creating VDN for user identity information. Through this system, the certification authority will be able to guarantee the certificate's status in real-time, and solve the problem of the sewer and network overload by verifying and finding user identity information from VDN, Based on the results, we propose a real-time certificate status verification system which can improve the speed of the verification. We confirmed the improvement in speed by testing and comparing it with the existing methods.

  • PDF

User Adaptation Using User Model in Intelligent Image Retrieval System (지능형 화상 검색 시스템에서의 사용자 모델을 이용한 사용자 적응)

  • Kim, Yong-Hwan;Rhee, Phill-Kyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3559-3568
    • /
    • 1999
  • The information overload with many information resources is an inevitable problem in modern electronic life. It is more difficult to search some information with user's information needs from an uncontrolled flood of many digital information resources, such as the internet which has been rapidly increased. So, many information retrieval systems have been researched and appeared. In text retrieval systems, they have met with user's information needs. While, in image retrieval systems, they have not properly dealt with user's information needs. In this paper, for resolving this problem, we proposed the intelligent user interface for image retrieval. It is based on HCOS(Human-Computer Symmetry) model which is a layed interaction model between a human and computer. Its' methodology is employed to reduce user's information overhead and semantic gap between user and systems. It is implemented with machine learning algorithms, decision tree and backpropagation neural network, for user adaptation capabilities of intelligent image retrieval system(IIRS).

  • PDF

Evaluation of functional wireless sensor node based Ad-hoc network for indoor healthcare monitoring (실내 건강모니터링을 위한 Ad-hoc기반의 기능성 무선센서노드 평가)

  • Lee, Dae-Seok;Do, Kyeong-Hoon;Lee, Hun-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.313-316
    • /
    • 2009
  • A novel approach for electrocardiogram (ECG) analysis within a functional sensor node has been developed and evaluated. The main aim is to reduce data collision, traffic over loads and power consumption in healthcare applications of wireless sensor networks (WSN). The sensor node attached on the patient's bodysurface around the heart can perform ECG analysis based on a QRS detection algorithm to detect abnormal condition of the patient. Data transfer is activated only after detected abnormality in the ECG. This system can reduce packet loss during transmission by reducing traffic overload. In addition, it saves power supply energy leading to more reliable, cheap and user-friendly operation in the WSN based ubiquitous health monitoring.

  • PDF

Analysis of Link Stability Based on Zone Master for Wireless Networks (무선네트워크에서 존 마스터 기반의 링크 안정성 해석)

  • Wen, Zheng-Zhu;Kim, Jeong-Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.3
    • /
    • pp.73-78
    • /
    • 2019
  • Due to frequent topology changes in wireless networks, inter-node link disconnection and path re-establishment occur, causing problems such as overloading control messages in the network. In this paper, to solve the problems such as link disconnection and control message overload, we perform path setup in three steps of the neighbor node discovery process, the route discovery process, and the route management process in the wireless network environment. The link stability value is calculated using the information of the routing table. Then, when the zone master monitors the calculated link value and becomes less than the threshold value, it predicts the link disconnection and performs the path reset to the corresponding transmitting and receiving node. The proposed scheme shows a performance improvement over the existing OLSR protocol in terms of data throughput, average path setup time, and data throughput depending on the speed of the mobile node as the number of mobile nodes changes.

Advanced ICMP Traceback Mechanism Against DDoS Attack in Router (DDoS 공격에 대한 개선된 라우터 기반 ICMP Traceback iT법)

  • 이형우
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2003
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive dating. Proactive tracing(such as packet marking and messaging) prepares information for tracing when packets are in transit. Reactive tracing starts tracing after an attack is detected. In this paper, we propose a 'advanced ICW Traceback' mechanism, which is based on the modified pushback system with secure router mechanism. Proposed mechanism can detect and control DDoS traffic on router and can generate ICMP Traceback message for reconstructing origin attack source, by which we can diminish network overload and enhance Traceback performance.