• Title/Summary/Keyword: New Address Information

Search Result 682, Processing Time 0.033 seconds

Standardization of Digital Archiving and OAIS Reference Model (디지털 아카이빙의 표준화와 OAIS 참조모형)

  • Lee, So-Yeon
    • Journal of Information Management
    • /
    • v.33 no.3
    • /
    • pp.45-68
    • /
    • 2002
  • OAIS Reference Model has become a basis for exchanging ideas and cooperating among institutions and various sectors concerned with digital archiving. It has been also recently approved as a new ISO standard. This paper reviews major concepts and issues that the reference addresses. It also introduces current activities of institutions and projects that have contributed to the development process of the model. Conclusion is devoted to address the importance of cooperation among cultural institutions. These institutions are taking the responsibility of preserving digital information for the long-term as authentic as possible and delivering it to the next generation.

Efficient Detour routing path detection algorithm based on the hierarchical network structure analysis (계층적 네트웍 구조 분석 기반의 패킷우회 검출 알고리즘)

  • 김진천;이동근;이동현;최상복
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.65-69
    • /
    • 2001
  • Network Management become more and more important issue in the network environment in which many applications such as Mail, teleconferencing, WWW and database software are operated. It can be possible for The Bridge and flouter forwarding data to select next hop device which results in routing incorrect path from the viewpoint of network design. In this paper we address the problem of finding the detour routing path due to incorrect setting on routing devices. We propose the new algorithm for finding detour routing path based on hierarchical network structure analysis using information from SNMP MIB. To prove the correctness of the proposed algorithm we have done simulation with predefined data. Simulation results show that the algorithm finds detour path correctly

  • PDF

Physical Topology Discovery for Metro Ethernet Networks

  • Son, Myung-Hee;Joo, Bheom-Soon;Kim, Byung-Chul;Lee, Jae-Yong
    • ETRI Journal
    • /
    • v.27 no.4
    • /
    • pp.355-366
    • /
    • 2005
  • Automatic discovery of physical topology plays a crucial role in enhancing the manageability of modern metro Ethernet networks. Despite the importance of the problem, earlier research and commercial network management tools have typically concentrated on either discovering logical topology, or proprietary solutions targeting specific product families. Recent works have demonstrated that network topology can be determined using the standard simple network management protocol (SNMP) management information base (MIB), but these algorithms depend on address forwarding table (AFT) entries and can find only spanning tree paths in an Ethernet mesh network. A previous work by Breibart et al. requires that AFT entries be complete; however, that can be a risky assumption in a realistic Ethernet mesh network. In this paper, we have proposed a new physical topology discovery algorithm which works without complete knowledge of AFT entries. Our algorithm can discover a complete physical topology including inactive interfaces eliminated by the spanning tree protocol in metro Ethernet networks. The effectiveness of the algorithm is demonstrated by implementation.

  • PDF

MIB-II based Algorithm for hierarchical network analysis and detection of detour routing paths (MIB-II 기반 계층적 네트워크 구조 분석 및 패킷우회 검출 알고리즘)

  • 김진천
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1442-1448
    • /
    • 2003
  • Network Management become more and more important issue in the network environment in which many applications such as Mail, teleconferencing, WWW and database software are operated. It can be possible for The Bridge and Router forwarding data to select next hop device which results in routing incorrect path from the viewpoint of network design. In this paper we address the problem of finding the detour routing path due to incorrect setting on routing devices. We propose the new algorithm for finding detour muting path based on hierarchical network structure analysis using information from SNMP MIB. To prove the correctness of the unposed algorithm we have done simulation with predefined data. Simulation results show that the algorithm finds detour path correctly.

Middleware for Context-Aware Ubiquitous Computing

  • Hung Q.;Sungyoung
    • Korea Information Processing Society Review
    • /
    • v.11 no.6
    • /
    • pp.56-75
    • /
    • 2004
  • In this article we address some system characteristics and challenging issues in developing Context-aware Middleware for Ubiquitous Computing. The functionalities of a Context-aware Middleware includes gathering context data from hardware/software sensors, reasoning and inferring high-level context data, and disseminating/delivering appropriate context data to interested applications/services. The Middleware should facilitate the query, aggregation, and discovery for the contexts, as well as facilities to specify their privacy policy. Following a formal context model using ontology would enable syntactic and semantic interoperability, and knowledge sharing between different domains. Moddleware should also provide different kinds of context classification mechanical as pluggable modules, including rules written in different types of logic (first order logic, description logic, temporal/spatial logic, fuzzy logic, etc.) as well as machine-learning mechanical (supervised and unsupervised classifiers). Different mechanisms have different power, expressiveness and decidability properties, and system developers can choose the appropriate mechanism that best meets the reasoning requirements of each context. And finally, to promote the context-trigger actions in application level, it is important to provide a uniform and platform-independent interface for applications to express their need for different context data without knowing how that data is acquired. The action could involve adapting to the new environment, notifying the user, communicating with another device to exchange information, or performing any other task.

  • PDF

A New Framework of 6lowpan node for Neighboring Communication with Healthcare Monitoring Applications

  • Singh, Dhananjay;Lee, Hoon-Jae;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.281-286
    • /
    • 2009
  • The proposed technique uses cyclic frame structure, where three periods such as beacon period (BP), mesh contention access period (MCAP) and slotted period (SP) are in a data frame. This paper studies on a mechanism to allow communication nodes (6lowpan) in a PAN with different logical channel for global healthcare applications monitoring technology. The proposed super framework structure system has installed 6lowpan sensor nodes to communicate with each other. The basic idea is to time share logical channels to perform 6lowpan sensor node. The concept of 6lowpan sensor node and various biomedical sensors fixed on the patient BAN (Body Area Network) for monitoring health condition. In PAN (hospital area), has fixed gateways that received biomedical data from 6lowpan (patient). Each 6lowpan sensor node (patient) has IP-addresses that would be directly connected to the internet. With the help of IP-address service provider can recognize or analyze patient data from all over the globe by the internet service provider, with specific equipments i.e. cell phone, PDA, note book. The NS-2.33 result shows the performance of data transmission delay and data delivery ratio in the case of hop count in a PAN (Personal Area Networks).

  • PDF

Federated Learning-Internet of Underwater Things (연합 학습기반 수중 사물 인터넷)

  • Shrutika Sinha;G., Pradeep Reddy;Soo-Hyun Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.140-142
    • /
    • 2023
  • Federated learning (FL) is a new paradigm in machine learning (ML) that enables multiple devices to collaboratively train a shared ML model without sharing their local data. FL is well-suited for applications where data is sensitive or difficult to transmit in large volumes, or where collaborative learning is required. The Internet of Underwater Things (IoUT) is a network of underwater devices that collect and exchange data. This data can be used for a variety of applications, such as monitoring water quality, detecting marine life, and tracking underwater vehicles. However, the harsh underwater environment makes it difficult to collect and transmit data in large volumes. FL can address these challenges by enabling devices to train a shared ML model without having to transmit their data to a central server. This can help to protect the privacy of the data and improve the efficiency of training. In this view, this paper provides a brief overview of Fed-IoUT, highlighting its various applications, challenges, and opportunities.

TPS Analysis, Performance Indicator of Public Blockchain Scalability

  • Hyug-Jun Ko;Seong-Soo Han
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.85-92
    • /
    • 2024
  • In recent years, Bitcoin and Ethereum have witnessed a surge in trading activity, driven by venture capital investment and funding through initial coin offerings (ICOs) and initial exchange offerings (IEOs). This heightened interest has led to kickstarting a vibrant ecosystem for blockchain development. The total number of cryptocurrencies listed on CoinMarketCap.com has reached 2,274 highlights how dynamic and wide blockchain development landscape has grown. In blockchain development, new blockchain projects are being created by forking blockchains inspired by major cryptocurrencies such as Bitcoin and Ethereum. These projects aim to address the perceived shortcomings and improve existing technologies. Altcoins, representing these alternative cryptocurrencies, are an ongoing industry effort to improve performance and security with enhancement proposals such as Bitcoin Improvement Proposals (BIP), Ethereum Improvement Proposals (EIP), and EOSIO Enhancement Proposals (EEP). With competitive attempts to improve blockchain performance and security, an ongoing performance race between various blockchains has taken shape, each claiming its own performance advantages. In this paper, we describe the transactions contained in the blocks of each representative blockchain, and find the factors that affect the transactions per second (TPS) through transaction processing and block generation processes, and suggest their relationship with scalability.

Digital Government Application: A Case Study of the Korean Civil Documents using Blockchain-based Resource Management Model

  • Hanbi Jeong;Jihae Suh;Jinsoo Park;Hanul Jung
    • Asia pacific journal of information systems
    • /
    • v.32 no.4
    • /
    • pp.830-856
    • /
    • 2022
  • The Digital Government landscape is changing to reflect how governments try to discover innovative digital solutions, and how they transform themselves in the process. In addition, with the advent of information and communication technology (ICT), e-governance became an essential part of the government. Among the services provided by the Korean government, the Minwon24 online portal is the most used one. However, it has some processing limitations, namely: (1) it provides a cumbersome document authenticity service; (2) people cannot know what happened even if the agency handles the documents arbitrarily. To address the issues outlined above, blockchain processing can be a good alternative. It has a tremendous potential in that it has maximum transparency and a low risk of being hacked. Resource management is one of the areas where blockchain is frequently used. The present study suggests a new model based on blockchain for Minwon24; the proposed model is a type of resource management. There are three participants: issuer, owner and receiver. The proposed model has two stages: issuing and exchanging. Issuing is creating civil documents on the database, which is BigchainDB in this study. Exchanging, the next stage, is a transaction between the owner and the receiver. Based on this model, the actual program is built with the programming language Python. To evaluate the model, the study uses various criteria and it shows the excellence of the model in comparison to others in prior research.

Performance Evaluation of Improved Fast PMIPv6-Based Network Mobility for Intelligent Transportation Systems

  • Ryu, Seonggeun;Choi, Ji-Woong;Park, Kyung-Joon
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.142-152
    • /
    • 2013
  • The network mobility basic support (NEMO BS) protocol has been investigated to provide Internet connectivity for a group of nodes, which is suitable for intelligent transportation systems (ITS) applications. NEMO BS often increases the traffic load and handover latency because it is designed on the basis of mobile Internet protocol version 6 (MIPv6). Therefore, schemes combining proxy MIPv6 with NEMO (P-NEMO) have emerged to solve these problems. However, these schemes still suffer from packet loss and long handover latency during handover. Fast P-NEMO (FP-NEMO) has emerged to prevent these problems. Although the FP-NEMO accelerates handover, it can cause a serious tunneling burden between the mobile access gateways (MAGs) during handover. This problem becomes more critical as the traffic between the MAGs increases. Therefore, we propose a scheme for designing an improved FP-NEMO (IFP-NEMO) to eliminate the tunneling burden by registering a new address in advance. When the registration is completed before the layer 2 handover, the packets are forwarded to the new MAG directly and thereby the IFP-NEMO avoids the use of the tunnel between the MAGs during handover. For the evaluation of the performance of the IFP-NEMO compared with the FP-NEMO, we develop an analytical framework for fast handovers on the basis of P-NEMO. Finally, we demonstrate that the IFP-NEMO outperforms the FP-NEMO through numerical results.