• Title/Summary/Keyword: network capabilities

Search Result 694, Processing Time 0.034 seconds

Design and Implementation of MPLS based VPN with DiffServ Capabilities (차별화 된 서비스를 제공하는 MPLS 기반의 VPN 구조 설계 및 구현)

  • 오홍석;오영선;이현태
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.227-233
    • /
    • 2003
  • In paper, we present design and implementation of MPLS based VPN with QoS capabilities. We propose a design architecture of an edge router for MPLS based VPN with QoS capabilities in backbone network. We design functional blocks, interface specifications, detail routing and forwarding information based structure, and packet forwarding engine for the purpose of implementation of an edge router, We extend bgp-4 software for implementation differentiated service packet forwarding schemes in MPLS based VPN.

  • PDF

A Study of the Impacts of Strategic Orientation on the Performance in Technology-based Start-ups (기술창업시 전략적 지향성이 창업성과에 미치는 영향)

  • Jang, Dong-Kwan;Song, In-Am;Hwang, Hee-Joong
    • Journal of Distribution Science
    • /
    • v.11 no.10
    • /
    • pp.37-45
    • /
    • 2013
  • Purpose - Appropriate response to the fast changing economic environment determines SMEs' competiveness in the era of globalization and open market and, therefore, government policies to strengthen SME's competitiveness will be very important in the future. It is time to investigate the element of strategic orientation that is necessary for strengthening the competitiveness of SMEs, and its effect on the success of a business start-up. This study analyzes the network orientation in addition to existing strategic orientation, and focuses on price and quality management capability as mediators for strategic orientation and outcomes of business start-ups. Research design/data/methodology - The orientations of technology-based business founders were classified into market, technology, network, and entrepreneurial orientation. We then investigated the effect of these orientations on product price and quality management capability, as well as the influence of price and quality management capability on the outcome of a business start-up. This study is based on the nation-wide survey of the founders and members of technology-based business establishments. The survey was administered to 300 selected companies via email for a period of one month, at the end of which 175 companies replied with valid answers. Further, for effective and objective research, we used SPSS 14.0 and Amos 7.0 for structural equation modeling assumptions and hypothesis verification. Results - Except for entrepreneurial orientation, the other three orientations, namely, technology, market, and network orientations, affect the price management capability according to our results. The price management capability relates significantly with the sales and customer satisfaction. Especially, technology orientation is the core competency of start-ups that affects price and quality management capabilities. However, technology and entrepreneurial orientation do not influence the outcome of business start-ups, but affect their quality management capabilities. Conclusions - This study confirms that the strategic orientation affects product price as well as quality management capabilities, to introduce new products and achieve successful outcomes. In conclusion, new business founders face the dilemma of trade-off between price and quality in the planning stage of new product development. In particular, price management capability directly affects the outcome. Therefore, price management is more important for a successful start-up than quality management. Especially, during the initial stages of starting up a new business, price management capability entails following the market-leading company, or price penetration strategy. In this stage, price management is dependent on the information from outside rather than on the founder's decision, and it directly affects sales performance and customer satisfaction. In contrast, quality management capability is directly related to the technology capability and market experience of founders. In this case, subjective and proactive decision making is required for differentiation and development of demand in the niche market, which does not directly influence the sales performance and customer satisfaction.

Hierarchical Power Management Architecture and Optimal Local Control Policy for Energy Efficient Networks

  • Wei, Yifei;Wang, Xiaojun;Fialho, Leonardo;Bruschi, Roberto;Ormond, Olga;Collier, Martin
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.540-550
    • /
    • 2016
  • Since energy efficiency has become a significant concern for network infrastructure, next-generation network devices are expected to have embedded advanced power management capabilities. However, how to effectively exploit the green capabilities is still a big challenge, especially given the high heterogeneity of devices and their internal architectures. In this paper, we introduce a hierarchical power management architecture (HPMA) which represents physical components whose power can be monitored and controlled at various levels of a device as entities. We use energy aware state (EAS) as the power management setting mode of each device entity. The power policy controller is capable of getting information on how many EASes of the entity are manageable inside a device, and setting a certain EAS configuration for the entity. We propose the optimal local control policy which aims to minimize the router power consumption while meeting the performance constraints. A first-order Markov chain is used to model the statistical features of the network traffic load. The dynamic EAS configuration problem is formulated as a Markov decision process and solved using a dynamic programming algorithm. In addition, we demonstrate a reference implementation of the HPMA and EAS concept in a NetFPGA frequency scaled router which has the ability of toggling among five operating frequency options and/or turning off unused Ethernet ports.

Mobile Contents Adaptation Network using Active Network Mechanisms (액티브 네트워크 메커니즘을 이용한 이동 컨텐츠 적응형 네트워크)

  • 김기조;이준호;임경식;오승희;남택용;손승원
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.384-392
    • /
    • 2004
  • Mobile contents service providers have some difficulties to timely and proper service deployment due to rapid development cycle of diverse portable devices with different capabilities. A way to resolve the problem is to introduce a mobile contents service paltform that can adapt original mobile contents to diverse devices dynamically and automatically. In this paper, we propose a mobile contents service platform based on active network mechanisms, called Mobile Content Adaptation Network(MobiCAN). The MobiCAN node provides effective service deployment, execution, and maintenance features and accommodates service layering and service customization capabilities for easy deployment. The basic functional units of the MobiCAN node are micro services with well-defined service interfaces and service layering features. For reliable services among the MobiCAN nodes, we design new distributed and robust Overlay Management Protocols(OMPs). As an example of practical MobiCAN applications, we finally describe Dynamic Contents Customization Proxy(DCCP) service.

Practical Schemes for Tunable Secure Network Coding

  • Liu, Guangjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1193-1209
    • /
    • 2015
  • Network coding is promising to maximize network throughput and improve the resilience to random network failures in various networking systems. In this paper, the problem of providing efficient confidentiality for practical network coding system against a global eavesdropper (with full eavesdropping capabilities to the network) is considered. By exploiting a novel combination between the construction technique of systematic Maximum Distance Separable (MDS) erasure coding and traditional cryptographic approach, two efficient schemes are proposed that can achieve the maximum possible rate and minimum encryption overhead respectively on top of any communication network or underlying linear network code. Every generation is first subjected to an encoding by a particular matrix generated by two (or three) Vandermonde matrices, and then parts of coded vectors (or secret symbols) are encrypted before transmitting. The proposed schemes are characterized by tunable and measurable degrees of security and also shown to be of low overhead in computation and bandwidth.

A New Multicasting Method in a Multiple Access Network (다중 접근 네트워크에서의 새로운 멀티캐스트 기법)

  • 정민규;김용민;김종권
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.9
    • /
    • pp.1824-1837
    • /
    • 1994
  • Broadband ISDN will support advanced communication services such as multimedia conference, VOD and electronic news service. Because many of these advanced services require multimedia data delivery, future communication networks must have flexible and efficient multiparty communications capabilities. In this paper we propose a new multicasting method which uses packer filtering capabilities both in a physical network and in a logical network layers. This new scheme has potential to reduce the transmission and packet processing overheads of multicast communications. For the new multicasting method, we develop a group matching algorithm which finds a suitable set of groups that covers multiple target hosts. We show the application of the multicasting method and the group matching algorithm with two simple examoles.

  • PDF

Path-Based Computation Encoder for Neural Architecture Search

  • Yang, Ying;Zhang, Xu;Pan, Hu
    • Journal of Information Processing Systems
    • /
    • v.18 no.2
    • /
    • pp.188-196
    • /
    • 2022
  • Recently, neural architecture search (NAS) has received increasing attention as it can replace human experts in designing the architecture of neural networks for different tasks and has achieved remarkable results in many challenging tasks. In this study, a path-based computation neural architecture encoder (PCE) was proposed. Our PCE first encodes the computation of information on each path in a neural network, and then aggregates the encodings on all paths together through an attention mechanism, simulating the process of information computation along paths in a neural network and encoding the computation on the neural network instead of the structure of the graph, which is more consistent with the computational properties of neural networks. We performed an extensive comparison with eight encoding methods on two commonly used NAS search spaces (NAS-Bench-101 and NAS-Bench-201), which included a comparison of the predictive capabilities of performance predictors and search capabilities based on two search strategies (reinforcement learning-based and Bayesian optimization-based) when equipped with different encoders. Experimental evaluation shows that PCE is an efficient encoding method that effectively ranks and predicts neural architecture performance, thereby improving the search efficiency of neural architectures.

Embodiment of network printer system for multi OS (서로 다른 운영체제를 위한 Network Printer System의 구현)

  • Cha, Kyung-Hwan;Seo, Byeong-Eun;Yu, Young-Seok;Sin, Hyun-Sil
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.957-958
    • /
    • 2006
  • PC users could experience some inconvenience when they use their PC that was physically connected to network printers shared by other people in the network due to the overload. This paper shows how to resolve this kind of overload problem and established the embedded printer system based on embedded Linux system which performs the printer server in order for any users in the office to do printing work more smoothly via current network. It's own capabilities and functions were verified throughout the various tests in practical environment.

  • PDF

Perspectives on the Application of Capabilities Based Acquisition in the System of Systems Environment (복합시스템 환경에서의 능력기반 획득 적용방안)

  • Kwon, Yong-Soo;Song, Sang-Ki;Ko, Nam-Kyung
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.2
    • /
    • pp.71-84
    • /
    • 2010
  • This work describes capabilities based acquisition process in the SoS(System of Systems) environment. It is written as qualitative paper based on a cognitive paradigm. Future battle space is formed with grids of the various sensors and the shooters. It has been also transformed into a SoS concept which accomplishes missions and their functions through network based battle management systems in a single theater. The SoS is a set or arrangement of systems that results when independent and useful systems are integrated into a larger system that delivers unique capabilities. Therefore the acquisition process is changing over from single system requirements to capabilities based acquisition of the SoS. In this point of view, this paper analyzes functionally JCIDS, DAS and CEP which are critical elements of the acquisition process. From results of this comprehensive analysis, perspectives on the application of capabilities based acquisition suitable for Korean acquisition environment are presented.

A Building Method of Security Architecture Framework on the Medical Information Network Environment (의료정보시스템상에서의 네트워크 보안기능 프레임워크와 보안 아키텍쳐 설계방법)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.3-9
    • /
    • 2011
  • On health information network architecture, traffic along the path of traffic and security, blocking malicious code penetration is performed. The medical information system network security infrastructure study, which was whether to be designed based on the structure and methodology is designed to develop the security features. Health informati on system's functionality and capabilities framework for infrastructure is the backbone and structure. The design fea tures a framework for the overall network structure formation of the skeleton and forms the basic structure of the security methodology. Infrastructure capabilities to build the framework and the application functionality is being implemented. Differentiated in accordance with security zones to perform security functions and security mechanisms that operate through this study is to present. u-Healthcare future advent of cloud computing and a new health information environment, the medical information on the preparation of this study is expected to be utilized for security.