• Title/Summary/Keyword: Campus Network

Search Result 298, Processing Time 0.025 seconds

Design of GlusterFS Based Big Data Distributed Processing System in Smart Factory (스마트 팩토리 환경에서의 GlusterFS 기반 빅데이터 분산 처리 시스템 설계)

  • Lee, Hyeop-Geon;Kim, Young-Woon;Kim, Ki-Young;Choi, Jong-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.70-75
    • /
    • 2018
  • Smart Factory is an intelligent factory that can enhance productivity, quality, customer satisfaction, etc. by applying information and communications technology to the entire production process including design & development, manufacture, and distribution & logistics. The precise amount of data generated in a smart factory varies depending on the factory's size and state of facilities. Regardless, it would be difficult to apply traditional production management systems to a smart factory environment, as it generates vast amounts of data. For this reason, the need for a distributed big-data processing system has risen, which can process a large amount of data. Therefore, this article has designed a Gluster File System (GlusterFS)-based distributed big-data processing system that can be used in a smart factory environment. Compared to existing distributed processing systems, the proposed distributed big-data processing system reduces the system load and the risk of data loss through the distribution and management of network traffic.

GENESIS: An Automatic Signature-generating Method for Detecting Internet Disk P2P Application Traffic (GENESIS: Internet Disk P2P 트래픽 탐지를 위한 시그너춰 자동 생성 방안)

  • Lee, Byung-Joon;Yoon, Seung-Hyun;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.4
    • /
    • pp.246-255
    • /
    • 2007
  • Due to the bandwidth-consuming characteristics of the heavy-hitter P2P applications, it has become critical to have the capability of pinpointing and mitigating P2P traffic. Traditional port-based classification scheme is no more adequate for this purpose because of newer P2P applications, which incorporating port-hopping techniques or disguising themselves as HTTP-based Internet disk services. Alternatively, packet filtering scheme based on payload signatures suggests more practical and accurate solution for this problem. Moreover, it can be easily deployed on existing IDSes. However, it is significantly difficult to maintain up-to-date signatures of P2P applications. Hence, the automatic signature generation method is essential and will be useful for successful signature-based traffic identification. In this paper, we suggest an automatic signature generation method for Internet disk P2P applications and provide an experimental results on CNU campus network.

A Study on the Characteristics of Human Resources Required in Electronics Company (미래 융합기술사회에서 전자기업의 인재상 분석)

  • Lim, Jung-Yeon
    • Journal of Internet of Things and Convergence
    • /
    • v.3 no.2
    • /
    • pp.33-39
    • /
    • 2017
  • The purpose of this study is to analyze the characteristics of talents required in electronic companies in the 4th industrial revolution. we conducted a network analysis on the key talent of the companies presented in over 100 job announcements to companies in the electronics industry. The results of the study are as follows. First, electronic companies showed the most favored creative talents, preferring collaborative talent and challenging talent. Second, looking at the core definitions of talent, change, response, problem solving, performance creation, communication, challenge, professionalism, enthusiasm, development, aggressiveness and spontaneity were used. In other words, key keywords emerging from the 4th industrial revolution were being used continuously. Third, in the Centrality analysis, talented people who emphasize humanity also appeared. Based on the study, it suggested that manpower training of the 4th Industrial Revolution.

Implementation of Leakage Monitoring System Using ZigBee (ZigBee를 적용한 누전상태 모니터링시스템 구현)

  • Ju, Jae-han;Na, Seung-kwon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.107-112
    • /
    • 2017
  • In recent years, electric shock accidents due to electric leakage currents of household appliances such as computers, TVs, refrigerators, and LED lights are continuously occurring in homes and industrial buildings. And it is not easy to check the leakage current of each household appliances connected in parallel at the rear end of the module. In addition, the leakage current flowing through the path of the normal current other than the existing current leakage circuit breakers are installed in the distribution box, only the function to cut off the power when the leakage. Therefore, there are various disasters such as electric shock and fire caused by short circuit of household appliances, and the risk of such leakage current is seriously presented. In this paper, we propose a method to implement a leakage monitoring system that can be monitored at all times using Zigbee communication based on IEEE 80215.4, which has advantages in low power and low cost among short range wireless communication systems.

Classification of Client-side Application-level HTTP Traffic (HTTP 트래픽의 클라이언트측 어플리케이션별 분류)

  • Choi, Mi-Jung;Jin, Chang-Gyu;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1277-1284
    • /
    • 2011
  • Today, many applications use 80 port, which is a basic port number of HTTP protocol, to avoid a blocking of firewall. HTTP protocol is used in not only Web browsing but also many applications such as the search of P2P programs, update of softwares and advertisement transfer of nateon messenger. As HTTP traffics are increasing and various applications transfer data through HTTP protocol, it is essential to identify which applications use HTTP and how they use the HTTP protocol. In order to prevent a specific application in the firewall, not the protocol-level, but the application-level traffic classification is necessary. This paper presents a method to classify HTTP traffics based on applications of the client-side and group the applications based on providing services. We developed an application-level HTTP traffic classification system and verified the method by applying the system to a small part of the campus network.

Research on Impacts of Depression Among the Aged in the Long-Term Care (장기요양기관 노인들의 우울증에 영향을 미치는 요인에 관한 연구)

  • Kim, Kyung-Woo;Choi, Kun-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.179-188
    • /
    • 2012
  • This research study was to examine the relationships of social supports and depression among long-term care center residents. Depression of long-term care center residents is the most common mental health problem confronting older adults. It is estimated that 13 percent of people aged 65 years and over have a major depressive disorder in Korean Society of Welfare for the Aged. Social support is a key ingredient in dealing with emotional distress and a critical in helping people to cope with all kinds of extreme circumstance. As the result of this research, Perceived social support was found to be related to depression. However, network size was not a predictor of depression, and high health status is accounted for a lower portion of the variance in depression., the poor health status was one of the most powerful predictors of depression, From results of this research study, for social workers who are employed institutional-based agencies.

Analysis for Protocol Layer Technical Requirements of Wireless Mesh Networks Optimization (무선 메쉬 네트워크의 최적화를 위한 프로토콜 계층별 기술적 요구사항에 관한 분석)

  • Lee, Soon-Sik;Yun, Sang-Man;Lee, Sang-Wook;Jeon, Seong-Geun;Lee, Woo-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.77-88
    • /
    • 2010
  • Wireless Mesh Networks are consist of mobility mesh clients and mesh routers. WMNs can communicate with heterogeneous networks such as IEEE 802.11, IEEE 802.15, IEEE 802.16 and sensor networks. WMNs which is based on ad hoc network are on research and developing to enhance WLANs, WPANs, or WMANs. WMNs can offer environment to serve human, service to person area, campus, and metro. But WMNs has many problems to solve about enhancing performance and generalization. Among them, Existing protocol layers has many problems enhancing to optimize WMNs. This document issues problems about WMNs in protocol layer and suggest the solutions. Also, suggests the requirements and the methods of QoS supporting issue.

Probabilistic Constrained Approach for Distributed Robust Beamforming Design in Cognitive Two-way Relay Networks

  • Chen, Xueyan;Guo, Li;Dong, Chao;Lin, Jiaru;Li, Xingwang;Cavalcante, Charles Casimiro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.21-40
    • /
    • 2018
  • In this paper, we propose the distributed robust beamforming design scheme in cognitive two-way amplify-and-forward (AF) relay networks with imperfect channel state information (CSI). Assuming the CSI errors follow a complex Gaussian distribution, the objective of this paper is to design the robust beamformer which minimizes the total transmit power of the collaborative relays. This design will guarantee the outage probability of signal-to-interference-plus-noise ratio (SINR) beyond a target level at each secondary user (SU), and satisfies the outage probability of interference generated on the primary user (PU) above the predetermined maximum tolerable interference power. Due to the multiple CSI uncertainties in the two-way transmission, the probabilistic constrained optimization problem is intractable and difficult to obtain a closed-form solution. To deal with this, we reformulate the problem to the standard form through a series of matrix transformations. We then accomplish the problem by using the probabilistic approach based on two sorts of Bernstein-type inequalities and the worst-case approach based on S-Procedure. The simulation results indicate that the robust beamforming designs based on the probabilistic method and the worst-case method are both robust to the CSI errors. Meanwhile, the probabilistic method can provide higher feasibility rate and consumes less power.

Statistic Signature based Application Traffic Classification (통계 시그니쳐 기반의 응용 트래픽 분류)

  • Park, Jin-Wan;Yoon, Sung-Ho;Park, Jun-Sang;Lee, Sang-Woo;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1234-1244
    • /
    • 2009
  • Nowadays, the traffic type and behavior are extremely diverse due to the appearance of various services and applications on Internet, which makes the need of application-level traffic classification important for the efficient management and control of network resources. Although lots of methods for traffic classification have been introduced in literature, they have some limitations to achieve an acceptable level of performance in terms of accuracy and completeness. In this paper we propose an application traffic classification method using statistic signatures, defined as a directional sequence of packet size in a flow, which is unique for each application. The statistic signatures of each application are collected by our automatic grouping and extracting mechanism which is mainly described in this paper. By matching to the statistic signatures we can easily and quickly identify the application name of traffic flows with high accuracy, which is also shown by comprehensive excrement with our campus traffic data.

Resource Allocation in Spectrum Sharing ad-hoc Cognitive Radio Networks Based on Game Theory: An Overview

  • Abdul-Ghafoor, Omar B.;Ismail, Mahamod;Nordin, Rosdiadee;El-Saleh, Ayman Abd
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.2957-2986
    • /
    • 2013
  • The traditional approach of fixed spectrum allocation to licensed networks has resulted in spectrum underutilisation. Cognitive radio technology is envisioned as a promising solution that can be used to resolve the ineffectiveness of the fixed spectrum allocation policy by accessing the underutilised spectrum of existing technologies opportunistically. The implementation of cognitive radio networks (CRNs) faces distinct challenges due to the fact that two systems (i.e., cognitive radio (CR) and primary users (PUs)) with conflicting interests interact with each other. Specially, in self-organised systems such as ad-hoc CRNs (AHCRNs), the coordination of spectrum access introduces challenges to researchers due to rapid utilisation changes in the available spectrum, as well as the multi-hop nature of ad-hoc networks, which creates additional challenges in the analysis of resource allocation (e.g., power control, channel and rate allocation). Instead, game theory has been adopted as a powerful mathematical tool in analysing and modelling the interaction processes of AHCRNs. In this survey, we first review the most fundamental concepts and architectures of CRNs and AHCRNs. We then introduce the concepts of game theory, utility function, Nash equilibrium and pricing techniques. Finally, we survey the recent literature on the game theoretic analysis of AHCRNs, highlighting its applicability to the physical layer PHY, the MAC layer and the network layer.