• Title/Summary/Keyword: In-Network

Search Result 50,274, Processing Time 0.06 seconds

A Study on the Types of Social Networks of Housewives in Urban Nuclear Families (가족의 사회관계망 유형화 연구 - 도시 핵가족 주부를 중심으로 -)

  • 원효종;옥선화
    • Journal of Families and Better Life
    • /
    • v.20 no.4
    • /
    • pp.149-164
    • /
    • 2002
  • The purpose of this study was to identify the types of social networks of urban housewives according to different network composition patterns and to analyze the structural and functional characteristics of identified types. The data used in this study were collected from 589 full-time housewives residing in Taejeon city. The major findings are as follows: 1) The social networks of housewives in urban nuclear families were classified into eight types: the kin network, the non-kin network, the kin-centered network, the friend-centered network, the neighbor-centered network, the associate-centered network, the parallel network, and the decentralized network. 2) The structual characteristics (size, density, homogeneity, duration, proximity, frequency, closeness, direction) varied according to the type. The kin network type and the non-kin network type showed extreme degrees in network characteristics. The parallel network type and the decentralized network type showed an average level of network characteristics. The kin-, friend-, neighbor-, and the associate-centered types showed network characteristics of an intermediate level between the single-category types and the decentralized type. 3) The average levels of function of social network types were different in only two(service support, interference) of the six function areas(emotional support, service support, material support, information support, social companionship support, interference). The average level of service support by the non-kin network type was higher than other types. The average level of interference by the kin-centered network type was higher than other types, and that of the neighbor-centered network type was lower than other types. On the other hand, the total amount of function performance of social network types was different in all function areas. The total amount of social support given by the decentralized network type was greater than the other types. The total amount of interference given by the non-kin network type was smaller than the other types.

A Case Study on Network Status Classification based on Latency Stability

  • Kim, JunSeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4016-4027
    • /
    • 2014
  • Understanding network latency is important for providing consistent and acceptable levels of services in network-based applications. However, due to the difficulty of estimating applications' network demands and the difficulty of network latency modeling the management of network resources has often been ignored. We expect that, since network latency repeats cycles of congested states, a systematic classification method for network status would be helpful to simplify issues in network resource managements. This paper presents a simple empirical method to classify network status with a real operational network. By observing oscillating behavior of end-to-end latency we determine networks' status in run time. Five typical network statuses are defined based on a long-term stability and a short-term burstiness. By investigating prediction accuracies of several simple numerical models we show the effectiveness of the network status classification. Experimental results show that around 80% reduction in prediction errors depending on network status.

Software Engineering Meets Network Engineering: Conceptual Model for Events Monitoring and Logging

  • Al-Fedaghi, Sabah;Behbehani, Bader
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.9-20
    • /
    • 2021
  • Abstraction applied in computer networking hides network details behind a well-defined representation by building a model that captures an essential aspect of the network system. Two current methods of representation are available, one based on graph theory, where a network node is reduced to a point in a graph, and the other the use of non-methodological iconic depictions such as human heads, walls, towers or computer racks. In this paper, we adopt an abstract representation methodology, the thinging machine (TM), proposed in software engineering to model computer networks. TM defines a single coherent network architecture and topology that is constituted from only five generic actions with two types of arrows. Without loss of generality, this paper applies TM to model the area of network monitoring in packet-mode transmission. Complex network documents are difficult to maintain and are not guaranteed to mirror actual situations. Network monitoring is constant monitoring for and alerting of malfunctions, failures, stoppages or suspicious activities in a network system. Current monitoring systems are built on ad hoc descriptions that lack systemization. The TM model of monitoring presents a theoretical foundation integrated with events and behavior descriptions. To investigate TM modeling's feasibility, we apply it to an existing computer network in a Kuwaiti enterprise to create an integrated network system that includes hardware, software and communication facilities. The final specifications point to TM modeling's viability in the computer networking field.

A Policy-based Network Control Methodology for Large-scale IP Network (대규모 IP 네트워크에서 정책기반의 네트워크 제어방법 연구)

  • Oh, Jun-Suk;Son, Choon-Ho;Kim, Ki-Eung;Lee, Jae-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.364-367
    • /
    • 2008
  • Many different types of network equipments are deployed in a large-scale IP network. In this operating environment, network service providers suffer from difficulty in controlling various equipments simultaneously in case network faults happen in their overall or regional network due to physical link failure or abnormal traffic. This paper presents a policy-based methodology to control many different types of network equipments at the same time in abnormal cases. The key idea is that NMS(Network Management System) keeps vendor-neutral control policies in normal times and that when an abnormal case occurs in network, NMS transforms the selected policy into vendor-specific control commands and enforces them to various equipments simultaneously.

  • PDF

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

An Improved Method of Character Network Analysis for Literary Criticism: A Case Study of

  • Kwon, Ho-Chang;Shim, Kwang-Hyun
    • International Journal of Contents
    • /
    • v.13 no.3
    • /
    • pp.43-48
    • /
    • 2017
  • As a computational approach to literary criticism, the method of character network analysis has attracted attention. The character network is composed of nodes as characters and links as relationship between characters, and has been used to analyze literary works systematically. However, there were limitations in that relationships between characters were so superficial that they could not reflect intimate relationships and quantitative data from the network were not interpreted in depth regarding meaning of literary works. In this study, we propose an improved method of character network analysis through a case study on the play . First, we segmented the character network into a dialogue network focused on speaker-to-listener relationship and an opinion network focused on subject-to-object relationship. We analyzed these networks in various ways and discussed how analysis results could reflect structure and meaning of the work. Through these studies, we strived to find a way of organic and meaningful connection between literary criticism in humanities and network analysis in computer science.

Applying the Graphic Processing Unit Based Cloud Computing in Cellular Network (그래픽 처리장치 기반 클라우드 컴퓨팅의 셀룰러 네트워크 응용)

  • Kim, June;Choi, Seung Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.75-85
    • /
    • 2012
  • In general, cellular network is deployed as distributed network architecture, so network equipment is spread out all over the coverage area. This case causes high cost. Recently, centralized network architecture has been deployable at cellular network since base station was able to be virtualized due to advance in computing power. The centralized network architecture in cellular network adjusts its cell radius dynamically and minimizes power consumption of the network. This paper introduces a new centralized deployment way of cellular network using SDR and cloud computing technology. Then, advantage and feasibility of the new network will be reviewed by implementing this novel network.

Modular Neural Network Using Recurrent Neural Network (궤환 신경회로망을 사용한 모듈라 네트워크)

  • 최우경;김성주;서재용;전흥태
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1565-1568
    • /
    • 2003
  • In this paper, we propose modular network to solve difficult and complex problems that are seldom solved with multi-layer neural network. The structure of modular neural network in researched by Jacobs and Jordan is selected in this paper. Modular network consists of several expert networks and a gating network which is composed of single-layer neural network or multi-layer neural network. We propose modular network structure using recurrent neural network, since the state of the whole network at a particular time depends on an aggregate of previous states as well as on the current input. Finally, we show excellence of the proposed network compared with modular network.

  • PDF

The Empirical Analysis on the Performance of Inter-firm Network Management in the IT Service Firms (IT서비스 기업에서의 네트워크 경영 관련 성과 요인에 대한 실증 연구)

  • Ahn, Yeon S.
    • Journal of Information Technology Services
    • /
    • v.10 no.1
    • /
    • pp.47-64
    • /
    • 2011
  • In the IT(Information Technology) service, which supply the solutions related to business management and IT, network construction and application trends, the related service business are increasing according to the enlargement of project scope and the diversity of project types as the need of service customers. In this paper, I propose the significant effect factors on the network management of IT service firms. The key findings are from the analysis result about 94 IT service firms as follows. For implementation the high performance of network management in the IT service firms, the strategic elements in the process of network construction are more conceived highly than the basic element in them. Also the perspective of project objectives are considered than the nominal perspectives in the partner selection process. The competency of partner firms', the cooperation process between the partner firms', network relation operation management and network relation structure management are the significant effect factors of network management.

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.