• Title/Summary/Keyword: Information-centric network

Search Result 346, Processing Time 0.025 seconds

A Study on Optimized Plan for Mass Acquisition and Processing of Battlefield Information (전장 정보의 대량 획득과 처리를 위한 최적화 방안 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.45-50
    • /
    • 2013
  • The future warfare will universalize the operation of a combined weapon system that utilizes this technology and create an operational environment that is centered on a network requiring a high level of interoperability between combat elements as well as a high level of operation speed. In this kind of operational environment, future combat will take on the aspects of network centric warfare, which is capable of realizing a real-time sensor to shooter cycle by horizontally connecting operation elements. Therefore, the study attempts to draw out a Korean measurement plan concerning battlefield environment changes in the future by investigating and analyzing all problems occurring during the mass acquisition and processing of battlefield information in battlefield situations of network centric warfare currently conducted by the US military in Afghanistan and Iraq.

User Centric Content Management System for Open IPTV Over SNS

  • Jeon, Seung Hyun;An, Sanghong;Yoon, Changwoo;Lee, Hyun-woo;Choi, Junkyun
    • Journal of Communications and Networks
    • /
    • v.17 no.3
    • /
    • pp.296-305
    • /
    • 2015
  • Coupled schemes between service-oriented architecture (SOA) and Web 2.0 have recently been researched. Web-based content providers and telecommunications company (Telecom) based Internet protocol television (IPTV) providers have struggled against each other to accommodate more three-screen service subscribers. Since the advent of Web 2.0, more abundant reproduced content can be circulated. However, because according to increasing device's resolution and content formats IPTV providers transcode content in advance, network bandwidth, storage and operation costs for content management systems (CMSs) are wasted. In this paper, we present a user centric CMS for open IPTV, which integrates SOA and Web 2.0. Considering content popularity based on a Zipf-like distribution to solve these problems, we analyze the performance between the user centric CMS and the conventional Web syndication system for normalized costs. Based on the user centric CMS, we implement a social Web TV with device-aware function, which can aggregate, transcode, and deploy content over social networking service independently.

I3A Framework of Defense Network Centric Based C2 Facilities (국방 NC 기반 C2 시설 I3A Framework)

  • Kim, Young-Dong;Lee, Tae-Gong;Park, Bum-Shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.615-625
    • /
    • 2014
  • Ministry of National Defense, MND, established a "Master Plan of Military Facility" in 2010 based on the defense reform to prepare for future war. It was a plan for consolidating small military facilities into battalion units, reflecting on and preparing for the needs of various changes in defense environment as well as balanced growth of ROK Army, Navy, and Air Force. However, to move forward with "Military Facility Master Plan," current design criteria for military facilities need to be revised to be enacted due to numerous calculation errors in facility footprints because of the absence of a sound facility criteria. Because the future war environment will be changed from Platform basis to Network Centric Warfare basis, Command & Control capability of C4I systems is getting more important. Therefore, Successful mission accomplishment can be secured by convergence of facility and military Information Technology(IT). So, MND should quickly prepare for the operational guidance, design criteria and policy that are suitable for Network Centric Warfare accomplishment, and implement infrastructure of IT and installation of C2 facility in conjunction with consolidation movement of military facilities. In this paper, we propose the defense I3A framework in order to solve this problem.

Co-author Network Analysis of Research Institutes in the Computer Field Based on the Journal Articles Published in Korea (한국 학술지 기반 컴퓨터분야 연구기관 공저 네트워크 분석)

  • Kim, Byungkyu;You, Beon-Jong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.117-122
    • /
    • 2021
  • In order to reveal the co-research relationship with key research institutes in the computer field in Korea, which have high competitiveness in the ICT field, this paper analyzes the co-author network of research institutes based on the papers of Korean journals. For this study, 15 computer journals published in Korea were selected and collected for the past 5 years. In addition, authors, affiliated institutions, and country information were extracted from the papers, and experimental data were produced using institutional identification data and SNA analysis techniques. Through this, statistical analysis was performed on researchers, research institutes, and countries, and the centrality of research institutes was measured through co-authored network analysis and visualized as a map. The results of the research that analyzed the co-author relationship based on the papers in computer science journals published in Korea are as follows. First, the status of co-author relations among researchers was statistically analyzed in detail. The number of authors, the number of co-authors, and statistics by co-authoring countries, as well as the ratio of co-authored research by institution and the ratio of co-authored by country were revealed. The co-authoring status of papers in English journals was analyzed separately to compare and analyze characteristics. Second, the centrality of each individual was measured through the co-authored network analysis of the identified researchers, institutions and countries affiliated with the institution, and the frequency of connection between data by level was identified. In addition, the co-authorization network between research institutes was visualized and presented as a map so that the overall view of the co-authoring network was presented, and the connection frequency between the institutes was checked. It is possible to recommend a research partner based on the co-authoring behavior of Korean computer researchers and the co-authoring relationship between major research institutes. For this, additional research is needed to analyze the subject areas of each institution.

  • PDF

Signaling and Control Procedures Using Generalized MPLS Protocol for IP over an Optical Network

  • Um, Tai-Won;Choi, Jun-Kyun;Kim, Young-Ae;Lee, Hyeong-Ho;Jung, Hae-Won;Jong, Sang-Gug
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.69-81
    • /
    • 2002
  • This paper reviews the existing research activities on signaling and control procedures for IP over optical networks. We focus on the IP-centric signaling and control architecture based on the generalized multi-protocol label switching (GMPLS) protocol and analyze various scenarios and technical issues for deploying the IP over an optical network. We analyze the signaling and operations and administration and maintenance requirements for integrating an IP network and an optical network in order to cope with the high bandwidth and poor resource granularity of the optical network, including the optical cross-connect system. On the basis of network architecture and a reference configuration model, we investigate the GMPLS-based control architecture and interconnection model appropriate for controlling IP bandwidth and optical lambda resources. The signaling and control procedure based on GMPLS on optical user-network interface and network-network interface are comparatively investigated to provide the optical lightpath. We also study protection and restoration procedures to protect link failure when it applies to generalized MPLS signaling.

  • PDF

Experimental Evaluation of Data Broadcast Storm in Vehicular NDN (차량 엔디엔 네트워크 안에 데이터 폭증 현상 실험적 평가)

  • Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.940-945
    • /
    • 2021
  • Future network architectures such as Named Data Networking (NDN) were born to change the way data can be transmitted from current host-centric network technologies to information-centric network technologies. Recently, many studies are being conducted to graft Vehicular NDN to the communication network technology of smart vehicles including connected vehicles. Explosion of data traffic due to Interest/Data packet broadcasting in Vehicular NDN environment is a very important problem to be solved in order to realize VNDN-based data communication. In this paper, the generation of data packet copies according to the increase in network size, vehicle speed, and frequency of interest packets in VNDN network is simulated and evaluated using ndnSIM, in order to show how severe the data broadcast storm phenomenon. The CDP(Copies of Data Packets) increased proportionally in the increase of network size or Interest frequency.

Delay Attenuation LFU (DA-LFU) Cache Replacement Policy to Improve Hit Rates in CCN (CCN에서 적중률 향상을 위한 지연감쇠 LFU(DA-LFU) 캐시 교체 정책)

  • Ban, Bin;Kwon, Tae-Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.3
    • /
    • pp.59-66
    • /
    • 2020
  • Content Centric Network(CCN) with architecture that is completely different from traditional host-based networks has emerged to address problems such as the explosion of traffic load in the current network. Research on cache replacement policies is very active to improve the performance of CCN with the characteristics that all routers cache on the network. Therefore, this paper proposes a cache replacement policy suitable for situations in which popularity is constantly changing, taking into account the actual network situation. In order to evaluate the performance of the proposed algorithm, we experimented in an environment where the popularity of content is constantly changing, and confirmed that we are superior to the existing replacement policy through comparing hit rates and analyzing server load.

Discovering Temporal Work Transference Networks from Workflow Execution Logs

  • Pham, Dinh-Lam;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.101-108
    • /
    • 2019
  • Workflow management systems (WfMSs) automate and manage workflows, which are implementations of organizational processes operated in process-centric organizations. In this paper, wepropose an algorithm to discover temporal work transference networks from workflow execution logs. The temporal work transference network is a special type of enterprise social networks that consists of workflow performers, and relationships among them that are formed by work transferences between performers who are responsible in performing precedent and succeeding activities in a workflow process. In terms of analysis, the temporal work transference network is an analytical property that has significant value to be analyzed to discover organizational knowledge for human resource management and related decision-making steps for process-centric organizations. Also, the beginning point of implementinga human-centered workflow intelligence framework dealing with work transference networks is to develop an algorithm for discovering temporal work transference cases on workflow execution logs. To this end, we first formalize a concept of temporal work transference network, and next, we present a discovery algorithm which is for the construction of temporal work transference network from workflow execution logs. Then, as a verification of the proposed algorithm, we apply the algorithm to an XES-formatted log dataset that was released by the process mining research group and finally summarize the discovery result.

Radio Link Modem System Architecture Design for Korean Tactical Data Link System Implementation (한국형 전술데이터링크 시스템 구현을 위한 무선모뎀 시스템 설계)

  • Choi, Hyo-Ki;Jang, Ho-Joon;Song, Young-Hwan;Jang, Dhong-Woon;Joo, Jae-Woo;Seo, Nan-Sol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.6
    • /
    • pp.789-796
    • /
    • 2013
  • Next Generation Weapon system from the center of the platform to share information in real-time Network Centric Warfare(NCW: Network Centric Warfare) has been changed. Data link system is defined as a network. That is, all in real-time battlefield information is to enable sharing. Data link system is classified as a precision strike, Monitoring/control, control of a Patriot missile battery systems. These systems are most effective in a Joint warfare and precision strike. Data Link Systems(Data Communications) implementation is accomplished by using the KDLM(Korean Data Link Modem) and Radio Transceiver. KDLM is operated in conjunction with the legacy Radios(re-using fielded HF/VHF/UHF radio systems). In this paper, we describe in terms of KDLM system design. In this paper, the proposed design structure is how to effectively interact with legacy various radio. First, The results provide an analysis of that Dynamic TDMA system and apply modem structure. Radio characteristics data are necessary for an effective TDMA system design. This article analyzes the test results and describes the structure to improve the receive performance.

Development of Information Technology for Smart Defense (Smart Defense 를 위한 IT 기술 개발)

  • Chung, Kyo-Il;Lee, So Yeon;Park, Sangjoon;Park, Jonghyun;Han, Sang-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.323-328
    • /
    • 2014
  • Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication & Computer, Intelligence), ISR(Intelligence, Surveillance & Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.