• Title/Summary/Keyword: Internet (Network)

Search Result 7,307, Processing Time 0.043 seconds

인터넷 패션정보 확산에서 네트워크 특성의 영향에 관한 연구 (A Study on the Influences of Network Features on the Diffusion of Internet Fashion Information)

  • 송기은;황선진
    • 복식
    • /
    • 제63권2호
    • /
    • pp.1-13
    • /
    • 2013
  • The purpose of this study is to examine how the features of network in the Internet fashion community affect the diffusion of fashion information to members in the online community with other variables (informative features, consumer features). Communities that actively exchange fashion information among their members were selected for the social network analysis and hypothesis verification. As a result, we found that a few information activists influenced most of the information receivers in the network features of fashion communities. Also, we found that the informative features (usefulness, reliability), consumer features (NFC, innovation) as well as the network features (connectivity, power), have a significant influence on the diffusion of Internet fashion information which verified the importance of the network features in the study on the Internet.

사물인터넷 환경에서 소셜 네트워크를 기반으로 한 정보 추천 기법 (Recommendation Technique using Social Network in Internet of Things Environment)

  • 김성림;권준희
    • 디지털산업정보학회논문지
    • /
    • 제11권1호
    • /
    • pp.47-57
    • /
    • 2015
  • Recently, Internet of Things (IoT) have become popular for research and development in many areas. IoT makes a new intelligent network between things, between things and persons, and between persons themselves. Social network service technology is in its infancy, but, it has many benefits. Adjacent users in a social network tend to trust each other more than random pairs of users in the network. In this paper, we propose recommendation technique using social network in Internet of Things environment. We study previous researches about information recommendation, IoT, and social IoT. We proposed SIoT_P(Social IoT Prediction) using social relationships and item-based collaborative filtering. Also, we proposed SR(Social Relationship) using four social relationships (Ownership Object Relationship, Co-Location Object Relationship, Social Object Relationship, Parental Object Relationship). We describe a recommendation scenario using our proposed method.

차량인터넷에서 지능형 서비스 제공을 위한 지식베이스 설계 및 구축 (Design and Implementation of a Knowledge Base for Intelligence Service in IoV)

  • 류민우;차시호
    • 디지털산업정보학회논문지
    • /
    • 제13권4호
    • /
    • pp.33-40
    • /
    • 2017
  • Internet of Vehicles (IoV) is a subset of Internet of Things (IoT) and it is an infrastructure for vehicles. Therefore, IoV consists of three main network including inter-vehicle network, intra-vehicle network, and vehicular mobile internet. IoV mainly used in urban traffic environment to provide network access for drivers, passengers and traffic management. Accordingly, many research works have focused on network technology. But, recent concerted efforts in academia and industry point to paradigm shift in IoV system. In this paper, we proposed a knowledge base for intelligence service in IoV. A detailed design and implementation of the proposed knowledged base is illustrated. We hope this work will show power of IoV as a disruptive technology.

VPN의 최근 산업계 동향 (Recent Industrial Developments of VPN(Virtual Private Network))

  • 황성운;최영배;이준석;윤기송;김명준
    • 전자통신동향분석
    • /
    • 제14권6호통권60호
    • /
    • pp.74-86
    • /
    • 1999
  • VPN (Virtual Private Network) is an effort to get some of the advantages of public network – cost saving, scalability, flexibility, and efficient network management as well as some advantages of private dedicated network – fast speed and less security threats. We introduce protocols to implement VPN, pros and cons of VPN, and its application areas. We also explain some tasks and classification criteria that should be considered in deploying VPN, available commercial products and recent industrial trends of VPN.

A Study of Advanced Internet Strategy for Future Industry

  • Park, Jae-Kyung;Lee, Hyung-Su;Kim, Young-Ja
    • 한국컴퓨터정보학회논문지
    • /
    • 제25권4호
    • /
    • pp.87-95
    • /
    • 2020
  • 본 논문에서는 향후 네트워크 서비스의 발전 및 네트워크 대역폭 확대에 따른 현재의 인터넷이 가지고 있는 문제점을 살펴보고 이를 고도화할 수 있는 방안에 대해 제안한다. 현재의 인터넷은 TCP/IP로 구성되어 오랜 시간 사용되어 왔으나 대역폭, 전송량, 보안 등의 근본적인 문제가 해결되지 않아 지속적인 투자 및 유지보수를 통해 미래 네트워크를 대비하여야 한다. 이를 극복하기 위해 현재의 인터넷 프로토콜을 차세대 네트워크로 변환하여 이러한 문제를 극복하고 고도화할 수 있는 방안을 제시하고자 한다. 현재 차세대 네트워크에 대한 많은 연구가 이루어지고 있으나 국내에는 이러한 연구가 많이 이루어지지 않고 있으며 국가적인 차원에서 미래의 인터넷 서비스 산업 발전을 위해 차세대 네트워크에 대한 연구는 매우 중요한 과제일 것이다. 본 논문에서는 다양한 차세대 프로토콜을 통한 장점을 통해 고도화된 인터넷 환경을 제안하고자 한다.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

A Study of Time Synchronization Methods for IoT Network Nodes

  • Yoo, Sung Geun;Park, Sangil;Lee, Won-Young
    • International journal of advanced smart convergence
    • /
    • 제9권1호
    • /
    • pp.109-112
    • /
    • 2020
  • Many devices are connected on the internet to give functionalities for interconnected services. In 2020', The number of devices connected to the internet will be reached 5.8 billion. Moreover, many connected service provider such as Google and Amazon, suggests edge computing and mesh networks to cope with this situation which the many devices completely connected on their networks. This paper introduces the current state of the introduction of the wireless mesh network and edge cloud in order to efficiently manage a large number of nodes in the exploding Internet of Things (IoT) network and introduces the existing Network Time Protocol (NTP). On the basis of this, we propose a relatively accurate time synchronization method, especially in heterogeneous mesh networks. Using this NTP, multiple time coordinators can be placed in a mesh network to find the delay error using the average delay time and the delay time of the time coordinator. Therefore, accurate time can be synchronized when implementing IoT, remote metering, and real-time media streaming using IoT mesh network.

회귀변수 선택절차를 이용한 인터넷통신 네트워크 품질특성과 고객만족도의 관계 실증분석 (Empirical Analysis of Relationship between Internet Communication Network Quality Characteristics and Customer Satisfaction using Regression Variable Selection Procedures)

  • 박성민;박영준
    • 산업공학
    • /
    • 제18권3호
    • /
    • pp.253-267
    • /
    • 2005
  • Customer satisfaction becomes one of the important managerial concerns associated with corporate competency in current competitive environment for Internet communication service companies. Hence, it is demanding to improve a company's customer satisfaction through the total quality management perspective. In practice, engineers as well as the management hope to find major quality characteristics with Internet communication network that is closely related to customer satisfaction, consequently aiming to the raise of their company's customer satisfaction. This paper presents an empirical relationship analysis between network quality characteristics and customer satisfaction on Internet communication. Methodologically, the relationship analysis framework is based on the regression variable selection procedures. In this framework, it is implemented that; 1) iterative model building; and 2) consistent criteria application to statistical tests for selecting significant variables. A case study shows that; 1) the customer satisfaction on the network connection seems to be more closely related to the network quality characteristics compared with the customer satisfaction on the network speed; and 2) the download disconnection rate has relatively evident relationship with the customer satisfaction on the network connection.

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

철도차량에서의 무선인터넷 환경 구축 (Building up a Wireless Network Infrastructure for Rolling-Stock)

  • 이용철;김동일;전상훈
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2010년도 춘계학술대회 논문집
    • /
    • pp.850-856
    • /
    • 2010
  • With skyrocketing number of people who use smartphone, the technology of wireless internet that is mobile-phone, Wi-Fi, Wibro, HSDPA has been developed remarkably. The environment that one can use wireless internet easily and inexpensively anywhere has been made. So, the customer of railway have needs and desire that could use the wireless internet network as travelling in rolling-stock. Although KTX, KTX-II and some subway agency has built-up wireless internet network and serviced it, it's closed infra and inconvenient environment has been criticized. So, we survey the wireless internet network that is serviced at present and the way to build wirelee internet infra to satisfy the needs of customers.

  • PDF