• Title/Summary/Keyword: Internet (Network)

Search Result 7,275, Processing Time 0.041 seconds

Modeling the Spread of Internet Worms on High-speed Networks (고성능 네트워크에서 인터넷 웜 확산 모델링)

  • Shin Weon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.839-846
    • /
    • 2005
  • Recently broadband convergence network technology is emerging as an integrated network of telecommunication, broadcasting and Internet. But there are various threats as side effects against the growth of information technology, and malicious codes such af Internet worms may bring about confusions to upset a national backbone network. In this paper, we survey the traditional spreading models and propose a new worm spreading model on Internet environment. We also analyze the spreading effects due to tile spread period and the response period of Internet worms. The proposed model leads to a better prediction of the scale and speed of worm spreading. It can be applied to high-speed network such as broadband convergence network.

Effective Streaming technology of a layered encoding Video Application supporting QoS mechanism in the Internet

  • Seok, Joo-Myoung;Lee, Kyou ho;Suh, Doug-Young
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.2075-2078
    • /
    • 2002
  • Internet became the most popular network in spite of its weakness in realtime multimedia service. Many experts believe that the Internet has the potential to become the main multimedia distribution network of the near future. Currently, it does not provide any (BoS guarantees and, even when it does, guaranteed quality delivery of video may turn out to be too expensive. Unavoidable packet losses and delay jitter caused by congestion in a best effort delivery environment require use of intelligent transport techniques for effective video delivery. According to market needs of better quality of service (QoS) fur realtime multimedia services over Internet, they have been standardizing RSVP, IntServ, and DiffServ This paper combines the benefits of QoS mechanisms such as RSVP/IntServ with scalable video encoding. We propose that more important bit stream is given more priority such that limited network resources are guaranteed far the stream. Various prioritizing approaches are proposed and compared to normal approach by using Network Simulator. The calculated QoS parameters such as packet loss rate are used to calculate degree of degradation in video quality. In this Paper, proposed methods can be implemented adaptively to Von protocol, such as H.323, SIP.

  • PDF

The Network Externality In Korean Wireless Internet Market (무선 인터넷 시장의 네트워크 외부성 분석)

  • 정동헌;김성민
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.425-428
    • /
    • 2002
  • To understand and forecast the wireless internet market in Korea, we will analyse the network externalities in wireless internet market into communication network externalities and hardware/software network externalities. The wireless market has two competing streams, one is mobile internet and the other is wireless fan internet. Both are characterized by strong network externalities which lead to increasing return to stale. Mobile internet is supposed more suitable for communication and WLAN for data. However these two system will compete in some area, and the critical factor to deride the winner is supposed to be the network externalities as in so many other high-tech industries had showed.

  • PDF

MRU-Net: A remote sensing image segmentation network for enhanced edge contour Detection

  • Jing Han;Weiyu Wang;Yuqi Lin;Xueqiang LYU
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.12
    • /
    • pp.3364-3382
    • /
    • 2023
  • Remote sensing image segmentation plays an important role in realizing intelligent city construction. The current mainstream segmentation networks effectively improve the segmentation effect of remote sensing images by deeply mining the rich texture and semantic features of images. But there are still some problems such as rough results of small target region segmentation and poor edge contour segmentation. To overcome these three challenges, we propose an improved semantic segmentation model, referred to as MRU-Net, which adopts the U-Net architecture as its backbone. Firstly, the convolutional layer is replaced by BasicBlock structure in U-Net network to extract features, then the activation function is replaced to reduce the computational load of model in the network. Secondly, a hybrid multi-scale recognition module is added in the encoder to improve the accuracy of image segmentation of small targets and edge parts. Finally, test on Massachusetts Buildings Dataset and WHU Dataset the experimental results show that compared with the original network the ACC, mIoU and F1 value are improved, and the imposed network shows good robustness and portability in different datasets.

Integrated Security Management Framework for Secure Networking

  • Jo, Su-Hyung;Kim, Jeong-Nyeo;Sohn, Sung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2174-2177
    • /
    • 2003
  • Internet is exposed to network attacks as Internet has a security weakness. Network attacks which are virus, system intrusion, and deny of service, put Internet in the risk of hacking, so the damage of public organization and banking facilities are more increased. So, it is necessary that the security technologies about intrusion detection and controlling attacks minimize the damage of hacking. Router is the network device of managing traffic between Internets or Intranets. The damage of router attack causes the problem of the entire network. The security technology about router is necessary to defend Internet against network attacks. Router has the need of access control and security skills that prevent from illegal attacks. We developed integrated security management framework for secure networking and kernel-level security engine that filters the network packets, detects the network intrusion, and reports the network intrusion. The security engine on the router protects router or gateway from the network attacks and provides secure networking environments. It manages the network with security policy and handles the network attacks dynamically.

  • PDF

Design and Implementation of Cable Data Subscriber Network Management System for High Speed Internet Service (초고속 인터넷서비스를 위한 케이블 데이터 가입자 망관리 시스템 설계 및 구현)

  • Yun Byeonh-Soo;Ha Eun-Ju
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.87-98
    • /
    • 2004
  • There are several types of distributed subscribers network using Asymmetric Digital Subscriber Line (ADSL), Very high-bit rate Digital Subscriber Line (VDSL), and Data Over Cable Service Interface Specifications (DOCSIS), The efficient and concentrated network management of those several distributed subscribers networks and resources require the general information model of network, which has abstract and conceptional managed objects independent of type of network and its equipment to manage the integrated subscriber network, This paper presents the general Internet subscribers network modeling framework using RM-ODP (Reference Model Open Distributed Processing) to manage that network In the form of integrated hierarchy, This paper adopts the object-oriented development methodology with UML (Unified Modeling Language) and designs and implements the HFC network of DOCSIS as an example of the subscriber network.

  • PDF

A Study on Network Architecture for Next Generation Optical Internet based DWDM (DWDM 기반의 차세대 광 인터넷 구조에 관한 연구)

  • 배정현;송현수;이재동;김성운
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.496-507
    • /
    • 2003
  • Rapidly increasing Internet traffic demands require IP protocol based on high quality networking technology. Accordingy, our Internet has evolved from best-effort service toward differentiated service framework so as to implement QoS as prerequisite to a series of new applications. In addition, it is forecasted that existing transport network will be reorganized into DWDM-based optical Internet sooner or later under the influence of Internet demands for higher bandwidth based on QoS. This study shows a way to an effective implementation in some aspects: QoS implementation on DWDM-based optical Internet network, control protocol, backbone network architecture and switching technology for the Next Generation Internet (NGI).

  • PDF

A Study on the Charge of Using the Internet Network - Focusing on U.S. Internet History and Charter Merger Approval Conditions Litigation - (인터넷 망 이용의 유상성에 대한 고찰 - 미국 인터넷 역사 및 Charter 합병승인조건 소송 중심으로 -)

  • Cho, Dae-Keun
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.123-134
    • /
    • 2021
  • This paper suggests that the Internet is not free through analysis of U.S. Internet history and lawsuits related to the Charter merger in 2016. Generally speaking, the players in internet connectivity market agree to Non-Disclosure Agreement, when connecting their facilities and networks each other. So, I adopted the case study & analysis as research methodologies due to limitation of collecting the transaction data between them. The former finds that Internet access has never been free in U.S Internet history. As we know, some including Content Providers(CPs) argue that the Internet is a free network and there are many cases to use the internet for free, so they came to conclusion that ISPs have no right to charge the users like CPs. This study refutes these arguments in two ways. One is that using the internet has never been free. From ARPANET, known as the beginning of the U.S. Internet, to the commercialization of backbone, no Internet has been considered or implemented for free since the early Internet network was devised. Also, the U.S government was paying subsidies or institutions were paying fees to secure network operations for the NSFNET backbone. the other is that "free peering" refers to barter transactions between ISPs, not to free access to counterpart internet networks. Second, this study analyze the FCC' executive order of conditioned merger approval and the court's related ruling and verify that using the internet is not free. According to the analysis, this study finds that it's real situation to make paid settlements between ISP-CPs (including OTTs) in the US Internet market at the moment. This study concludes that the Internet has never been free in terms of its technical characteristics, network structure, network operation, and system. Also it proposes how to improve the domestic settlement system between ISPs-CPs in terms of policy and regulation.

A Study of Internet Worm Detection & Response Method Using Outbound Traffic (OutBound 트래픽을 이용한 인터넷 웜 탐지 및 대응 방안 연구)

  • Lee, Sang-Hun
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.75-82
    • /
    • 2006
  • Internet worm gives various while we paralyze the network and flow the information out damages. In this paper, I suggest the method to prevent this. This method detect internet worm in PC first. and present the method to do an automatic confrontation. This method detect a traffic foundation network scanning of internet worm which is the feature and accomplish the confrontation. This method stop the process to be infected at the internet worm and prevent that traffic is flowed out to the outside. and This method isolate the execution file to be infected at the internet worm and move at a specific location for organizing at the postmortem so that we could accomplish the investigation about internet worm. Such method is useful to the radiation detection indication and computation of unknown internet worm. therefore, Stable network operation is possible through this method.

  • PDF

Analysis of Structure and Content of Entertainment OTT: Focus on WWE Network (엔터테인먼트 OTT 구조와 콘텐츠의 분석: WWE Network를 중심으로)

  • Han, Sukhee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.41-51
    • /
    • 2019
  • This study explores the structure and the content of WWE Network, an entertainment Over The Top(OTT) produced in the United States. These days, a lot of companies all around the globe provide Internet streaming service OTT, and Netflix could be a great example of that. This study focuses on researching WWE Network of World Wrestling Entertainment(WWE). WWE Network is distinguished in a way that it is based on wrestling which combines sport and entertainment, and it is a suitable subject as it is not of wide range. Through this, it not only studies the structure and the content of WWE Network, but also explores the general market of OTT.