• Title/Summary/Keyword: Internet network investment

Search Result 47, Processing Time 0.024 seconds

An Empirical Study on the Construction Strategy of Web-caching Network (효과적인 웹-캐싱 네트웍 구축전략에 관한 실증 연구)

  • 이주헌;조병룡
    • The Journal of Information Technology and Database
    • /
    • v.8 no.2
    • /
    • pp.41-60
    • /
    • 2001
  • Despite the growth in Internet users, demand for multi-medial, large data files and resulting explosive growth in data traffic, there has been lack of investment in Middle-Mile, interconnection of various networks, resulting in bottleneck effect, which is acerbating. One strategy to overcome such network bottleneck is Content Delivery Network (CDN). CDN does not achieve efficient delivery of large file data through physical improvement/increase in network capacity, but by delivering large file contents, the cause of bottlenecks, from distributed servers. Since it is impracticable to physically improve networks capacity to accommodate the growth in internet traffic, CON, by strong CPs contents at cache servers deployed at major ISPs networks, is able to deliver requested contents to the requesting Web clients without the loss of data and long latency.

  • PDF

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

Traffic Engineering with Segment Routing under Uncertain Failures

  • Zheng, Zengwei;Zhao, Chenwei;Zhang, Jianwei;Cai, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2589-2609
    • /
    • 2021
  • Segment routing (SR) is a highly implementable approach for traffic engineering (TE) with high flexibility, high scalability, and high stability, which can be established upon existing network infrastructure. Thus, when a network failure occurs, it can leverage the existing rerouting methods, such as rerouting based on Interior Gateway Protocol (IGP) and fast rerouting with loop-free alternates. To better exploit these features, we propose a high-performance and easy-to-deploy method SRUF (Segment Routing under Uncertain Failures). The method is inspired by the Value-at-Risk (VaR) theory in finance. Just as each investment risk is considered in financial investment, SRUF also considers each traffic distribution scheme's risk when forwarding traffic to achieve optimal traffic distribution. Specifically, SRUF takes into account that every link may fail and therefore has inherent robustness and high availability. Also, SRUF considers that a single link failure is a low-probability event; hence it can achieve high performance. We perform experiments on real topologies to validate the flexibility, high-availability, and load balancing of SRUF. The results show that when given an availability requirement, SRUF has greater load balancing performance under uncertain failures and that when given a demand requirement, SRUF can achieve higher availability.

Study on Effective Management of Heterogeneous Networks (이기종 네트워크의 효율적 관리에 연구)

  • Cho, Sok-Pol
    • The Journal of Information Technology
    • /
    • v.8 no.3
    • /
    • pp.131-142
    • /
    • 2005
  • The principles on which the Internet was designed and has evolved were first laid out in an explicit way 20 years age. The basic principle is that in layered communications network such as the Internet, functions should always be implemented at the end systems whenever the option exists. This applies to all functions that can be implemented either in the network or at the end systems. End-to-end arguments have recently been reexamined as the Internet and its uses have evolved, and a new set of requirements has begun to emerge. In addition to these, it add a new, and perhaps more important, requirement to this list in the case of heterogeneous networks: the proliferation of unpredictable wireless networks. Wireless networks must cope with dynamic link conditions not present in wired infrastructures, which place a heavy burden on quality of service management solutions. Managing QoS in the face of constantly changing operating conditions demands dynamic management approaches that span multiple layers in the protocol stack. Such as cross-layer design approaches have recently received attention in the context of cellular and mobile special networks. This article introduce the notion of network predictability and describe its relationship to achievable QoS. This relationship is used to propose a framework for cross layer design that can be used to guide development efforts and direct investment decisions for future networks.

  • PDF

A Case Study on Partnership Types between Network Operators & Netflix: Based on Corporate Investment Model

  • Minzheong, Song
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.14-26
    • /
    • 2020
  • We categorize partnership types between network operators and a global video streaming or over-the-top service provider, Netflix from 2011 to the first quarter 2018. The options are based on the integration of over-the-top (OTT), Netflix with pay TV and telecommunication operators in the form of carrier billing, access to over-the-top (OTT) via devices or the development of their tariff plans. Options of the Type 3, 'cooperation' or the Type 4, 'agreement' entails a kind of the technical involvement between two partners and commercial agreement. The types of partnership are evolving from one to others. Some partnerships have characteristics of more than one type. The majority of technical or service integration cooperation of Type 3 entail bundling and marketing promotion of Type 2 and Type 1. Similarly, the 'agreement' of Type 4, co-branded or white-label service initiative entail tariff or device user interface (UI) integration of the 'cooperation' of Type 3 and joint marketing initiatives of Type 1.

Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks

  • Alruwaili, Rahaf Hamoud;Alanazi, Haifa Khaled;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.303-309
    • /
    • 2022
  • Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.

Modern Study on Internet of Medical Things (IOMT) Security

  • Aljumaie, Ghada Sultan;Alzeer, Ghada Hisham;Alghamdi, Reham Khaild;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.254-266
    • /
    • 2021
  • The Internet of Medical Things (IoMTs) are to be considered an investment and an improvement to respond effectively and efficiently to patient needs, as it reduces healthcare costs, provides the timely attendance of medical responses, and increases the quality of medical treatment. However, IoMT devices face exposure from several security threats that defer in function and thus can pose a significant risk to how private and safe a patient's data is. This document works as a comprehensive review of modern approaches to achieving security within the Internet of Things. Most of the papers cited here are used been carefully selected based on how recently it has been published. The paper highlights some common attacks on IoMTs. Also, highlighting the process by which secure authentication mechanisms can be achieved on IoMTs, we present several means to detect different attacks in IoMTs

An Analysis of the Economic Effects on the Project to Construct Smart Network (스마트 네트워크 구축사업의 경제적 파급효과 분석)

  • Jeong, Woo-Soo;Kim, Sa-Hyuk
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.61-71
    • /
    • 2011
  • The Smart Network Project is planned for achieving the Internet advanced country by adjusting the Government Future Internet Development as a national agenda. The future Internet is defined as diverse alternative technology and services that can provide optimal services for individual characteristic and situation in anywhere, anytime throughout convergence of communication, broadcasting, and computing to solve the current limitation of the Internet. This paper is to analyze the economic effects of the smart network build-up. For the economic effect analysis, we reclassified the smart network industry classification system and re-drew up 2011 Inter-industry Relations Table by using the Inter-industry Relations Table issued by the Bank of Korea and the RAS techniques. And we analyzed the economic effects that can be drawn from the investment of the smart network industry. As a result, the gross production inductive effect which appears with the economic effect of the smart network establishment project from 2011 to 2015 came out to be about 72 trillion 808.2 billion KW, added value inductive effect of 44 trillion 192.9 billion KW and the employment inductive effect of the job creation of about 412 thousands people. Afterward, it is anticipated that the smart network build-up project to contribute to the improvement of Koreans' daily life. Moreover, this research will be used as a valued basic material in the pursuit of the future network projects.

The Algorithm Design and Implementation of the Internet Statistics System for using the Robot Agent (로봇에이전트를 이용한 인터넷 주요 통계산출 알고리즘 설계 및 구현)

  • Kim, Weon;Chin, Yong-Ohk;Song, Khwan-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.43-46
    • /
    • 2001
  • This thesis proposes the design method of intelligent robot agent system and deals with the implementation of the system which is able to produce key internet statistics. It is believed that the statistics lead to effective investment from internet industry on its development. The system consists of robot agent process module, statistics production module and management module, and has an algorithm that can produce periodically the number of domestic homepages, active domain using .kr or gTLD and intenet hosts. It provides the result of the implementation and performance of the system as well.

  • PDF

A Pricing Scheme in Networked Computing System with Priority

  • Kim, Hyoun-Jong;Juhn, Jae-Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.302-305
    • /
    • 2000
  • The operation of a networked computing system (NCS), such as Internet, can be viewed as a resource allocation problem, and can be analyzed using the techniques of mathematical modeling. We define a general NCS and translate that setup into a model of an economy. The preferences of users are taken as primitives, and servers in the network are viewed as productive firms with priority input queues. Each sewer charges a rental price for its services by priority class. We characterize optimal system allocation, and derive formulae for supporting rental prices and priority premia such that the aggregated individual user demands do not exceed optimal levels and waiting-time expectations are correct. Our economic approach has the added benefit of providing a sound basis for evaluating NCS investment alternatives, using a process analogous to free entry and exit in free-enterprise economies.

  • PDF