• Title/Summary/Keyword: Network environments

Search Result 2,288, Processing Time 0.035 seconds

Design of Network Protocols for Distributed Virtual Environments (분산 가상 환경을 위한 네트워크 프로토콜의 설계)

  • Ko, Dong-Il;Choi, Yang-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.1-11
    • /
    • 2000
  • Recently, the explosive popularity of Internet gave birth to researches on Distributed Virtual Environments(DVE). They aim at providing a shared application data environment at realtime for users participating in the same application session across Internet. As more users join the session, and as more multimedia data are shared, because of network resource limitation, it is more difficult to maintain the quality of DVE, such as users' satisfaction level. Previous works mainly tried to solve the scalability, synchronization and data transport issues at the application level, with limited success. We suggest a new network centric solution, that consists of a novel network architecture and protocols upon which any large-scale DVE application can be easily developed. The performance of the proposed scheme, called GAIA, is verified by simulation.

  • PDF

A Study on Establishing a Hub Port in Northeast Asia through the Reconsideration of the Maritime Network Management of Jang BoGo (장보고의 해양네트워크 경영의 재조명을 통한 동북아 허브항만 구축에 관한 연구)

  • Pak, Myong-Sop
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.27
    • /
    • pp.69-95
    • /
    • 2005
  • East Asia has played an important role in the economic and social development in the Asian pacific region and in the global arena. In the region the impact of companies centralizing their logistics activities around a few distribution centers has already led some leading ports such as Singapore, Hong Kong to transform and expand their functions and business activities to provide port users with value added logistics services. Other ports in the region also have an important part to play in the total logistics Chain. In these environments, the maritime activities of Jang BoGo, who was the maritime king of the commercial maritime empire in East Asia in the 9th century, give many implications to the international logistics network strategy that Korea has to take in order to become a power of International Logistics. Though the trading and economic environments at that time may be quite different from today, the super-national maritime management pattern that Jang Bo-go, founder of the Northeast Asian maritime trading kingdom devised, gives us many implications in the global trading and economic environments, in the respects of overseas direct investment and international logistics. Accordingly, the paper aims to examine the establishment of hub port in Northeast Asia, modelled after the maritime network management strategy of Jang BoGo.

  • PDF

A Study on Security Framework in Digital Home Environments (디지털홈 환경에서의 보안 프레임워크 연구)

  • 김도우;한종욱;주홍일;이윤경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.724-727
    • /
    • 2004
  • With the development of modem communication and networking technology, more and more computing and communication facilities, automation equipments, hone information appliances and different type of networking terminals come into home all over the world. The user can control information appliances in home environments. The home environment can communicate with the external network via phone line, wired LAN, wireless LAN, or mixed. However, home information appliances that are connected to the external network are under attack and need to be secured. So specifying suitable security requirements and policies for digital home environment is critical in hone networking environments. This paper analyzes the possible vulnerability to home network, and specifies the security requirements derived from the vulnerability analysis for digital home environment

  • PDF

Analyses of Wireless Network Security in Heterogeneous Environments (이종 시스템 환경하에서의 무선 네트워크의 보안 대책)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.717-720
    • /
    • 2007
  • With the convergence of mobile devices and the Internet ubiquitous computing promises to revolutionalize the way that we access services and run application. However, ubiquitous computing environments, in particular, mobile and wireless environments interfaced with the Internet, currently possess security vulnerabilities that are ripe for attack from cyber-threats. Thus, this paper discusses the Limitation of current security mechanisms in ubiquitous computing environments

  • PDF

Fault-tolerant ZigBee-based Automatic Meter Reading Infrastructure

  • Hwang, Kwang-Il
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.221-228
    • /
    • 2009
  • Due to low cost, low-power, and scalability, ZigBee is considered an efficient wireless AMR infrastructure. However, these characteristics of ZigBee can make the devices more vulnerable to unexpected error environments. In this paper, a fault-tolerant wireless AMR network (FWAMR) is proposed, which is designed to improve the robustness of the conventional ZigBee-based AMR systems by coping well with dynamic error environments. The experimental results demonstrate that the FWAMR is considerably fault-tolerant compared with the conventional ZigBee-based AMR network.

Efficient Network Structure Using UAV Squad In DTN (DTN에서 UAV 편대를 이용한 효율적인 네트워크 구조)

  • Dho, Yoon-hyung;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.907-909
    • /
    • 2016
  • In this peper, we proposed efficient network structure using UAV squad in DTN. In Delay Tolerant Network(DTN), the routing protocols adopting store-carry-forward method are used for solving network problem occurred by the unstable network environments. This routing method is useful for work in disaster and battle field so many researches are in progress. This paper is part of that, we use UAV squad in DTN which is dynamic environments for efficient network structure. Propsed measure use environment information in disparate sensor node and organize UAV squad for stable network.

  • PDF

Event Driven Service with Unified Identification for Next Generation Network

  • Kim, Dong-Il;Lee, Soong-Hee;Kim, Ki-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.502-507
    • /
    • 2010
  • Event driven service (EDS) is one of such services administrating different functions of multiple service providers according to the user situation. This paper first describes the service model of EDS, a User-centric Service for multiple service provider environments over the next generation networks. The multiple provider environments stimulates the unified identifier management, namely unified identification (U-ID), to enable users to be provided network services without awareness of multiple providers. Combining these two concepts, i.e., EDS and U-ID, the designed structure of EDS with U-ID and related procedures are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.

Complete Coverage Path Planning of Cleaning Robot

  • Liu, Jiang;Kim, Kab-Il;Son, Young-I.
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.429-432
    • /
    • 2003
  • In this paper, a novel neural network approach is proposed for cleaning robot to complete coverage path planning with obstacle avoidance in stationary and dynamic environments. The dynamics of each neuron in the topologically organized neural network is characterized by a shunting equation derived from Hodgkin and Huxley's membrane equation. There are only local lateral connections among neurons. The robot path is autonomously generated from the dynamic activity landscape of the neural network and the previous robot location without any prior knowledge of the dynamic environment.

  • PDF

ID-based group key exchange mechanism for virtual group with microservice

  • Kim, Hyun-Jin;Park, Pyung-Koo;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.932-940
    • /
    • 2021
  • Currently, research on network functions virtualization focuses on using microservices in cloud environments. Previous studies primarily focused on communication between nodes in physical infrastructure. Until now, there is no sufficient research on group key management in virtual environments. The service is composed of microservices that change dynamically according to the virtual service. There are dependencies for microservices on changing the group membership of the service. There is also a high possibility that various security threats, such as data leakage, communication surveillance, and privacy exposure, may occur in interactive communication with microservices. In this study, we propose an ID-based group key exchange (idGKE) mechanism between microservices as one group. idGKE defines the microservices' schemes: group key gen, join group, leave group, and multiple group join. We experiment in a real environment to evaluate the performance of the proposed mechanism. The proposed mechanism ensures an essential requirement for group key management such as secrecy, sustainability, and performance, improving virtual environment security.

Artificial Neural Network Modeling for Photovoltaic Module Under Arbitrary Environmental Conditions (랜덤 환경조건 기반의 태양광 모듈 인공신경망 모델링)

  • Baek, Jihye;Lee, Jonghwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.4
    • /
    • pp.110-115
    • /
    • 2022
  • Accurate current-voltage modeling of solar cell systems plays an important role in power prediction. Solar cells have nonlinear characteristics that are sensitive to environmental conditions such as temperature and irradiance. In this paper, the output characteristics of photovoltaic module are accurately predicted by combining the artificial neural network and physical model. In order to estimate the performance of PV module under varying environments, the artificial neural network model is trained with randomly generated temperature and irradiance data. With the use of proposed model, the current-voltage and power-voltage characteristics under real environments can be predicted with high accuracy.