• Title/Summary/Keyword: Networking Capabilities

Search Result 72, Processing Time 0.029 seconds

Coarse grained Simulation Model for Web Application Performance Analysis (웹 애플리케이션 성능 분석을 위한 대략적 시뮬레이션 모델)

  • Kim, Yong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.25-31
    • /
    • 2008
  • The web has been evolving as an indispensable part of our lives since Berners Lee introduced the first web sever and browser in 1990. From the web end user's point of view, the response time is a matter of concern. Moreover the throughput is an important factor to consider for the system manager's point as well. It's not easy to estimate the performance of a web application because it depends on various elements comprising the whole operational environment of the Internet from networking, client and server computing powers, DBMS and OS capabilities, to application itself. This paper suggests a coarse grained simulation model for web application performance estimation based on the data measured by Buch and Pentkowski [1] and the analytical model proposed by Gunther [2]. The result of the simulation model almost coincides with the measured data and estimates the performance of a new environment.

  • PDF

Performance Evaluation of Label Switching in ATM networks. (ATM 망에서의 레이블 스위칭 기법 성능 평가 및 분석)

  • 이수경;오경희;손홍세;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3B
    • /
    • pp.437-445
    • /
    • 2000
  • More advanced and demanding applications, like videoconferencing, video on demand. distributed computing etc., have been devised thanks to the availability of enhanced network feature. Network technologies need to be enhanced to support these applications and to cope with the increasing number of users. Increasing the availability of network resources is just not enough to achieve this goal; scalable network architecture. increased packet forwarding capabilities, a wider range of services are all additional requirements. MOLS (multiprotocol label Switching) is one of the new networking techniques under standardization in the scientific community. In this paper, we analyze the performance of label switching in ATM networks. Simulation tests were performed. In this simulation, we set a simple network configuration and used internet traffic traces from NLANR as input traffic sources. The simulation results and analysis will be helpful in utilizing the functions of ATM switching and IP routing.

  • PDF

Efficient Load Balancing Technique Considering Data Generation Form and Server Response Time in SDN (SDN 환경에서의 데이터 생성 형태와 서버 응답시간을 고려한 효율적인 부하분산 기법)

  • Kim, Jong-Geon;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.679-686
    • /
    • 2020
  • With global data totals expected to grow to 175 ZB by 2025, data processing capabilities in the network area are becoming more important. In particular, data centers are becoming more stubborn as data usage increases, and the load generated by incoming data should be appropriately distributed to reduce costs and efficiently operate. The SDN technology, which emerged to overcome the limitations of the existing network system, removes rigidity of the Legacy system by separating H/W and S/W from the network equipment, and can be effectively applied to load balancing in the data center using S/W-based flexibility. In this paper, we propose ways to increase efficiency by classifying data received from users by type by utilizing SDN technology, and transmitting and processing classified data in order of response speed of servers in the data center.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

A Study of Security QoS(Quality of Service) Measurement Methodology for Network Security Efficiency (MOS(Mean Opinion Score)를 이용한 네트워크 보안 QoS(Quality of Service) 평가체계)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.11-17
    • /
    • 2012
  • Network security performance evaluation is a complex and diverse system environments, a single, specific performance measurements alone performance evaluation measure itself and the meaning of the reliability of the evaluation results do not limit the number of days only. In this paper, we propose a method to measure the security features of security, QoS measurement techniques using MOS satisfaction. MOS(Mean Opinion Score) Rating specifications for network security, QoS satisfaction and how to operate the development and operational model for future customer's satisfaction for information systems that can be used to evaluate the QoS measurement/analysis be utilized in the field. Objectified in the form of standards and performance measurement system provider (supplier development) and consumers(users) all the results available so that how to develop a system. Development is the development of information security features, the performance of these two features networking capabilities and a comprehensive evaluation of a three-gaeyoungyeok Correlating performance measurement methodology. Systematic measurement environment designed using the proposed methodology of this study, when the operating system is on the satisfaction of the security, QoS can be calculated. Forward In addition, a variety of performance metrics and performance measurement methods by extending the network security system satisfaction rating upgrade by the way will be.

A Scalable Resource-Lookup Protocol for Internet File System Considering the Computing Power of a Peer (피어의 컴퓨팅 능력을 고려한 인터넷 파일 시스템을 위한 확장성 있는 자원 탐색 프로토콜 설계)

  • Jung Il-dong;You Young-ho;Lee Jong-hwan;Kim Kyongsok
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.89-99
    • /
    • 2005
  • Advances of Internet and rC accelerate distribution and sharing of information, which make P2P(Peer-to-Peer) computing paradigm appear P2P computing Paradigm is the computing paradigm that shares computing resources and services between users directly. A fundamental problem that confronts Peer-to-Peer applications is the efficient location of the node that stoles a desired item. P2P systems treat the majority of their components as equivalent. This purist philosophy is useful from an academic standpoint, since it simplifies algorithmic analysis. In reality, however, some peers are more equal than others. We propose the P2P protocol considering differences of capabilities of computers, which is ignored in previous researches. And we examine the possibility and applications of the protocol. Simulating the Magic Square, we estimate the performances of the protocol with the number of hop and network round time. Finally, we analyze the performance of the protocol with the numerical formula. We call our p2p protocol the Magic Square. Although the numbers that magic square contains have no meaning, the sum of the numbers in magic square is same in each row, column, and main diagonal. The design goals of our p2p protocol are similar query response time and query path length between request peer and response peer, although the network information stored in each peer is not important.

A Global Korean Networking Strategy for Tourism-related Firms' Internationalization (관광관련기업의 국제화를 위한 글로벌 코리안 네트워킹 전략)

  • Kim, Min-Sook;Bang, Ho-Yeol
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.55-79
    • /
    • 2012
  • The previous studies based on a resource-based view of firm highlighted the role of resources within a firm in creating and sustaining competitive advantage. Recent research, however, the relational view points to the importance of inter-firm sources(or relational capital) in creating firm competitiveness. In international business field, the studies on born-global firms also states that when firms are lack of ownership-specific advantages in their internationalization process, they resort to the external partners and social networks to complement their resource scarcity. By adopting the relational view and born-global firms concept, a network-based approach needs to be applied to explain the international strategy of Korean service firms. This is because most of Korean service firms own less ownership-specific advantages than global competitors. This study proposes Korean firms' global network building and exploiting strategy to enhance their international stages of development. The network, for example, Global Korean Tourism Network, enables network members access to the valuable resources and capabilities they are lack of when undergoing internationalization process. This study's contribution is along two dimension. First, even global Korean network is emerging as a major issue in recent years, we could not figure out how to build global Korean network for service firms. This studies gives an answer. Second, we derived what benefits can be gained from the network if Global Korean Tourism Network is developed for hotel, tourism, convention firms' internationalization.

  • PDF

A Study of the Overseas Entry Strategies of Freight Forwarders (국제물류주선업의 해외진출 전략에 관한 연구)

  • Kim, Ho-Hwoan;Shin, Yong-John
    • Journal of Korea Port Economic Association
    • /
    • v.31 no.2
    • /
    • pp.69-83
    • /
    • 2015
  • This study proposes effective overseas market entry strategies that could allow Korean logistics companies to develop international capabilities and become global firms by adapting to environmental changes in global logistics. First, it reviews the overseas networks of Korean international freight forwarders and the recent trends in the global logistics market. Then, it surveys the conditions of two groups of freight forwarders, namely partnerships and subsidiaries, which are categorized according to type of entry into foreign markets. These companies' networks are concentrated in East and Southeast Asia regardless of network type. As a result, the ability for partnerships to network is higher than that of subsidiaries. However, subsidiaries are small in number and located in various regions because of their initial stage, which is why their businesses depend on the price competitiveness of the parent company. The satisfaction and performance of subsidiaries are both generally low according to the presented findings. In addition, the successful strategies of international freight forwarders include following operations, specializing their logistics services, building collaborations among small and medium-sized companies, recruiting and training professional human resources in international logistics, and entering markets together with their customers. Overall, this study highlights the importance of measuring and evaluating objectively the level and performance of overseas networking through a survey about the internationalization of Korean freight forwarder companies. To conclude, this study is considered to contribute to raising their global competitiveness by suggesting strategies derived from the survey findings and SWOT analysis.

A study on the Wonju Medical Equipment Industry Cluster (원주의료기기산업 클러스터의 형성과정에 관한 연구)

  • Lee, Woo-Chun;Yoon, Hyung-Ro
    • Journal of the Korean Academic Society of Industrial Cluster
    • /
    • v.1 no.1
    • /
    • pp.67-86
    • /
    • 2007
  • Wonju Medical Equipment Industry, despite of its short history, poor sales and weak manpower and so on, have shown remarkable outcomes in a relatively short period. At the end of 2007, totally 79 enterprises (only 4.6% of whole enterprises in Korea) made 10% of the nationwide production and 15% of the nationwide exports with an annual average growth rate of 66.7%, contributing domestic medical equipment industry tremendously. In addition, many leading medical equipment enterprises in various fields already moved or plan to move to Wonju, accelerating Wonju Medical Equipment Cluster. Wonju Medical Equipment Industry Cluster now enters into the growth stage, getting out of the initial business setup stage. Especially, the nomination of Wonju cluster project from the government accelerates networking (e.g. the development of the universal parts, the establishment of the mutual collaboration model among enterprises, and the mutual marketing), making a rapid growth in Wonju Medical Equipment Industry. Wonju Medical Equipment Industry Cluster revealed positive outcomes despite of the weakness in investment size and infra-structure comparing with the other medical industry cluster in the advanced country, while many domestic enterprises pursued their own growth models and thus failed to promote the international competitive power. Wonju Medical Equipment Industry has been developed rapidly. However, there are many challenging problems to support enterprises: small R&D investment and thus weak technology power, difficulties in recruiting R&D engineers, and poor marketing capabilities, financial infrastructure & policies, and network architecture. In order to develop a world-competitive medical equipment industry cluster at Wonju, the complement of infrastructures, the technology innovation, the mutual marketing, and the network expansion to support enterprises are further required. Wonju' s experiences in developing medical equipment industry so far suggest that our own flexible cluster model considering the industry structure and maturity for different regions should be developed, and specific action plans from the local and central governments based on their systematic strategies for industry development should be implemented in order to build world-competitive industry clusters in Korea.

  • PDF

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF