• Title/Summary/Keyword: Next generation Internet

Search Result 523, Processing Time 0.031 seconds

Web Archiving: What We Have Done and What We Should Do (웹 아카이빙의 성과와 과제)

  • Suh, Hye-Ran
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.15 no.1
    • /
    • pp.5-22
    • /
    • 2004
  • The purpose of this study is to review what we have done and to identify what we have to do to be successful with Web archiving which is important to preserve our cultural heritage for the next generation. Some characteristics of Web resources as information sources were identified and some difficulties with Web archiving were discussed. The outcome of national and/or international Web archiving projects including Kurturarw3, PANDORA and Internet Archive were reviewed. Policy issues and technological problems of Web archiving we have to solve were listed.

  • PDF

A Study on the Knowledge Measurement md Sharing Methodology at the Knowledge-Oriented Organization (지식지향적 조직에 있어서의 지식평가 및 공유방법에 관한 연구)

  • 이상근;유상진;장영택
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.3
    • /
    • pp.1-19
    • /
    • 2001
  • Internet based on web service is growing rapidly and the effort to standardize the next generation web is world-widely being made. When the web was developed for the first time, HTTP, HTML, and URL were designed based on the structure of text background. Through those, asynchronous search and simple, unified expression patterns have been used. But recently many data on internet are becoming complicated. Consequently new structure and expression patterns including synchronous multimedia information are requested. The currently used standard language among user interface domain of W3C is SMIL which is XML-based one. SMIL describes where and how long the multimedia factors are integrated on the web. In this paper the standardization trend and important issues related to SMIL are reviewed and analyzed. Also the development of technology is discussed.

  • PDF

A VoIP System for Secure Support in Next Generation Networks based on SIP (차세대 네트워크환경에서의 보안성 지원을 위한 SIP 기반 VoIP 시스템)

  • Sung, Kyung;Kim, Seok-Hun;Park, Gil-Ha
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2321-2328
    • /
    • 2006
  • Today, SIP standard (The signalling protocol for the Internet phone service) raises to be the standard technique because the expandability is high and complexity is low. It is widely investigated and actively advocated to use Si81a1 ring protocol for SIP in VoIP service. SIP service can be applied even outside the Internet phone service; instance messaging and various multimedia technology are just an example. This paper proposed an embodiment proxy server for rambling support to use JAIN SIP API. It provides standard interface for testing the Proxy server for SIP and embodiment of user agent that transfer instant massaging and voice communication.

An Attack Model Based on Software Cruise for Information Warfare (정보전을 위한 소프트웨어 순항 기반 공격 모델)

  • Ryu Ho-Yeon;Nam Young-Ho
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.49-60
    • /
    • 2004
  • Information Warfare(IW), a new aspect of war, is the field centralized the concern and research in the information security and national security, Both the defense and the offensive are important in the next generation IW, and so we need to do the various research to secure the network and system for gaining the superiority of IW. This paper proposes a model for IW based on software cruise to prepare the IW that is changing the offensive aspect. Software cruise is defined as a behavior of computer programs that travel toward specific destination from a source through the network. The proposed model have the cruise property and uses the cybermap to cruise toward the destination chosen in advance. Also, while self-movement, the model can function the predefined task.

  • PDF

MARS: Multiple Access Radio Scheduling for a Multi-homed Mobile Device in Soft-RAN

  • Sun, Guolin;Eng, Kongmaing;Yin, Seng;Liu, Guisong;Min, Geyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.79-95
    • /
    • 2016
  • In order to improve the Quality-of-Service (QoS) of latency sensitive applications in next-generation cellular networks, multi-path is adopted to transmit packet stream in real-time to achieve high-quality video transmission in heterogeneous wireless networks. However, multi-path also introduces two important challenges: out-of-order issue and reordering delay. In this paper, we propose a new architecture based on Software Defined Network (SDN) for flow aggregation and flow splitting, and then design a Multiple Access Radio Scheduling (MARS) scheme based on relative Round-Trip Time (RTT) measurement. The QoS metrics including end-to-end delay, throughput and the packet out-of-order problem at the receiver have been investigated using the extensive simulation experiments. The performance results show that this SDN architecture coupled with the proposed MARS scheme can reduce the end-to-end delay and the reordering delay time caused by packet out-of-order as well as achieve a better throughput than the existing SMOS and Round-Robin algorithms.

A Proposition for Smart Warehouse Management System (SWMS) through IoT (IoT를 채용한 스마트 창고관리 시스템 설계 제안)

  • Kim, Jun Yeong;Jeon, Byeong-Woo;Hong, Dae Geun;Suh, Suk-Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.11 no.2
    • /
    • pp.85-93
    • /
    • 2015
  • Warehouse Management System (WMS) is a key control for Material Handling System (MHS) and Inventory Control System (ICS). How to design and implement for WMS is crucial factor for achieving the key performance index for Manufacturing Industry. In particular, iron and steel making industry, where the volume and weight is large and hence FIFO (First Input First Out) is not working, how to design WMS is a key factor. In this paper, we systematically define the problem of WMS via developing StR (Stakeholders' Requirements) or ORD (Operational Requirement Documents), SyR (System Requirement), and SA (System Architecture) based on the emerging technologies. In particular, IoT (Internet of Things), CPS (Cyber Physical System) concepts and enabling technologies haves been incorporated in developing Smart WMS. The deliverables of the research can provide a conceptual framework for developing the next generation industrial WMS.

A Study on Information Security policy for VoIP Service in Next Generation Networks (차세대 네트워크 환경에서의 인터넷전화 서비스를 위한 정보보호 대책 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.28-33
    • /
    • 2008
  • VoIP provided voice service using Internet is receiving footlights when it escapes an initial curiosity. VoIP interest became larger, because it can transfer existing phone service and deliver voice data through internet technology. Is inheriting as it is threats of IP base because a VoIP technology provides audiocommunication service taking advantage of an existing IP technology, and have new threats that happen from new know-hows for VoIP service offer. In this paper, presented about problem and consideration and countermeasure of examines about security threat of VoIP service, and applies security.

  • PDF

Trend and Prospect of Security System Technology for Network (네트워크를 위한 보안 시스템의 기술 개발 동향 및 전망)

  • Yang, Kyung-Ah;Shin, Dong-Woo;Kim, Jong-Kyu;Bae, Byung-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2018
  • The latest cyber attack utilizing advanced technologies is more rapidly advancing than developing speed of defense technology, thereby escalates the security risk. In responding to this recent threat, academia and industries are developing some sophisticated security technologies applying various methods. Based on these technologies, security systems are used in many fields. This article aims to select noticeable network security related technologies for the security systems. In particular, we compared and analyzed the trend, performance, and functions of both foreign and domestic technologies in regard to UTM having the largest portions among network security systems so far. We will also discuss the prospect for the change in network infrastructure due to the emergence of the next-generation network technology.

A Trapping Behavior of GaN on Diamond HEMTs for Next Generation 5G Base Station and SSPA Radar Application

  • Lee, Won Sang;Kim, John;Lee, Kyung-Won;Jin, Hyung-Suk;Kim, Sang-Keun;Kang, Youn-Duk;Na, Hyung-Gi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.30-36
    • /
    • 2020
  • We demonstrated a successful fabrication of 4" Gallium Nitride (GaN)/Diamond High Electron Mobility Transistors (HEMTs) incorporated with Inner Slot Via Hole process. We made in manufacturing technology of 4" GaN/Diamond HEMT wafers in a compound semiconductor foundry since reported [1]. Wafer thickness uniformity and wafer flatness of starting GaN/Diamond wafers have improved greatly, which contributed to improved processing yield. By optimizing Laser drilling techniques, we successfully demonstrated a through-substrate-via process, which is last hurdle in GaN/Diamond manufacturing technology. To fully exploit Diamond's superior thermal property for GaN HEMT devices, we include Aluminum Nitride (AlN) barrier in epitaxial layer structure, in addition to conventional Aluminum Gallium Nitride (AlGaN) barrier layer. The current collapse revealed very stable up to Vds = 90 V. The trapping behaviors were measured Emission Microscope (EMMI). The traps are located in interface between Silicon Nitride (SiN) passivation layer and GaN cap layer.

Hierarchical Binary Search Tree (HBST) for Packet Classification (패킷 분류를 위한 계층 이진 검색 트리)

  • Chu, Ha-Neul;Lim, Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3B
    • /
    • pp.143-152
    • /
    • 2007
  • In order to provide new value-added services such as a policy-based routing and the quality of services in next generation network, the Internet routers need to classify packets into flows for different treatments, and it is called a packet classification. Since the packet classification should be performed in wire-speed for every packet incoming in several hundred giga-bits per second, the packet classification becomes a bottleneck in the Internet routers. Therefore, high speed packet classification algorithms are required. In this paper, we propose an efficient packet classification architecture based on a hierarchical binary search fee. The proposed architecture hierarchically connects the binary search tree which does not have empty nodes, and hence the proposed architecture reduces the memory requirement and improves the search performance.