• Title/Summary/Keyword: Next generation Internet

Search Result 523, Processing Time 0.029 seconds

Comparison and Analysis of Name-Based Routing Protocols for Information-Centric Network (정보 중심 네트워크를 위한 이름 기반 라우팅 프로토콜의 비교 및 분석)

  • Kim, Jung-Jae;Ryu, Min-Woo;Cha, Si-Ho;Cho, Kuk-Huyn
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1969-1975
    • /
    • 2013
  • ICN (Information-Centric Network) is a next generation Internet communication technology for converting existing Internet communication paradigm to information-based communication paradigm to efficiently use a large amount of information that exists on the Internet. Therefore, unlike existing Internet communication technologies focused on the process of communication using the host address, ICN focuses on the purpose of communication for each information by defining the information of everything that exists on the Internet. For this purpose, ICN uses NbR (Name-based Routing) methods that assign a name to each piece of information, all routers participating in ICN have the physical storage so that they are able to share information with each other. NbR methods on ICN are divided into one-phase routing and two-phase routing depending on how to reach at the storage of each router. However, currently proposed NbR methods cause many problems because they do not reflect the unique characteristics of ICN. Therefore, this paper looked at various NbR issues from caching, access time, distribution, mobility, scaliability, and dissemination of information for an efficient NbR method, and analyzed existing methods proposed for ICN. This paper also proposed a research direction to study the efficient NbR for ICN based on the analysis information.

Attributed Intrusion Detection System using Pattern Extracting Agent (패턴 추출 에이전트를 이용한 분산 침입 탐지 시스템)

  • Jeong, Jong-Geun;Lee, Hae-Gun;Her, Kyung;Shin, Suk-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.658-661
    • /
    • 2008
  • As network security is coming up with significant problem after the major Internet sites were hacked nowadays, IDS(Intrusion Detection System) is considered as a next generation security solution for more trusted network and system security. We propose the new IDS model which can detect intrusion in the expanded distribute environment in host level, drawback of existing IDS, and implement prototype. We used pattern extraction agent so that we extract automatically audit file needed in intrusion detection even in other platforms.

  • PDF

A Conditional Clustering Scheme for Hybrid NOMA in Millimeter Wave Communication System

  • Nguyen, Thanh Ngoc;Jeon, Taehyun
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.34-39
    • /
    • 2019
  • Millimeter-wave (mmWave) and Non-orthogonal multiple access (NOMA) are expected to be the major techniques that lead to the next generation wireless communication. NOMA provides a high spectrum efficiency by sharing of spatial resources among users in the same frequency band. Meanwhile, millimeter-wave gives a huge underutilized bandwidth at extremely high frequency band (EHF) which covers 30GHz to 300GHz. These techniques have been proven in several recent literatures to achieve high data rates. The combination of NOMA and millimeter-wave techniques further improves average sum capacities, as well as reduces the interference compared to conventional wireless communication systems. In this paper, we focus on hybrid NOMA system working in millimeter-wave frequency. We propose a clustering algorithm used for a hybrid NOMA scheme to optimize the usage of wireless resources. The proposed clustering algorithm adds several conditions in grouping users and defining clusters to increase the probability of the successful superposition decoding process. The performance of the proposed clustering algorithm is investigated in hybrid NOMA system and compared with the conventional orthogonal multiple access (OMA) scheme.

Design and Implementation of BADA-IV/XML Query Processor Supporting Efficient Structure Querying (효율적 구조 질의를 지원하는 바다-IV/XML 질의처리기의 설계 및 구현)

  • 이명철;김상균;손덕주;김명준;이규철
    • The Journal of Information Technology and Database
    • /
    • v.7 no.2
    • /
    • pp.17-32
    • /
    • 2000
  • As XML emerging as the Internet electronic document language standard of the next generation, the number of XML documents which contain vast amount of Information is increasing substantially through the transformation of existing documents to XML documents or the appearance of new XML documents. Consequently, XML document retrieval system becomes extremely essential for searching through a large quantity of XML documents that are storied in and managed by DBMS. In this paper we describe the design and implementation of BADA-IV/XML query processor that supports content-based, structure-based and attribute-based retrieval. We design XML query language based upon XQL (XML Query Language) of W3C and tightly-coupled with OQL (a query language for object-oriented database). XML document is stored and maintained in BADA-IV, which is an object-oriented database management system developed by ETRI (Electronics and Telecommunications Research Institute) The storage data model is based on DOM (Document Object Model), therefore the retrieval of XML documents is executed basically using DOM tree traversal. We improve the search performance using Node ID which represents node's hierarchy information in an XML document. Assuming that DOW tree is a complete k-ary tree, we show that Node ID technique is superior to DOM tree traversal from the viewpoint of node fetch counts.

  • PDF

The Trend of IPv6 Router System Technology for Next Generation Internet Service (차세대 인터넷서비스를 위한 IPv6 라우터 기술 개발 동향)

  • Byun, S.H.;Jung, C.H.;Nam, K.J.;June, J.A.;Song, K.S.
    • Electronics and Telecommunications Trends
    • /
    • v.19 no.6 s.90
    • /
    • pp.74-82
    • /
    • 2004
  • 인터넷의 도입 및 확대가 활발하게 이루어지면서 보다 많은 이용자들은 홈 네트워킹 기반의 정보 가전 기기, 텔레매틱스, 전자 물류 실현을 위한 전자 태크(RFID), 센서 네트워킹 등 모든 사물이 상호 통신할 수 있는 다양한 서비스를 요구하고 있으며 이를 해결하기 위한 연구가 활발히 진행되고 있다. 그러나 현재인터넷의 기반이 되고 있는 IPv4 주소 체계는 약 43억 개의 주소를 생성할 수 있도록 설계되어 있으며, 그 동안 비효율적인 주소 할당으로 유효한 주소는 불과 5~6억 개 정도만을 사용할 수 있는 실정이다. IPv4 기반의 인터넷 주소 체계로는 앞으로 도래할 유무선 통합 서비스 혹은 방송과 통신이 융합되는 사용자 중심의 인터넷 서비스 네트워크 구축에 많은 문제점을 갖고 있기 때문에 주소 자원을 거의 무한대로 제공하는 IPv6 기반의 인터넷(128비트 IPv6 주소는 2128개의 주소 지원) 도입이 필수적이다. 따라서 현재 IPv4 기반의 인터넷에서 IPv6 기반의 차세대 인터넷으로 전환되고 있으며, 또한 라우터 장비 시장은 차별화된 IPv6 기능을 제공하는 장비 중심으로 재편될 것으로 보인다. 본 고에서는 IPv6 라우터에 대한 IPv6 도입 배경 및 프로토콜에 관련된 제반적 기술을 살펴 보고, 이를 기반으로 외국 시스템들의 현재 구현 상태, IPv6 라우터를 개발하는 데 연구되어야 할 주요 사항 및 국내외 IPv6 도입 추진 현황을 살펴 본다.

Design & Implementation of an Ontology for Relic Search in Museums (시맨틱 웹 기반 박물관 유물 검색을 위한 온톨로지 설계 및 구현)

  • Park, Jin-Seuk;Yang, Gi-Chul;Oh, Jeong-Jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.269-274
    • /
    • 2004
  • Because of the rapid development of internet and Various Types. huge amount and Various types of data are available on the web there days. The tasks such as information retrieval, composition and integration are not easy on the web which contains such huge amount of data. In order to solve these problems W3C introduced Semantic Web as a next generation Web. Semantic Web guarantee the cooperation between heterogeneous Systems and improve reusability of information by providing the machine understandable Web data. In this paper. We design develop an ontology for the museum. The implemented ontology can be used as a standard ontology for the relic search in a museum.

  • PDF

The Effect of Customers' Participation and Satisfaction on Performance of IT Project (IT 프로젝트의 고객참여 및 만족도가 성과에 미치는 영향)

  • Kang, Sora;Kim, Min Sun;Kim, Myung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.5721-5727
    • /
    • 2012
  • In this study, we examine the effect of customers's participation and satisfaction on performance of IT project. This study collected data from the project team members of the next-generation internet banking project in K Bank. We found that customers's participation has positive effect on their satisfaction of IT project and the satisfaction also has a positive influence on performance of IT project. Implications and directions for future research are discussed.

A Network-based Movement Detection Scheme for Proxy Mobile IPv6 over IEEE802.11 Networks (IEEE 802.11 네트워크에서 Proxy Mobile IPv6의 네트워크기반 이동성 감지 기법)

  • Kim, A-Ram;Han, Youn-Hee;Choi, Hyung-Young;Min, Sung-Gi;You, Heung-Ryeol
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.505-509
    • /
    • 2007
  • Proxy Mobile IPv6 (PMIPv6)는 Mobile Node (MN)가 스스로 이동성을 지원하지 않더라도 Mobile Access Gate가 MN대신 이동성을 처리하여 IPv6 이동성을 지원하는 기술이다. 좀 더 향상된 핸드오버 성능을 얻기 위해 Proxy Mobile IPv6에서도 버퍼링을 통한 패킷 손실을 줄이는 기법을 사용할 수 있다. 하지만, IEEE 802.11 네트워크에서는 Handover 발생 직전에 MN이 어떠한 통보도 AP로 하지 않기 때문에 Handover시에 패킷 손실을 줄이기 위한 패킷 버퍼링 방법을 사용하기가 어렵다. 본 논문에서 PMIPv6에서 MAG와 AP가 MN의 이동성을 감지하여 버퍼링을 시작하고 Handover가 발생하였을 경우에 대비해 버퍼링을 하는 Cross-layer 버퍼링 방법을 제안한다. 이를 통해 PMIPv6에서도 MN의 변경 없이 Handover시에 발생하는 패킷 손실을 최소화 할 수 있다. 또한 간단한 성능 비교를 통하여 제안 방법이 기존 PMIPv6보다 우수함을 알 수 있다.

  • PDF

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Study on Mobile Multicast Support over Mobile IPv6 Networks (Mobile IPv6 망에서 이동 멀티캐스트 지원 방안에 관한 연구)

  • 변태영;김성희
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1187-1193
    • /
    • 2003
  • The interest for IPv6, which is next generation IP, increases, while the difficulty for adopting it into IT industries also increases too. We also expect that Internet technologies develop on basis of All-IP networks, which include various heterogeneous networks. Therefore, it is necessary for network to support mobility and multicast capability to create applications with wide-variety. In this paper, we propose a new mobile multicasting protocol called Mobile IPv6 Multicast Protocol(MIMP). The proposed scheme satisfies no packet losses from roaming and optimal routing efficiency.