• Title/Summary/Keyword: Next generation Internet

Search Result 523, Processing Time 0.032 seconds

A Study on Methodology for Efficient Ontology Reasoning in the Semantic Web (시맨틱 웹에서의 효율적인 온톨로지 추론을 위한 개선방법에 관한 연구)

  • Hong, June-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.3
    • /
    • pp.85-101
    • /
    • 2008
  • The semantic web is taken as next generation standards of information exchange on the internet to overcome the limitations of the current web. To utilize the information on the semantic web, tools are required the functionality of query search and reasoning for the ontology. However, most of semantic web management tools cannot efficiently support the search for the complex query because they apply Triple-based storage structure about RDF metadata. We design the storage structure of the ontology in corresponding with the structure of ontology data and develop the search system(SMART-DLTriple) to support complex query search efficiently in this research. The performance of the system using new storage structure is evaluated to compare with the popular semantic web management systems. The proposed method and system make a contribution to enhancement of a practical ontology reasoning systems due to improved performance of the ontology search.

  • PDF

The Burst Effect Analysis of 2.5 Gb/s TDM-PON Systems Using a SOA Link Extender (반도체광증폭기로 전송거리 확장된 2.5 Gb/s TDM-PON에서 버스트 효과에 의한 신호왜곡 분석)

  • Choi, Bo-Hun;Lee, Sang Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.23 no.1
    • /
    • pp.6-11
    • /
    • 2012
  • A bidirectional TDM-PON link to support 2.5 Gb/s upstream signals of 256 ONUs was considered for an extended transmission distance of 50 km. The power budget of the link was 58 dB for the upstream signal and a SOA was applied as a link extender which had a 25 dB gain. Receiver sensitivity of the upstream signal was -25 dBm for -30 dBm input power to the SOA. When the input power was -10 dBm, pulse overshooting caused by gain transient of the SOA was maximum at 45% and the signal performance degradation gave a power penalty of 1.55 dB for $10^{-12}$ BER. However the penalties diminished rapidly and became negligible as the input power went below -15 dBm. So this input power dynamic range of up to -15 dBm means that it is not positively necessary to use gain control methods for the next generation TDM-PON systems.

QoS-, Energy- and Cost-efficient Resource Allocation for Cloud-based Interactive TV Applications

  • Kulupana, Gosala;Talagala, Dumidu S.;Arachchi, Hemantha Kodikara;Fernando, Anil
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.3
    • /
    • pp.158-167
    • /
    • 2017
  • Internet-based social and interactive video applications have become major constituents of the envisaged applications for next-generation multimedia networks. However, inherently dynamic network conditions, together with varying user expectations, pose many challenges for resource allocation mechanisms for such applications. Yet, in addition to addressing these challenges, service providers must also consider how to mitigate their operational costs (e.g., energy costs, equipment costs) while satisfying the end-user quality of service (QoS) expectations. This paper proposes a heuristic solution to the problem, where the energy incurred by the applications, and the monetary costs associated with the service infrastructure, are minimized while simultaneously maximizing the average end-user QoS. We evaluate the performance of the proposed solution in terms of serving probability, i.e., the likelihood of being able to allocate resources to groups of users, the computation time of the resource allocation process, and the adaptability and sensitivity to dynamic network conditions. The proposed method demonstrates improvements in serving probability of up to 27%, in comparison with greedy resource allocation schemes, and a several-orders-of-magnitude reduction in computation time, compared to the linear programming approach, which significantly reduces the service-interrupted user percentage when operating under variable network conditions.

NetFlow based IPv6 user's Flow traffic monitoring (NetFlow 기반 IPv6 사용자 Flow traffic 모니터링)

  • Kim, Sung-Su;Song, Wang-Cheol;Oh, Yong-Taek;Choi, Deok-Jai
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.42-46
    • /
    • 2006
  • As the next generation internet (NGI) is supporting High-speed in Gbps rate with the appearance of advanced network technologies, various applications that require high data rates. have been experimented and operated. By using high speed application services, many kinds of problems can be generated but we cannot easily grasp their reasons. However, if the user monitors the end-to-end one's flow data information (path and data rate in each router, state of each router) he can find them more accurately Until now, we have found out the fact that systems which can network-widely monitor end-to-end flow have not be developed yet, only simple systems which can monitor user's individual flow data at just one node are developed In this study, we suggest and materialize a system which can analyze bandwidth in real time by searching routing paths and measuring packet transfer rate between end-to-end flow data and supported flow traffic of using IPv6.

  • PDF

Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN (802.11 무선랜에서 1 비트를 이용한 패킷 인증 방안)

  • Lee Sungryoul;Kang Jimyung;Moon hogun;Lee myungsoo;Kim Chong-Kwon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.465-472
    • /
    • 2005
  • IEEE 802.11 wireless LAN technology is essential for wireless internet, next generation converged network and home network. But, it is certain that user's privacy must be provided to expand the applicable area in IEEE 802.11 WLAN. Recently, WEP and 802.11i security scheme can be used in MAC Layer. But with VPN technology which is applied to WLAN user, it means that suity mechanism is used redundantly. One bit authentication mechanism was already proposed to solve this redundancy. In this paper, we analyze problems of 1-bit Authentication mechanism which are failure of synchronization and waste of packet. And we propose new algorithm which synchronizes sender with receiver, at once, using duplicated-packet-count information. We show that our algorithm improves success probability of packet authentication up to $98\%$ and efficiency of authentication bit stream up to $97\%$.

A Cross-layering Handover Scheme for IPv6 Mobile Station over WiBro Networks (와이브로 망에서 IPv6 이동 단말의 교차 계층 핸드오버 기법)

  • Jang, Hee-Jin;Han, Youn-Hee;Hwang, Seung-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.48-61
    • /
    • 2007
  • WiBro (Wireless Broadband) service, developed in Korea, can provide the host mobility while its users hang around within the subnet. Next-generation Internet protocols, IPv6 and Mobile IPv6 (MIPv6), provide a plenty of addresses to the nodes and enable the handover between different subnets. However, MIPv6 is not enough to support a real time service such as VoIP (Voice over IP) due to the long latency, and it is necessary to develop an enhanced handover mechanism which is optimized to the WiBro networks. In this paper, we suggest an improved fast handover mechanism while the mobile node moves around WiBro networks. The proposal is based on Fast Mobile IPv6 (FMIPv6) which is the representative protocol for fast handover, and reduces the handover latency by the close interaction between the link layer (WiBro MAC) and IP layer (FMIPv6). Finally, we analyze the performance of proposed mechanism through the mathematical analysis.

Fashion Product Purchase Behaviors in the Development Stages of Ubiquitous Environment -Focusing on Clothing Shopping Orientation and Consumer Purchase Decision Making- (유비쿼터스 환경의 발전 단계에 따른 패션 제품 구매행동 연구 -의복쇼핑성향 집단별 구매의사 결정의 차이를 중심으로-)

  • Chung Mi-Jae
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.4 s.103
    • /
    • pp.33-47
    • /
    • 2006
  • In 21 century, the ubiquitous environment is advanced fast through the so-called digital convergence. This research experts what is the next generation of traditional fashion product purchase behaviors. The purpose of this study is to analyze the fashion product purchase decision making in the development stages of ubiquitous environment. The quantitative Investigation was executed for 487 collegians and the data were analyzed with Frequency, percentage, ANOVA, Duncan test and multiple regression by using SPSS win version 10 package. The results of this research were as followed: First, in the 1st stages of ubiquitous developmental environment, using internet pc or mobile phone was analyze the difference between fashion shopping orientation group and purchase restricted factor Second, as a result of the factor analysis of the ubiquitous 2nd stages, four lower dimensions were made: giving information; wearable effect, buying facility; interest from purchase. as a result of ANOVA, there were any differences between fashion shopping orientation group and ubiquitous 2nd stages. Third, in the 3rd stages of ubiquitous developmental environment, there are differences between fashion shopping orientation group and ubiquitous 3rd stages. And the result from regression analysis of the ubiquitous 2nd stages and 3rd stages showed that buying facility factor in increasing need recognition, wearable effect factor in fashion information acquisition, giving information factor in have a intention to buy in ubiquitous #3 rendition are most influential.

Performance Analysis of WAP Packet Considering WTP SAR Algorithm and RLP in Wireless CDMA Network (무선 CDMA 망에서 WTP SAR 알고리즘과 RLP를 고려한 WAP 패킷의 성능 분석)

  • Moon, Il-Young;Roh, Jae-Sung;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.1
    • /
    • pp.69-76
    • /
    • 2002
  • With the growth of data communication service by mobile devices, WAP is proposed to efficiently access the Internet contents by user request through wireless condition that has a high error rate and mobility. But, because a transmission speed of WAP is limited, it takes many times to transmit and to receive the data. This paper has studied the WAP packet transmission time using WTP-SAR algorithm. As a method that is to improve transfer capability of WAP, using SAR function in WTP, total message down from upper layer has been fragmented and packet is transmitted through RLP frame time slot. Then, we have analyzed the transmission time of WAP packet with variable RLP layer size on the wireless CDMA network for next generation systems. From the results, we could obtain the WAP packet transmission time and optimal WTP packet size.

  • PDF

Design and Implementation of SIP System for Supporting Mobility Based on JAIN (이동성 지원을 위한 JAIN 기반 SIP 시스템의 설계 및 구현)

  • Lee Jong eon;Cha Si ho;Kim Dae young;Lee Jae oh;Cho Kuk hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3B
    • /
    • pp.144-152
    • /
    • 2005
  • Mobile IP(MIP) and SIP have been proposed to support mobility in the wireless internet working at different layers of the protocol stack. However MIP has some problems such as triangle routing, the need of each host's home address, the overhead of tunneling and the lack of wide deployment. Thus we proposed a scheme for supporting mobility based on SIP in this research. A novel SIP system to provide a hierarchical registration has been designed according to this scheme. Our SIP system has been established by implementing JAIN technologies which follow next generation network standards to support the mobility of wireless terminal. This system successfully satisfied ITU-T recommendation.

Multiplex Certification System Using XML For WBI (WBI에서의 XML 다중인증 시스템)

  • 신영준;이동휘;김정재;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.297-302
    • /
    • 2004
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submint various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. And XML electronic signature raise interworking between digital signature systems used by various field of using XML document. Using these merit and complementing defect are main contents that users have to pay about Certification service to get CA certificate from 2004 june. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF