• Title/Summary/Keyword: Open Networking

Search Result 171, Processing Time 0.034 seconds

SmartRetweet : A Study on Method of the Efficient Propagation of Location-Based News Feed (스마트 리트윗 : 위치기반 관심정보의 효율적인 전파방법에 대한 연구)

  • Jeong, Do-Seong;Cho, Dae-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.960-966
    • /
    • 2012
  • It is prevalent to gather the location information from GPS, WiFi and etc, and therefore LBSNS (Location-Based SNS) has increased rapidly (such as location-augmented Twitter services). The message created from LBSNS include the specific area of interests which the message is created in or mentions. It is easy to propagate the location-based information of LBSNS by adapting the retweet function which is efficient way to propagate the message in tweeter. In this paper, we have defined the smart retweet as a automatic retweet function for efficient propagating the messages which is geo-tagging the location of interests. We have designed the smart retweet system based on the tweeter system. The user could specify the area of interests and build the social networking among the users which have interested in common area. The smart retweet system have been implemented by mesh-up services based on Open-API of trweeter and google map. It is expected that the smart retweet service proposed in this paper makes easy sharing of the location-based interesting information.

Design and Prototyping of Scientific Collaboration Platform over KREONET (KREONET 기반의 과학기술협업연구 플랫폼(RealLab) 설계 및 프로토타입 구축)

  • Kwon, Yoonjoo;Hong, Wontaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.297-306
    • /
    • 2015
  • Cloud computing has been increasingly used in various fields due to its flexibility, scalability, cost effectiveness, etc. Recently, many scientific communities have been attempting to use cloud computing as a way to deal with difficulties in constructing and operating a research infrastructure. Especially, since they need various collaborations based on networking, such as sharing experimental data, redistributing experimental results, and so forth, cloud computing environment that supports high performance networking is required for scientific communities. To address these issues, we propose RealLab, a high performance cloud platform for collaborative research that provides virtual experimental research environment and data sharing infrastructure over KREONET/GLORIAD. Additionally, we describe some RealLab use cases for showing the swift creation of experimental environment and explain how massive experimental data can be transferred and shared among the community members.

An SDN-based Bandwidth Control Scheme considering Traffic Variation in the Virtualized WLAN Environment (가상화된 WLAN 환경에서 트래픽 변화를 고려한 SDN 기반 대역폭 제어 기법)

  • Moon, Jaewon;Chung, Sanghwa
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1223-1232
    • /
    • 2016
  • A virtual network technology can provide a network reflecting the requirements of various services. The virtual network can distribute resources of the physical network to each virtual slice. An efficient resource distribution technique is needed to reflect the requirements of various services. Existing bandwidth distribution techniques can only control downlink traffic without taking traffic conditions on the network into account. Downlink and uplink share the same resources in a wireless network. The existing bandwidth distribution techniques assumed that all stations generate saturated traffic. Therefore, the existing bandwidth distribution technique cannot make traffic isolation in a virtual wireless network. In this paper, we proposed a traffic-based bandwidth control techniques to solve these problems. We applied Software-Defined Networking(SDN) to the virtual wireless network, monitored the traffic at each station, and searched for stations that generated unsaturated traffic. We also controlled both uplink and downlink traffics dynamically based on monitoring information. Our system can be implemented with legasy 802.11 clients and SDN-enabled APs. After the actual test bed configuration, it was compared to existing techniques. As a result, the distribution performance of the proposed technique was improved by 14% in maximum.

The Device Configuration Protocol with Real-Time Processing for QoS Support over IPv6 (IPv6 상에서 QoS 지원을 위한 실시간 처리용 DCP 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.660-668
    • /
    • 2005
  • Recently, the Internet-based communication method has been adopted as an open networking solution in the field of remote control and data acquisition. In the current Internet, most networking applications are developed according to the client-server approach. In this paper, we propose an innovative Device Configuration Protocol (DCP) that exchanges the traditional role between client and server to provide a uniform device interface over the Internet for various field devices. The proposed protocol is implemented as an application-level protocol running on top of the standard TCP/IP protocols. Also, the DCP protocol is extended with real-time processing to work with the FlowLabel of IPv6 for QoS (Quality of Service) support. The simulation results show that the real-time packets can be processed prior to the given deadline regardless of throughput, as compared to the normal packets.

Federation Trader Model Supporting Interface Between Object Groups (객체그룹간의 상호접속을 지원하는 연합 트레이더 모델)

  • Jeong, Chang-Won;Ju, Su-Jong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.9
    • /
    • pp.1126-1134
    • /
    • 1999
  • 최근 다양한 멀티미디어 서비스를 지원하기 위한 통신망 관리와 서비스 관리가 통합된 개방형 정보 통신망의 구조가 요구되고 있다. 이러한 구조를 기반으로, TINA-C(Tele-communications Information Networking Architecture-Consortium)에서는 분산 환경에서 분산 어플리케이션 객체들에 대한 복잡한 서비스 및 관리 인터페이스들을 간결하도록 객체그룹의 개념을 정의하고 있다. 이러한 환경 속에서 트레이딩 서비스는 통신 서비스를 제공하는 객체그룹간의 상호작용을 지원하는데 매우 중요하다.따라서, 본 논문에서는 객체그룹간의 상호접속을 지원할 수 있는 트레이딩 기능과 이들 트레이더들간의 연동을 위한 트레이더 연합 모델을 제시하고자 한다. 이를 위해 우리는 트레이더의 중개자로서 Cooperator를 설계하여 기존의 트레이더와 연동시켰다. 이러한 결과로서 우리의 새로운 트레이더 연합 모델에서 Cooperator는 객체그룹간의 상호접속에서 객체들의 접속 권한의 체크 기능과 기존의 트레이더 연합모델의 문제점인 트레이더들간의 단 방향 연결문제를 보완하여 양방향 연결 기능을 갖도록 하였다. 끝으로, 이러한 해결 과정을 보이기 위해 트레이더와 Cooperator들로 이루어진 본 연합모델에서 분산 객체그룹간의 상호접속 절차과정과 사건 추적 다이어그램을 보였다.Abstract Recently, the open networking architecture is required to support various multimedia services as integrated functions of network management and service management. Based on this architecture, TINA-C defines an object group concept for simplifying complex management and service interfaces, when distributed application is executed in distributed environments. Within the support environment the trading service is an important of the interacting object groups which provide a telecommunication service.Hence, we suggest the trader federation model for supporting interconnections between object groups and among existing traders by using the cooperator we designed, as an intermediator among traders. Our cooperator has functions for checking access rights of objects in object groups, and for providing bidirectional linkage among traders. Up to now, the existing trader federation models have a single directional linkage for interactions among traders. Finally, we showed the interface procedure and the event trace diagram of distributed object groups using our model consisted of traders and the cooperators.

An Efficient Authentication Mechanism in Mobile-IP Network (Mobile-IP망에서의 효율적인 인증 방안)

  • Chung, Sun-Nie;Chae, Ki-Joon;Jang, Jong-Soo;Sohn, Sung-Won
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.321-335
    • /
    • 2001
  • The explosive growth in wireless networking increasingly urges the demand to support mobility within the Internet which is what Mobile-IP aims to provide. Because the transmission of signals through open-air s easy to be attacked, it is important to provide secure transmission for mobile users and make them responsible for what they have done in networks. Although IETF provides a secret-key based security mechanism, those mechanisms suffer from scalability, efficiency and non-repudiation service problem. The proposed mechanism uses public-key based authentication optimizing the performance. It includes non-repudiation service on the side of mobile for airtight security in wireless network. The simulation results show that the proposed authentication reduces the total registration time. It especially minimizes the computation cost on the side of the mobile node and solves the power problem. In practice, the proposed authentication is feasible with reasonable performance and security service in macro mobility that Mobile-IP is intended to solve.

  • PDF

Digital Diplomacy via Social Networks: A Cross-National Analysis of Governmental Usage of Facebook and Twitter for Digital Engagement

  • Ittefaq, Muhammad
    • Journal of Contemporary Eastern Asia
    • /
    • v.18 no.1
    • /
    • pp.49-69
    • /
    • 2019
  • Over the last couple of years, digital diplomacy has become a fascinating area of research among Mass Communication, Peace and Conflict Studies, and International Affairs scholars. Social media and new technology open up new avenues for governments, individuals, and organizations to engage with foreign audiences. However, developing countries' governments are still lacking in the realization of the potential of social media. This study aims to analyze the usage of social media (Facebook & Twitter) by the two biggest countries in South Asia (Pakistan and India). I selected 10 government officials' social media accounts including prime ministers', national press offices', military public relations offices', public diplomacy divisions', and ministries of foreign offices' profiles. The study relies on quantitative content analysis and a comparative research approach. The total number of analyzed Twitter tweets (n=1,015) and Facebook posts (n=1,005) include 10 accounts, five from each country. In light of Kent and Taylor's (1998) dialogic communication framework, the results indicate that no digital engagement and dialogue occurs between government departments and the public through social networking sites. Government departments do not engage with local or foreign audiences through digital media. When comparing both countries, results reveal that India has more institutionalized and organized digital diplomacy. In terms of departmental use of social media, the digital diplomacy division and foreign office of India is more active than other government departments in that nation. Meanwhile, Pakistan's military public relations office and press office is more active than its other government departments. In conclusion, both countries realize the potential of social media in digital diplomacy, but still lack engagement with foreign audiences.

Match Field based Algorithm Selection Approach in Hybrid SDN and PCE Based Optical Networks

  • Selvaraj, P.;Nagarajan, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5723-5743
    • /
    • 2018
  • The evolving internet-based services demand high-speed data transmission in conjunction with scalability. The next generation optical network has to exploit artificial intelligence and cognitive techniques to cope with the emerging requirements. This work proposes a novel way to solve the dynamic provisioning problem in optical network. The provisioning in optical network involves the computation of routes and the reservation of wavelenghs (Routing and Wavelength assignment-RWA). This is an extensively studied multi-objective optimization problem and its complexity is known to be NP-Complete. As the exact algorithms incurs more running time, the heuristic based approaches have been widely preferred to solve this problem. Recently the software-defined networking has impacted the way the optical pipes are configured and monitored. This work proposes the dynamic selection of path computation algorithms in response to the changing service requirements and network scenarios. A software-defined controller mechanism with a novel packet matching feature was proposed to dynamically match the traffic demands with the appropriate algorithm. A software-defined controller with Path Computation Element-PCE was created in the ONOS tool. A simulation study was performed with the case study of dynamic path establishment in ONOS-Open Network Operating System based software defined controller environment. A java based NOX controller was configured with a parent path computation element. The child path computation elements were configured with different path computation algorithms under the control of the parent path computation element. The use case of dynamic bulk path creation was considered. The algorithm selection method is compared with the existing single algorithm based method and the results are analyzed.

Building a Korean Sentiment Lexicon Using Collective Intelligence (집단지성을 이용한 한글 감성어 사전 구축)

  • An, Jungkook;Kim, Hee-Woong
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.49-67
    • /
    • 2015
  • Recently, emerging the notion of big data and social media has led us to enter data's big bang. Social networking services are widely used by people around the world, and they have become a part of major communication tools for all ages. Over the last decade, as online social networking sites become increasingly popular, companies tend to focus on advanced social media analysis for their marketing strategies. In addition to social media analysis, companies are mainly concerned about propagating of negative opinions on social networking sites such as Facebook and Twitter, as well as e-commerce sites. The effect of online word of mouth (WOM) such as product rating, product review, and product recommendations is very influential, and negative opinions have significant impact on product sales. This trend has increased researchers' attention to a natural language processing, such as a sentiment analysis. A sentiment analysis, also refers to as an opinion mining, is a process of identifying the polarity of subjective information and has been applied to various research and practical fields. However, there are obstacles lies when Korean language (Hangul) is used in a natural language processing because it is an agglutinative language with rich morphology pose problems. Therefore, there is a lack of Korean natural language processing resources such as a sentiment lexicon, and this has resulted in significant limitations for researchers and practitioners who are considering sentiment analysis. Our study builds a Korean sentiment lexicon with collective intelligence, and provides API (Application Programming Interface) service to open and share a sentiment lexicon data with the public (www.openhangul.com). For the pre-processing, we have created a Korean lexicon database with over 517,178 words and classified them into sentiment and non-sentiment words. In order to classify them, we first identified stop words which often quite likely to play a negative role in sentiment analysis and excluded them from our sentiment scoring. In general, sentiment words are nouns, adjectives, verbs, adverbs as they have sentimental expressions such as positive, neutral, and negative. On the other hands, non-sentiment words are interjection, determiner, numeral, postposition, etc. as they generally have no sentimental expressions. To build a reliable sentiment lexicon, we have adopted a concept of collective intelligence as a model for crowdsourcing. In addition, a concept of folksonomy has been implemented in the process of taxonomy to help collective intelligence. In order to make up for an inherent weakness of folksonomy, we have adopted a majority rule by building a voting system. Participants, as voters were offered three voting options to choose from positivity, negativity, and neutrality, and the voting have been conducted on one of the largest social networking sites for college students in Korea. More than 35,000 votes have been made by college students in Korea, and we keep this voting system open by maintaining the project as a perpetual study. Besides, any change in the sentiment score of words can be an important observation because it enables us to keep track of temporal changes in Korean language as a natural language. Lastly, our study offers a RESTful, JSON based API service through a web platform to make easier support for users such as researchers, companies, and developers. Finally, our study makes important contributions to both research and practice. In terms of research, our Korean sentiment lexicon plays an important role as a resource for Korean natural language processing. In terms of practice, practitioners such as managers and marketers can implement sentiment analysis effectively by using Korean sentiment lexicon we built. Moreover, our study sheds new light on the value of folksonomy by combining collective intelligence, and we also expect to give a new direction and a new start to the development of Korean natural language processing.

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF