• Title/Summary/Keyword: Research Network

Search Result 14,886, Processing Time 0.039 seconds

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Design of Interface Specification for Smart Buoys in Maritime Environment (해상 환경에 적합한 스마트 항로표지용 인터페이스 규격 설계)

  • Junsu Kim;Yangseop Kim;Sungyoon Cho;Donghyun Kim;Kiwon Kwon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.180-181
    • /
    • 2023
  • 본 논문은 해양 환경에서 항로표지 내에 탑재되는 등명기, 배터리, BMS, 통신장치 등의 전원 공급 및 각 모듈들 간의 유선 데이터 통신에 사용할 수 있는 커넥터 인터페이스 규격을 제시한다. 제안하는 규격은 M12 커넥터 규격을 이용하여 내구성을 확보하고 방수방진을 지원한다. 이를 통해 극한의 온·습도에 노출되며 태풍, 파도 등의 변수가 많은 해양 환경에서의 안정적인 연결성 유지를 기대할 수 있다.

  • PDF

Determinants of Writing Research According to International Standards in Web of Science Journals

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.94-102
    • /
    • 2021
  • The study aimed to define all the main determinants of writing a research paper in an integrated manner within the requirements of the science network journals, by introducing scientific research and the steps of writing a research paper, starting from choosing the title to writing the abstract, identifying the research problem, questions, importance and objectives of the study, how to choose previous studies, research methodology and tools, discussion and results In addition to determining the acceptable percentage of plagiarism for science network journals, recommendations, choosing appropriate references and choosing the appropriate references, in addition to determining the acceptable percentage of plagiarism for the journals of the Network of Science, the researcher used the method of analytical investigative research to find out the axes of the study and analyze different reference citation methods to deal with different sources of information (articles-books-theses-conference works-reviews), In addition to studying the most important international programs for measuring plagiarism ratios that are accredited within the journals of the Science Network, and the study concluded that the researcher must present original and innovative results, add an integrated and logical work, take into account all the scientific conditions in the design of the research, its steps and ethics, and take into account the international standards in citing Reference, taking into account the rates of plagiarism within Web of Science journals.

VIMS: Design and Implementation of Virtual Network Integrated Control and Management Framework over National Research Network (연구망에서 가상네트워크 통합제어플랫폼 구현 및 실험)

  • Cho, Ilkwon;Kang, Sun-Moo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.10
    • /
    • pp.877-888
    • /
    • 2012
  • Network virtualization technology is a crucial research issue of Future Internet which pursues a service-oriented architecture so-called NaaS (Network as a Service) or SDN (Software Defined Network). Network virtualization is expected to play an important role in Future Internet researches as a network testbed technology which enables innovative protocols to be experimented independently on a common testbed environment. We propose a control framework in order to provide user defined topology and bandwidth services with network virtualization and to separate and manage multiple-user traffics in a small and medium scale - single domain research network. The proposed framework (VIMS; Virtual network Integrated control and Management System) supports testbed expansions without any changes of heterogeneous virtual network support equipments through accommodation of each equipment's control plane. The framework shows a feasibility through applied to KOREN and we describe the differences and further study directions for improvement the framework comparing with GENI control framework.

CONTEXT-AWARE ROUTING ARCHITECTURE ON TELEMATICS SENSOR COMMUNICATION NETWORK

  • Lee Eunkyu;Kim Minsoo;Jang Byung-Tae
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.546-549
    • /
    • 2005
  • It is evident that advancement of ubiquitous technologies in the near future guarantees more convenient and plentiful living. With regarding to car life, we dream of an automatic driving without any effort of operation. This paper touches the realization issue, a convergence of wireless sensor network and Telematics specializing on an information routing mechanism between participating components in Telematics sensor communication network. We list up new requirements of wireless sensor network deployed for Telematics services. Then context-aware routing architecture is proposed in order to solve these constraints, in which a network topology for routing can be dynamically configured according to the combination of context models of network components.

  • PDF

Reliability-guaranteed multipath allocation algorithm in mobile network

  • Jaewook Lee;Haneul Ko
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.936-944
    • /
    • 2022
  • The mobile network allows redundant transmission via disjoint paths to support high-reliability communication (e.g., ultrareliable and low-latency communications [URLLC]). Although redundant transmission can improve communication reliability, it also increases network costs (e.g., traffic and control overhead). In this study, we propose a reliability-guaranteed multipath allocation algorithm (RG-MAA) that allocates appropriate paths by considering the path setup time and dynamicity of the reliability paths. We develop an optimization problem using a constrained Markov decision process (CMDP) to minimize network costs while ensuring the required communication reliability. The evaluation results show that RG-MAA can reduce network costs by up to 30% compared with the scheme that uses all possible paths while ensuring the required communication reliability.

An ICN In-Network Caching Policy for Butterfly Network in DCN

  • Jeon, Hongseok;Lee, Byungjoon;Song, Hoyoung;Kang, Moonsoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1610-1623
    • /
    • 2013
  • In-network caching is a key component of information-centric networking (ICN) for reducing content download time, network traffic, and server workload. Data center network (DCN) is an ideal candidate for applying the ICN design principles. In this paper, we have evaluated the effectiveness of caching placement and replacement in DCN with butterfly-topology. We also suggest a new cache placement policy based on the number of routing nodes (i.e., hop counts) through which travels the content. With a probability inversely proportional to the hop counts, the caching placement policy makes each routing node to cache content chunks. Simulation results lead us to conclude (i) cache placement policy is more effective for cache performance than cache replacement, (ii) the suggested cache placement policy has better caching performance for butterfly-type DCNs than the traditional caching placement policies such as ALWASYS and FIX(P), and (iii) high cache hit ratio does not always imply low average hop counts.

Analysis of Research Trends of Lifelong Education through Social Network (사회연결망을 통한 평생교육 연구동향 분석)

  • KIM, Taeyeon;KANG, Beodeul
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.29 no.1
    • /
    • pp.224-233
    • /
    • 2017
  • This study aims to analyze the research trend of lifelong education in Korea over the last 10 years based on social network analysis. To do this, a dataset has been collected from KCI (Korea Citation Index) database. According to the results of the study, firstly, the current status of lifelong education research by the year in the last 10 years showed a relatively high ratio between 2008 and 2009 and 2014 ~ 2015. Secondly, the most active networks between authors and journals constitute a key group in the order of 'Lifelong Education Study' and 'Lifelong Learning Society'. Thirdly, the research institutes with the largest number of lifelong education research papers are Soongsil University, Dong-Eui University, and Korea National Open University. In the network with the authors' network, the only authors were K8 working at Chonbuk National University, and the co-authors, H4, who works at Kyungpook National University, showed the most active network. Finally, the core keyword network based on the thesis topic was analyzed as having higher connection centrality in the order of 'lifelong education', 'lifelong educator', and 'university lifelong education'.

Home Gateway-based Home Network Access Control Mechanism (홈게이트웨이 기반 홈네트워크 접근제어 메커니즘)

  • Kim Geon-Woo;Kim Do-Woo;Lee Jun-Ho;Hwang Jin-Beon;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.733-736
    • /
    • 2006
  • As various mobile technologies, sensor technologies, remote control and network infrastructure are developing and expectations on quality of life are increasing, a lot of researches and developments on home network technologies and services are actively on going. Until now, home network is just beginning, and we are developing home network services necessary to users, incrementing easiness, however we need to research on the safety of home network system guaranteeing the easiness as the services are going actively. So, in this paper, we propose the access control mechanism for protecting the home network system against indoor/outdoor illegal accesses and unauthorized accesses.

  • PDF

Efficient Load Balancing Algorithms for a Resilient Packet Ring

  • Cho, Kwang-Soo;Joo, Un-Gi;Lee, Heyung-Sub;Kim, Bong-Tae;Lee, Won-Don
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.110-113
    • /
    • 2005
  • The resilient packet ring (RPR) is a data optimized ring network, where one of the key issues is on load balancing for competing streams of elastic traffic. This paper suggests three efficient traffic loading algorithms on the RPR. For the algorithms, we evaluate their efficiency via analysis or simulation.

  • PDF