• Title/Summary/Keyword: global networks

Search Result 883, Processing Time 0.023 seconds

An efficient Load Balanced Cost Calculation Scheme for QoS Routing (QoS 라우팅을 위한 부하균등 비용산정 방식)

  • Hong, Jong-Joon;Kim, Seung-Hoon;Lee, Kyoon-Ha
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.135-140
    • /
    • 2002
  • An efficient QoS routing scheme needs to find a path that satisfies a given QoS requirements while consuming as few resources as Possible. In this paper, we propose two schemes of calculating resources'costs one for on-demand and one for precomputation QoS routing schemes. These schemes are effective in respect to the global network utilization and the balanced use of network resources. We also propose a QoS routing scheme for transit and Intra traffic in a large scale of domain-based network. For a domain in the network, the routing scheme first precomputes K multip1e paths between all pairs of ingress and ogress border routers while considering balancing of the expected load. We, therefore, expect that the paths are bettor than any other paths in respect to reserving the network resources on Paths. The routine: scheme combines inter and intra domain routings seamlessly and uses the same cost calculation scheme. cote that our cost calculation schemes for both kinds of traffic could be used in existing QoS routing protocols without and modification in small and large scale of networks.

A Correction Security Framework for Reliable Internet Services (신뢰성 있는 인터넷 서비스 제공을 위한 교정 보안 프레임워크)

  • Lee, Seung-Min;Nam, Taek-Yong;Sohn, Sung-Won;Han, Chi-Moon
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.779-786
    • /
    • 2003
  • We propose a correction security framework as next generation security technology to provide secure and reliable Internet services. The framework guarantees durability of the services in spite of external attack, intrusion, vulnerability for fault tolerance, and network management technology that covers the set of techniques aimed at providing rapid service recovery. The improvement technology includes system itself improvement and synamic improvement preventing faults from being re-activated, in cooperation with other systems such as vulnerability anaysis system, NMS, ESM. It is expected that our framework will be applied to global networks as well as system alone, and be able to guarantee the network survivability and reliable Internet services.

GIS- Based Predictive Model for Measure of Environmental Pollutant (GIS를 이용한 환경오염의 예측 모델)

  • Lee, Ja-Won
    • Journal of the Korean association of regional geographers
    • /
    • v.14 no.2
    • /
    • pp.114-125
    • /
    • 2008
  • Colored dissolved organic matter(CDOM) is an important component of ocean color that can be used as an invaluable tool in water quality and ocean color studies. With the largest source of coastal CDOM appearing to be from freshwater discharge into the ocean, coastal predictive models will do much to refine our knowledge about major processes that control CDOM distributions in coastal waters and provide a better insight into the global carbon cycle. This study aims at developing a GIS-based watershed-scale predictive model of CDOM distributions in Neponset river watersheds that can be used to appraise our understanding of CDOM sources and distributions in coastal waters and predict the response of CDOM concentration to changes in land use patterns. Weighting factors are developed for CDOM freshwater sources after extensive groundtruthing from various landuse types in the watershed. This model makes use of a publicly available DEM(Digital elevation model) as the base data for analysis. Stream networks, discharge, and land use data are used from public repositories while sub- watershed delineation, pour-points, and land use parcels are generated using Spatial Analysis of ArcGIS 9.2 to estimate the CDOM loading from various sources to the lower tributaries of rivers. The Neponset Watershed in eastern Massachusetts is selected as the site for development of the model.

  • PDF

An analysis of Changes of International Terrorisms of IS (IS테러를 중심으로 한 국제테러의 변화양상 분석)

  • Oh, Seiyouen
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.429-435
    • /
    • 2015
  • This study analyzes the changes of international terrorisms which are caused by IS through literature investigation, statistics and case analysis, and gives an understanding about recent trend of the terrorisms and aggressive method. Moreover, this study is for presenting a basic standard about an effective counterplan of the terrorisms. The results of this study are summarized as follows. First of all, there is a change of terrorism that homegrown terrorism grows into wolf-pack terrorism. Second, the terrorists show psychological terror by expanding their targets and using brutal and indiscriminate terrorism attacks. Third, the terrorists use networks of internet and SNS as a resource and as a tool for publicity activities of their groups. Forth, the terrorists have form of global organization through ties of other terrorists like middle-east or Africa.

Wireless Caching Techniques Based on Content Popularity for Network Resource Efficiency and Quality of Experience Improvement (네트워크 자원효율 및 QoE 향상을 위한 콘텐츠 인기도 기반 무선 캐싱 기술)

  • Kim, Geun-Uk;Hong, Jun-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1498-1507
    • /
    • 2017
  • According to recent report, global mobile data traffic is expected to increase by 11 times from 2016 to 2020. Moreover, this growth is expected to be driven mainly by mobile video traffic which is expected to account for about 70% of the total mobile data traffic. To cope with enormous mobile traffic, we need to understand video traffic's characteristic. Recently, the repetitive requests of some popular content such as popular YouTube videos cause a enormous network traffic overheads. If we constitute a network with the nodes capable of content caching based on the content popularity, we can reduce the network overheads by using the cached content for every request. Through device-to-device, multicast, and helpers, the video throughput can improve about 1.5~2 times and prefix caching reduces the playback delay by about 0.2~0.5 times than the conventional method. In this paper, we introduce some recent work on content popularity-based caching techniques in wireless networks.

Joint Crediting Mechanism under the Paris Agreement and Its Implication to the Climate Policy in Korea

  • Jung, Tae Yong;Sohn, Jihyun
    • Journal of Climate Change Research
    • /
    • v.7 no.4
    • /
    • pp.373-381
    • /
    • 2016
  • Before the Conference of Parties (COP) 21 of the United Nations Framework Convention on Climate Change (UNFCCC) in 2015, most parties of UNFCCC had submitted their intended nationally determined contributions (INDCs) and to achieve their voluntary targets, some parties consider using international market mechanisms. As one of such mechanisms, Japan promoted its own bilateral mechanism called Joint Crediting Mechanism (JCM). In this study, feasibility studies and projects under JCM have been analyzed by project type, sector, country and region, which could provide some implications in designing Korea's future climate policy to achieve Korea's targets of 11.7% using international market mechanism in INDC. Since 2010, JCM has promoted 542 projects and feasibility studies in 44 countries according to the Institute for Global Environmental Strategies (IGES) database. Among 542 projects, about 80% were feasibility studies implying that JCM was more focused on project identification. However, current trends of JCM show that more projects will be soon implemented based on these feasibility studies. For sectoral categorization, projects were categorized into seven sectors-energy technology, energy efficiency, renewable energy, waste management, city, strategic planning and projects related to the country's efforts to reduce emissions from deforestation and forest degradation (REDD+). JCM projects were mitigation focused with more than 70% of projects were related to energy efficiency, renewable energy and energy technology. At the regional and country level, JCM is highly focused on Asia and especially, more than 100 projects were developed in Indonesia. Based on the analysis of JCM, in order to develop bilateral international mechanism for Korea, it is worthwhile to emphasize that Korea considers Asian countries as her partner. In addition, Korea may consider the collaboration with Multilateral Development Banks (MDBs) to implement projects identified by Korea and Asian partner countries. Furthermore, strategically, it is recommendable to develop jointly with Japan who has already capacity and networks with other Asian countries to mitigate GHG emissions. Such financial resources from MDBs and Japan may contribute to meet the 11.3% of GHG reduction target from abroad according to INDC of Korea.

A study on the overseas expansion strategy of domestic ICT companies in the post-corona era -Focusing on case studies of ICT companies- (포스트 코로나 시대의 국내 ICT기업의 해외 진출 전략에 관한 연구 -ICT 기업 사례분석을 중심으로-)

  • Park, Sang-Hee;Kim, Ki-Yoon;Jung, Hyun-Seung;Hyun, Daiwon
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.163-173
    • /
    • 2021
  • The purpose of this study was to explore a support model for domestic ICT companies to advance into overseas markets suitable for the post-corona era along with the rapidly changing global economic situation. As a result of the analysis, first, by analyzing the internationalization cases of domestic ICT companies through the realization theory, in the COVID-19 situation, domestic ICT companies organically respond to crisis situations through ad hoc responses, use of international networks, use of external organizations, and resource-based practices. Through qualitative analysis, we were able to confirm that we are growing overseas while achieving our goals. In addition, strategies for domestic ICT companies to grow through internationalization were derived. Ultimately, it was interpreted as a part that required advancement of government policy according to the government's overseas expansion support system.

A Study on the Concept of the Cyber Warfare and the Plan of Reaction (사이버전의 개념과 대응방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.521-524
    • /
    • 2014
  • Because of the development of computers and networks, the use of the internet has been rapidly increased. The smart devices, such as smart phones and tablet PCs, have made an epoch-making changes, which have brought people's daily lives to the cyber world and life values have been improved. The cyber world not only just changed individual's lives, but also affected all areas and the world. The recent global trends reside mainly in protection of energy sources, and nation's dependency of the information system such as politic, economic and national security. Since major national infrastructure becomes a stragic attack target, the importance of cyber warfare has rised as an effective way to attact enermy. This article explores the concept of cyber warfare and national cyber capability, and then figure out the plan of reaction to minimize damages with best protection when cyber warfare occurs.

  • PDF

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.

Network Analysis of the Intellectual Structure of Addiction Research in Social Sciences: Based on the KCI Articles Published in 2019 (사회과학 중독연구 분야의 지적구조에 관한 네트워크 분석 : 2019년도 KCI 등재 논문을 기반으로)

  • Lee, Serim;Chun, JongSerl
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.21-37
    • /
    • 2021
  • This study investigated the intellectual structure of the latest trends in Korean addiction research in the social sciences. A network analysis of keywords with co-word occurrence was performed on 172 papers from the KCI database based on the data from the year of 2019, and a total of 432 keywords were extracted. The network analysis was performed using several programs: Bibexcel, COOC, WNET, and NodeXL. As a result of the study, keywords related to addiction type, study subjects, research methods, and research variables were found, and a total of 20 clusters were identified. Furthermore, to identify and measure weighted networks, the relationships between each keyword were explored and discussed in detail through a network analysis of global centralities, local centralities, and betweenness centralities. The study indicated that the latest issues were focused on smartphone addiction and provided implications for the future research and practice that fields and topics of relationship addiction, food addiction, and work addiction should be more considered. Further, the study discussed the relationship between drug addiction-crime, alcohol addiction-family, and gambling addiction-motivation and the necessity of qualitative study.