• Title/Summary/Keyword: network virtualization

Search Result 246, Processing Time 0.022 seconds

Research Institutes Network Analysis on the Established Research Equipment : Ministry of Knowledge Economy R&D Business Project (연구장비 구축 연구기관 네트워크 분석 : 지식경제부 R&D 사업 대상)

  • Ham, Myoung-In;Lee, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.307-317
    • /
    • 2013
  • This study aims to investigate the research equipment establishing relationship by looking at research equipment information transfer that follows the network's structural and positional characteristics and the research institute's responsibilities to increase the possibility of research equipment usage by using the SNA(Social Network Analysis) method. Consequently, with the given structural characteristics of research institute, it can be concluded that because of its low density, it appears to be difficult to transfer research equipment information within the network. Government-funded research institutes that can effectively deliver research equipment information within the network system through comparison positional characteristics are ETRI, KITECH, KRICT, Sungkyungwan University, and Kyungbook National University. In addition, a virtualization node not only invigorates the network system but also acts as an intermediary factor to effectively deliver research equipment information. As results, there can be three conceivable alternatives to increase the possibility of research equipment usage. Those includes: 1. policy to encourage relationship building among research institutes 2. utilizing suitable institutes for effective delivery of research equipment information and lastly, 3. establishing a virtual intermediary institute for information sharing and utilization of isolated institutes' research equipments.

PosCFS+: A Self-Managed File Service in Personal Area Network

  • Lee, Woo-Joong;Kim, Shi-Ne;Park, Chan-Ik
    • ETRI Journal
    • /
    • v.29 no.3
    • /
    • pp.281-291
    • /
    • 2007
  • Wearable computers consisting of various small devices such as smart phones, digital cameras, MP3 players and specialized I/O devices in personal area networks will play an important role in future ubiquitous computing. In this environment, accessing user data is quite complex due to the dynamic and heterogeneous characteristics of the underlying networks. Moreover, since the amount of user data increases rapidly, automatic data backup management is also critical. To overcome these challenges, several studies have been conducted including our previously proposed file service system, PosCFS, which could be adapted to the requirements with a virtualization technique allowing per-user global namespace for managing and accessing data stored on physical storage spaces detected in PAN. In this paper, we present a smart file service framework, PosCFS+ which is an improved and extended version of our previous work. Performance improvement is made possible by redesigning the metadata management scheme based on database and keywords rather than ontology. In addition, the automatic data replication management is newly designed based on the OSD protocol.

  • PDF

Central Control over Distributed Service Function Path

  • Li, Dan;Lan, Julong;Hu, Yuxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.577-594
    • /
    • 2020
  • Service Function Chaining (SFC) supports services through linking an ordered list of functions. There may be multiple instances of the same function, which provides a challenge to select available instances for all the functions in an SFC and generate a specific Service Function Path (SFP). Aiming to solve the problem of SFP selection, we propose an architecture consisting of distributed SFP algorithm and central control mechanism. Nodes generate distributed routings based on the first function and destination node in each service request. Controller supervises all of the distributed routing tables and modifies paths as required. The architecture is scalable, robust and quickly reacts to failures because of distributed routings. Besides, it enables centralized and direct control of the forwarding behavior with the help of central control mechanism. Simulation results show that distributed routing tables can generate efficient SFP and the average cost is acceptable. Compared with other algorithms, our design has a good performance on average cost of paths and load balancing, and the response delay to service requests is much lower.

Evaluation of Facilitating Factors for Cloud Service by Delphi Method (델파이 기법을 이용한 클라우드 서비스의 개념 정의와 활성화 요인 분석)

  • Suh, Jung-Han;Chang, Suk-Gwon
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.107-118
    • /
    • 2012
  • Recently, as the clouding computing begins to receive a great attention from people all over the world, it became the most popular buzz word in recent IT magazines or journal and heard it in many different services or different fields. However, a notion of the cloud service is defined vaguely compared to increasing attentions from others. Generally the cloud service could be understood as a specific service model base on the clouding computing, but the cloud, the cloud computing, the cloud computing service and cloud service, these four all terms are often used without any distinction of its notions and characteristics so that it's difficult to define the exact nature of the cloud service. To explore and analyze the cloud service systematically, an accurate conception and scope have to be preceded. Therefore this study is to firstly clarify its definition by Delpi method using expert group and then tries to provide the foundation needed to enable relative research such as establishing business model or value chain and policies for its activation to set off. For the Delpi, 16 experts participated in several surveys from different fields such industry, academy and research sector. As a result of the research, Characteristics of the Cloud Service are followings : Pay per use, Scalability, Internet centric Virtualization. And the scope as defined including Grid Computing, Utility Computing, Server Based Computing, Network Computing.

A Study on the Technologies of Storage Management System for Digital Contents (디지털콘텐츠의 저장관리시스템 기술에 관한 연구)

  • 조윤희
    • Journal of Korean Library and Information Science Society
    • /
    • v.34 no.2
    • /
    • pp.187-207
    • /
    • 2003
  • With the rapidly evolving information technologies and the Internet, a network-based storage management system is required that can efficiently save, search, modify, and manage digital contents which are increasing by geometric progression. Recently, the SAN became highlighted as a solution to such issues as the integrated data management for heterogeneous systems, the effective utilization of storage systems, and the limitation of data transfer. SAN allows for effective management and sharing of bulk data by directly connecting the storage systems, which used to be independently connected to servers, to the high-speed networks such as optical channels. In this study, I researched on the technologies, standardization and market trends of storage management systems, and performed comparative analyses of the structures, components, and performances for achieving the integration of diverse system storage systems as well as the virtualization of storage systems.

  • PDF

Research on the Trend of Utilizing Emulab as Cyber Security Research Framework (사이버 보안 연구 프레임워크로써의 Emulab 활용 동향 연구)

  • Lee, Man-Hee;Seok, Woo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1169-1180
    • /
    • 2013
  • Emulab is a research framework developed by Utah university, proving on-demend research environment service so that researchers can set up and use the environment at anytime. The main advantage of Emulab over other research methodologies like simulation or virtualization is to use real systems and networks using real operating systems, making the research environment much similar to the real world. Even though Emulab has been actively used in many areas such as security and network, there has been little use in Korea research community. As KISTI recently constructed a small Emulab, it is expected that many researchers and educators would make use of the Emulab. In this study, we introduce Emulab to Korea research community and give an overview of utilization trend of Emulab as a cyber security research framework.

A Study on Networking Technology for Cloud Data Centers (클라우드 데이터센터를 위한 네트워킹 기술에 관한 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.235-243
    • /
    • 2016
  • Legacy data centers are transforming toward cloud data centers according to the advance of mobile and Internet of Things technology, processing of big data, and development of cloud computing technology. The goal of cloud data centers is to efficiently manage energy and facility, and to rapidly provide service demands to users by operating virtualized ICT(Information and Communication Technology) resources. Accordingly, it requires to configure and operate networks for efficiently providing virtualized ICT resources. This paper analyzes networking technologies suitable for cloud data centers and presents ways to efficiently operate the data center.

BGP Session Takeover Method Based on Docker (Docker 기반의 BGP 세션 절체 방안)

  • Kim, Sang-il;Kim, Hwa-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.238-240
    • /
    • 2016
  • Recently, the improvement in the data communication networks in terms of availability and reliability is emerging as a critical issue. In this context, the high availability and reliability of routers that control data flow and routing path between networks on the data communication network are being recognized as critical problems. Many methods for providing high availability to minimize the loss cost caused by the failure of a router are being studied. This paper proposed a BGP session takeover method using the Docker to support the high availability of the BGP session and to improve the takeover performance.

Restful Web Services Composition Using Semantic Ontology for Elderly Living Assistance Services

  • Fattah, Sheik Mohammad Mostakim;Chong, Ilyoung
    • Journal of Information Processing Systems
    • /
    • v.14 no.4
    • /
    • pp.1010-1032
    • /
    • 2018
  • Recent advances in medical science have made people live longer, which has affected many aspects of life, such as caregiver burden, increasing cost of healthcare, increasing number of disabled and depressive disorder persons, and so on. Researchers are now focused on elderly living assistance services in smart home environments. In recent years, assisted living technologies have rapidly grown due to a faster growing aging society. Many smart devices are now interconnected within the home network environment and such a home setup supports collaborations between those devices based on the Internet of Things (IoT). One of the major challenges in providing elderly living assistance services is to consider each individual's requirements of different needs. In order to solve this, the virtualization of physical things, as well as the collaboration and composition of services provided by these physical things should be considered. In order to meet these challenges, Web of Objects (WoO) focuses on the implementation aspects of IoT to bring the assorted real world objects with the web applications. We proposed a semantic modelling technique for manual and semi-automated service composition. The aim of this work is to propose a framework to enable RESTful web services composition using semantic ontology for elderly living assistance services creation in WoO based smart home environment.

A Secure Attribute-based Authentication Scheme for Cloud Computing (클라우드 컴퓨팅을 위한 안전한 속성기반 인증 기법)

  • Moon, Jongho;Choi, Younsung;Won, Dongho
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.345-350
    • /
    • 2016
  • Cloud computing services have different characteristics from the traditional computing environment such as resource sharing, virtualization, etc. These characteristics of cloud computing environment necessitate specific properties such as user identify, access control, security control property, etc. Recently, Yoo proposed an attribute-based authentication scheme for secure cloud computing. However, Yoo's authentication scheme is vulnerable to customer attack and an adversary can modify the authentication request message. In this paper, we propose a secure and efficient attribute-based authentication scheme for cloud computing based on Yoo's scheme.