• 제목/요약/키워드: networking

검색결과 3,279건 처리시간 0.023초

콘텐츠 중심 네트워킹에서 IGPT를 이용한 적시성 및 보안성 향상 방안 (A Method for Enhancing Timely-Delivery and Security Using IGPT in Content-Centric Networking)

  • 정승훈;박흥순;권태욱
    • 한국통신학회논문지
    • /
    • 제39B권11호
    • /
    • pp.743-754
    • /
    • 2014
  • 최근에 기존 IP기반과는 다른, 정보 중심 네트워킹이 부각되고 있으며 그 중의 하나인 Content-Centric Networking(CCN)은 Van Jacobson에 의해 처음 제안되어 대표적인 정보 중심 네트워킹 패러다임으로 활발히 연구되고 있다. CCN은 콘텐츠 자체에 대한 접근과 전달에 목표를 두고 라우터에서 콘텐츠의 배분이 가능토록 하여 IP 방식보다 좀 더 빠르게 콘텐츠가 전달되도록 하는 장점을 가지고 있다. 하지만, CCN은 정보요청자 기준의 통신(pull-based)으로 사전 요청패킷의 전송없이 정보를 분배하는 것이 제한된다. 또한, PIT(Pending Interest Table)의 사용으로 DDoS 공격 등을 받을 시 PIT 메모리 오버로드의 문제점이 있다. 이에 본 논문은 CCN에서 요청패킷 없이 정보를 전달하는 push-based 기법과 PIT 오버로드 상황에서 데이터 전달이 가능하도록 Interest Group Pushing Table(IGPT)을 활용한 정보전송 방법을 제안한다. 제안하는 기법은 데이터 전송의 신속성 및 보안성 향상 측면에서 기존의 기법보다 동일 시간동안 많은 양의 콘텐츠 전송이 가능하다.

소프트웨어정의네트워크 기반의 서비스 오버레이 네트워킹을 위한 네트워크 정책 제어기 (A Centralized Network Policy Controller for SDN-Based Service Overlay Networking)

  • 조진용;이소연;공정욱;김종원
    • 한국통신학회논문지
    • /
    • 제38B권4호
    • /
    • pp.266-278
    • /
    • 2013
  • 본 논문은 인터넷과 같은 다중제공자(multi-provider) 네트워크 환경 하에서 패킷 플로우를 효과적으로 제어하기 위한 SDN(Software Defined Networking) 기반의 정책 제어기를 소개한다. 제안된 정책 제어기는 네트워크 가시성 정보를 이용해 가상링크 및 가상포트 등을 직관적으로 제어함으로써 효과적인 서비스 오버레이 네트워킹(service overlay networking) 환경을 실현한다. 또한, 논리적으로 구분된 다수의 주문형 가상망을 신속히 구성하고 동적으로 관리함으로써 응용에 최적화된 네트워킹 환경을 사용자에게 제공한다. 본 논문에서는 정책 제어기의 구조 및 특징을 소개한 후, 멀티캐스트를 위한 두 가지 서비스 응용을 예시한다. 또한, 해당 응용들을 이용한 네트워크 서비스의 구성 시간을 성능 평가함으로써 정책 제어기의 적용 가능성을 확인한다.

비윤리적 정보공유 딜레마와 사회적 네트워킹 관계에서 정보접근 모니터링의 영향력 (The Impact of Information Access Monitoring between Dilemma of Unethical Information Sharing and Social Networking)

  • 정병호
    • 디지털산업정보학회논문지
    • /
    • 제14권2호
    • /
    • pp.91-105
    • /
    • 2018
  • The purpose of this study is to examine an immoral effectiveness decrease by information access monitoring between ethical dilemma and unethical information-sharing behavior. Firms are raising the demand of confidential information management and are highlighting the ethical awareness of organizational members. The individuals in organization are concerned information sharing for future-oriented social networking. To prevent their immoral behavior, Firms should consider investing the information access monitoring. This system is aiming at log verification of movement, storage and deletion on information and will reduce an ethical conflict and unethical behavior on employees. I used the structural equation methodology for this empirical study. The research model constructs the voluntary and involuntary dilemma of information sharing on the two independent-variables, the unethical information behavior and the improper networking reinforcement on the two dependent-variables and the information access monitoring the one mediating-variables. This model tests the power effect of direct path, indirect path and total path. According to the study, the two ethical dilemma of information sharing provided a high influence to the unethical sharing action and to the inappropriate social networking strengthens. However, the mediating role of information access monitoring shows the effect weakens of independent and dependent variables. Thus, the mediating variables appeared to be important for the controlling role of an unethical behavior and improper social networking. Ultimately, The firms will need to invest the information access monitoring for a compulsory ethics behavior of organizational members. In addition, this can hinder networking enhancements for future opportunistic behaviors.

NDN에서 Off-Path 콘텐츠 접근기법들에 대한 성능 비교 연구 (A Comparative Study on Off-Path Content Access Schemes in NDN)

  • 이준석;김도형
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제10권12호
    • /
    • pp.319-328
    • /
    • 2021
  • 인터넷에서의 대용량 콘텐츠들에 대한 서비스가 일반화됨에 따라 기존 TCP/IP 프로토콜에서의 비효율적인 데이터 전송에 대한 문제점들이 제기되었고, 그 결과로 정보중심네트워크 (Information-centric networking) 패러다임이 새롭게 제시되었다. 정보중심네트워크에서는 IP와 같은 위치 식별자를 대신하여 콘텐츠 이름을 통해 콘텐츠 접근이 이루어지며, 네트워크 노드들 (e.g., 라우터)은 캐시를 활용하여 전송중인 콘텐츠들을 저장하여 이후 발생하는 사용자 요청들에 대한 서비스를 수행할 수 있다. 사용자 요청이 멀리 위치한 콘텐츠 서버가 아닌 가까운 네트워크 캐시에서 서비스될 수 있게 됨에 따라 서비스 지연 감소, 네트워크 대역폭의 효율적 사용, 서비스 확장성 확보 등의 이점이 소개되었다. 그런데 이와 같은 정보중심네트워크에서의 이점들은 캐시에 저장되어 있는 콘텐츠가 얼마나 적극적으로 활용될 수 있느냐에 의해 결정될 수 있다. 본 논문에서는 1) 정보중심네트워크의 대표적인 아키텍쳐 중의 하나인 Named-data Networking (NDN) 에서의 콘텐츠 접근 기법에 대해 소개하고, 2) 특별히 라우팅 경로를 벗어나 캐시되어 있는 콘텐츠들을 접근할 수 있도록 하기 위해 제안된 기법들에 대한 리뷰를 진행하며, 3) ndnSIM 시뮬레이터를 활용해 이들 기법들에 대한 성능 비교 평가를 진행한다.

온라인 네트워킹 활동이 가상협업 역량 및 업무성과에 미치는 영향 (The Influence of Online Social Networking on Individual Virtual Competence and Task Performance in Organizations)

  • 서아영;신경식
    • Asia pacific journal of information systems
    • /
    • 제22권2호
    • /
    • pp.39-69
    • /
    • 2012
  • With the advent of communication technologies including electronic collaborative tools and conferencing systems provided over the Internet, virtual collaboration is becoming increasingly common in organizations. Virtual collaboration refers to an environment in which the people working together are interdependent in their tasks, share responsibility for outcomes, are geographically dispersed, and rely on mediated rather than face-to face, communication to produce an outcome. Research suggests that new sets of individual skill, knowledge, and ability (SKAs) are required to perform effectively in today's virtualized workplace, which is labeled as individual virtual competence. It is also argued that use of online social networking sites may influence not only individuals' daily lives but also their capability to manage their work-related relationships in organizations, which in turn leads to better performance. The existing research regarding (1) the relationship between virtual competence and task performance and (2) the relationship between online networking and task performance has been conducted based on different theoretical perspectives so that little is known about how online social networking and virtual competence interplay to predict individuals' task performance. To fill this gap, this study raises the following research questions: (1) What is the individual virtual competence required for better adjustment to the virtual collaboration environment? (2) How does online networking via diverse social network service sites influence individuals' task performance in organizations? (3) How do the joint effects of individual virtual competence and online networking influence task performance? To address these research questions, we first draw on the prior literature and derive four dimensions of individual virtual competence that are related with an individual's self-concept, knowledge and ability. Computer self-efficacy is defined as the extent to which an individual beliefs in his or her ability to use computer technology broadly. Remotework self-efficacy is defined as the extent to which an individual beliefs in his or her ability to work and perform joint tasks with others in virtual settings. Virtual media skill is defined as the degree of confidence of individuals to function in their work role without face-to-face interactions. Virtual social skill is an individual's skill level in using technologies to communicate in virtual settings to their full potential. It should be noted that the concept of virtual social skill is different from the self-efficacy and captures an individual's cognition-based ability to build social relationships with others in virtual settings. Next, we discuss how online networking influences both individual virtual competence and task performance based on the social network theory and the social learning theory. We argue that online networking may enhance individuals' capability in expanding their social networks with low costs. We also argue that online networking may enable individuals to learn the necessary skills regarding how they use technological functions, communicate with others, and share information and make social relations using the technical functions provided by electronic media, consequently increasing individual virtual competence. To examine the relationships among online networking, virtual competence, and task performance, we developed research models (the mediation, interaction, and additive models, respectively) by integrating the social network theory and the social learning theory. Using data from 112 employees of a virtualized company, we tested the proposed research models. The results of analysis partly support the mediation model in that online social networking positively influences individuals' computer self-efficacy, virtual social skill, and virtual media skill, which are key predictors of individuals' task performance. Furthermore, the results of the analysis partly support the interaction model in that the level of remotework self-efficacy moderates the relationship between online social networking and task performance. The results paint a picture of people adjusting to virtual collaboration that constrains and enables their task performance. This study contributes to research and practice. First, we suggest a shift of research focus to the individual level when examining virtual phenomena and theorize that online social networking can enhance individual virtual competence in some aspects. Second, we replicate and advance the prior competence literature by linking each component of virtual competence and objective task performance. The results of this study provide useful insights into how human resource responsibilities assess employees' weakness and strength when they organize virtualized groups or projects. Furthermore, it provides managers with insights into the kinds of development or training programs that they can engage in with their employees to advance their ability to undertake virtual work.

  • PDF

트위터를 통한 기업과 고객과의 소통: 지속적인 팔로윙과 구전 의도에 영향을 미치는 요인에 대한 연구 (Following Firms on Twitter: Determinants of Continuance and Word-of-Mouth Intentions)

  • 김홍기;손재열;서길수
    • Asia pacific journal of information systems
    • /
    • 제22권3호
    • /
    • pp.1-27
    • /
    • 2012
  • Many companies have recently become interested in using social networking sites such as Twitter and Facebook as a new channel to communicate with their customers. For example, companies often offer "special deals" (e.g., coupons, discounts, free samples, etc.) to their customers who participate in promotions or events on social networking sites. Companies often make important announcements on their products or services on social networking sites. By doing so, customers are encouraged to continue to have relationships with companies on social networking sites and to recommend the companies' presence on social networking sites to other potential customers. Moreover, customers who keep close relationships with companies on social networking sites often provide the companies with valuable suggestions and feedback. For instance, Starbucks has more than 2 million followers on Twitter, and often receive suggestions and feedback for their product offerings and services from the followers on Twitter. Although companies realize potential benefits of using social networking sites as a channel to communicate with their customers, it appears that many companies have difficulty forging long-lasting relationships with customers on social networking sites. It is often reported that many customers who had followed companies on Twitter later stopped following them for various reasons. Therefore, it is an important issue to understand what motivates customers to continue to keep relationships with companies on social networking sites. Nonetheless, due attention has yet paid to this issue until recently. This study intends to contribute to our understanding on customers' intention to continue to follow companies on Twitter and to spread positive word-of-mouth about companies on Twitter. Specifically, we identify seven potential factors that customers perceive as important in evaluating their experience with companies on Twitter. The seven factors include similarity, receptivity, interactivity, ubiquitous connectivity, enjoyment, usefulness and transparency. We posit that the seven perception factors can affect the two types of satisfaction, emotional and cognitive, which can in turn influence on customers' intention to follow companies on Twitter and to spread positive word-of-mouth about companies on Twitter. Research hypotheses formulated in this study were tested with data collected from a questionnaire survey administered to customers who had been following companies on Twitter. The data was analyzed with the partial least square (PLS) approach to structural equation modeling. The results of data analysis based on 177 usable responses were generally supportive of our predictions for the effects of the seven factors identified and the two types of satisfaction. In particular, out results suggest that emotional satisfaction was strongly influenced by perceived similarity, perceived receptivity, perceived enjoyment, and perceived transparency. Cognitive satisfaction was significantly influenced by perceived similarity, perceived interactivity, perceived enjoyment, and perceived transparency. While cognitive satisfaction was found to have significant and positive effects on both continued following and word-of-mouth intentions, emotional satisfaction had a significant and positive effect only on word-of-mouth intention.

  • PDF

Rules Placement with Delay Guarantee in Combined SDN Forwarding Element

  • Qi, Qinglei;Wang, Wendong;Gong, Xiangyang;Que, Xirong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권6호
    • /
    • pp.2870-2888
    • /
    • 2017
  • Recent studies have shown that the flow table size of hardware SDN switch cannot match the number of concurrent flows. Combined SDN Forwarding Element (CFE), which comprises several software switches and a hardware switch, becomes an alternative approach to tackle this problem. Due to the limited capacity of software switch, the way to route concurrent flows in CFE can largely affect the maximum delay that a flow suffers at CFE. As delay-guarantee is a nontrivial task for network providers with the increasing number of delay-sensitive applications, we propose an analytical model of CFE to evaluate a rules placement solution first. Next, we formulate the problem of Rules Placement with delay guarantee in CFE (RPCFE), and present the genetic-based rules placement (GARP) algorithm to solve the RPCFE problem. Further, we validate the analytical model of CFE through simulations in NS-3 and compare the performance of GARP with three benchmark algorithms.

UPnP 홈네트워크 보안 취약점에 관한 연구 (A Study for Vulnerability of Security of the UPnP Home-Networking)

  • 오임걸;이종일
    • 한국산업정보학회논문지
    • /
    • 제12권2호
    • /
    • pp.30-36
    • /
    • 2007
  • UPnP는 TCP/IP와 같은 인터넷 표준과 기술을 기반으로 한 SSDP, UDP와 동일한 표준 프로토콜을 사용하고 있으며, 다른 물리적 네트워킹 제품에 독립적이다. 그러나 UPnP의 구조가 SSDP, UDP같은 프로토콜 위에서 동작하기 때문에 홈네트워킹 기술에 대한 보안 대책에서 취약점을 가지고 있다. 그러므로 본 논문에서는 UPnP 취약점을 이용한 웜 바이러스가 네트워크 기반의 모든 장비들의 공격 및 홈네트워킹 장비내의 정보를 삭제하거나 대량의 데이터를 전송하는 DoS 공격에 대해서 분석 보고 한다.

  • PDF

A Study on Transport Protocol for High Speed Networking

  • Kwon, Yoon-Joo;Seok, Woo-Jin;Byeon, Ok-Hwan
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.211-214
    • /
    • 2005
  • There are emerging many eScience applications. More and more scientists want to collaborate on their investigation with international partners without space limitation by using these applications. Since these applications have to analyze the massive raw data, scientists need to send and receive the data in short time. So today's network related requirement is high speed networking. The key point of network performance is transport protocol. We can use TCP and UDP as transport protocol but we use TCP due to the data reliability. However, TCP was designed under low bandwidth network, therefore, general TCP, for example Reno, cannot utilize the whole bandwidth of high capacity network. There are several TCP variants to solve TCP problems related to high speed networking. They can be classified into two groups: loss based TCP and delay based TCP. In this paper, I will compare two approaches of TCP variants and propose a hybrid approach for high speed networking.

  • PDF

Identity Based Proxy Re-encryption Scheme under LWE

  • Yin, Wei;Wen, Qiaoyan;Li, Wenmin;Zhang, Hua;Jin, Zheng Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.6116-6132
    • /
    • 2017
  • The proxy re-encryption allows an intermediate proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the original message and leaking out relevant information. Unlike many prior identity based proxy re-encryption schemes which are based on the number theoretic assumptions such as large integer factorization and discrete logarithm problem. In this paper, we first propose a novel identity based proxy re-encryption scheme which is based on the hardness of standard Learning With Error(LWE) problem and is CPA secure in the standard model. This scheme can be reduced to the worst-case lattice hard problem that is able to resist attacks from quantum algorithm. The key step in our construction is that the challenger how to answer the private query under a known trapdoor matrix. Our scheme enjoys properties of the non-interactivity, unidirectionality, anonymous and so on. In this paper, we utilize primitives include G-trapdoor for lattice and sample algorithms to realize simple and efficient re-encryption.