• Title/Summary/Keyword: networking

Search Result 3,276, Processing Time 0.041 seconds

A Method for Enhancing Timely-Delivery and Security Using IGPT in Content-Centric Networking (콘텐츠 중심 네트워킹에서 IGPT를 이용한 적시성 및 보안성 향상 방안)

  • Jung, Seunghoon;Park, Heungsoon;Kwon, Taewook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.11
    • /
    • pp.743-754
    • /
    • 2014
  • Recently, Information-Centric Networking(ICN), different from traditional IP-based networking, has been highlighted. Content-Centric Networking(CCN), proposed by Van Jacobson, is a representative scheme of the ICN architectures. It can deliver messages slightly faster than the IP-based networking by focusing on the access and delivery to the content itself. However, CCN is restricted to distribute the information without transmitting the request packet in advance because it is pull-based architecture by content requester. In addition, it has a problem that the Pending Interest Table(PIT) could be overloaded easily when DDoS attack happens. In this paper, we suggest an algorithm using a push-based scheme without request packets and overcoming PIT overload situation by Interest Group Push Table(IGPT). The proposed scheme enables to transmit a large amount of content than an existing scheme during the same amount of time in terms of timely-delivery and security.

A Centralized Network Policy Controller for SDN-Based Service Overlay Networking (소프트웨어정의네트워크 기반의 서비스 오버레이 네트워킹을 위한 네트워크 정책 제어기)

  • Jo, Jinyong;Lee, Soyeon;Kong, JongUk;Kim, JongWon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.266-278
    • /
    • 2013
  • In this paper, to manage the efficient control of IP packet flows crossing multi-provider networks such as Internet, we propose a SDN(Software Defined Networking)-based policy controller. The proposed policy controller leverages the visibility of underlying network and manages both virtual links and ports to inter-connect networking elements. The controller is capable of quickly composing multiple on-demand virtual networks and dynamically managing the composed networks, thus it can provide more flexible and optimized overlay networking environment to end-user applications. More specifically, we first look into the proposed structure and features of policy controller. With two kinds of service applications, we then verify the applicability of the proposed controller by evaluating its service composition time.

The Impact of Information Access Monitoring between Dilemma of Unethical Information Sharing and Social Networking (비윤리적 정보공유 딜레마와 사회적 네트워킹 관계에서 정보접근 모니터링의 영향력)

  • Jung, Byoungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.91-105
    • /
    • 2018
  • The purpose of this study is to examine an immoral effectiveness decrease by information access monitoring between ethical dilemma and unethical information-sharing behavior. Firms are raising the demand of confidential information management and are highlighting the ethical awareness of organizational members. The individuals in organization are concerned information sharing for future-oriented social networking. To prevent their immoral behavior, Firms should consider investing the information access monitoring. This system is aiming at log verification of movement, storage and deletion on information and will reduce an ethical conflict and unethical behavior on employees. I used the structural equation methodology for this empirical study. The research model constructs the voluntary and involuntary dilemma of information sharing on the two independent-variables, the unethical information behavior and the improper networking reinforcement on the two dependent-variables and the information access monitoring the one mediating-variables. This model tests the power effect of direct path, indirect path and total path. According to the study, the two ethical dilemma of information sharing provided a high influence to the unethical sharing action and to the inappropriate social networking strengthens. However, the mediating role of information access monitoring shows the effect weakens of independent and dependent variables. Thus, the mediating variables appeared to be important for the controlling role of an unethical behavior and improper social networking. Ultimately, The firms will need to invest the information access monitoring for a compulsory ethics behavior of organizational members. In addition, this can hinder networking enhancements for future opportunistic behaviors.

A Comparative Study on Off-Path Content Access Schemes in NDN (NDN에서 Off-Path 콘텐츠 접근기법들에 대한 성능 비교 연구)

  • Lee, Junseok;Kim, Dohyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.12
    • /
    • pp.319-328
    • /
    • 2021
  • With popularization of services for massive content, the fundamental limitations of TCP/IP networking were discussed and a new paradigm called Information-centric networking (ICN) was presented. In ICN, content is addressed by the content identifier (content name) instead of the location identifier such as IP address, and network nodes can use the cache to store content in transit to directly service subsequent user requests. As the user request can be serviced from nearby network caches rather than from far-located content servers, advantages such as reduced service latency, efficient usage of network bandwidth, and service scalability have been introduced. However, these advantages are determined by how actively content stored in the cache can be utilized. In this paper, we 1) introduce content access schemes in Named-data networking, one of the representative ICN architectures; 2) in particular, review the schemes that allow access to cached content away from routing paths; 3) conduct comparative study on the performance of the schemes using the ndnSIM simulator.

The Influence of Online Social Networking on Individual Virtual Competence and Task Performance in Organizations (온라인 네트워킹 활동이 가상협업 역량 및 업무성과에 미치는 영향)

  • Suh, A-Young;Shin, Kyung-Shik
    • Asia pacific journal of information systems
    • /
    • v.22 no.2
    • /
    • pp.39-69
    • /
    • 2012
  • With the advent of communication technologies including electronic collaborative tools and conferencing systems provided over the Internet, virtual collaboration is becoming increasingly common in organizations. Virtual collaboration refers to an environment in which the people working together are interdependent in their tasks, share responsibility for outcomes, are geographically dispersed, and rely on mediated rather than face-to face, communication to produce an outcome. Research suggests that new sets of individual skill, knowledge, and ability (SKAs) are required to perform effectively in today's virtualized workplace, which is labeled as individual virtual competence. It is also argued that use of online social networking sites may influence not only individuals' daily lives but also their capability to manage their work-related relationships in organizations, which in turn leads to better performance. The existing research regarding (1) the relationship between virtual competence and task performance and (2) the relationship between online networking and task performance has been conducted based on different theoretical perspectives so that little is known about how online social networking and virtual competence interplay to predict individuals' task performance. To fill this gap, this study raises the following research questions: (1) What is the individual virtual competence required for better adjustment to the virtual collaboration environment? (2) How does online networking via diverse social network service sites influence individuals' task performance in organizations? (3) How do the joint effects of individual virtual competence and online networking influence task performance? To address these research questions, we first draw on the prior literature and derive four dimensions of individual virtual competence that are related with an individual's self-concept, knowledge and ability. Computer self-efficacy is defined as the extent to which an individual beliefs in his or her ability to use computer technology broadly. Remotework self-efficacy is defined as the extent to which an individual beliefs in his or her ability to work and perform joint tasks with others in virtual settings. Virtual media skill is defined as the degree of confidence of individuals to function in their work role without face-to-face interactions. Virtual social skill is an individual's skill level in using technologies to communicate in virtual settings to their full potential. It should be noted that the concept of virtual social skill is different from the self-efficacy and captures an individual's cognition-based ability to build social relationships with others in virtual settings. Next, we discuss how online networking influences both individual virtual competence and task performance based on the social network theory and the social learning theory. We argue that online networking may enhance individuals' capability in expanding their social networks with low costs. We also argue that online networking may enable individuals to learn the necessary skills regarding how they use technological functions, communicate with others, and share information and make social relations using the technical functions provided by electronic media, consequently increasing individual virtual competence. To examine the relationships among online networking, virtual competence, and task performance, we developed research models (the mediation, interaction, and additive models, respectively) by integrating the social network theory and the social learning theory. Using data from 112 employees of a virtualized company, we tested the proposed research models. The results of analysis partly support the mediation model in that online social networking positively influences individuals' computer self-efficacy, virtual social skill, and virtual media skill, which are key predictors of individuals' task performance. Furthermore, the results of the analysis partly support the interaction model in that the level of remotework self-efficacy moderates the relationship between online social networking and task performance. The results paint a picture of people adjusting to virtual collaboration that constrains and enables their task performance. This study contributes to research and practice. First, we suggest a shift of research focus to the individual level when examining virtual phenomena and theorize that online social networking can enhance individual virtual competence in some aspects. Second, we replicate and advance the prior competence literature by linking each component of virtual competence and objective task performance. The results of this study provide useful insights into how human resource responsibilities assess employees' weakness and strength when they organize virtualized groups or projects. Furthermore, it provides managers with insights into the kinds of development or training programs that they can engage in with their employees to advance their ability to undertake virtual work.

  • PDF

Following Firms on Twitter: Determinants of Continuance and Word-of-Mouth Intentions (트위터를 통한 기업과 고객과의 소통: 지속적인 팔로윙과 구전 의도에 영향을 미치는 요인에 대한 연구)

  • Kim, Hongki;Son, Jai-Yeol;Suh, Kil-Soo
    • Asia pacific journal of information systems
    • /
    • v.22 no.3
    • /
    • pp.1-27
    • /
    • 2012
  • Many companies have recently become interested in using social networking sites such as Twitter and Facebook as a new channel to communicate with their customers. For example, companies often offer "special deals" (e.g., coupons, discounts, free samples, etc.) to their customers who participate in promotions or events on social networking sites. Companies often make important announcements on their products or services on social networking sites. By doing so, customers are encouraged to continue to have relationships with companies on social networking sites and to recommend the companies' presence on social networking sites to other potential customers. Moreover, customers who keep close relationships with companies on social networking sites often provide the companies with valuable suggestions and feedback. For instance, Starbucks has more than 2 million followers on Twitter, and often receive suggestions and feedback for their product offerings and services from the followers on Twitter. Although companies realize potential benefits of using social networking sites as a channel to communicate with their customers, it appears that many companies have difficulty forging long-lasting relationships with customers on social networking sites. It is often reported that many customers who had followed companies on Twitter later stopped following them for various reasons. Therefore, it is an important issue to understand what motivates customers to continue to keep relationships with companies on social networking sites. Nonetheless, due attention has yet paid to this issue until recently. This study intends to contribute to our understanding on customers' intention to continue to follow companies on Twitter and to spread positive word-of-mouth about companies on Twitter. Specifically, we identify seven potential factors that customers perceive as important in evaluating their experience with companies on Twitter. The seven factors include similarity, receptivity, interactivity, ubiquitous connectivity, enjoyment, usefulness and transparency. We posit that the seven perception factors can affect the two types of satisfaction, emotional and cognitive, which can in turn influence on customers' intention to follow companies on Twitter and to spread positive word-of-mouth about companies on Twitter. Research hypotheses formulated in this study were tested with data collected from a questionnaire survey administered to customers who had been following companies on Twitter. The data was analyzed with the partial least square (PLS) approach to structural equation modeling. The results of data analysis based on 177 usable responses were generally supportive of our predictions for the effects of the seven factors identified and the two types of satisfaction. In particular, out results suggest that emotional satisfaction was strongly influenced by perceived similarity, perceived receptivity, perceived enjoyment, and perceived transparency. Cognitive satisfaction was significantly influenced by perceived similarity, perceived interactivity, perceived enjoyment, and perceived transparency. While cognitive satisfaction was found to have significant and positive effects on both continued following and word-of-mouth intentions, emotional satisfaction had a significant and positive effect only on word-of-mouth intention.

  • PDF

Rules Placement with Delay Guarantee in Combined SDN Forwarding Element

  • Qi, Qinglei;Wang, Wendong;Gong, Xiangyang;Que, Xirong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2870-2888
    • /
    • 2017
  • Recent studies have shown that the flow table size of hardware SDN switch cannot match the number of concurrent flows. Combined SDN Forwarding Element (CFE), which comprises several software switches and a hardware switch, becomes an alternative approach to tackle this problem. Due to the limited capacity of software switch, the way to route concurrent flows in CFE can largely affect the maximum delay that a flow suffers at CFE. As delay-guarantee is a nontrivial task for network providers with the increasing number of delay-sensitive applications, we propose an analytical model of CFE to evaluate a rules placement solution first. Next, we formulate the problem of Rules Placement with delay guarantee in CFE (RPCFE), and present the genetic-based rules placement (GARP) algorithm to solve the RPCFE problem. Further, we validate the analytical model of CFE through simulations in NS-3 and compare the performance of GARP with three benchmark algorithms.

A Study for Vulnerability of Security of the UPnP Home-Networking (UPnP 홈네트워크 보안 취약점에 관한 연구)

  • Oh, Im-Geol;Lee, Jong-Il
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.2
    • /
    • pp.30-36
    • /
    • 2007
  • The UPnP uses the same standard protocol as SSDP and UDP based on standard internet and technology like the TCP/IP, and is independent of other physical networking product. But the structure of the UPnP has the of vulnerability to the security countermeasure for home-networking technology since it is operated on the same protocol as the SSDP and UDP. In this paper, we analyze and report against the DoS attack, where the worm virus, using the vulnerability to the UPnP, eliminates the attack of all equipments that are based on networking and eliminates the information belonging to the equipments of the home-networking or transmits the massive data.

  • PDF

A Study on Transport Protocol for High Speed Networking

  • Kwon, Yoon-Joo;Seok, Woo-Jin;Byeon, Ok-Hwan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.211-214
    • /
    • 2005
  • There are emerging many eScience applications. More and more scientists want to collaborate on their investigation with international partners without space limitation by using these applications. Since these applications have to analyze the massive raw data, scientists need to send and receive the data in short time. So today's network related requirement is high speed networking. The key point of network performance is transport protocol. We can use TCP and UDP as transport protocol but we use TCP due to the data reliability. However, TCP was designed under low bandwidth network, therefore, general TCP, for example Reno, cannot utilize the whole bandwidth of high capacity network. There are several TCP variants to solve TCP problems related to high speed networking. They can be classified into two groups: loss based TCP and delay based TCP. In this paper, I will compare two approaches of TCP variants and propose a hybrid approach for high speed networking.

  • PDF

Identity Based Proxy Re-encryption Scheme under LWE

  • Yin, Wei;Wen, Qiaoyan;Li, Wenmin;Zhang, Hua;Jin, Zheng Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6116-6132
    • /
    • 2017
  • The proxy re-encryption allows an intermediate proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the original message and leaking out relevant information. Unlike many prior identity based proxy re-encryption schemes which are based on the number theoretic assumptions such as large integer factorization and discrete logarithm problem. In this paper, we first propose a novel identity based proxy re-encryption scheme which is based on the hardness of standard Learning With Error(LWE) problem and is CPA secure in the standard model. This scheme can be reduced to the worst-case lattice hard problem that is able to resist attacks from quantum algorithm. The key step in our construction is that the challenger how to answer the private query under a known trapdoor matrix. Our scheme enjoys properties of the non-interactivity, unidirectionality, anonymous and so on. In this paper, we utilize primitives include G-trapdoor for lattice and sample algorithms to realize simple and efficient re-encryption.