• Title/Summary/Keyword: networking of networks

Search Result 815, Processing Time 0.029 seconds

Including P4 and AI: A Survey on SDN Security (P4 와 AI 포함된 SDN 보안 기술 동향 연구 )

  • Xiang Li;Yeonjoon Lee
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.200-202
    • /
    • 2023
  • SDN (Software Defined Networking) is an emerging networking system which differs from traditional network architecture. Moreover SDN has many advantages and special capabilities that traditional networks do not have. SDN and P4 are related in that they can be combined to create more advanced and intelligent networking systems. Additionally, Al has emerged as a transformative force in various fields, including SDN. By applying Al and P4 to SDN, network administrators can leverage the power of them to make impact on SDN security. We offer an overview of recent trend of SDN security integrating P4 a nd Al in this study.

Performance Evaluation of User Mobility Management Scheme based-on Dwell Time Optimization for Effective Inter-working with Heterogeneous Networks under Cognitive Networking Environments (인지 네트워킹 환경 하에서 체류시간 관리 최적화를 통한 사용자 이동성 모델 기반 이동성 관리방법의 성능평가)

  • Choi, Yu-Mi;Kim, Jeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.5
    • /
    • pp.77-83
    • /
    • 2012
  • The importance of mobility management is becoming to be one of the upcomming issues to be addressed to provide the converged services and the convergence of the heterogeneous network environments. In this paper, the new user mobility management scheme which can be utilized to model the user's mobility behaviors for interworking with heterogeneous overlay convergent networks under the time-varying radio propagation environment has been proposed. Thus user mobility management scheme based on user mobility model is considered in order to optimize the dwell time of users in the overlay convergent networks. This Mobile IP user mobility management will be very useful to model the user mobility behaviors and can be used to estimate the signaling traffic and frequency spectrum demands for massive data transfer for the heterogeneous overlay convergent networks.

Mobility-Aware Ad Hoc Routing Protocols for Networking Mobile Robot Teams

  • Das, Saumitra M.;Hu, Y. Charlie;Lee, C.S. George;Lu, Yung-Hsiang
    • Journal of Communications and Networks
    • /
    • v.9 no.3
    • /
    • pp.296-311
    • /
    • 2007
  • Mobile multi-robot teams are useful in many critical applications such as search and rescue. Explicit communication among robots in such mobile multi-robot teams is useful for the coordination of such teams as well as exchanging data. Since many applications for mobile robots involve scenarios in which communication infrastructure may be damaged or unavailable, mobile robot teams frequently need to communicate with each other via ad hoc networking. In such scenarios, low-overhead and energy-efficient routing protocols for delivering messages among robots are a key requirement. Two important primitives for communication are essential for enabling a wide variety of mobile robot applications. First, unicast communication (between two robots) needs to be provided to enable coordination and data exchange. Second, in many applications, group communication is required for flexible control, organization, and management of the mobile robots. Multicast provides a bandwidth-efficient communication method between a source and a group of robots. In this paper, we first propose and evaluate two unicast routing protocols tailored for use in ad hoc networks formed by mobile multi-robot teams: Mobile robot distance vector (MRDV) and mobile robot source routing (MRSR). Both protocols exploit the unique mobility characteristics of mobile robot networks to perform efficient routing. Our simulation study show that both MRDV and MRSR incur lower overhead while operating in mobile robot networks when compared to traditional mobile ad hoc network routing protocols such as DSR and AODV. We then propose and evaluate an efficient multicast protocol mobile robot mesh multicast (MRMM) for deployment in mobile robot networks. MRMM exploits the fact that mobile robots know what velocity they are instructed to move at and for what distance in building a long lifetime sparse mesh for group communication that is more efficient. Our results show that MRMM provides an efficient group communication mechanism that can potentially be used in many mobile robot application scenarios.

Design and Implementation of Self-networking and Replaceable Structure in Mobile Vector Graphics

  • Jeong Gu-Min;Na Seung-Won;Jung Doo-Hee;Lee Yang-Sun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.6
    • /
    • pp.827-835
    • /
    • 2005
  • In this paper, self-networking and replaceable structure in vector graphics contents are presented for wireless internet service. The wireless networks over 2G or 3G are limited in the sense of the speed and the cost. Considering these characteristics of wireless network, self-networking method and replaceable structure in downloaded contents are introduced in order to save the amount of data and provide variations for contents. During the display of contents, a certain data for the contents is downloaded from the server and it is managed appropriately for the operation of the contents. The downloaded materials are reflected to the original contents using replaceable structure. Also, the downloading and modification are independent of the play. In this implementation, the data consists of control data for control and resource data for image, sound or text. Comparing to the conventional methods which download the whole data, the amount of the transmitted data is very small since only the difference is downloaded. Also, during the play of the contents, the changes are adopted immediately. The whole functions are implemented in wireless handset and the various applications are discussed.

  • PDF

Corporate Marketing Strategy Using Social Media: A Case Study of the Ritz-Carlton Seoul

  • Lee, Jung Wan;Kwag, Michael
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.4 no.1
    • /
    • pp.79-86
    • /
    • 2017
  • With the increasing trend of popularity of websites and social networking sites, it is quite evident that companies need to take cautionary measures in protecting the reputations with respect to company and brands. In this process, every company should indulge in enhancing their company and brand image through websites and social networking sites that fortify the bonding nature among them. The always-on nature of websites and social networking sites has contributed to their phenomenal marketing power and altered the balance of power between consumers and firms. Websites and social networks are used by hundreds of millions of people to communicate about a huge range of topics, including personal interests, activities, social events and even public issues. The paper explores a case study of the Ritz-Carlton hotel for their marketing strategy and organizational use of their website and social media in communicating with their customers. Even for the normal luxury traveler who would not have previously used the Internet to research a hotel or make a reservation, ritzcarlton.com is making it possible for them to do so in a sense of the luxury and typical Ritz-Carlton style. It seems to be a staple of the company for years to come.

An Architecture for Key Management in Hierarchical Mobile Ad-hoc Networks

  • Rhee, Kyung-Hyune;Park, Young-Ho;Gene Tsudik
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.156-162
    • /
    • 2004
  • In recent years, mobile ad-hoc networks have received a great deal of attention in both academia and industry to provide anytime-anywhere networking services. As wireless networks are rapidly deployed, the security of wireless environment will be mandatory. In this paper, we describe a group key management architecture and key agreement protocols for secure communication in mobile ad-hoc wireless networks (MANETs) overseen by unmanned aerial vehicles (UAVs). We use implicitly certified public keys method, which alleviates the certificate overhead and improves computational efficiency. The architecture uses a two-layered key management approach where the group of nodes is divided into: 1) Cell groups consisting of ground nodes and 2) control groups consisting of cell group managers. The chief benefit of this approach is that the effects of a membership change are restricted to the single cell group.

Transmission Characteristics in LonWorks/IP-based Virtual Device Network (II)

  • Park, Gi-Heung;Song, Ki-Won;Kim, Jong-Hwi;Park, Gi-Sang
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.121.6-121
    • /
    • 2002
  • Web-based virtual machine/manufacturing system (VMS) utilizes Virtual Device Network (VDN.) VDN inevitably involves the implementation of Distributed Monitoring and Control Networks (DMCN). In general, one needs to integrate device (control) network and IP network to realize DMCN over IP network or internet, which can be viewed as a VDN. In this study, LonWorks networking technology is used for device network and the transmission characteristics of LonWorks/IP-based VDN is investigated. A method to minimize the transmission delay in the LonWorks/IP networks is also suggested.

  • PDF

A qualitative Study of successful community networking experiences of social workers (지역사회 네트워킹(community networking) 형성·유지경험에 관한 질적 연구)

  • Jeong, Jeong-Ho
    • Korean Journal of Social Welfare Studies
    • /
    • v.45 no.2
    • /
    • pp.289-325
    • /
    • 2014
  • In spite of theoretical logics about the necessities and effects of community networking, we have easily watched the failure of netwoking efforts and break of community networks in everyday life. Starting from these experiences, I tried to understand the process of community networking from the networkers'point of view, by the qualitative research method. Through qualitative in-depth interviews on the 6 experienced social workers in 4 communities, I analyzed their experiences of community network building, presented the results(practical guidelines), especially for the social workers expecting to be a community netwoker themselves. They consist of 10 categories and 5 themes(Being a leader/leaderships, partnership/teamwork building, understanding the impact of context, resource usage, netwoking sustaining).

A design of session management for video conference services (개방형 통신망에서 화상 회의 서비스 세션 관리 설계)

  • 신영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2498-2511
    • /
    • 1997
  • Due to the recent advances in computer technologies and high-speed networks, telecommunication services and provision of multimedia services will be considered a new software architecture adapting networking infrastructure on information networking architecture. In this paper, the video conference services has been selected as a target service example because it is expected to become one of the most important services on the full service network. In fact, it can be viewed as the basis for providing telecommunication services such as video telephony and video conferencing. This paepr presents the prototyping of TINA(Telecommunication Information Networking Architecture) based desktop video conference system using the concepts of session management. The prototyping of deskop video conference system aims at assessing TINA concepts and refinement of the mapping between session graph and connection graph, and provides support of open service platform towards distribution and objected-orientation.

  • PDF

Modeling and Analysis of Load-Balancing Based on Base-Station CoMP with Guaranteed QoS

  • Feng, Lei;Li, WenJing;Yin, Mengjun;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.2982-3003
    • /
    • 2014
  • With the explosive deployment of the wireless communications technology, the increased QoS requirement has sparked keen interest in network planning and optimization. As the major players in wireless network optimization, the BS's resource utilization and mobile user's QoS can be improved a lot by the load-balancing technology. In this paper, we propose a load-balancing strategy that uses Coordinated Multiple Points (CoMP) technology among the Base Stations (BS) to effectively extend network coverage and increase edge users signal quality. To use universally, different patterns of load-balancing based on CoMP are modeled and discussed. We define two QoS metrics to be guaranteed during CoMP load balancing: call blocking rate and efficient throughput. The closed-form expressions for these two QoS metrics are derived. The load-balancing capacity and QoS performances with different CoMP patterns are evaluated and analyzed in low-dense and high-dense traffic system. The numerical results present the reasonable CoMP load balancing pattern choice with guaranteed QoS in each system.