• Title/Summary/Keyword: networking services

Search Result 686, Processing Time 0.027 seconds

Social Bookmarking Use in University Courses: Student Perceptions and Behaviors (대학 수업에서 소셜 북마킹의 활용: 학생 인식 및 행태를 중심으로)

  • Park, Ok-Nam;Jung, Young-Sook
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.2
    • /
    • pp.65-82
    • /
    • 2009
  • This exploratory study describes the social bookmarking perceptions and behaviors of students in university courses. Although an emerging discussion regarding the value of social bookmarking tools exists, how users adopt tools in practice is not well known. Students were asked to utilize the bookmarking tool del.icio.us to store information relating to course projects. They were also asked to comment how they employed del.icio.us for course projects. The study analyzed student perceptions and behaviors when using social bookmarking tools for university coursework. The study noted that the use of tags, notes, and networking within these social bookmarking tools remained less active and social bookmarking services in Web 2.0 as shared collaboration, shared communities, and vertical search were less present. Utilizing social bookmarking tools to facilitate personal information management includes the activities of information use, information re-use, and mobility.

A MAC Protocol for the Integrated Voice/Data Services in Packet CDMA Network (패킷 CDMA 망에서 음성/데이타 통합 서비스를 위한 MAC 프로토콜)

  • Lim, In-Taek
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.68-75
    • /
    • 2000
  • In this paper, a media access control protocol is proposed for voice/data integrated services in the packet CDMA network, and the performance of the proposed protocol is analyzed. The proposed protocol uses the spreading code sensing and the reservation schemes. This protocol gives higher priority to the delay-sensitive voice traffic than to the data traffic. A voice terminal can reserve an available spreading code during a talkspurt to transmit multiple voice packets. On the other hand, whenever a data packet is generated, the data terminal transmits the packet through one of the available spreading codes that are not used by the voice terminals. In this protocol, the voice packets do not come into collision with the data packets. The numerical results show that this protocol can increase the maximum number of voice terminals. The performance for the data traffic degrades by increasing the voice traffic load because of the low priority. But it shows that the data traffic performance can be increased in proportion to the number of spreading codes.

  • PDF

A Study on the Component Development For e-Business Application Systems (e-비즈니스 응용 시스템을 위한 컴포넌트 개발에 관한 연구)

  • Kim, Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1095-1104
    • /
    • 2004
  • An electronic services which are based on Internet/Intranet business transactions are available to e-market places and get the broader business concepts. Component-based e-commerce technology is a recent trend towards resolving the e-commerce chanange at both system and ap-plication levels. The basic capabilities of component based systems should include the plug and play features at various granularities, interoper-ability across networks and mobility in various networking environments. E-business application developers are attempting to more towards web-service as a mechanism for developing component-based web-applications. Traditional process and development models are inadequately architectured to meet the rapidly evolving needs for the future of scalable web services. In this thesis, we focus specifically on the issues of e-business system architecture based on web service for establishing e-business system. We specifies and identifies design pattern for applying e-business domain in the context of multiple entities. We investigate prototype and frameworks to develope components for e-business application based suggested process. We present a worked example to demonstrate the behavior of Customer Authentication System(CAS) development with component and recommend process. Final]Y, we indicate and view on future directions in component-based development in the context of electronic business.

Development of a High Performance Web Server Using A Real-Time Compression Architecture (실시간 압축 전송 아키텍쳐를 이용한 고성능 웹서버 구현)

  • Min Byungjo;Hwang June;Kim Hagbae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.781-786
    • /
    • 2004
  • In these days, such services are popularized as E-commerce, E- government, multimedia services, and home networking applications. Most web traffics generated contemporarily basically use the Hyper Text Transfer Protocol(HTTP). Unfortunately, the HTTP is improper for these applications that comprise significant components of the web traffics. In this paper, we introduce a real-time contents compression architecture that maximizes the web service performance as well as reduces the response time. This architecture is built into the linux kernel-based web accelerating module. It guarantees not only the freshness of compressed contents but also the minimum time delay using an server-state adaptive algorithm, which can determine whether the server sends the compressed message considering the consumption of sewer resources when heavy requests reach the web server. Also, We minimize the CPU overhead of the web server by exclusively implementing the compression kernel-thread. The testing results validates that this architecture saves the bandwidth of the web server and that elapsed time improvement is dramatic.

Analysis and Study on Invasion Threat and Security Measures for Smart Home Services in IoT Environment (사물인터넷 환경에서의 스마트홈 서비스 침해위협 분석 및 보안 대책 연구)

  • Lee, Myongyeal;Park, Jaepyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.27-32
    • /
    • 2016
  • In general, IoT(Internet of things) designate the intelligence technologies and services which interact all necessity information between human and things, things and thing and things and systems with all things connecting through the internet based. The smart home in present of IoT environment fuses the daily supplies/equipment which needs to use for the private life with the internet of things that is the fruit of the converged business through all most private consumption related in vastly. The concept of smart home has been built around early 2000s due to the spread of high speed internet and advanced of smart electronics and internet, furthermore influencing by the enhancement of wireless network and smart devices, it is advanced as a smart home within the internet of things environment. Smart home service inside the house which most closely implemented with personal life is being developed and advanced in various forms. These developments may exert a positive effect, but if it does not resolve the security issues for the smart home service, then it may cause a big plague of privacy and personal life.

Utilization of Legacy APs for Seamless Handover in a SDN Environment (네트워크 가상화 환경에서 끊김 없는 핸드오버를 위한 일반 AP 활용)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • Journal of Digital Contents Society
    • /
    • v.19 no.8
    • /
    • pp.1545-1554
    • /
    • 2018
  • In order to support the mobility of the wireless devices, at least two APs (Access Points) must be arranged in a single AP area to maintain communication area. In the WLAN (Wireless LAN) environment, seamless handover is one of the most important issues in terms of effective utilization of wireless networks and maximization of services for users. On the other hand, SDN (Software-Defined Networking), which is emerging rapidly in recent years, is revolutionizing network management in terms of flexibility, fine control, and convenience. SDN originally reduces latency time or increases network robustness by real-time flow table control reducing or bypassing paths between switches in LAN-based data centers. In this study, we apply OpenFlow, a SDN platform focused on wired LAN, to a dense WLAN environment using legacy APs to implement and evaluate seamless handover for streaming services of digital contents.

O.P.E.N Triad: The Future Success for Individuals, Institutes, and Industries

  • Kim, Hae-Jung;Forney, Judith;Crowley, Ruth
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.34 no.12
    • /
    • pp.1980-1991
    • /
    • 2010
  • This study proposes the O P E N Triad framework as a future set of tools and perspectives for individual members and institutes to further their professional and academic potential as well as prospect and vitalize the future of the Korean Clothing and Textiles discipline through a global perspective. The millennial generation desires On-demand, Personal, Engaging, and Networked (O P E N) experiences effecting cultural change for creative and influential interaction in transactions, communication, and education. O P E N Individuals offers a WebSphere model as a holistic learning system that has a synergizing value of education across academic courses, industries, and cultures. Through a digitalized and virtualized class, it complements relevant technologies already familiar to the student population. By employing environmental scanning approaches, the most influential and viable future global issues related to the clothing and textiles discipline are identified and dialogued within O P E N Institutes. For future clothing and textiles institutes, this scanning allows them to be open to new ideas, to focus on inter-engagements, to collaborate among individuals, to associate as a part of web of people, organizations, and ideas, to personalize an institutes curricula, and to dialogue generative knowledge. O P E N Industries reveals three dominant future issues that cross academia and industry, sustainability, supply chain management, and social networking. In-depth interviews with U.S. industry experts identified interdependent gaps in global consumer experience practices and suggested the following gaps as future research areas: a standardized business model to the entrepreneurial model, strategic management to a sustainable competitive advantage, standardized to differentiated products, services and operations, market segmentation to global consumer clusters, business-driven marketplaces to consumer-engaged marketspaces, and excellent services to optimal experience. This O P E N Triad framework empowers millennial students, universities, and industries to anticipate and prepare for a radically changing world.

Implementation of ANSI C12.22 Communication Protocol for Two-way Communications of Smart Meter (스마트미터의 양방향 통신을 위한 ANSI C12.22 통신 프로토콜 구현)

  • Lee, Sang-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.815-821
    • /
    • 2013
  • In this paper, application layer protocol of C12.22 node, defined by ANSI C12.22 is implemented. ANSI C12.22 defines application layer only among the OSI 7 layers and recommends using the existing protocols for the 1~4 layer to transmit the information. TCP/IP which is one of the generally used protocols has been applied for the transport and network layer protocol in this paper. ANSI C12.19 defines the parameters for the watt-hour meter, and C12.22 application layer defines the network services and data structures networking the watt-hour meter parameters at a minimum. This kind of services and data structures are used for the configuration, programming, monitoring of the networked watt-hour meter or collecting information of the watt-hour meter. A embedded board has been used to implement the C12.22 application layer and a test program for the AMI application server has been developed for the functional test.

Service Oriented Self-Construction Network Scheme in IoT Environments (사물인터넷 환경에서 서비스 중심 자율-구성 네트워크 기법)

  • Youn, Joosang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.922-928
    • /
    • 2018
  • Recently, various researches have been studied to support service-oriented IoT networking. This is because the IoT environment coexists with various service devices for providing the service in a certain unified area. Thus, in this network environment, an effective data delivery service is not provided in a network configuration. Also, in order to provide efficient IoT services in this network environment, new scheme is necessary to recognize services by themselves and to construct network structures for each service. In this paper, we propose a service oriented self-constructive network (SO-SCN) scheme that can construct a service-oriented network in IoT environments composed of various service devices. The proposed scheme is a method that can minimize the network overhead required for service provisioning and extend the network lifetime. Through simulation, we show that the proposed service oriented self-construction network scheme improves the performance, in terms of the number of packets generated for end-to end data transmission and the end-to-end delay.

On Providing Anonymity in Ad Hoc Networks (Ad Hoc Network에서 익명성 제공에 관한 연구)

  • Kang, Seung-Seok
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.93-103
    • /
    • 2007
  • Networking environments are exposed to outside attacks and privacy threats. Due to broadcast nature of radio transmissions, wireless devices experience more vulnerable situations than those of wired network devices. This paper assumes that a wireless device has two network interfaces, one for accessing internet using 3G services, and the other for constructing an ad hoc network. To deal with privacy threats, this paper introduces an approach in which wireless devices form a special ad hoc network in order to exchange data using anonymous communications. One or more intermediate peers should be involved in the construction of an anonymous path. The proposed anonymous communication mechanism discourages traffic analysis and improves user privacy. According to simulation results, the anonymous connection in an ad hoc network prefers the intermediate peer(s) which is located near the source and/or the destination peer, rather than randomly-selected peers.

  • PDF