21 results on '"Seyeon Jeong"'
Search Results
2. Development and feasibility test of sit-to-stand transfer assistive device
- Author
-
SinHo Ha, SeYeon Jeong, SoungKyun Hong, Wonjae Choi, Kwangkook Lee, Donghwan Park, SangJun Son, HyeonHui Shin, and GyuChang Lee
- Published
- 2022
- Full Text
- View/download PDF
3. A Network Intelligence Architecture for Efficient VNF Lifecycle Management
- Author
-
Nguyen Van Tu, Hee-Gon Kim, Seyeon Jeong, Jibum Hong, Stanislav Lange, Jae-Hyoung Yoo, Doyoung Lee, and James Won-Ki Hong
- Subjects
Flexibility (engineering) ,Service (systems architecture) ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Testbed ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Application lifecycle management ,Network management ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Network intelligence ,Electrical and Electronic Engineering ,business - Abstract
Network softwarization paradigms such as SDN and NFV provide network operators with advantages in terms of scalability, cost and resource efficiency, as well as flexibility. However, in order to fully reap these benefits and cope with new challenges regarding the heterogeneity of user demands and an ever-growing service landscape, management and operation of such networks requires a high degree of automation that ensures fast and proactive decision making. With the recent success of machine learning (ML) across numerous domains, a shift from traditional rule-based policies towards ML-based approaches in the context of network management is taking place. Although many individual contributions cover use cases such as predicting various network characteristics or optimizing the configuration of components, a fully integrated architecture for achieving Network Intelligence is still missing. Hence, in this work, we propose such an architecture that combines the capabilities of softwarized networks with ML-based management. The contribution of this article is threefold: first, we present the proposed architecture alongside its components. Second, we implement a proof-of-concept version of all components in our OpenStack-based testbed. Finally, we demonstrate in a case study regarding VNF resource prediction how the proposed architecture can be used to generate realistic data sets to train and evaluate ML-based models for this task.
- Published
- 2021
- Full Text
- View/download PDF
4. Toward Fast and Scalable Firmware Fuzzing With Dual-Level Peripheral Modeling
- Author
-
Taekyoung Kwon, Hyun-Seok Lee, Eunbi Hwang, Seyeon Jeong, and Mingi Cho
- Subjects
General Computer Science ,Computer science ,media_common.quotation_subject ,vulnerability ,security ,computer.software_genre ,Software ,Firmware ,Microcode ,General Materials Science ,Function (engineering) ,media_common ,Emulation ,business.industry ,General Engineering ,Fuzz testing ,DUAL (cognitive architecture) ,fuzzing ,TK1-9971 ,Embedded system ,Scalability ,peripheral modeling ,Electrical engineering. Electronics. Nuclear engineering ,Hardware_CONTROLSTRUCTURESANDMICROPROGRAMMING ,business ,computer - Abstract
Firmware vulnerabilities raise serious security concerns with the rapid growth in connected embedded devices. Fuzzing is an effective dynamic testing technique to find those vulnerabilities; however, firmware fuzzing is very limited by hardware dependence, such as on-chip and off-chip peripherals. The latest elegant approaches are making substantial progress in hardware-independent firmware fuzzing, but there is room for further improvement. We observe that hardware-independent peripheral modeling is scalable but slow at the register level; in contrast, at the abstract function level, it is fast but has limited scalability. Firmware fuzzing is still challenging in terms of achieving both scalability and efficiency. To address this problem, we present a dual-level approach that leverages register level modeling and selective function level modeling in a hybrid manner. Our method starts firmware fuzzing at the register level and connects peripheral handlers while executing hardware abstraction layer functions. We evaluate our method in terms of efficiency, scalability, and effectiveness with four real-world firmware and demonstrate the possibility of relatively fast and scalable firmware fuzzing that combines the benefits of the two levels.
- Published
- 2021
- Full Text
- View/download PDF
5. Development of transfer device with customized sling lifts
- Author
-
SeYeon Jeong, Ki-hun Cho, SoungKyun Hong, Wonjae Choi, Kwangkook Lee, and GyuChang Lee
- Abstract
Background: Bedridden patients and disabled persons need help from a guardian or caregiver even in the activities of daily living. In particular, for transfer of them, the use of a transfer lift has been recommended. However, the existing devices have limitations in terms of support according to the individual’s characteristics. This study aimed to develop a transfer lift device utilizing the user’s body fitting sling equipped with an air tube inside the sling. Results: Customized sling lifts are generally floor-based lifts that consist of a sling that holds the user’s body and a lift that moves the sling to the desired position. One characteristic feature of the device is an air tube, which is used on the sling to allow the sling to be adjusted to the user’s body. Conclusion: The device will be useful in the advancement and commercialization of customized sling lifts, to ensure the safe and efficient transfer of persons with disabilities.
- Published
- 2022
- Full Text
- View/download PDF
6. Effects of Upper-Body Flexibility Exercise on Golf Performance of Amateur Female Golfer: A Case Report
- Author
-
GwangIl, Jung, SungKyun, Hong, DooChul, Shin, SeYeon, Jeong, CheongHoon, Kim, HyungKi, Park, and GyuChang, Lee
- Subjects
Adult ,Golf ,Humans ,Female ,General Medicine ,Biomechanical Phenomena - Abstract
BACKGROUND We investigated the effects of the upper-body flexibility exercises on the golf performance of a female amateur golfer. CASE REPORT The participant was a 43-year-old woman who performed a general golf swing exercise (30 min) and an upper-body flexibility exercise (20 min) 3 times a week, for a total of 6 times in 2 weeks. The maximum rotation angle of the upper body was measured using a goniometer. To measure the X-factor, the numerical value was measured after subtracting the rotation angle of the lower-body from the rotation angle of the upper body when the participant stopped making a back-swing top motion. A camera measuring instrument was used to measure the clubhead speed and carry distance of the golf ball when she hit the ball with a no. 7 iron club. After the exercises, the maximum rotation angle of the participant's upper body increased from 40° to 69°, and the X-factor increased from 10° to 24°. The clubhead speed increased from 29.4 m/s to 34.4 m/s, and the carry distance increased from 84 m to 106 m. CONCLUSIONS The participant responded positively to the upper-body flexibility exercises, and there was improved upper-body mobility, X-factor, clubhead speed, and carry distance. Our results showed that upper-body flexibility exercises with a general golf swing exercise for female amateur golfers may improve golf performance.
- Published
- 2022
- Full Text
- View/download PDF
7. A Study of Cyber Security Threat Analysis on FPGA-based Embedded Systems
- Author
-
Eunbi Hwang, Seyeon Jeong, Taekyoung Kwon, and Mingi Cho
- Subjects
business.industry ,Computer science ,Embedded system ,Computer security ,computer.software_genre ,business ,Field-programmable gate array ,computer - Published
- 2020
- Full Text
- View/download PDF
8. Proactive Live Migration for Virtual Network Functions using Machine Learning
- Author
-
Seyeon Jeong, Nguyen Van Tu, Jae-Hyoung Yoo, and James Won-Ki Hong
- Published
- 2021
- Full Text
- View/download PDF
9. Deep Q‐network‐based auto scaling for service in a multi‐access edge computing environment
- Author
-
James Won-Ki Hong, Doyoung Lee, Kyungchan Ko, Seyeon Jeong, and Jae-Hyoung Yoo
- Subjects
Service (business) ,Computer Networks and Communications ,Computer science ,business.industry ,Multi access ,business ,Scaling ,Edge computing ,Computer Science Applications ,Computer network - Published
- 2021
- Full Text
- View/download PDF
10. The relationship between sitting balance, trunk control and mobility with predictive for current mobility level in survivors of sub-acute stroke
- Author
-
Doochul Shin, DongGeon Lee, GyuChang Lee, HyeonHui Shin, SoungKyun Hong, SeungHeon An, Wonjae Choi, SeYeon Jeong, and Kyeongbong Lee
- Subjects
Male ,Muscle Physiology ,Physiology ,Social Sciences ,Walking ,Timed Up and Go test ,Vascular Medicine ,Medical Conditions ,Mathematical and Statistical Techniques ,Medicine and Health Sciences ,Sitting balance ,Postural Balance ,Psychology ,Biomechanics ,Survivors ,Stroke ,Sitting Position ,Multidisciplinary ,Statistics ,Stroke Rehabilitation ,Middle Aged ,Neurology ,Physical Sciences ,Regression Analysis ,Engineering and Technology ,Medicine ,Female ,Research Article ,Biotechnology ,Adult ,Trunk control ,medicine.medical_specialty ,Cognitive Neuroscience ,Cerebrovascular Diseases ,Science ,Bioengineering ,Sub acute ,Research and Analysis Methods ,Sitting ,Motor Reactions ,Physical medicine and rehabilitation ,medicine ,Humans ,Statistical Methods ,Aged ,Balance and Falls ,Behavior ,Biological Locomotion ,business.industry ,Biology and Life Sciences ,medicine.disease ,Trunk ,Postural Control ,Cross-Sectional Studies ,Geriatrics ,Cognitive Science ,Medical Devices and Equipment ,Sedentary Behavior ,Musculoskeletal Mechanics ,business ,human activities ,Mathematics ,Neuroscience - Abstract
Objective To investigate the relationship between sitting balance, trunk control, and mobility, as well as whether the sitting balance and trunk control can predict mobility level in sub-acute stroke survivors. Methods This is a observational and cross-sectional study. Fifty-five hemiplegic stroke survivors were participated in this study. The Timed Up and Go Test (TUG) was used to estimate mobility, and the Sitting Balance Scale (SBS) was used to examining sitting balance. The Trunk Impairment Scale (TIS), Trunk Control Test (TCT), and Postural Assessment Scale for Stroke-trunk control (PASS-TC) were used for examining the trunk control. Spearman’s correlation was used to analyze the relationship between TUG, SBS, TIS, TCT, and PASS-TC. Results The TUG is significantly correlated with SBS (r = -0.78), TIS (r = -0.76), TCT (r = -0.65), and PASS-TC (r = -0.67). In addition, the receiver operation characteristic (ROC) curve showed as cut-off value of SBS as >28.5, TIS > 16.5, TCT >82, and PASS-TC >10.5. The area under the ROC curve in each of the four tests is moderately accurate for predicting the mobility of sub-acute stroke survivors (0.84 ~0.90) (0.7 < AUC ≤ 9 (moderate informative)). Implications The SBS showed the highest correlation for mobility using TUG in the hemiplegic stroke survivors. Also, SBS was revealed as the most dominant examination tool predicting the mobility by TUG, it can be explained the sitting postural balance is the variable predicting the mobility in survivors of sub-acute stroke.
- Published
- 2021
- Full Text
- View/download PDF
11. Poster
- Author
-
Taekyoung Kwon, Seoyoung Kim, Seyeon Jeong, Soochang Chung, and Mingi Cho
- Subjects
Os kernel ,System call ,Computer science ,Kernel (statistics) ,Intel processor ,Code coverage ,Operating system ,Fuzz testing ,Virtualization ,computer.software_genre ,computer ,TRACE (psycholinguistics) - Abstract
The OS kernel, which has entire system privileges, is an attractive target of attackers. To reduce this threat, we need to find security bugs in the kernel prior to the attackers, and system call fuzzing is a widely used technique for this purpose. However, many system call fuzzers have not been evaluated for coverage performance which is an important indicator in fuzzing. In this poster, we propose a methodology to evaluate the code coverage performance of system call fuzzers with a strategy that combines virtualization and Intel Processor Trace (PT). First, we extract all the functions in the kernel that can be executed by system calls. Then we perform fuzzing with the target system call fuzzer on the guest OS, and record coverage information by leveraging the Intel PT. Finally, we evaluate system call fuzzers by comparing the list of functions related to system calls with the executed functions logged by Intel PT while fuzzing.
- Published
- 2019
- Full Text
- View/download PDF
12. Predicting VNF Deployment Decisions under Dynamically Changing Network Conditions
- Author
-
Heeyoul Choi, James Won-Ki Hong, Jae-Hyung Yoo, Hee-Gon Kim, Stanislav Lange, and Seyeon Jeong
- Subjects
Flexibility (engineering) ,Service (systems architecture) ,Mobile edge computing ,Cost efficiency ,Computer science ,Distributed computing ,020206 networking & telecommunications ,020302 automobile design & engineering ,Context (language use) ,02 engineering and technology ,Network topology ,0203 mechanical engineering ,Chaining ,0202 electrical engineering, electronic engineering, information engineering ,Use case - Abstract
In addition to providing network operators with benefits in terms of flexibility and cost efficiency, softwarization paradigms like SDN and NFV are key enablers for the concept of Service Function Chaining (SFC). The corresponding networks need to support a wide range of services and applications with highly heterogeneous requirements that change dynamically during the network’s lifetime. Hence, efficient management and operation of such networks requires a high degree of automation that is paired with fast and proactive decisions in order to cope with these phenomena.In particular, determining the optimal number of VNF instances that is required for accommodating current and upcoming demands is a crucial task that also affects subsequent management decisions. To enable fast and proactive decisions in this context, we propose a machine learning-based approach that uses recent monitoring data to predict whether to adapt the current number of VNF instances of a given type. Furthermore, we present a methodology for generating labeled training data that reflects temporal dynamics and heterogeneous demands of real world networks. We demonstrate the feasibility of the approach using two different network topologies that represent WAN and mobile edge computing use cases, respectively. Additionally, we investigate how well the models generalize among networks and provide guidelines regarding the prediction horizon, i.e., how far ahead predictions can be performed in a reliable manner.
- Published
- 2019
- Full Text
- View/download PDF
13. Machine Learning based Link State Aware Service Function Chaining
- Author
-
Hee-Gon Kim, James Won-Ki Hong, Seyeon Jeong, and Jae-Hyoung Yoo
- Subjects
Computer science ,business.industry ,020206 networking & telecommunications ,020302 automobile design & engineering ,Cloud computing ,02 engineering and technology ,Machine learning ,computer.software_genre ,Tree traversal ,0203 mechanical engineering ,Link-state routing protocol ,Scalability ,Network service ,Chaining ,0202 electrical engineering, electronic engineering, information engineering ,Network performance ,Artificial intelligence ,Routing (electronic design automation) ,business ,computer - Abstract
Service Function Chaining (SFC) can be a basic deployment unit that composes a chaining order of required network functions to provide a network service. With the proliferation of Software-Defined Networking (SDN) and cloud computing, such virtualized network functions can be dynamically deployed in different sites, depending on SFC requests. While offering the advantages of flexibility and efficiency, this also leaves management complexity and room for optimization where Machine Learning (ML) can be applicable to solve the problems based on monitoring data. In this paper, we treat SFC as a problem of finding a best source-to-destination routing path from multiple candidates with different link costs and a required traversal order of network functions. There are many mathematical approaches that ensure best optimum but not scalable to the problem size, whereas our approach hides underlying considerations by applying ML technique on measured SFC data to quickly find suboptimal routing paths on a new SFC request, based on their predicted network performance such as the number of successful requests or end-to-end delay. So, we developed a measurement system that records the performance and path costs of SFCs in emulated networks with different per link costs and chain lengths. Then, we evaluate four different ML models for the approach described above.
- Published
- 2019
- Full Text
- View/download PDF
14. A Deep Learning Approach to VNF Resource Prediction using Correlation between VNFs
- Author
-
Doyoung Lee, James Won-Ki Hong, Seyeon Jeong, Heeyoul Choi, Hee-Gon Kim, and Jae-Hyung Yoo
- Subjects
Service (systems architecture) ,business.industry ,Computer science ,Quality of service ,Distributed computing ,Deep learning ,05 social sciences ,050801 communication & media studies ,02 engineering and technology ,0508 media and communications ,Resource (project management) ,Chaining ,Network service ,0202 electrical engineering, electronic engineering, information engineering ,Resource allocation ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Virtual network - Abstract
Software-Defined Networking (SDN) and Network Function Virtualization (NFV) greatly facilitate network service management. Specifically, these new network paradigms help manage the network environment dynamically and cost-efficiently. Virtual Network Function (VNF) and Service Function Chaining (SFC) are important aspects of the NFV environment. In terms of NFV management, resource demand of VNFs can be predicted at a future time to handle Quality of Service (QoS) and resource allocation problems efficiently. Hence, researchers study and build a management system where machine-learning-based predictions of VNF information are used to handle auto-scaling, deployment and migration of VNFs. In addition, in recent studies, these systems have involved SFC to obtain useful information, not just a lone VNF. However, not many of studies explain clearly how chaining dependency among VNFs in a SFC can be used to predict future resource demand of a VNF. In this paper, we introduce VNF resource prediction machine learning model that maximizes the benefits of using SFC. Then, we compare several machine learning models and analyze how SFC data can help predict resource usage patterns of VNFs. We also show benefits of Attention model to improve prediction accuracy and convergence time through experiments.
- Published
- 2019
- Full Text
- View/download PDF
15. Machine Learning-Based Method for Prediction of Virtual Network Function Resource Demands
- Author
-
Hee-Gon Kim, James Won-Ki Hong, Heeyoul Choi, Seyeon Jeong, Doyoung Lee, and Jae-Hyung Yoo
- Subjects
Flexibility (engineering) ,Service (systems architecture) ,Computer science ,Reliability (computer networking) ,Distributed computing ,05 social sciences ,050801 communication & media studies ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,0508 media and communications ,Resource (project management) ,Chaining ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Virtual network - Abstract
Software-Defined Networking (SDN) and Network Function Virtualization (NFV) are paradigms that help administrators to manage dynamic networks. While SDN allows centralized network control, NFV provides flexible and scalable Virtual Network Functions (VNFs). These paradigms are also enablers for concepts such as Service Function Chaining (SFC) where chains are composed of several VNFs to provide a specific service. However, in order to maximize the benefits from the above-mentioned flexibility, new research questions need to be addressed, e.g., regarding effective management processes for dynamic networks. We proposed a novel learning model based on the flexibility of softwarization and abundant volume of monitoring data in NFV environments to predict VNF resource demands using SFC data. Our model is based on Context and Aspect Embedded Attentive Target Dependent Long Short Term Memory (CAT-LSTM) that consists of Target-Dependent LSTM (TD-LSTM), context embedding, aspect embedding, and attention. We developed this model to obtain high accuracy for the prediction of VNF resources such as the CPU. Our model uses two labeling systems: the qualitative resource state and the quantitative resource usage, both of which are used to evaluate its performance. This assists the administrator in understanding the network conditions, improves prediction performance, and provides practically useful information. Our learning model for predicting VNF resource demands can be utilized to solve essential SFC problems such as auto-scaling and optimal placement, which in turn prevent service interruption and provide high reliability.
- Published
- 2019
- Full Text
- View/download PDF
16. Towards bidirectional LUT-level detection of hardware Trojans
- Author
-
Yezee Seo, Taekyoung Kwon, Seyeon Jeong, Mingi Cho, Jaedong Jang, and Soochang Chung
- Subjects
Source code ,General Computer Science ,Exploit ,business.industry ,Computer science ,media_common.quotation_subject ,020206 networking & telecommunications ,02 engineering and technology ,Integrated circuit ,law.invention ,Software deployment ,law ,Lookup table ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,business ,Field-programmable gate array ,Hardware_REGISTER-TRANSFER-LEVELIMPLEMENTATION ,Law ,Computer hardware ,Hardware_LOGICDESIGN ,media_common ,Electronic circuit - Abstract
FPGAs are field-programmable and reconfigurable integrated circuits; consequently, they entail numerous security concerns. For example, malicious functions such as hardware Trojans (HTs), can be inserted into the circuits in both development and deployment stages, as malicious fabrication and modification are possible even after deployment. Therefore, to detect HTs in FPGAs effectively, it is necessary to exploit both netlists available at the development stage and bitstreams available at deployment stage; this is in contrast with existing approaches, which require source code or gate-level netlists. In achieving this, we encounter two major challenges: effectively exploiting FPGA netlists closer to bitstreams for HTs detection and reverse-engineering bitstreams to netlists at an acceptable level. To address these problems, we develop a bidirectional mechanism for detecting HTs in FPGAs at any stage. To the best of our knowledge, this is the first study on bidirectional HT detection in FPGAs. To address the first challenge, we focus on LUT-level netlists; regarding the second challenge, we directly reverse-engineer bitstreams to LUT-level netlists. For HTs detection, we employ features extracted from LUT-level netlists, which can also be derived from reversed bitstreams and used to identify HTs. We design and implement our system for experimental studies. The experiments achieve a TPR of more than 99.3% and an FPR of less than 0.15% for 15 TrustHub benchmarks in forward and backward (reverse) directions for FPGA Virtex-5 devices.
- Published
- 2021
- Full Text
- View/download PDF
17. OpenFlow-based virtual TAP using open vSwitch and DPDK
- Author
-
Seyeon Jeong, James Won-Ki Hong, Doyoung Lee, and Jian Li
- Subjects
OpenFlow ,Computer science ,business.industry ,Network packet ,Packet processing ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Virtualization ,computer.software_genre ,01 natural sciences ,Packet switching ,Port mirroring ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Network tap ,business ,Virtual network ,computer ,Computer network - Abstract
Currently, server (host) virtualization technology that brings effective use of server resources to a data center is promising as cloud services are being prevalent with increasing traffic volumes and requirements for higher service quality. Proposed network TAP, named vTAP (Virtual Test Access Port), overcomes the problem that existing hardware TAP devices cannot be utilized for virtual network links to monitor traffic among virtual machines (VMs) at a packet level. vTAP can be implemented by a virtual switch that gives network connectivity to VMs by switching packets over the virtual network links. The port mirroring feature of a virtual switch can be a naive solution to provide packet level monitoring among VMs. However, using the feature in an environment that needs to treat large volume of network traffic with low delay such as NFV (Network Function Virtualization) incurs performance degradation in packet switching capability of the switch and error-prone manual configurations. This paper provides design and implementation approaches to vTAP using Open vSwitch with DPDK (Data Plane Development Kit) and an OpenFlow SDN (Software-Defined Networking) controller to overcome the problems. DPDK can accelerate overall packet processing operations needed in vTAP, and OpenFlow controller can provide a centralized and flexible way to apply and manage TAP policies in an SDN network. This paper also provides performance comparisons of the proposed vTAP and the naive method, port mirroring.
- Published
- 2018
- Full Text
- View/download PDF
18. OpenAPI-based message router for mashup service development
- Author
-
James Won-Ki Hong, Doyoung Lee, and Seyeon Jeong
- Subjects
Router ,Service (business) ,Application programming interface ,business.industry ,Computer science ,Information technology ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Service provider ,computer.software_genre ,World Wide Web ,Open data ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,Mashup ,business ,computer - Abstract
Owing to the development of information technology, many people can access various services through the Internet. In addition, with the emergence of the Web 2.0 concept of opening, participating, and sharing, public institutions and companies have made it possible to use their data and services in a variety of ways. In this environment, service providers have developed new services by linking open data and services to meet the rapidly changing requirements of Internet users. A new service developed through the interworking of data and services is called a mashup service. A mashup service has the advantage of providing useful functions required by users by combining the existing data and services. However, to develop a mashup service, it is necessary to process the data collected from other sources and link the services, which greatly increases the developers burden. In this study, we propose an open application programming interface (openAPI)-based message router for mashup service development to overcome this problem. The message router supports the development of the mashup service by providing useful functions required by the developer in cooperation with various platforms according to the request messages transmitted through openAPI.
- Published
- 2017
- Full Text
- View/download PDF
19. Application-aware traffic engineering in software-defined network
- Author
-
Jian Li, James Won-Ki Hong, Doyoung Lee, Jonghwan Hyun, and Seyeon Jeong
- Subjects
Computer science ,business.industry ,Quality of service ,020206 networking & telecommunications ,02 engineering and technology ,Internet traffic engineering ,Network traffic control ,Traffic classification ,Traffic engineering ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Traffic shaping ,Software-defined networking ,business ,Traffic generation model ,Computer network - Abstract
Software-defined Networking (SDN) is a network paradigm to resolve the challenges of traditional networks. SDN can utilize its concept of control and data plane separation to improve Quality of Service (QoS) of certain network traffic efficiently. Because traffic engineering in SDN is a promising way to satisfy the requirement well, we propose an application-aware traffic engineering system that cooperates with Deep Packet Inspection (DPI). In the system, port number and DPI-based traffic classification are used to identify application or service flows. The system improves QoS of the identified flows by distributing them to multiple queues with different priorities in each switch port. A network admin can define a mapping table between an identified flow and its QoS priority (queue) in the system. To demonstrate the feasibility of the system, we designed and implemented the system by constructing an SDN controller application and data plane entities. The results of the experiment shows increased throughput and reduced packet delay for identified application traffic.
- Published
- 2017
- Full Text
- View/download PDF
20. ICBMS SM: A Smart Mediator for mashup service development
- Author
-
James Won-Ki Hong, Taeyeol Jeong, Doyoung Lee, Seyeon Jeong, and Jae-Hyoung Yoo
- Subjects
Service (business) ,business.industry ,Computer science ,Big data ,Overhead (engineering) ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,World Wide Web ,Open data ,Data access ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,Mashup ,business ,computer - Abstract
With the advancement of the Internet technologies, cloud services and various open data, there have been many active attempts to develop mashup services. To develop a mashup service, many data sources and service platforms should be interlinked. Therefore, efficient ways of interconnecting various service platforms and managing data are essential to provide easy service development environment. However, current mashup service development environments do not provide any of them, which forces each developer to fully understand every platforms, interfaces and data format to develop a mahsup service. So, it gives a big burden to mashup service developers and also hinders growth of mashup service industry. In this paper, we propose ICBMS Smart Mediator which connects IoT, cloud, big data, mobile, and security platforms and helps developers to easily utilize them with less overhead and provides easy access to data. We have designed and implemented the proposed ICBMS Smart Mediator and created a new mahsup service with the ICBMS Smart Mediator.
- Published
- 2016
- Full Text
- View/download PDF
21. Application-aware Traffic Management for OpenFlow networks
- Author
-
James Won-Ki Hong, Junemuk Choi, Seyeon Jeong, Jian Li, and Doyoung Lee
- Subjects
OpenFlow ,Network administrator ,business.industry ,Computer science ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Deep packet inspection ,02 engineering and technology ,Port (computer networking) ,Network traffic control ,Protocol stack ,Network management ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Computer network - Abstract
Software-Defined Networking (SDN) is an emerging networking paradigm aims to improve network management flexibility and efficiency. OpenFlow is the popular SDN de-facto standard, which has been prevalently adopted by both academia and industry for research and development purpose. OpenFlow provides rich programmable interface to network administrator to ease traffic monitoring and control. Because OpenFlow supports L4 network stack, it is feasible to provide application level traffic control by specifying TCP/UDP port number in flow rules. The major deficiency of the port-based traffic control is that it only provides the ability to control traffic from applications which have well-known TCP/UDP port numbers. In the case of port number change or dynamic (ephemeral) port allocation to an application, it is difficult to accurately control the application traffic. To be a solution, we propose an application-aware traffic management method by integrating Deep Packet Inspection (DPI) function with SDN controller. To show the feasibility, we design and implement Firewall and Bandwidth Manager applications based on the proposed management method. The applications perform on top of ONOS [1] controller, and FTP rate control example is shown to prove the feasibility of the proposed flow management method.
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.