Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hongseok Jeon is active.

Publication


Featured researches published by Hongseok Jeon.


international conference on advanced communication technology | 2006

IPv6 Neighbor Discovery Protocol for Common Prefix Allocation in IEEE 802.16

Hongseok Jeon; Junghoon Jee

IEEE 802.16 is one of broadband wireless access technologies and will become a key technology for growing wireless IP network. However, point-to-point oriented network such as IEEE 802.16 introduces some issues in applying conventional standard IPv6 neighbor discovery protocol (NDP). Following the previous 3GPP model for IPv6 NDP is not flexible in IPv6 link configuration since it assigns different network prefixes to each subscriber stations. We presents a mechanism which can allocate a common network prefix to all subscriber stations under the same IPv6 link. Through this mechanism, the standard IPv6 NDP can be applied to IEEE 802.16 networks without modifying conventional host-side operation


Cluster Computing | 2015

A healthcare information sharing scheme in distributed cloud networks

Sunyoung Kang; TaeYeon Kim; Hongseok Jeon; Wonhyuk Lee; Seungae Kang

Current information & communication technology infrastructures are struggling for a wide variety of devices, services, and business and technology evolution. Cloud computing is becoming a promising platform and has developed rapidly. In contrast to traditional enterprise IT solution, it enables enterprises to procure computing resources on demand basis and delegate management of all the resources to the cloud service provider. Healthcare information networks have emerged as one of the major research area in the cloud networks. Healthcare information is communication and information systems and technology that facilitate quality patient care, progressive medical education, and innovative research. Healthcare information networks must ensure the reliability and efficiency because it transfers highly personal data. Thus, it guarantees and keeps a certain level of transfer efficiency. In the distributed cloud environments, management costs for the network and computing resources are solved fundamentally through the integrated management system. It can increase the cost savings to solve the traffic explosion problem of core network via a distributed micro datacenters (DCs). However, traditional flooding methods may cause a lot of traffic because it had to send data to all the neighbor DCs. Restricted Path Flooding algorithms have been proposed for this purpose. In large networks, there is still the disadvantage that may occur traffic. In this paper, we develope lightweight path flooding algorithm to improve existing flooding algorithm using hop count restriction. This paper also investigates the problem of partial information sharing.


Cluster Computing | 2016

Service platform and monitoring architecture for network function virtualization (NFV)

Hyuncheol Kim; Seunghyun Yoon; Hongseok Jeon; Wonhyuk Lee; Seungae Kang

With the advent of cloud and virtualization technologies and the integration of various computer communication technologies, today’s computing environments can provide virtualized high quality services. The network traffic has also continuously increased with remarkable growth. Software defined networking/network function virtualization (SDN/NFV) enhancing the infrastructure agility, thus network operators and service providers are able to program their own network functions on vendor independent hardware substrate. However, in order for the SDN/NFV to realize a profit, it must provide a new resource sharing and monitoring procedures among the regionally distributed and virtualized computers. In this paper, we proposes a NFV monitoring architecture based practical measuring framework for network performance measurement. We also proposes a end-to-end connectivity support platform across a whole SDN/NFV networks has not been fully addressed.


international conference on information and communication technology convergence | 2015

Network service chaining challenges for VNF outsourcing in network function virtualization

Hongseok Jeon; Bhum-Cheol Lee

Fundamentally, network function virtualization (NFV) allows virtual network functions (VNFs) to be outsourced by a third party because it separates network functions from their locations. However, the VNF outsourcing raises significant challenges for network service chains, which is a necessary technology to realize NFV. This paper discusses challenges of the network service chain under consideration for VNF outsourcing.


Cluster Computing | 2015

A fault tolerant channel allocation scheme in distributed cloud networks

Jaeil Cho; Kiheon Park; TaeYeon Kim; Hongseok Jeon; Wonhyuk Lee; Hyuncheol Kim

With the cloud computing, storage and computing resources are moving to remote resources such as virtual servers and storage systems in large datacenters, which raise many performance and management challenges. The distributed cloud networks must have an ability to maintain an acceptable level of service during network failures to provide high resilience against service failures. This paper presents an eccentric fault tolerant path grouping scheme that can achieve mobility independent Quality of Service guaranteed services in distributed cloud networks To make this possible, we propose a path allocation and restoration strategy called “Reverse Shared Risk Link Group” and demonstrates how this concept can be applied to minimize recovery contention in cloud networks and to assess the network convergence associated with failures. To reflect little more actual situations, we assume that the bandwidth of cloud connection requests can be some fraction of the lightpath capacity. Simulation results show that the proposed recovery scheme outperforms other schemes with fewer signaling traffics and contention probability. Very fast restorability can be accomplished for multiple failures. We also has developed an analytical model and performed analysis for the proposed scheme in terms of two performance factors: mean system time and reservation blocking probability.


Software Networking | 2016

Holistic Service Orchestration over Distributed Micro Data Center

TaeYeon Kim; Hongseok Jeon

Three technologies, i.e. Cloud, SDN, and NFV, the most frequently touted as promising terms to pave the way to the next generation networking era are keenly needed to be harmonized for vertical application service providers. This holistic approach to orchestrate application service on the edge of the network is based on requirements such as Service Profile and Service Policy with environmental condition from service providers and network providers respectively. This paper shows how to organize and manage the application service from the perspective of end user side with two requirements, profile and policy, leveraging three disruptive technologies.


international conference on it convergence and security, icitcs | 2015

Detecting an Abnormal Traffic on Healthcare Network

Wonhyuk Lee; Seunghae Kim; Hongseok Jeon; Hyuncheol Kim

The data transferring on health-care network has a sensitive data such as personal medical information, genome, and so on. So it is very important to make secure network, and there are potential targets to infect when the next vulnerability announces. And hacking or worm virus uses several vulnerability to drain important information. Also it attacks security program for personal computer such as vaccine, personal firewall, etc. Recently network fault is often happened by worm virus, and then the major reason is anomaly traffic flowed from inside host rather than attack from outside. In this paper, we try to design and implement automatic system which can trace the location for the infected system using monitoring load of network node and detecting signs of anomaly traffic.


international conference on information and communication technology convergence | 2014

Inter-country knowledge flows in virtualization technologies: Patent citation network

Hongseok Jeon; Bhum-Cheol Lee

Recently, virtualization has come into the spotlight as a fundamental enabler of cloud computing. This paper examines characteristics of knowledge diffusion among countries in the virtualization technology to understand the exploration and extension of the virtualization technology. In this paper, patents and their citations are utilized as proxies to measure the transfer of knowledge.


international conference on advanced communication technology | 2014

Content delivery in Smart Ubiquitous Network

Hongseok Jeon; TaeYeon Kim; Seung-Ik Lee; Bhumchul Lee

As a large-scale content distribution becomes an important challenge in Internet, there are developed various approaches to address the challenge. ITU-T has standardized SUN (Smart Ubiquitous Network) as an evolved network concept that handles emerging Internet issues and now they are standardizing a functional architecture for content delivery in SUN. In this paper, we provide an overview of the functional architecture and operational procedures for content delivery in SUN.


international conference on information and communication technology convergence | 2013

A low latency background scan in IEEE 802.11 networks using a triangular cooperation

Hongseok Jeon; Bhum-Cheol Lee

During background scan in IEEE 802.11 networks, a mobile node is disconnected from its serving access point and thus it cannot transmit or receive data traffic. In this paper, we propose a novel background scan scheme, called TriScan, to minimize the disconnected time. The proposed scheme allows a mobile node to switch back to its serving channel instead of waiting for any responses (e.g. Beacon or Probe Response) on the probing channels and then indirectly receive them via its serving access point. The simulation results confirm the proposed scheme outperforms than the active background scan.

Collaboration


Dive into the Hongseok Jeon's collaboration.

Top Co-Authors

Avatar

Junghoon Jee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Byungjoon Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Chang-min Park

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hoyoung Song

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Seunghyun Yoon

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

TaeYeon Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Eunah Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Heeyoung Jung

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Wonhyuk Lee

Korea Institute of Science and Technology Information

View shared research outputs
Top Co-Authors

Avatar

Bhum-Cheol Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge