• Title/Summary/Keyword: 고속네트워크

Search Result 886, Processing Time 0.031 seconds

Low-Complexity and High-Speed Multi-Size Circular Shifter With Benes Network Control Signal Optimization for WiMAX QC-LDPC Decoder (Benes 네트워크 제어 신호 최적화를 이용한 WiMAX QC-LDPC 복호기용 저면적/고속 Multi-Size Circular Shifter)

  • Kang, Hyeong-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2367-2372
    • /
    • 2015
  • One of various low-density parity-check(LDPC) codes that has been adopted in many communication standards due to its error correction ability is a quasi-cyclic LDPC(QC-LDPC) code, which leads to comparable decoder complexity. One of the main blocks in the QC-LCDC code decoder is a multi-size circular shifter(MSCS) that can perform various size rotation. The MSCS can be implemented with many structures, one of which is based on Banes network. The Benes network structure can perform the normal MSCS operation efficiently, but it cannot use the properties coming from specifications like rotation sizes. This paper proposesd a scheme where the Benes network structure can use the rotation size property with the modification of the control signal generation. The proposed scheme is applied to the MSCS of IEEE 802.16e WiMAX QC-LDPC decoder to reduce the number of MUXes and the critical path delay.

Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure (BcN 인프라 보호를 위한 다중 도메인 보안 관리 프레임워크와 성능평가)

  • Jang Jung-Sook;Jeon Yong-Hee;Jang Jong-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.817-826
    • /
    • 2005
  • BcN(Broadband convergence Network) is being developed in order to support a variety of network applications, with enhanced capabilities of QoS(Quality of Service) provisioning and security, and IPv6. In a high-speed network environment such as BcN, it if more likely for the network resources to be exposed to various intrusion activities. The propagation speed of intrusion is alto expected to be much faster than in the existing Internet In this paper, we present a multi-domain security management framework which my be used for a global intrusion detection at multiple domains of BcN and describe its characteristics. For the performance evaluation, we first present test results for the security node and compare with other products. Then we design and Implement an OPNET simulator for the proposed framework, and present some simulation results. In the simulation model, we focus on the performance of alert information in the security overlay network.

A Seamless Multicast Scheme Supporting Global Mobility in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 전역 이동을 지원하는 끊김 없는 멀티캐스트 기법)

  • Kim, Hwan-Gi;Kim, Jong-Min;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.3
    • /
    • pp.258-267
    • /
    • 2013
  • Recently, Proxy Mobile IPv6(PMIPv6) networks have been drawing attention as the mobility management protocol that uses limited wireless resources effectively. And the multicast, which is a core technology of the Internet broadcast system such as mobile IPTV, has been widely discussed mainly based on PMIPv6 network. However, PMIPv6-based multicast cannot support the global mobility directly between different PMIPv6 domains because PMIPv6 is basically designed for local mobility in single PMIPv6 domain. Moreover, PMIPv6-based multicast causes the disconnection of services because it does not solve the packet loss problem during binding and group joining procedure. In this paper, we propose a global mobility scheme that supports the seamless multicast service in PMIPv6 networks. The proposed scheme supports the global mobility due to the addition of extra signalling messages between LMAs. Also, it achieves low latency because it performs fast binding and group joining procedure. We present the simulation results which show that the proposed scheme achieves the global mobility with low latency through the NS-2 simulation.

The Changes of Urban System Reflected in Daily Movement: 2005-2012 (일일 인구이동으로 본 국토공간의 도시체계 변화: 2005년과 2012년)

  • Son, Seungho
    • Journal of the Korean Geographical Society
    • /
    • v.50 no.2
    • /
    • pp.203-216
    • /
    • 2015
  • This paper examined the changes of urban system through the network and the flow pattern reflected in daily movement in Korea. Because daily movement reflects trip pattern, urban system formed by inter-city linkages can be recognized in terms of living sphere. While population movements between cities have the number of linkage systems of city network and the number of traffic regions composed of the origin and destination has increased respectively. Nevertheless, spatial extent of Capital region and Busan region has been expanded. In Gangwon-do in which Seoul-oriented high-speed transportation network has developed, separation of living sphere between Yeongdong area and the Soyanggang cultural region formed around Chuncheon was intensified. Living sphere that includes Daejeon and the surrounding cities has been expanded to the southern Gyeonggi-do. The existing living sphere formed in Jeollanam-do was fragmented into the east and west around Mokpo and Suncheon due to the weakened centrality of Gwangju. Living spheres formed by spatial interaction were consistent with regional administrative boundary. Considering the increased interaction between Seoul and its surrounding cities, the development of global city-region centered on Seoul is expected.

  • PDF

Side-Channel Cryptanalysis on Stream Cipher HC-128 for Mobile Ad-Hoc Network Environments (이동 Ad-Hoc 네트워크 환경에 적합한 스트림 암호 HC-128의 부채널 안전성 분석)

  • Bae, KiSeok;Park, YoungHo;Moon, SangJae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.11-17
    • /
    • 2012
  • The HC-128 stram cipher which selected for the final eSTREAM portfolio is suitable for mobile Ad-Hoc network environments because of the ability of high-speed encryption in restricted memory space. In this paper, we analyzed the vulnerability of side channel analysis attack on HC-128 stream cipher. At the first, we explain a flaw of previous theoretical analysis result which defined the complexity of side-channel attack of HC-128 stream cipher as 'low' and then re-evaluate the security against side-channel attack by estimating the concrete complexity for recovering the secret key. As a result, HC-128 stream cipher is relatively secure against side-channel attack since recovering the secret key have $2^{65}$ computation complexity which is higher than other stream cipher's one.

Genetic Algorithm Based Routing Method for Efficient Data Transmission for Reliable Data Transmission in Sensor Networks (센서 네트워크에서 데이터 전송 보장을 위한 유전자 알고리즘 기반의 라우팅 방법)

  • Kim, Jin-Myoung;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.49-56
    • /
    • 2007
  • There are many application areas of wireless sensor networks, such as combat field surveillance, terrorist tracking and highway traffic monitoring. These applications collect sensed data from sensor nodes to monitor events in the territory of interest. One of the important issues in these applications is the existence of the radio-jamming zone between source nodes and the base station. Depending on the routing protocol the transmission of the sensed data may not be delivered to the base station. To solve this problem we propose a genetic algorithm based routing method for reliable transmission while considering the balanced energy depletion of the sensor nodes. The genetic algorithm finds an efficient routing path by considering the radio-jamming zone, energy consumption needed fur data transmission and average remaining energy level. The fitness function employed in genetic algorithm is implemented by applying the fuzzy logic. In simulation, our proposed method is compared with LEACH and Hierarchical PEGASIS. The simulation results show that the proposed method is efficient in both the energy consumption and success ratio of delivery.

  • PDF

Performances of wireless ATM cell transmission with partial concatenated coding (무선 ATM셀 전송을 위한 부분 연쇄 부호화 기법의 성능분석)

  • 이진호;김태중;이동도;안재영;황금찬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.9
    • /
    • pp.2014-2026
    • /
    • 1997
  • In this paper, the performances of wireless asynchronous transfer mode (ATM) cell transmission in mobile work are analyzed. We adopt 16Star QAM as amodulation technique in wireless channel and considered Reed-Solomon, convolutional, and concatenated coding to improve the error rate performances, and also proposed the Partial Concatenated Coding (PCC) technique as UEP(unequal error protection) code for efficient transmission of ATM cell in the air interface. We consider Doppler's effect, Rician fading, and diversity technique of maximal-ratio combining (MRC) for mobile channel model. For performance measure, we analyze bit error rate, ATM cell loss probability, ATM cell error probability, and network performances of ATM cell transmission delay and throughput. The numerical results show that the adoption of PCC is a prospective way for the evolution of future wireless ATM network on mobile environment.

  • PDF

Analysis of Common Data Link Technology Trends for the Next Generation Korean Common Data Link Development (차세대 한국형 공용데이터링크 개발을 위한 국·내외 공용데이터링크 기술 동향 분석)

  • Kang, Wipil;Song, Juhyung;Lee, Kyunghoon;Lee, Dae-Hong;Jung, Sung-Jin;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.209-222
    • /
    • 2014
  • NCW is a new operational concept for modern warfare to improve the ability to conduct combat by connecting command and control system via network. To realize NCW integrating information sharing system between multiple platforms, CDL is considered as a key component for high-speed transmission of ISR data. Accordingly, further studies to enhance the performance of CDL are being performed around the world, and our government has also developed self-reliant CDL, MPI-CDL. However, the maximum data rate and networking performance of current CDL still fall short of the objective to enable multiple systems to share the large ISR data. Therefore, in this paper, we analyze the development flow and international technical trends of CDL, and present an approach for enhancing data rate and networking capacity of the next generation CDL.

Dynamic Core Affinity for High-Performance I/O Devices Supporting Multiple Queues (다중 큐를 지원하는 고속 I/O 장치를 위한 동적 코어 친화도)

  • Cho, Joong-Yeon;Uhm, Junyong;Jin, Hyun-Wook;Jung, Sungin
    • Journal of KIISE
    • /
    • v.43 no.7
    • /
    • pp.736-743
    • /
    • 2016
  • Several studies have reported the impact of core affinity on the network I/O performance of multi-core systems. As the network bandwidth increases significantly, it becomes more important to determine the effective core affinity. Although a framework for dynamic core affinity that considers both network and disk I/O has been suggested, the multiple queues provided by high-speed I/O devices are not properly supported. In this paper, we extend the existing framework of dynamic core affinity to efficiently support the multiple queues of high-speed I/O devices, such as 40 Gigabit Ethernet and NVM Express. Our experimental results show that the extended framework can improve the HDFS file upload throughput by up to 32%, and can provide improved scalability in terms of the number of cores. In addition, we analyze the impact of the assignment policy of multiple I/O queues across a number of cores.

Performance Improvement of the Statistical Information based Traffic Identification System (통계 정보 기반 트래픽 분석 방법론의 성능 향상)

  • An, Hyun Min;Ham, Jae Hyun;Kim, Myung Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.335-342
    • /
    • 2013
  • Nowadays, the traffic type and behavior are extremely diverse due to the growth of network speed and the appearance of various services on Internet. For efficient network operation and management, the importance of application-level traffic identification is more and more increasing in the area of traffic analysis. In recent years traffic identification methodology using statistical features of traffic flow has been broadly studied. However, there are several problems to be considered in the identification methodology base on statistical features of flow to improve the analysis accuracy. In this paper, we recognize these problems by analyzing the ground-truth traffic and propose the solution of these problems. The four problems considered in this paper are the distance measurement of features, the selection of the representative value of features, the abnormal behavior of TCP sessions, and the weight assignment to the feature. The proposed solutions were verified by showing the performance improvement through experiments in campus network.