• Title/Summary/Keyword: 네트워크 지도

Search Result 12,221, Processing Time 0.034 seconds

A Hybrid MAC Protocol for Wireless Sensor Networks Enhancing Network Performance (무선센서 네트워크에서 네트워크 성능을 향상시키는 하이브리드 MAC 프로토콜)

  • Kim, Seong-Cheol;Kim, Dong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2008
  • In this paper we suggest a hybrid MAC protocol for wireless sensor networks (WSN) to enhance network performance. The proposed MAC scheme is specifically designed for wireless sensor networks which consist of lots nodes. The contributions of this paper are: First, the proposed scheduling algorithm is independent of network topology. Even though the BS node has lots of one hop node in dense mode network, all the time slots can be assigned fully without increasing frequencies. Second, BS one hop nodes can use more than one time slots if necessary, so total network performance is increased. We compare the network performance of the proposed scheme with previous one, HyMAC [1].

  • PDF

A Study on the Network Access Control of a System in Real Time by Network Address Authentication Based on Policy in the VLAN Environments (VLAN 환경에서 네트워크 주소 인증을 통한 정책 기반 실시간 시스템 제어 기술 연구)

  • Choi, Won-Woo;Ahn, Seong-Jin;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.35-43
    • /
    • 2005
  • It is need to control network access that a user personally change own IP or network devices in managing network address. Also, When we use new network devices or assign network address, we do them by design, not arbitrarily. And then, we can immediately control network's problems. It could be used network management and security in low level. But most of managers do this works by hand not automatically. This paper propose the solutions that improve the security by network address authentication in VLAN environment, such as corporations and public offices.

  • PDF

A Node Management Scheme in Tactical Data Link Network (전술데이터링크 네트워크에서의 노드 이탈 관리 기법)

  • Ahn, Kwang-Ho;Lee, Ju-Hyung;Cho, Joon-Young;Oh, Hyuk-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.386-390
    • /
    • 2011
  • Modem warfares have changed from PCW (platform Centric Warfare) to NCW (Network Centric Warfare). Therefore, it is more important to operate and manage the network. This paper proposed a node management scheme in military wireless networks. In military wireless networks, nodes can join and leave the networks easily. It causes a degradation of network capacity. This paper figured out a problem caused by node which is leaving the network. This paper proposed a RSSI based method of estimating and detecting the leaving nodes in the networks. Finally, an experimental result was demonstrated to show the efficiency of the proposed method.

Survey on Network Protocols for Energy Network Infrastructure based on Smart Utility Networks (스마트 유틸리티 네트워크 기반의 에너지 망 인프라 구축을 위한 네트워크 프로토콜에 관한 연구)

  • Hwang, Kwang-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.119-124
    • /
    • 2012
  • As an energy network infrastructure, which is capable of integrating energy related services such as AMR/AMI, Smart Grid, and Smart Water Grid, the Smart Utility Network (SUN) enables a paradigm shift from user-oriented networks to device-oriented networks. The SUN has some similarities to sensor networks in application and network requirements. Therefore it is required to investigate and analyze thoroughly existing related work in advance to design new network protocols for SUN. In this paper we analyze service requirements and design considerations for SUN and then present a design guideline of new network protocols for SUN by investigating existing low power protocols, data aggregation methods, and in-network storages.

Analysis of People Networks in Goguryeo, Baekje, and Silla Dynasty Silloks (고구려, 백제, 신라 왕조실록 인명 네트워크 분석)

  • Chung, Jean-S.;Kim, Hak-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.5
    • /
    • pp.474-480
    • /
    • 2011
  • Most social networks have power-law distribution that is one of distinct properties in scale-free network. In contrast to social network character, people networks of the Goguryeo, Baekje, and Silla show dissemination network that is a narrow and deep-reaching style of information transmission. However, people network of three kingdoms that is integrated each national people reveals scale-free and hierarchical properties. Pattern of territory expansion and abridgment in Silla is distinct from those in Goguryeo and Baekje, indicating that the distinct pattern reflects a power for unification. Several patterns in national management and national development of the three kingdoms are also analyzed based on network. Our results provide new insight that is analyzed by network-based approaches but is not analyzed by historial approaches in history of three kingdoms.

Implementation & Performance Analysis of Virtual Storage System Based on iSCSI Protocol in Wireless Networks (iSCSI 기반의 무선 네트워크 연결형 가상 저장장치 드라이버 구현 및 성능 분석)

  • Choi Sae-bom;Lim Hyotaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6A
    • /
    • pp.517-525
    • /
    • 2005
  • iSCSI(Internet Small Computer System Interface) is a block-oriented storage access protocol that enables a user to recognize a remote storage as their own local block device through general TCP/IP networks. Since iSCSI uses a standard ethernet switch and router for this kind of access, it can not only be applied to ethernet technologies, but can also be used to create a storage networking system without any distance restrictions that can equally be applied to a wireless network environment. Accordingly, focusing on this applicability, this paper presents an alternative approach to overcome the limited storage space of mobile devices based on the iSCSI initiator driver, which was originally designed for wired networks. Additionally, its potential with a wireless network is also evaluated.

FT-Indoornavi: A Flexible Navigation Method Based on Topology Analysis and Room Internal Path Networks for Indoor Navigation (FT-IndoorNavi: 토폴로지 분석 및 실내 경로 네트워크 분석에 기반한 실내 네비게이션을 위한 유연한 네비게이션 알고리즘)

  • Zhou, Jian;Li, Yan;Lee, Soon Jo;Bae, Hae Young
    • Spatial Information Research
    • /
    • v.21 no.2
    • /
    • pp.1-9
    • /
    • 2013
  • Recently many researches have focused on indoor navigation system. An optimal indoor navigation method can help people to find a path in large and complex buildings easily. However, some indoor navigation algorithms only calculate approximate routes based on spatial topology analysis, while others only use indoor road networks. However, both of them use only one of the spatial topology or network information. In this paper, we present a navigation method based on topology analysis and room internal networks for indoor navigation path. FT-Indoornavi (Flexible Topology Analysis Indoornavi) calculate internal routes based on spatial topology and internal path networks to support length-dependent and running-time optimal routing, which adapt to complex indoor environment and can achieve a better performance in comparison of Elastic algorithm and iNav.

Network Intrusion Detection with One Class Anomaly Detection Model based on Auto Encoder. (오토 인코더 기반의 단일 클래스 이상 탐지 모델을 통한 네트워크 침입 탐지)

  • Min, Byeoungjun;Yoo, Jihoon;Kim, Sangsoo;Shin, Dongil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.13-22
    • /
    • 2021
  • Recently network based attack technologies are rapidly advanced and intelligent, the limitations of existing signature-based intrusion detection systems are becoming clear. The reason is that signature-based detection methods lack generalization capabilities for new attacks such as APT attacks. To solve these problems, research on machine learning-based intrusion detection systems is being actively conducted. However, in the actual network environment, attack samples are collected very little compared to normal samples, resulting in class imbalance problems. When a supervised learning-based anomaly detection model is trained with such data, the result is biased to the normal sample. In this paper, we propose to overcome this imbalance problem through One-Class Anomaly Detection using an auto encoder. The experiment was conducted through the NSL-KDD data set and compares the performance with the supervised learning models for the performance evaluation of the proposed method.

Development of scalable big data storage system using network computing technology (네트워크 컴퓨팅 기술을 활용한 확장 가능형 빅데이터 스토리지 시스템 개발)

  • Park, Jung Kyu;Park, Eun Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1330-1336
    • /
    • 2019
  • As the Fourth Industrial Revolution era began, a variety of devices are running on the cloud. These various devices continue to generate various types of data or large amounts of multimedia data. To handle this situation, a large amount of storage is required, and big data technology is required to process stored data and obtain accurate information. NAS (Network Attached Storage) or SAN (Storage Area Network) technology is typically used to build high-speed, high-capacity storage in a network-based environment. In this paper, we propose a method to construct a mass storage device using Network-DAS which is an extension technology of DAS (Direct Attached Storage). Benchmark experiments were performed to verify the scalability of the storage system with 76 HDD. Experimental results show that the proposed high performance mass storage system is scalable and reliable.

Drone Deployment Using Coverage-and-Energy-Oriented Technique in Drone-Based Wireless Sensor Network (드론 기반 무선 센서 네트워크에서의 커버리지와 에너지를 고려한 드론 배치)

  • Kim, Tae-Rim;Song, Jong-Gyu;Im, Hyun-Jae;Kim, Bum-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.15-22
    • /
    • 2019
  • Awireless sensor network utilizes small sensors with a low cost and low power being deployed over a wide area. They monitor the surrounding environment and gather the associated information to transmit it to a base station via multi-hop transmission. Most of the research has mainly focused on static sensors that are located in a fixed position. Unlike a wireless sensor network based on static sensors, we can exploit drone-based technologies for more efficient wireless networks in terms of coverage and energy. In this paper, we introduce a transmission power model and a video encoding power model to design the network environment. We also explain a priority mapping scheme, and deploy drones oriented for network coverage and energy consumption. Through our simulations, this research shows coverage and energy improvements in adrone-based wireless sensor network with fewer sensors, compared to astatic sensor-based wireless sensor network. Concretely, coverage increases by 30% for thedrone-based wireless sensor network with the same number of sensors. Moreover, we save an average of 25% with respect to the total energy consumption of the network while maintaining the coverage required.