• Title/Summary/Keyword: Backbone Network

Search Result 354, Processing Time 0.026 seconds

A QoS Improvement Scheme for Real-time Traffic using IPv6 Flow Labels (IPv6 플로우 레이블을 이용한 실시간 트래픽의 QoS개선 방안)

  • 이인화;김성조
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.787-798
    • /
    • 2003
  • The flow label field in IPv6 has been proposed to provide the QoS. Since the existing flow label specification scheme like random-number format utilizes the label only as the identifier of flow, it is not appropriate for providing differentiated services according to the characteristics of various types of real-time traffic. This paper proposes a hybrid scheme that makes use of the flow label fields as components of flow and QoS parameters as well. To be specific, this paper investigates a scheme that both guarantees the end-to-end service quality and utilizes efficiently backbone resources by allowing users to specify QoS parameters using flow labels. Assuming an MLPS-TE network as the backbone, we compare the performance of our proposed scheme with that of random-number scheme through simulation. The simulation result shows that our scheme is more efficient than the existing one in terms of the transmission rate as well as the resource utilization of the backbone.

Modeling the Spread of Internet Worms on High-speed Networks (고성능 네트워크에서 인터넷 웜 확산 모델링)

  • Shin Weon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.839-846
    • /
    • 2005
  • Recently broadband convergence network technology is emerging as an integrated network of telecommunication, broadcasting and Internet. But there are various threats as side effects against the growth of information technology, and malicious codes such af Internet worms may bring about confusions to upset a national backbone network. In this paper, we survey the traditional spreading models and propose a new worm spreading model on Internet environment. We also analyze the spreading effects due to tile spread period and the response period of Internet worms. The proposed model leads to a better prediction of the scale and speed of worm spreading. It can be applied to high-speed network such as broadband convergence network.

An Effective Multi-hop Relay Algorithm in Wireless Mesh Network (무선 메쉬 네트워크 환경에서 효율적인 다중 홉 전달 기법)

  • Kim, Young-An;Park, Chul-Hyun;Hong, Choong-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10B
    • /
    • pp.872-882
    • /
    • 2006
  • The Wireless Mesh Network uses a wireless communication technology with transmission rates similar to that of a cable, which is used as a backbone network. The topology structure is in a Mesh form which resembles an Ad-hoc network, however a metric is needed in order to set the channel and channel methods since the operation intentions and interior motions are different. This thesis proposes a metric(ETR : Expected Transmission Rate) that sets the channel with physical link performance and multi hop transmission capabilities. This metric will also be based on multi channel creation methods and Hop-by-hop routing techniques for an effective multi hop transmission with no loops.

Push-Pull Distributed Movement Algorithm toy An Optimized Coverage of Mobile Base Station in Topology-less Wireless Networks

  • Unhawiwat, Mallika;Wipusitwarakun, Komwut
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1936-1939
    • /
    • 2002
  • Much recent attention on wireless technologies s put on topology-less wireless network, in which all nodes an be mobile and can communicate over wireless links, due to its ease of deployment, high flexibility and low expenses. One key in topology-less wireless network is mobile base stations (MBSs), which provides access points or mobile terminals (MTs) to wireless backbone network. MBSs can move to anywhere in accordance with changes in geographical distribution of MTs. They serve as dynamic odes. However, in order to utilize network resources and take full advantage of this topology-less network, MBSs must move to suitable position according to the current tate of network use. Moreover, MBSs have to consider the distance among them to avoid the crash and gap area of MBSs. Therefore, this paper proposes MBS movement algorithm by implementing push-pull method to fulfill the corporation of MBSs and considering the center of covered MTs or centroid to satisfy the MT coverage. From the simulation results, the proposed algorithm increases the performance of system when comparing with the centroid-based algoriom〔7〕, such as coverage area, MT coverage and call drops rate.

  • PDF

Multi-interface Wireless Mesh Network Testbed using Wireless Distribution System (무선 분산 시스템을 이용한 멀티 인터페이스 무선 메쉬 네트워크 테스트베드)

  • Yoon, Mi-kyung;Yang, Seung-chur;Kim, Jong-deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.87-90
    • /
    • 2009
  • Wireless Mesh Network(WMN) is wireless backbone networks technique which has ease of network configuration and cost of advantage. Recently, WNM released a new product, but most of existing research and technology analysis the performance through the simulation. This paper build the wireless mesh network testbed for actual situation. Testbed supports multi-channel multi-interface using bridge, the Wireless Distribution System and dynamic location-based routing protocol. This routing protocol strongly design against wireless interference using metric for link channel change and real distance. Then, the address of mesh clients assigned by the centralized address management server. Mesh clients is designed and implemented to manage network through Simple Network Management Protocol.

  • PDF

Detection and Localization of Image Tampering using Deep Residual UNET with Stacked Dilated Convolution

  • Aminu, Ali Ahmad;Agwu, Nwojo Nnanna;Steve, Adeshina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.203-211
    • /
    • 2021
  • Image tampering detection and localization have become an active area of research in the field of digital image forensics in recent times. This is due to the widespread of malicious image tampering. This study presents a new method for image tampering detection and localization that combines the advantages of dilated convolution, residual network, and UNET Architecture. Using the UNET architecture as a backbone, we built the proposed network from two kinds of residual units, one for the encoder path and the other for the decoder path. The residual units help to speed up the training process and facilitate information propagation between the lower layers and the higher layers which are often difficult to train. To capture global image tampering artifacts and reduce the computational burden of the proposed method, we enlarge the receptive field size of the convolutional kernels by adopting dilated convolutions in the residual units used in building the proposed network. In contrast to existing deep learning methods, having a large number of layers, many network parameters, and often difficult to train, the proposed method can achieve excellent performance with a fewer number of parameters and less computational cost. To test the performance of the proposed method, we evaluate its performance in the context of four benchmark image forensics datasets. Experimental results show that the proposed method outperforms existing methods and could be potentially used to enhance image tampering detection and localization.

Application of YOLOv5 Neural Network Based on Improved Attention Mechanism in Recognition of Thangka Image Defects

  • Fan, Yao;Li, Yubo;Shi, Yingnan;Wang, Shuaishuai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.245-265
    • /
    • 2022
  • In response to problems such as insufficient extraction information, low detection accuracy, and frequent misdetection in the field of Thangka image defects, this paper proposes a YOLOv5 prediction algorithm fused with the attention mechanism. Firstly, the Backbone network is used for feature extraction, and the attention mechanism is fused to represent different features, so that the network can fully extract the texture and semantic features of the defect area. The extracted features are then weighted and fused, so as to reduce the loss of information. Next, the weighted fused features are transferred to the Neck network, the semantic features and texture features of different layers are fused by FPN, and the defect target is located more accurately by PAN. In the detection network, the CIOU loss function is used to replace the GIOU loss function to locate the image defect area quickly and accurately, generate the bounding box, and predict the defect category. The results show that compared with the original network, YOLOv5-SE and YOLOv5-CBAM achieve an improvement of 8.95% and 12.87% in detection accuracy respectively. The improved networks can identify the location and category of defects more accurately, and greatly improve the accuracy of defect detection of Thangka images.

MRU-Net: A remote sensing image segmentation network for enhanced edge contour Detection

  • Jing Han;Weiyu Wang;Yuqi Lin;Xueqiang LYU
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.12
    • /
    • pp.3364-3382
    • /
    • 2023
  • Remote sensing image segmentation plays an important role in realizing intelligent city construction. The current mainstream segmentation networks effectively improve the segmentation effect of remote sensing images by deeply mining the rich texture and semantic features of images. But there are still some problems such as rough results of small target region segmentation and poor edge contour segmentation. To overcome these three challenges, we propose an improved semantic segmentation model, referred to as MRU-Net, which adopts the U-Net architecture as its backbone. Firstly, the convolutional layer is replaced by BasicBlock structure in U-Net network to extract features, then the activation function is replaced to reduce the computational load of model in the network. Secondly, a hybrid multi-scale recognition module is added in the encoder to improve the accuracy of image segmentation of small targets and edge parts. Finally, test on Massachusetts Buildings Dataset and WHU Dataset the experimental results show that compared with the original network the ACC, mIoU and F1 value are improved, and the imposed network shows good robustness and portability in different datasets.

Enterprise Network Weather Map System using SNMP (SNMP를 이용한 엔터프라이즈 Network Weather Map 시스템)

  • Kim, Myung-Sup;Kim, Sung-Yun;Park, Jun-Sang;Choi, Kyung-Jun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.93-102
    • /
    • 2008
  • The network weather map and bandwidth time-series graph are popularly used to understand the current and past traffic condition of NSP, ISP, and enterprise networks. These systems collect traffic performance data from a SNMP agent running on the network devices such as routers and switches, store the gathered information into a DB, and display the network performance status in the form of a time-series graph or a network weather map using Web user interface. Most of current enterprise networks are constructed in the form of a hierarchical tree-like structure with multi-Gbps Ethernet links, which is quietly different from the national or world-wide backbone network structure. This paper focuses on the network weather map for current enterprise network. We start with the considering points in developing a network weather map system suitable for enterprise network. Based on these considerings, this paper proposes the best way of using SNMP in constructing a network weather map system. To prove our idea, we designed and developed a network weather map system for our campus network, which is also described in detail.

A Study on the Charge of Using the Internet Network - Focusing on U.S. Internet History and Charter Merger Approval Conditions Litigation - (인터넷 망 이용의 유상성에 대한 고찰 - 미국 인터넷 역사 및 Charter 합병승인조건 소송 중심으로 -)

  • Cho, Dae-Keun
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.123-134
    • /
    • 2021
  • This paper suggests that the Internet is not free through analysis of U.S. Internet history and lawsuits related to the Charter merger in 2016. Generally speaking, the players in internet connectivity market agree to Non-Disclosure Agreement, when connecting their facilities and networks each other. So, I adopted the case study & analysis as research methodologies due to limitation of collecting the transaction data between them. The former finds that Internet access has never been free in U.S Internet history. As we know, some including Content Providers(CPs) argue that the Internet is a free network and there are many cases to use the internet for free, so they came to conclusion that ISPs have no right to charge the users like CPs. This study refutes these arguments in two ways. One is that using the internet has never been free. From ARPANET, known as the beginning of the U.S. Internet, to the commercialization of backbone, no Internet has been considered or implemented for free since the early Internet network was devised. Also, the U.S government was paying subsidies or institutions were paying fees to secure network operations for the NSFNET backbone. the other is that "free peering" refers to barter transactions between ISPs, not to free access to counterpart internet networks. Second, this study analyze the FCC' executive order of conditioned merger approval and the court's related ruling and verify that using the internet is not free. According to the analysis, this study finds that it's real situation to make paid settlements between ISP-CPs (including OTTs) in the US Internet market at the moment. This study concludes that the Internet has never been free in terms of its technical characteristics, network structure, network operation, and system. Also it proposes how to improve the domestic settlement system between ISPs-CPs in terms of policy and regulation.