• Title/Summary/Keyword: Computer Network

Search Result 12,663, Processing Time 0.036 seconds

Towards a Scalable SDN Hypervisors Framework

  • Aamir Hussain;Sajid Ali;Mubashir Ali;Sarfraz Hashim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.67-78
    • /
    • 2024
  • Software-Defined Networking (SDN) is a new emerging networking paradigm that has adopted a logically centralized architecture to increase overall network performance agility and programmability. Combining network virtualization with SDN will guarantees for combined advantages of improved flexibility and network performance. Combining SDN with hypervisors divides the network physical resources into several logical transparent and isolated virtual SDN network (vSDN), where each has its virtual controller. However, SDN hypervisors bring several advantages as well as several challenges to its network operators as for the virtual appliances, their efficient placement, assurance of network performance is mandatory, and their dynamic instantiation with their migration. In this article, we provide a brief and concise review of network virtualization along with its implementation in the SDN network. SDN hypervisors types are discussed, and taxonomy is provided to demonstrate the importance of hypervisors in SDN. A comparison of SDN hypervisors is performed to elaborate on the vital hypervisor software along with their features, and different challenges are discussed faced by the SDN network. A framework is proposed to add combined functionalities of hypervisors to create a more effective and efficient virtual system. The purpose of the framework is to increase network performance through proper configuration of resources, software, control plane isolation functions with defined rules and policies.

Location Service Model Based On Integrated Architecture of RFID Network and Cellular Network (RFID 망과 이동통신망의 연동 구조를 기반으로 한 위치기반서비스 모델 연구)

  • Eom, Jung-Hyun;Woo, Si-Nam;An, Sun-Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.100-104
    • /
    • 2007
  • 라디오 주파수를 이용하여 사물의 정보를 인식할 수 있는 RFID 기술은 다양한 분야에 활용되고 있는데 이러한 RFID 망을 All-IP 기반의 이동통신망과 연동할 경우 RFID의 각종정보와 휴대단말기의 위치정보 및 이동성, 그리고 다양한 IP 기반의 정보서버를 활용한 새로운 형태의 위치기반 서비스의 창출이 가능하다. 즉, RFID 태그에 태그 리더기 역할을 하는 단말기의 위치를 부여하고 이를 RFID 서버에서 지속적으로 관리함으로써 RFID 태그의 Code와 위치를 기반으로 한 위치기반서비스를 제공할 수 있다. 본 연구에서는 RFID망과 이동통신망의 연동을 기반으로 한 위치기반서비스 모델로 Mobile Information Retrieval Service (MIRS), Mobile Location Tracking Service (MLTS), Localization Service by Fixed Tag (LSFT) 세 가지 모델을 제시하였으며 이러한 서비스 모델은 실제 서비스를 개발하는데 있어 다양한 방식으로 활용될 수 있다.

  • PDF

A Comparative Analysis Of Routing Protocol In Mobile Ad-hoc Network Based On OMNeT++ (OMNeT++ 기반 Mobile Ad-hoc Network 라우팅 프로토콜 비교분석)

  • Kim, Sang Young;Lee, Byung-Jun;Cho, Young-Joo;Youn, Hee Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.63-64
    • /
    • 2016
  • Ad-hoc Network는 노드의 이동성과 제한된 배터리 수명에 의해 Network 토폴로지가 자주 교체되며 이런 연유로 적합한 Routing Protocol을 선택하는 것도 매우 중요한 과제이다. 본 논문에서는 자주 변화하는 Ad-hoc Network에 적합한 Routing Protocol을 선정하기 위해서 OMNeT++을 이용해 시뮬레이션 환경을 설정하고 각 Routing Protocol 특성을 파라미터 화시켜 적용, 요소별 수치를 비교 분석하여 성능평가를 하였다.

  • PDF

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

Behavioral Tendency Analysis towards E-Participation for Voting in Political Elections using Social Web

  • Hussain Saleem;Jamshed Butt;Altaf H. Nizamani;Amin Lalani;Fawwad Alam;Samina Saleem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.189-195
    • /
    • 2024
  • The issue "Exploring Social Media and Other Crucial Success Elements of Attitude towards Politics and Intention for Voting in Pakistan" is a huge study embracing more issues. The politics of Pakistan is basically the politics of semantic groups. Pakistan is a multilingual state more than six languages. There are 245 religious parties in Pakistan, as elaborated by the Daily Times research. The use of social media sites in Pakistan peaked to its maximum after announcement of election schedule by the Election Commission of Pakistan in March 22, 2013. Most of the political parties used it for the recent elections in Pakistan to promote their agenda and attract country's 80 million registered electors. This study was aiming to investigate the role of social media and other critical variables in the attitude towards politics and intention for voting.

A New Stochastic Binary Neural Network Based on Hopfield Model and Its Application

  • Nakamura, Taichi;Tsuneda, Akio;Inoue, Takahiro
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.34-37
    • /
    • 2002
  • This paper presents a new stochastic binary neural network based on the Hopfield model. We apply the proposed network to TSP and compare it with other methods by computer simulations. Furthermore, we apply 2-opt to the proposed network to improve the performance.

  • PDF

Arabic Text Recognition with Harakat Using Deep Learning

  • Ashwag, Maghraby;Esraa, Samkari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.41-46
    • /
    • 2023
  • Because of the significant role that harakat plays in Arabic text, this paper used deep learning to extract Arabic text with its harakat from an image. Convolutional neural networks and recurrent neural network algorithms were applied to the dataset, which contained 110 images, each representing one word. The results showed the ability to extract some letters with harakat.

Mechanism for Reader Collision Avoidance using sensor nodes (센서 노드를 이용한 리더간의 충돌방지 방법)

  • Lee Hyun-Jung;Kim Sung-Jun;An Sun-Shin;Kim Dong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.145-147
    • /
    • 2006
  • 본 논문에서는 센서네트워크와 RFID 네트워크가 결합되어 있는 환경에서 센서 노드의 특성을 이용한 RFID 리더 충돌 방지 방법을 제안한다. 세부적으로 이웃 센서 노드 정보 확인 단계, 관리 노드로부터 리더 충돌 확인 단계, 태그 리드 단계를 포함한다. 리더와 센서가 결합되어 있는 환경에서, 센서 노드들간의 거리에 따라 리더들 간의 동기를 맞추어 충돌을 방지함으로써, 전체 시스템의 부하를 감소시키고, 시스템을 관리하는데 자원 낭비를 방지하며, 시스템의 처리율 및 효율을 향상시킬 수 있다.

  • PDF

Connection Frequency Buffer Aware Routing Protocol for Delay Tolerant Network

  • Ayub, Qaisar;Mohd Zahid, M. Soperi;Abdullah, Abdul Hanan;Rashid, Sulma
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.649-657
    • /
    • 2013
  • DTN flooding based routing protocol replicate the message copy to increase the delivery like hood that overloads the network resources. The probabilistic routing protocols reduce replication cost by forwarding the message to a node that holds high predictability value to meet its destination. However, the network traffic converges to high probable nodes and produce congestion that triggers the drop of previously stored messages. In this paper, we have proposed a routing protocol called as Connection frequency Buffer Aware Routing Protocol (CFBARP) that uses an adaptive method to maintain the information about the available buffer space at the receiver before message transmission. Furthermore, a frequency based method has been employed to determine the connection recurrence among nodes. The proposed strategy has performed well in terms of reducing message drop, message relay while increases the delivery probability.

Introducing 'Meta-Network': A New Concept in Network Technology

  • Gaur, Deepti;Shastri, Aditya;Biswas, Ranjit
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.470-474
    • /
    • 2008
  • A well-designed computer network technology produces benefits on several fields within the organization, between the organizations(suborganizations) or among different organizations(suborganizations). Network technology streamlines business processes, decision process. Graphs are useful data structures capable of efficiently representing a variety of networks in the various fields. Metagraph is a like graph theoretic construct introduced recently by Basu and Blanning in which there is set to set mapping in place of node to node as in a conventional graph structure. Metagraph is thus a new type of data structure occupying its popularity among the computer scientists very fast. Every graph is special case of Metagraph. In this paper the authors introduce the notion of Meta-Networking as a new network technological representation, which is having all the capabilities of crisp network as well as few additional capabilities. It is expected that the notion of meta-networking will have huge applications in due course. This paper will play the role of introducing this new concept to the network technologists and scientists.