• Title/Summary/Keyword: Computer Networks

Search Result 5,261, Processing Time 0.033 seconds

Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

  • Kim, Hyo-Jin;Chitti, Ramachandra Bhargav;Song, Joo-Seok
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.137-150
    • /
    • 2011
  • Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as a result of clogging the victim node. If collaborative multiple attacks are conducted, it becomes more difficult to prevent. To defend against these attacks, we propose a novel defense mechanism in mobile ad hoc networks. The proposed scheme enhances the amount of legitimate packet processing at each node. The simulation results show that the proposed scheme also improves the end-to-end packet delivery ratio.

Mention Detection Using Pointer Networks for Coreference Resolution

  • Park, Cheoneum;Lee, Changki;Lim, Soojong
    • ETRI Journal
    • /
    • v.39 no.5
    • /
    • pp.652-661
    • /
    • 2017
  • A mention has a noun or noun phrase as its head and constructs a chunk that defines any meaning, including a modifier. Mention detection refers to the extraction of mentions from a document. In mentions, coreference resolution refers to determining any mentions that have the same meaning. Pointer networks, which are models based on a recurrent neural network encoder-decoder, outputs a list of elements corresponding to an input sequence. In this paper, we propose mention detection using pointer networks. This approach can solve the problem of overlapped mention detection, which cannot be solved by a sequence labeling approach. The experimental results show that the performance of the proposed mention detection approach is F1 of 80.75%, which is 8% higher than rule-based mention detection, and the performance of the coreference resolution has a CoNLL F1 of 56.67% (mention boundary), which is 7.68% higher than coreference resolution using rule-based mention detection.

Design and Implementation of a Component-based Simulator for the Virtual Laboratory of Computer Networks (컴퓨터 네트워크 가상 실습을 위한 컴포넌트 기반의 시뮬레이터 설계 및 구현)

  • 임명식;김기형
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.1
    • /
    • pp.1-10
    • /
    • 2003
  • Recently, various network protocols have been developed to keep step with the rapid growth of Internet users. For the education of students in the computer networks classes, there have been many attempts to allow students experiment routers setting, operations and management of networks by themselves, in addition to the classroom lectures based on textbooks. One of the attempts is to install expensive real router experiment sets in laboratories for students, and one another is using router and network simulators for virtual experiments. This paper presents the design and implementation of NetSim, a scalable, component-based simulator environment for the network experimentation. NetSim expands the existing component-based JavaSim simulation tool for the education purpose, and it allows the design and experiment of various networks and protocols. For the evaluation of NetSim, it is shown that the network design and RIP-based router setting process is possible in NetSim.

  • PDF

Design and Evaluation of a Fuzzy Hierarchical Location Service for Mobile Ad Hoc Networks

  • Bae, Ihn-Han;Kim, Yoon-Jeong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.3
    • /
    • pp.757-766
    • /
    • 2007
  • Location services are used in mobile ad hoc and hybrid networks to locate either the geographic position of a given node in the network or a data item. One of the main usages of position location services is presented in location based routing algorithms. In particular, geographic routing protocols can route messages more efficiently to their destinations based on the destination node's geographic position, which is provided by a location service. In this paper, we propose an adaptive location service on the basis of fuzzy logic called FHLS (Fuzzy Hierarchical Location Service) for mobile ad hoc networks. The adaptive location update scheme using the fuzzy logic on the basis of the mobility and the call preference of mobile nodes is used by the FHLS. The performance of the FHLS is to be evaluated by a simulation, and compared with that of existing HLS scheme.

  • PDF

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

  • Yoo, Dae-Suk;Choi, Seung-Sik
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.501-510
    • /
    • 2010
  • Wireless sensor networks consist of sensor nodes which are expected to be battery-powered and are hard to replace or recharge. Thus, reducing the energy consumption of sensor nodes is an important design consideration in wireless sensor networks. For the implementation of an energy-efficient MAC protocol, a Sensor-MAC based on the IEEE 802.11 protocol, which has energy efficient scheduling, has been proposed. In this paper, we propose a Dynamic S-MAC that adapts dynamically to the network-traffic state. The dynamic S-MAC protocol improves the energy consumption of the S-MAC by changing the frame length according to the network-traffic state. Using an NS-2 Simulator, we compare the performance of the Dynamic S-MAC with that of the S-MAC protocol.

P2P Network Simulation System for Performance Evaluation in Convergence Networks

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.396-400
    • /
    • 2011
  • P2P(peer to Peer) network is a distributed network architecture composed of participants that make a portion of their resources directly available to other network participants, without the need for a central server. Currently, convergence network industry using wired and mobile are grows rapidly. So P2P protocols will be used between mobile and wired network. But current P2P protocols are focused on the wired networks only and there are no simulators for performance analysis of mobile P2P. In this paper, we design a P2P simulation system for performance analysis of P2P protocols in mobile, wired and convergence networks. It is constructed by a well-known mobile network simulator and wired based P2P protocol simulator. Finally we have implemented a smart TV test-bed using our P2P test-bed for convergence networks.

A Novel Text to Image Conversion Method Using Word2Vec and Generative Adversarial Networks

  • LIU, XINRUI;Joe, Inwhee
    • Annual Conference of KIPS
    • /
    • 2019.05a
    • /
    • pp.401-403
    • /
    • 2019
  • In this paper, we propose a generative adversarial networks (GAN) based text-to-image generating method. In many natural language processing tasks, which word expressions are determined by their term frequency -inverse document frequency scores. Word2Vec is a type of neural network model that, in the case of an unlabeled corpus, produces a vector that expresses semantics for words in the corpus and an image is generated by GAN training according to the obtained vector. Thanks to the understanding of the word we can generate higher and more realistic images. Our GAN structure is based on deep convolution neural networks and pixel recurrent neural networks. Comparing the generated image with the real image, we get about 88% similarity on the Oxford-102 flowers dataset.

A Revised Timing-sync Protocol for Sensor Networks by a Polling Method

  • Bae, Shi-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.23-28
    • /
    • 2015
  • TPSN(Timing-sync Protocol for Sensor Networks), the representative of time synchronization protocol for WSN(wireless sensor networks), was developed to provide higher synchronization accuracy and energy efficiency. So, TPSN's approach has been referenced by so many other WSN synchronization schemes till now. However, TPSN has a collision problem due to simultaneous transmission among competing nodes, which causes more network convergence delay for a network-wide synchronization. A Polling-based scheme for TPSN is proposed in this paper. The proposed scheme not only shortens network-wide synchronization time of TPSN, but also reduce collision traffic which lead to needless power consumption. The proposed scheme's performance has been evaluated and compared with an original scheme by simulation. The results are shown to be better than the original algorithm used in TPSN.

Efficient Slice Allocation Method using Cluster Technology in Fifth-Generation Core Networks

  • Park, Sang-Myeon;Mun, Young-Song
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.3
    • /
    • pp.185-190
    • /
    • 2019
  • The explosive growth of data traffic and services has created cost challenges for networks. Studies have attempted to effectively apply network slicing in fifth generation networks to provide high speed, low latency, and various compatible services. However, in network slicing using mixed-integer linear programming, the operation count increases exponentially with the number of physical servers and virtual network functions (VNFs) to be allocated. Therefore, we propose an efficient slice allocation method based on cluster technology, comprising the following three steps: i) clustering physical servers; ii) selecting an appropriate cluster to allocate a VNF; iii) selecting an appropriate physical server for VNF allocation. Solver runtimes of the existing and proposed methods are compared, under similar settings, with respect to intra-slice isolation. The results show that solver runtime decreases, by approximately 30% on average, with an increase in the number of physical servers within the cluster in the presence of intra-slice isolation.

Path Collision-aware Real-time Link Scheduling for TSCH Wireless Networks

  • Darbandi, Armaghan;Kim, Myung Kyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4429-4445
    • /
    • 2019
  • As low-power and low-rate WSNs are being widely used for industrial applications, the scheduling of such applications becomes a critical issue to guarantee meeting the stringent requirements of determinism and tight latencies. This paper studies the link scheduling problem for real-time industrial applications in time-slotted channel hopping (TSCH) networks. We propose a heuristic algorithm for centralized link scheduling referred to as path-collision aware least laxity first (PC-LLF) algorithm, which dynamically prioritizes the packets based on the laxity time to the end-to-end deadlines and the amount of collisions that messages might deal with along their designated paths to the destination device. We propose schedulability analysis of real-time applications scheduled under our prioritization approach over TSCH networks, based on the literature on real-time schedulability analysis of multiprocessors and distributed systems. We show that our methodology provides an improved schedulability condition with respect to the existing approaches. Performance evaluation studies quantify to quantify the performance of our proposed approach under a variety of scenarios.