• Title/Summary/Keyword: Computer Networks

Search Result 5,189, Processing Time 0.03 seconds

Performance analysis of Hierarchical Mobile IPv6 depending on the paging size (페이징 영역크기에 따른 계층적 이동 IPv6 의 성능분석)

  • 정계갑;이상욱;김준년
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12A
    • /
    • pp.964-974
    • /
    • 2003
  • With increasing use of a personal mobile computer. the Mobile IPv6 is one of the main protocols that support mobility and complies with IPv6 specification. Similar to the mobile IPv6, the mobile IPv6 also has limitations on fast moving condition. The Hierarchical Mobile IPv6 is a solution that overcomes these limitations. The Hierarchical Mobile IPv6 is a micro mobility protocol that supports fast mobile IP handover and reduces signaling overhead with Mobility Anchor Point(MAP). But until now no paging method is applied to the Hierarchical Mobile IPv6 to reduce unnecessary signaling overhead and power consumption of mobile nodes. So, the paging mechanism for the Hierarchical Mobile IPv6 is proposed in this paper. the mechanism is implemented by making use of the destination option header and extension function and the last location algorithm. The results show that the Hierarchical Mobile IPv6 with the paging ability reduces the traffic of mobile networks by removing unnecessary binding update packet generated whenever handover takes place. Also, the larger the paging size is. the less the number of BU(Binding Update) massage generated.

3S: Scalable, Secure and Seamless Inter-Domain Mobility Management Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 3S를 고려한 도메인간 이동성관리 기법)

  • Kang, Min;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.99-114
    • /
    • 2012
  • Proxy Mobile IPv6 (PMIPv6) has received considerable attention between telecommunications and the Internet communities and does not require active participation of the Mobile Node (MN) by way of network-based mobility management. The PMIPv6 domain is studying establishment in progress to support extensively a number of MN by using a low handover latency. In this research, we are propose a novel 3S scheme for building Scalable and Secure and Seamless PMIPv6 domains. In the proposed scheme, all of Mobility Access Gateway (MAG) are acting as the Local Mobility Anchor (LMA) and composing a virtual ring with another MAG. General hashing is used in the efficient distribution-mapping between each MN and the MN's LMA of all MAGs. And, MAG and MN are authenticated using the symmetric key. Through mathematical analysis, we verifies the safety, scalability, and seamless service for 3S. Also, we're propose a handover procedure of 3S and show better than the existing schemes in terms of handover latency.

The Structure of Reversible DTCNN (Discrete-Time Celluar Neural Networks) for Digital Image Copyright Labeling (디지털영상의 저작권보호 라벨링을 위한 Reversible DTCNN(Discrete-Time Cellular Neural Network) 구조)

  • Lee, Gye-Ho;Han, Seung-jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.3
    • /
    • pp.532-543
    • /
    • 2003
  • In this paper, we proposed structure of a reversible discrete-time cellular neural network (DTCNN) for labeling digital images to protect copylight. First, we present the concept and the structure of reversible DTCNN, which can be used to generate 2D binary pseudo-random images sequences. We presented some, output examples of different kinds of reversible DTCNNs to show their complex behaviors. Then both the original image and the copyright label, which is often another binary image, are used to generate a binary random key image. The key image is then used to scramble the original image. Since the reversibility of a reversible DTCNN, the same reversible DTCNN can recover the copyright label from a labeled image. Due to the high speed of a DTCNN chip, our method can be used to label image sequences, e.g., video sequences, in real time. Computer simulation results are presented.

An Agent System Protection Mechanism for Secure Action of Mobile Agent in Open Network Systems (Open Network 시스템에서 이동에이전트의 안전한 역할 수행을 위한 에이전트 보호메커니즘)

  • Jung, Chang-Ryul;Yoon, Hong-Sang;Koh, Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.371-378
    • /
    • 2002
  • In the resent years, the term mobile agent is probably one of the most overused words in many appliable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributed systems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.

Design of a Smart Application Using Ad-Hoc Sensor Networks based on Bluetooth (블루투스기반 애드 혹 센서망을 이용한 스마트 응용 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.243-248
    • /
    • 2013
  • With rapid growth and fast diffusion of smartphone technologies, many users are deeply concerned about the smart applications and many mobile applications converged with various related technologies are rapidly disseminated. Especially, the convergence technologies like mobile apps that can establish the wireless ad hoc network between smartphone and other peripherals and exchange data are appear and progressed continuously. In this paper, we design and implement the smart app using bluetooth based wireless ad hoc sensor network that can connect smartphone with sensors and exchange data for various smart applications. The proposed smart application in this paper collects data obtained from more than 2 multi-sensors in real time and fulfills the decision making function by storing data at the database and analysing it. The smart application designed and implemented in this paper is the healthcare application that can analyze and evaluate the patient's health condition with sensing data from multi-sensors in real time through bluetooth module.

Weakly-supervised Semantic Segmentation using Exclusive Multi-Classifier Deep Learning Model (독점 멀티 분류기의 심층 학습 모델을 사용한 약지도 시맨틱 분할)

  • Choi, Hyeon-Joon;Kang, Dong-Joong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.227-233
    • /
    • 2019
  • Recently, along with the recent development of deep learning technique, neural networks are achieving success in computer vision filed. Convolutional neural network have shown outstanding performance in not only for a simple image classification task, but also for tasks with high difficulty such as object segmentation and detection. However many such deep learning models are based on supervised-learning, which requires more annotation labels than image-level label. Especially image semantic segmentation model requires pixel-level annotations for training, which is very. To solve these problems, this paper proposes a weakly-supervised semantic segmentation method which requires only image level label to train network. Existing weakly-supervised learning methods have limitations in detecting only specific area of object. In this paper, on the other hand, we use multi-classifier deep learning architecture so that our model recognizes more different parts of objects. The proposed method is evaluated using VOC 2012 validation dataset.

Pilot Hopping Scheme for Massive Antenna Systems in Cellular Networks (극다중 안테나 셀룰러 시스템을 위한 파일럿 도약 기법)

  • Kim, Seong Hwan;Ban, Tae-Won;Lee, Wongsup;Ryu, Jong Yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.718-723
    • /
    • 2017
  • We propose a pilot hopping scheme that improves the limited system capacity due to pilot contamination in multi-cell environment with large-scale antenna arrays at a base station, assuming the infinite number of antennas. In the conventional fixed pilot scheme, each user obtains the same signal-to-interference ratio (SIR) over a long period of time. Therefore, a user with strong interference has continuously low SIR which degrades its service quality. In the proposed pilot hopping scheme, different pilot signals are used for each time slot, and different amounts of interference are received every time. When such a pilot hopping technique is applied, the SIR fluctuates at every time slot. When the Hybrid Automatic Repeat & reQuest (HARQ) technique is applied in such a channel, the outage probability and transmission rate are improved. We show that there is the performance gain of the proposed scheme over the conventional scheme through computer simulations.

An Architecture for Securing Digital Documents Using Radio Frequency Identification(RFID) (RFID를 이용한 디지털 문서 보안 아키텍처)

  • Choi, Jae-Hyun;Lee, Woo-Jin;Chon, Ki-Won
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.965-972
    • /
    • 2005
  • Digital documents have become the mainstay of the paperless office. This is due to the increased usage of computer networks and the widespread digital culture. Along with the increased usage of digital documents comes the problem of securing them. The documents nay have very important information such as confidential business policies and intellectual Property statements. Generally, most of users protect them by using a password or secured flash memory or security software, but it has several weaknesses. Accordingly, we propose a new architecture for securing digital documents. The proposed architecture bases on RFID and several encrypting techniques. It makes up for the weakness of traditional securing architectures, and supports various Policies for digital documents of users.

Performance Analysis on Link Quality of Handover Mechanism based on the Terminal Mobility in Wired and Wireless Integrated Networks (유무선 복합망에서 이동 단말 기반 핸드오버의 링크 품질에 관한 성능 분석)

  • Park, Nam-Hun;Gwon, O-Jun;Kim, Yeong-Seon;Gam, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8S
    • /
    • pp.2608-2619
    • /
    • 2000
  • This paper proposes the Handover Scheme for the mobile and describes the result of the performance analysis. In the conventional scheme of handover request, the withdrawal of terminal may occur because handover request is performed based on fixed signal level without considering network load and terminal mobility. The proposed scheme offers the minimization of withdrawal and handover blocking probability by means of the handover request of terminal based on the network load and terminal mobility. Conventional handover scheme has the sequential procedure that network performs resource check and path rerouting on the handover by MT(Mobile Terminal). Proposed handover scheme pre-processes the resource check before the handover request by predicting the handover request timo so that handover latency can be reduced. Moreover, path optimization is executed after the completion of handover in order to reduce handover latency. The rdduction of handover latency prevents the dropping of service by minimizing backward handover blocking. In summary, we propose the prediction of handover request time and decision method based on terminal, validating the performance of proposed scheme considering various cases of simulation.

  • PDF

An implementation of hypercube with routing algorithm in bisectional interconnection network (Bisectional 상호연결 네트워크에서 하이퍼큐브의 구현과 경로배정 알고리즘)

  • 최창훈;정영호;김성천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.5
    • /
    • pp.1180-1192
    • /
    • 1996
  • On demand of many users, basic networks of a parallel computer system are required to have a property that can embed various topologies. Bisectional interconnection network is known to satisfy this property, and it can embed various topologies optimally. Nowadays one is very interested in the hypercube as a message pssing multicomputer system, so it is very important to implement a hypercube in bisectional network. In this paper, a hypercube is implemented in a versatile bisecional netork, and its routing and broadcasting algorithm are proposed. Conventional bisectional network can accomodata linear array, complete binary tree and mesh structure as its topology. Now hypercube is implemented to be utilized as a general purpose supercomputercommunication architecture. The proposed routing and broadcasting algorithm embedded in bisectional network are general purpose algorithms which satisfy property of conventional hypercube.

  • PDF