• Title/Summary/Keyword: Computer Networks

Search Result 5,189, Processing Time 0.032 seconds

Applying Hebbian Theory to Enhance Search Performance in Unstructured Social-Like Peer-to-Peer Networks

  • Huang, Chester S.J.;Yang, Stephen J.H.;Su, Addison Y.S.
    • ETRI Journal
    • /
    • v.34 no.4
    • /
    • pp.591-601
    • /
    • 2012
  • Unstructured peer-to-peer (p2p) networks usually employ flooding search algorithms to locate resources. However, these algorithms often require a large storage overhead or generate massive network traffic. To address this issue, previous researchers explored the possibility of building efficient p2p networks by clustering peers into communities based on their social relationships, creating social-like p2p networks. This study proposes a social relationship p2p network that uses a measure based on Hebbian theory to create a social relation weight. The contribution of the study is twofold. First, using the social relation weight, the query peer stores and searches for the appropriate response peers in social-like p2p networks. Second, this study designs a novel knowledge index mechanism that dynamically adapts social relationship p2p networks. The results show that the proposed social relationship p2p network improves search performance significantly, compared with existing approaches.

Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks

  • Wei, Min;Kim, Kee-Cheon
    • Journal of Communications and Networks
    • /
    • v.14 no.3
    • /
    • pp.310-318
    • /
    • 2012
  • Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.

Optimizing the Joint Source/Network Coding for Video Streaming over Multi-hop Wireless Networks

  • Cui, Huali;Qian, Depei;Zhang, Xingjun;You, Ilsun;Dong, Xiaoshe
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.800-818
    • /
    • 2013
  • Supporting video streaming over multi-hop wireless networks is particularly challenging due to the time-varying and error-prone characteristics of the wireless channel. In this paper, we propose a joint optimization scheme for video streaming over multi-hop wireless networks. Our coding scheme, called Joint Source/Network Coding (JSNC), combines source coding and network coding to maximize the video quality under the limited wireless resources and coding constraints. JSNC segments the streaming data into generations at the source node and exploits the intra-session coding on both the source and the intermediate nodes. The size of the generation and the level of redundancy influence the streaming performance significantly and need to be determined carefully. We formulate the problem as an optimization problem with the objective of minimizing the end-to-end distortion by jointly considering the generation size and the coding redundancy. The simulation results demonstrate that, with the appropriate generation size and coding redundancy, the JSNC scheme can achieve an optimal performance for video streaming over multi-hop wireless networks.

A Hybrid Cloud Testing System Based on Virtual Machines and Networks

  • Chen, Jing;Yan, Honghua;Wang, Chunxiao;Liu, Xuyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1520-1542
    • /
    • 2020
  • Traditional software testing typically uses many physical resources to manually build various test environments, resulting in high resource costs and long test time due to limited resources, especially for small enterprises. Cloud computing can provide sufficient low-cost virtual resources to alleviate these problems through the virtualization of physical resources. However, the provision of various test environments and services for implementing software testing rapidly and conveniently based on cloud computing is challenging. This paper proposes a multilayer cloud testing model based on cloud computing and implements a hybrid cloud testing system based on virtual machines (VMs) and networks. This system realizes the automatic and rapid creation of test environments and the remote use of test tools and test services. We conduct experiments on this system and evaluate its applicability in terms of the VM provision time, VM performance and virtual network performance. The experimental results demonstrate that the performance of the VMs and virtual networks is satisfactory and that this system can improve the test efficiency and reduce test costs through rapid virtual resource provision and convenient test services.

Improving TCP Performance in Multipath Packet Forwarding Networks

  • Lee, Youngseok;Park, Ilkyu;Park, Yanghee
    • Journal of Communications and Networks
    • /
    • v.4 no.2
    • /
    • pp.148-157
    • /
    • 2002
  • This paper investigates schemes to improve TCP performance in multipath forwarding networks. In multipath routing, packets to the same destination are sent to multiple next-hops in either packet-level or flow-level forwarding mode. Effective bandwidth is increased since we can utilize unused capacity of multiple paths to the destination. In packet-level multipath forwarding networks, TCP performance may not be enhanced due to frequent out-of-order segment arrivals at the receiver because of different delays among paths. To overcome this problem, we propose simple TCP modifications. At the sender, the fast retransmission threshold is adjusted taking the number of paths into consideration. At the receiver, the delayed acknowledgment scheme is modified such that an acknowledgment for an out-of-order segment arrival is delayed in the same way for the in-order one. The number of unnecessary retransmissions and congestion window reductions is diminished, which is verified by extensive simulations. In flow-level multipath forwarding networks, hashing is used at routers to select outgoing link of a packet. Here, we show by simulations that TCP performance is increased in proportion to the number of paths regardless of delay differences.

Hole Modeling and Detour Scheme for Geographic Routing in Wireless Sensor Networks

  • Yu, Fucai;Park, Soo-Chang;Lee, Eui-Sin;Kim, Sang-Ha
    • Journal of Communications and Networks
    • /
    • v.11 no.4
    • /
    • pp.327-336
    • /
    • 2009
  • Geographic routing has been considered as an attractive approach in wireless sensor networks, since it routes data packets by using location information rather than global topology information. In geographic routing schemes, packets are usually sent along the boundary of a hole by face routing to detour the hole. As result, all data flows which need to detour the hole are concentrated on the boundary of the hole. This hole detour scheme results in much more energy consumption for nodes at the hole boundary, and the energy exhaustion of hole boundary nodes enlarges the holes. This is referred to as a hole diffusion problem. The perimeter mode may also lead to data collisions on the hole boundary nodes if multiple data flows need to bypass a hole simultaneously. In this paper, we propose a hole modeling and detour scheme for geographic routing in wire-less sensor networks. Our hole modeling and detour scheme can efficiently prevent hole diffusion, avoid the local minimum problem faced by geographic routing protocols, and reduce data collisions on the hole boundary nodes. Simulation results show that the proposed scheme is superior to the other protocols in terms of control overhead, average delivery delay and energy consumption.

Capacity Analysis of UWB Networks in Three-Dimensional Space

  • Cai, Lin X.;Cai, Lin;Shen, Xuemin;Mark, Jon W.
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.287-296
    • /
    • 2009
  • Although asymptotic bounds of wireless network capacity have been heavily pursued, the answers to the following questions are still critical for network planning, protocol and architecture design: Given a three-dimensional (3D) network space with the number of active users randomly located in the space and using the wireless communication technology, what are the expected per-flow throughput, network capacity, and network transport capacity? In addition, how can the protocol parameters be tuned to enhance network performance? In this paper, we focus on the ultra wideband (UWB) based wireless personal area networks (WPANs) and provide answers to these questions, considering the salient features of UWB communications, i.e., low transmission/interference power level, accurate ranging capability, etc. Specifically, we demonstrate how to explore the spatial multiplexing gain of UWB networks by allowing appropriate concurrent transmissions. Given 3D space and the number of active users, we derive the expected number of concurrent transmissions, network capacity and transport capacity of the UWB network. The results reveal the main factors affecting network (transport) capacity, and how to determine the best protocol parameters, e.g., exclusive region size, in order to maximize the capacity. Extensive simulation results are given to validate the analytical results.

A visiting scheme of mobile sink system in distributed sensor networks

  • Park, Sang-Joon;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.93-99
    • /
    • 2021
  • The sensor networks should be appropriately designed by applied network purpose, so that they can support proper application functions. Based on the design of suitable network model, the network lifetime can be maximized than using other general strategies which have not the consideration of specific network environments. In this paper, we propose a non-deterministic agent scheme to the mobile sink in distributed wireless sensor networks. The sensor network area can be divided into several sensor regions. Hence, to these such networks, the specified suitable scheme is requested by the applied network model to implement satisfactory network management. In this paper, we theoretically represent the proposed scheme, and provide the evaluation with the simulation results.

A Study of QoS Mapping based on SLA in B3G Networks (B3G 네트워크에서 SLA 기반 QoS 매핑을 위한 연구)

  • Moon, Hyun-Joo;Lee, Jin-Kwan;Jung, Kyu-Chul;Lee, Jong-Chan;Park, Sang-Joon;Shin, Seong-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.157-165
    • /
    • 2011
  • The QoS management is an agreement of service user and service provider in B3G networks, and service provider must support proper the network service to service users by the agreement facts. The service provider must provide the QoS method to maintain the agreed service, which manages the detail method of system level from policy level. By the agreement of service policy, the service provider can give the QoS to the service customer with the service agreement. Hence, in this paper we propose a QoS mapping method of heterogeneous networks to provide the customer service through the service agreement based on the SLA of B3G networks.

Energy Efficient Control Scheme in Wireless Sensor Networks

  • Pongot, Kamil;Jeong, Woo-Jin;Lee, Jae-Yoon;Yoon, Dong-Weon;Park, Sang-Kyu
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.371-372
    • /
    • 2008
  • In this paper, we consider wireless sensor networks with hard energy constraint, where each node is powered by a small battery. Under this hard constraint, reducing energy consumption is the most important design consideration for wireless sensor networks. Energy saving and control is an important issue, involved in the design of most sensor nodes. In this context, we focus on physical layer design where energy constraint problem can be modeled as an optimization of transmission modulation scheme[1]. Specifically, our analyses are based on energy control schemes that are relative to physical layer design on upper bound SEP MPSK in AWGN channels.

  • PDF