• Title/Summary/Keyword: Issue-network

Search Result 1,546, Processing Time 0.024 seconds

An Effective Location-based Packet Scheduling Scheme for Adaptive Tactical Wireless Mesh Network (무선 메쉬 네트워크의 군 환경 적용을 위한 효율적인 위치기반 패킷 스케줄링 방식)

  • Kim, Young-An;Hong, Choong-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.719-727
    • /
    • 2007
  • The Wireless Mesh Network technology is able to provide an infrastructure for isolated islands, in which it is difficult to install cables or wide area such as battlefield of armed forces. Therefore, Wireless Mesh Network is frequently used to satisfy needs for internet connection and active studies and research on them are in progress However, as a result of increase in number of hops under hop-by-hop communication environment has caused a significant decrease in throughput and an increase in delay. Considering the heavy traffic of real-time data, such as voice or moving pictures to adaptive WMN, in a military environment, it is restricted for remote units to have their Mesh Node to get real-time services. Such phenomenon might cause an issue in fairness. In order to resolve this issue, the Location-based Packet Scheduling Scheme, which can provide an fair QoS to each mesh node that is connected to each echelon's AP and operates based on WRR method that gives a priority to emergency message and control packet. The performance of this scheme is validated.

Analysis of Personal Information Data Flow Structure based on Network Theory (네트워크 이론을 적용한 개인정보 유통구조 분석)

  • Lee, Jae-Geun;Kim, Hyun Jin;YOUM, Heung Youl;Kang, Sang-ug
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.17-34
    • /
    • 2014
  • The study on the structure of personal information flows is very important because government can measure and respond the risks caused by companies which collect personal information from other personal data users to operate their business. Recently, as the value of personal information is increasing, number of companies which intend to process a large scale of personal information is increasing too. Accordingly, the issue on the structure of personal data flow has become important for the leading personal information processors which receive far more personal information from others to comply the personal information protection laws. However, research on this issue has rarely performed so far. Therefore, this study proposes a framework for personal information data flow structure based on network theory. Theoretically, the results of the study may contribute to extending the application areas of the network theory to personal information area. Practically, the study may contribute to assisting regulatory authorities to find and monitor personal information processors.

Social Network Analysis to Analyze the Purchase Behavior Of Churning Customers and Loyal Customers (사회 네트워크 분석을 이용한 충성고객과 이탈고객의 구매 특성 비교 연구)

  • Kim, Jae-Kyeong;Choi, Il-Young;Kim, Hyea-Kyeong;Kim, Nam-Hee
    • Korean Management Science Review
    • /
    • v.26 no.1
    • /
    • pp.183-196
    • /
    • 2009
  • Customer retention has been a pressing issue for companies to get and maintain the loyal customers in the competing environment. Lots of researchers make effort to seek the characteristics of the churning customers and the loyal customers using the data mining techniques such as decision tree. However, such existing researches don't consider relationships among customers. Social network analysis has been used to search relationships among social entities such as genetics network, traffic network, organization network and so on. In this study, a customer network is proposed to investigate the differences of network characteristics of churning customers and loyal customers. The customer networks are constructed by analyzing the real purchase data collected from a Korean cosmetic provider. We investigated whether the churning customers and the loyal customers have different degree centralities and densities of the customer networks. In addition, we compared products purchased by the churning customers and those by the loyal customers. Our data analysis results indicate that degree centrality and density of the churning customer network are higher than those of the loyal customer network, and the various products are purchased by churning customers rather than by the loyal customers. We expect that the suggested social network analysis is used to as a complementary analysis methodology with existing statistical analysis and data mining analysis.

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

A D2D communication architecture under full control using SDN

  • Ngo, Thanh-Hai;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3435-3454
    • /
    • 2016
  • Device-to-device (D2D) communication is a potential solution to the incessant increase in data traffic on cellular networks. The greatest problem is how to control the interference between D2D users and cellular mobile users, and between D2D users themselves. This paper proposes a solution for this issue by putting the full control privilege in cellular network using the software-defined networking (SDN) concept. A software virtual switch called Open vSwitch and several components are integrated into mobile devices for data forwarding and radio resource mapping, whereas the control functions are executed in the cellular network via a SDN controller. This allows the network to assign radio resources for D2D communication directly, thus reducing interference. This solution also brings out many benefits, including resource efficiency, energy saving, topology flexibility, etc. The advantages and disadvantages of this architecture are analyzed by both a mathematical method and a simple implementation. The result shows that implementation of this solution in the next generation of cellular networks is feasible.

Development of a New Islanding Detection Method for Distributed Resources (분산 전원의 고립 운전 검출 기법의 개발)

  • Jang, Seong-Il;Kim, Gwang-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.11
    • /
    • pp.506-513
    • /
    • 2001
  • The islanding detection for distributed resources (DR) becomes an important and emerging issue in power system protection since the distributed generator installations are rapidly increasing and most of the installed systems are interconnected with distribution network. In order to avoid the negative impacts from islanding operations of DR on protection, operation and management of distribution system, it is necessary to effectively detect the islanding operations of DR and rapidly disconnect it from distribution network. Generally, it is difficult to detect islanding operation by monitoring only one system parameter This paper presents a new logic based islanding detection method for distributed resources(DR) which are interconnected with distribution network. The proposed method detects the islanding operation by monitoring four system parameter: voltage variation, phase displacement, frequency variation, and the variation of total harmonic distortion(THD) of current; therefore, it effectively detects island operation of DR unit operating in parallel with the distribution network. We also verified the efficiency of the proposed algorithm using the radial distribution network of IEEE 34 bus model.

  • PDF

Product Network Analysis to Analyze the Purchase Behavior of Customers (제품 네트워크 분석을 이용한 고객의 구매제품 특성 비교 연구)

  • Choi, II-Young;Kim, Jae-Kyeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.34 no.4
    • /
    • pp.57-72
    • /
    • 2009
  • As development of information technologies, customer retention has been an important issue in the competing environment. A lot of researches focus on prediction of the churning customers and seeking their characteristics. However, relationships among customers or products have not been considered in existing researches. In this study, product networks are proposed and analyzed to investigate the differences of network characteristics of products purchased by potential churning customers and those of loyal customers. The product networks are constructed from real product purchase data collected from a Korean department store. We investigated the characteristic differences, such as the degree centrality, degree centralization, and density, of two product networks constructed by potential churning customers and the loyal customers. The results indicate that degree centrality, density and degree centralization of the product network of the loyal customers are higher than those of the potential churning customers. And the promotional products of the department store are resulted to be effective in attracting the loyal customers.

A Study on the Network Centric Warfare Information Security for Ubiquitous Network Computing (유비쿼터스 환경에서의 NCW 정보보호 대책)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.15-22
    • /
    • 2010
  • Information security is a critical issue for network centric warfare(NCW). This paper provides defense information security guidelines for NCW, especially for ubiquitous network computing environment. For this purpose, this paper identified changes of battle aspect of tactical level and characteristics of information threats, and finally, the research suggested several information security guidelines for NCW. This paper is to intended to help military organization's planners determine practical and implemental plans in the near future.

Survivability in the Optical Internet Using the Optical Burst Switch

  • Oh, Seung-Hun;Kim, Young-Han;Yoo, Myung-Sik;Hong, Hyun-Ha
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.117-130
    • /
    • 2002
  • Due to its salient features, the optical burst switch is becoming a key technology for the optical Internet. Within this technology, the survivability issue in the optical Internet has to be addressed because a simple failure causes severe damage to the huge amount of data carried in optical fiber. In this paper, we introduce a restoration procedure that can provide good survivability in the optical burst switch (OBS)-based optical Internet. OBS restoration can survive various types of network failure while maintaining good network performance. We propose novel restoration mechanisms, namely, "temporary Label Switched Path (LSP)" and "bossy LSP," to enhance restoration time and network utilization. The simulation results verify that the proposed OBS restoration achieves good network performance and provides good network connectivity as well.

  • PDF

An Energy Efficient Routing Scheme with Tabu Search Algorithm (타부 탐색 알고리즘을 적용한 전력 효율적 라우팅 기법)

  • Yan, Shi;Hong, Won-Kee
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.10 no.3
    • /
    • pp.86-91
    • /
    • 2011
  • Wireless sensor network (WSN) is a distributed self-organizing network which contains a large number of tiny multi-functional sensor nodes. The network life time is an important issue in WSN because every sensor node has a constraint on electric supply. In this paper, an energy consumption model is described and a GA-based algorithm will be used to optimize the energy consumption by analyzing the working model of sensor nodes. The model will provide an effective reference of working pattern for WSN. This algorithm is evaluated through analysis and simulations.

  • PDF