• Title/Summary/Keyword: Mobile Networks, Network Architecture

Search Result 222, Processing Time 0.024 seconds

Neural-Fuzzy Controller Based on Reinforcement Learning (강화 학습에 기반한 뉴럴-퍼지 제어기)

  • 박영철;김대수;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2000.05a
    • /
    • pp.245-248
    • /
    • 2000
  • In this paper we improve the performance of autonomous mobile robot by induction of reinforcement learning concept. Generally, the system used in this paper is divided into two part. Namely, one is neural-fuzzy and the other is dynamic recurrent neural networks. Neural-fuzzy determines the next action of robot. Also, the neural-fuzzy is determined to optimal action internal reinforcement from dynamic recurrent neural network. Dynamic recurrent neural network evaluated to determine action of neural-fuzzy by external reinforcement signal from environment, Besides, dynamic recurrent neural network weight determined to internal reinforcement signal value is evolved by genetic algorithms. The architecture of propose system is applied to the computer simulations on controlling autonomous mobile robot.

  • PDF

Model and Architecture of User-Defined Networks for Seamless Mobility Management in Diverse Wireless Environment (다양한 무선 환경에서 끊김 없는 이동성 관리를 위한 사용자 정의 네트워크 모델 및 구조)

  • Chun, Seung-Man;Nah, Jae-Wook;Lee, Seung-Mu;Choi, Jun-Hyuk;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.35-43
    • /
    • 2011
  • In this paper, we propose a novel architecture for seamless mobility management to provide users with seamless Internet connection when users roam between diverse wireless local area networks (WLANS) controlled by different management entities. There have been many researches in IETF, i.e., MIPv6, HMIPv6, and PMIPv6, to provide the mobility management. However, practically since wireless access points or access routers, which are managed by an individual manager or ISP managers, have different authentication scheme and the supported mobility management, the previous mobility management protocol developed by IETF can not guarantee the quality of service of application services as the mobile node performs the handover. To solve this drawback, we propose the mobility management scheme to provide QoS-guaranteed Internet services during the handover by configurating the wireless networks which is defined by users. More specifically, we present a model, the architecture and an algorithm for user-defined network (UDN) to provide the seamless Internet service. Finally, the performance of the proposed algorithm is evaluated by the network simulation tool.

A Data Gathering Protocol for Multihop Transmission for Large Sensor Networks (대형 센서네트워크에서 멀티홉 전송을 이용한 데이터 수집 프로토콜)

  • Park, Jang-Su;Ahn, Byoung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.50-56
    • /
    • 2010
  • This paper proposes a data gathering method by adapting the mobile sink to prolong the whole operation time of large WSNs. After partitioning a network into several clusters, a mobile sink visits each cluster and collects data from it. An efficient protocol improves the energy efficiency by delivering messages from the mobile sink to the cluster head as well as reduces the data gathering delay, which is the disadvantage of the mobile sink. For the scalability of sensor network, the network architecture should support the multihop transmission in the duster rather than the single hop transmission. The process for the data aggregation linked to the travelling path is proposed to improve the energy consumption of intermediate nodes. The experiment results show that the proposed model is more efficient than legacy methods in the energy consumption and the data gathering time.

Embedded Mobile Automatic System Architecture and Interface for the Telematics (텔레매틱스를 위한 임베디드 이동체 자동화 시스템 구조 및 인터페이스)

  • Han Cheol-Min;Kim Nam-Hee;Cho Hae-Sung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.443-447
    • /
    • 2005
  • EMAST(Embedded Mobile Automatic System for Telematics) is implemented in SoC using the CAN and ARM Processor. For the general usage, EMAST must satisfy the two condition. First, Mobile internal interface is to be designed to support Differential Transceiver, Optical Transceiver and Wireless Transceiver Second, it should be supporting the interface between terminals using EMAST and telematics networks. In this paper, we propose EMAST structure and the efficient interface structure between EMAST and each mobile units.

  • PDF

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Network Slice Selection Function on M-CORD (M-CORD 기반의 네트워크 슬라이스 선택 기능)

  • Rivera, Javier Diaz;Khan, Talha Ahmed;Asif, Mehmood;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.35-45
    • /
    • 2018
  • As Network Slicing functionality gets applied to mobile networking, a mechanism that enables the selection of network slices becomes indispensable. Following the 3GPP Technical Specification for the 5G Architecture, the inclusion of the Network Slice Selection Function (NSSF) in order to leverage the process of slice selection is apparent. However, actual implementation of this network function needs to deal with the dynamic changes of network instances, due to this, a platform that supports the orchestration of Virtual Network Functions (VNF) is required. Our proposed solution include the use of the Central Office Rearchitected as a Data Center (CORD) platform, with the specified profile for mobile networks (M-CORD) that integrates a service orchestrator (XOS) alongside solutions oriented to Software Defined Networking (SDN), Network Function Virtualization (VNF) and virtual machine management through OpenStack, in order to provide the right ecosystem where our implementation of NSSF can obtain slice information dynamically by relying on synchronization between back-end services and network function instances.

Implementation of Service Architecture for Hierarchical UHD Broadcasting over Heterogeneous Networks (이기종망에서 계층 부호화된 UHD 방송을 위한 서비스 아키텍처 구현)

  • Seo, Minjae;Paik, Jong Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.38-41
    • /
    • 2014
  • Due to the diversity of device performances and the possibility of providing multimedia service through many networks, media consumption environment has been changed in various ways. In recent, mobile services and broadcasting services started to provided through IP network. According to this flow changes, there was great demand for various multimedia services through heterogenous networks. To solve this problem, MMT was suggested as a standard of multimedia transport which replaces MPEG-2 TS(Transport Stream) which is used for HD(High Definition) transport. MMT can be provided various broadcasting based on IP through terrestrial, satellite, cable broadcasting networks, and also deliver multimedia through many networks at the same time. MMT was risen as a method of servicing UHD broadcasting. In this paper, we present an implementation of service architecture for hierarchical UHD broadcasting over heterogenous networks using MMT.

A Study for Performance Evaluation of Distributed Mobility Management based on Proxy Mobile IPv6 (PMIPv6기반의 분산 이동성 관리 방식의 성능 평가에 관한 연구)

  • Wie, Sunghong;Jang, Jaeshin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.97-105
    • /
    • 2015
  • Recently, due to an explosive growth of the internet traffic, the limitations of a current framework for a mobility management have been focused. The current centralized mobility management is prone to several problems and limitations: suboptimal routing, low scalability, signaling overhead, and a single point of failure. To overcome these problems and limitations, IETF is working about the distributed mobility management scheme that the centralized mobility functions of HA(Home Agents) are distributed to networks edges such as access routers. These distributions of mobility functions overcome the limitations of the centralized mobility managements and go with the trend of flat networks e.g. more simple network architecture. This paper analyzes the distributed mobility management based on Proxy Mobile IPv6 and demonstrates the performance superiority.

A Study on Hierarchical Overlay Multicast Architecture in Mobile Ad Hoc Networks (Mobile Ad Hoc 네트워크를 위한 계층적 오버레이 멀티캐스트 구조 연구)

  • Kim, Kap-Dong;Park, Jun-Hee;Lee, Kwang-Il;Kim, Hag-Young;Kim, Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.627-634
    • /
    • 2006
  • Overlay network eliminates the need to change the application-layer tree when the underlying network changes and enables the overlay network to survive in environments where nonmember nodes do not support multicast functionality. An overlay protocol monitors group dynamics, while underlying unicast protocols track network dynamics, resulting in more stable protocol operation and low control overhead even in a highly dynamic environment. But, if overlay multicast protocols does not know the location information of node, this makes it very difficult to build an efficient multicasting tree. So, we propose a Hierarchical Overlay Multicast Architecture (HOMA) with the location information. Because proposed architecture makes static region-based dynamic group by multicast members, it is 2-tired overlay multicasts of application layer that higher layer forms overlay multicast network between members that represent group, and support multicast between multicast members belonging to region at lower layer. This use GPS, take advantage of geographical region, and realizes a region-sensitive higher layer overlay multicast tree which is impervious to the movements of nodes. The simulation results show that our approach solves the efficiency problem effectively.

6G in the sky: On-demand intelligence at the edge of 3D networks (Invited paper)

  • Strinati, Emilio Calvanese;Barbarossa, Sergio;Choi, Taesang;Pietrabissa, Antonio;Giuseppi, Alessandro;De Santis, Emanuele;Vidal, Josep;Becvar, Zdenek;Haustein, Thomas;Cassiau, Nicolas;Costanzo, Francesca;Kim, Junhyeong;Kim, Ilgyu
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.643-657
    • /
    • 2020
  • Sixth generation will exploit satellite, aerial, and terrestrial platforms jointly to improve radio access capability and unlock the support of on-demand edge cloud services in three-dimensional (3D) space, by incorporating mobile edge computing (MEC) functionalities on aerial platforms and low-orbit satellites. This will extend the MEC support to devices and network elements in the sky and forge a space-borne MEC, enabling intelligent, personalized, and distributed on-demand services. End users will experience the impression of being surrounded by a distributed computer, fulfilling their requests with apparently zero latency. In this paper, we consider an architecture that provides communication, computation, and caching (C3) services on demand, anytime, and everywhere in 3D space, integrating conventional ground (terrestrial) base stations and flying (non-terrestrial) nodes. Given the complexity of the overall network, the C3 resources and management of aerial devices need to be jointly orchestrated via artificial intelligence-based algorithms, exploiting virtualized network functions dynamically deployed in a distributed manner across terrestrial and non-terrestrial nodes.