• Title/Summary/Keyword: Network Connectivity

Search Result 765, Processing Time 0.025 seconds

A Novel Multi-Path Routing Algorithm Based on Clustering for Wireless Mesh Networks

  • Liu, Chun-Xiao;Zhang, Yan;Xu, E;Yang, Yu-Qiang;Zhao, Xu-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1256-1275
    • /
    • 2014
  • As one of the new self-organizing and self-configuration broadband networks, wireless mesh networks are being increasingly attractive. In order to solve the load balancing problem in wireless mesh networks, this paper proposes a novel multi-path routing algorithm based on clustering (Cluster_MMesh) for wireless mesh networks. In the clustering stage, on the basis of the maximum connectivity clustering algorithm and k-hop clustering algorithm, according to the idea of maximum connectivity, a new concept of node connectivity degree is proposed in this paper, which can make the selection of cluster head more simple and reasonable. While clustering, the node which has less expected load in the candidate border gateway node set will be selected as the border gateway node. In the multi-path routing establishment stage, we use the intra-clustering multi-path routing algorithm and inter-clustering multi-path routing algorithm to establish multi-path routing from the source node to the destination node. At last, in the traffic allocation stage, we will use the virtual disjoint multi-path model (Vdmp) to allocate the network traffic. Simulation results show that the Cluster_MMesh routing algorithm can help increase the packet delivery rate, reduce the average end to end delay, and improve the network performance.

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

Determining differentially expressed genes in a microarray expression dataset based on the global connectivity structure of pathway information

  • Chung, Tae-Su;Kim, Kee-Won;Lee, Hye-Won;Kim, Ju-Han
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2004.11a
    • /
    • pp.124-130
    • /
    • 2004
  • Microarray expression datasets are incessantly cumulated with the aid of recent technological advances. One of the first steps for analyzing these data under various experimental conditions is determining differentially expressed genes (DEGs) in each condition. Reasonable choices of thresholds for determining differentially expressed genes are used for the next -step-analysis with suitable statistical significances. We present a model for identifying DEGs using pathway information based on the global connectivity structure. Pathway information can be regarded as a collection of biological knowledge, thus we are tying to determine the optimal threshold so that the consequential connectivity structure can be the most compatible with the existing pathway information. The significant feature of our model is that it uses established knowledge as a reference to determine the direction of analyzing microarray dataset. In the most of previous work, only intrinsic information in the miroarray is used for the identifying DEGs. We hope that our proposed method could contribute to construct biologically meaningful network structure from microarray datasets.

  • PDF

An Assessment of ICT Infrastructure, Deployment and Applications in the Science and Technology (S&T) Research Institutions in Ghana

  • Kwafoa, Paulina Nana Yaa;Entsua-Mensah, Clement
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.1
    • /
    • pp.29-48
    • /
    • 2021
  • The paper discusses the ICT infrastructure as far as the availability of (computers, local or wide area networks, Internet connectivity and its reliability, size of the bandwidth and its optimization, etc.) in the S&T research institution. It also examined the profile of the research scientists and looked at the type of ICT infrastructure that is available for their use as well as the reliability of the Internet connectivity within these research institutions. It looked at the broadband capacities of the research institutions and the ICT capabilities in respect of the technical and managerial support back-up that are available to the research institutions. The study used the survey research method with a questionnaire as well as personal observation to gather the data. From the data gathered, it was realized that the internet connectivity and the size of the bandwidth that the R&D institutions subscribed to differed significantly. Again, the extent to which the research scientists were able to access the internet in their respective institutions depended on the quality of the local network in place. Generally, the investments in ICT were made for different management objectives, and these were meant to facilitate the generation of new knowledge as well as make measurable improvements in R&D activities.

New approach of using cortico-cortical evoked potential for functional brain evaluation

  • Jo, Hyunjin;Kim, Dongyeop;Song, Jooyeon;Seo, Dae-Won
    • Annals of Clinical Neurophysiology
    • /
    • v.23 no.2
    • /
    • pp.69-81
    • /
    • 2021
  • Cortico-cortical evoked potential (CCEP) mapping is a rapidly developing method for visualizing the brain network and estimating cortical excitability. The CCEP comprises the early N1 component the occurs at 10-30 ms poststimulation, indicating anatomic connectivity, and the late N2 component that appears at < 200 ms poststimulation, suggesting long-lasting effective connectivity. A later component at 200-1,000 ms poststimulation can also appear as a delayed response in some studied areas. Such delayed responses occur in areas with changed excitability, such as an epileptogenic zone. CCEP mapping has been used to examine the brain connections causally in functional systems such as the language, auditory, and visual systems as well as in anatomic regions including the frontoparietal neocortices and hippocampal limbic areas. Task-based CCEPs can be used to measure behavior. In addition to evaluations of the brain connectome, single-pulse electrical stimulation (SPES) can reflect cortical excitability, and so it could be used to predict a seizure onset zone. CCEP brain mapping and SPES investigations could be applied both extraoperatively and intraoperatively. These underused electrophysiologic tools in basic and clinical neuroscience might be powerful methods for providing insight into measures of brain connectivity and dynamics. Analyses of CCEPs might enable us to identify causal relationships between brain areas during cortical processing, and to develop a new paradigm of effective therapeutic neuromodulation in the future.

Analysis of Trends in Science and Technology using Keyword Network Analysis (키워드 네트워크 분석을 활용한 과학기술동향 분석)

  • Park, Ju Seop;Kim, Na Rang;Han, Eun Jung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.2
    • /
    • pp.63-73
    • /
    • 2018
  • Academia and research institutes mainly use qualitative methods that rely on expert judgments to understand and predict research trends and science and technology trends. Since such a technique has the disadvantage of requiring much time and money, in this study, science and technology trends were predicted using keyword network analysis. To that end, 13,618 AI (Artificial Intelligence) patent abstracts were analyzed using keyword network analysis in three separate lots based on the period of the submission of each abstract: analysis period 1 (January 1, 2002 - December 31, 2006), analysis period 2 (January 1, 2007 - December 31, 2011), and analysis period 3 (January 1, 2012 - December 31, 2016). According to the results of frequency analyses, keywords related to methods in the field of AI application appeared more frequently as time passed from analysis period 1 to analysis period 3. In keyword network analyses, the connectivity between keywords related to methods in the field of AI application and other keywords increased over time. In addition, when the connected keywords that showed increasing or decreasing trends during the entire analysis period were analyzed, it could be seen that the connectivity to methods and management in the field of AI application was strengthened while the connectivity to the field of basic science and technology was weakened. According to analysis of keyword connection centrality, the centrality value of the field of AI application increased over time. According to analysis of keyword mediation centrality during analysis period 3, keywords related to methodologies in the field of AI application showed the highest mediation value. Therefore, it is expected that methods in the field of AI application will play the role of powerful intermediaries in AI hereafter. The technique presented in this paper can be employed in the excavation of tasks related to regional innovation or in fields such as social issue visualization.

Channel Assignment and Routing using Traffic Profiles in Wireless Mesh Networks (무선 메쉬 네트워크에서 트래픽 프로파일을 고려하는 채널 할당 및 라우팅)

  • Park, Sook-Young;Lee, Sang-Kyu
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.374-385
    • /
    • 2010
  • Wireless mesh networks can be deployed for various networks from home networking to last-mile broadband Internet access. Wireless mesh networks are composed of mesh routers and mesh clients. In these networks, static nodes form a multi-hop backbone of a large wireless access network that provides connectivity to end-users' mobile terminals. The network nodes cooperate with each other to relay data traffic to its destinations. In order to increase connectivity and better performance, researchers are getting interested in multi-channel and multi-interface wireless mesh networks. In these networks, non-overlapping multiple frequency channels are used simultaneously to increase the aggregate bandwidth available to end-users. Recently, researches have focused on finding suitable channel assignments for wireless network interfaces, equiped in a mesh node, together with efficient routing to improve overall system throughput in wireless mesh networks. This goal can be achieved by minimize channel interference. Less interference among using channels in a network guarantees more aggregated channel capacity and better connectivity of the networks. In this thesis, we propose interference aware channel assignment and routing algorithms for multi-channel multi-hop wireless mesh networks. We propose Channel Assignment and Routing algorithms using Traffic Profiles(CARTP) and Routing algorithms allowing detour routing(CARTP+2). Finally, we evaluate the performance of proposed algorithms in comparison to results from previous methods using ns-2 simulations. The simulation results show that our proposed algorithms can enhance the overall network performance in wireless mesh networks.

Dynamics of Global Liner Shipping Network and Strategy of Korean Ports (국제 컨테이너 선대 운항네트워크 변화와 우리항만의 전략)

  • Park, Byungin
    • Journal of Korea Port Economic Association
    • /
    • v.34 no.3
    • /
    • pp.133-158
    • /
    • 2018
  • The role and ratio of national vessels in the global container shipping market have reduced significantly due to the bankruptcy of Hanjin Shipping in early 2017. All import-export companies, as well as container ports in Korea, are facing a crisis. The Trump's tariff and trade battles have had a negative impact on the increase in the North American cargo. However, Chinese and Japanese container shipping companies, which merged with domestic container shipping companies, and mega carriers such as Maersk and CMA CGM have benefited from the decline in shipping supplies due to the collapse of Hanjin Shipping, the world's 10th largest container carrier in Korea. The import/export freight trade in Korea is witnessing the increasing stronghold of foreign carriers. This scenario is expected to weaken Korea's negotiation powers with overseas shipping companies in domestic ports, such as Busan and Kwangyang, thereby making it more challenging to attract shipping carriers. This study compares the global container-shipping network in 2007 and 2017 by combining the network topology of the social network analysis and the economics of the liner shipping connectivity index (LSCI) and the container port connectivity index (CPCI) analysis. The findings of this study are that the role of the ports across the world can be identified, and CPCI has a high correlation with the centrality index and freight volume data. These findings can contribute toward the utilization of the meaning of the necessary centrality index without an additional centrality analysis. This study can be applied not only to the call strategy of container carriers but also to the alliance and development strategy of Korean ports.

An Efficiently Cluster Management using Secondary Leader in CBRP

  • Hur Tai Sung;Kim Jong Ki;Min Hong Ki
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.552-557
    • /
    • 2004
  • Mobile Ad Hoc Network (MANET) is a network architecture, which has no backbone network and is deployed temporarily and rapidly in emergency or war without fixed mobile infrastructures. All communications between network entities are carried in ad-hoc networks over the wireless medium. Due to the radio communications being extremely vulnerable to propagation impairments, connectivity between network nodes is not guaranteed. Therefore, previously developed routing algorithms in wired networks cannot be used. And many new algorithms have been undergone. This study proposes the secondary leader approach to the cluster based routing protocol(CBRP). In case, the primary leader becomes abnormal status so that the primary leader cannot participate the communications between network entities, the secondary leader immediately replaces the primary header without selecting process of the new primary leader. The performances of proposed algorithm ACBRP(Advanced Cluster. Based Routing Protocol;CBRP using secondary leader) are compared with CBRP and results are presented in order to show the effectiveness of the algorithm.

  • PDF

A Network Mobility Support Scheme in Future LISP Network (미래 LISP 망에서의 망 이동성 지원 방안)

  • Zhang, Xiaolei;Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.171-177
    • /
    • 2012
  • Network mobility support has been taken into consideration for users who have multiple terminals to enjoy the seamless connectivity. This paper proposes a network mobility support scheme in the LISP architecture. During the mobile router attachment, the EID-to-RLOC mapping database is refreshed in the map server. Furthermore, map update is developed to support smooth handoff for the mobile network. An analysis of performance is given by comparing the proposed scheme with NEMO.