• 제목/요약/키워드: Network Connectivity

검색결과 761건 처리시간 0.032초

Enhanced OLSR Routing Protocol Using Link-Break Prediction Mechanism for WSN

  • Jaggi, Sukhleen;Wasson, Er. Vikas
    • Industrial Engineering and Management Systems
    • /
    • 제15권3호
    • /
    • pp.259-267
    • /
    • 2016
  • In Wireless Sensor Network, various routing protocols were employed by our Research and Development community to improve the energy efficiency of a network as well as to control the traffic by considering the terms, i.e. Packet delivery rate, the average end-to-end delay, network routing load, average throughput, and total energy consumption. While maintaining network connectivity for a long-term duration, it's necessary that routing protocol must perform in an efficient way. As we discussed Optimized Link State Routing protocol between all of them, we find out that this protocol performs well in the large and dense networks, but with the decrease in network size then scalability of the network decreases. Whenever a link breakage is encountered, OLSR is not able to periodically update its routing table which may create a redundancy problem. To resolve this issue in the OLSR problem of redundancy and predict link breakage, an enhanced protocol, i.e. S-OLSR (More Scalable OLSR) protocol has been proposed. At the end, a comparison among different existing protocols, i.e. DSR, AODV, OLSR with the proposed protocol, i.e. S-OLSR is drawn by using the NS-2 simulator.

Bridge-edges Mining in Complex Power Optical Cable Network based on Minimum Connected Chain Attenuation Topological Potential

  • Jiang, Wanchang;Liu, Yanhui;Wang, Shengda;Guo, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.1030-1050
    • /
    • 2021
  • The edges with "bridge characteristic" play the role of connecting the communication between regions in power optical cable network. To solve the problem of mining edges with "bridge characteristic" in provincial power optical cable network, the complex power optical cable network model is constructed. Firstly, to measure the generated potential energy of all nodes in n-level neighborhood local structure for one edge, the n-level neighborhood local structure topological potential is designed. And the minimum connected chain attenuation is designed to measure the attenuation degree caused by substituted edges. On the basis of that, the minimum connected chain attenuation topological potential based measurement is designed. By using the designed measurement, a bridge-edges mining algorithm is proposed to mine edges with "bridge characteristic". The experiments are conducted on the physical topology of the power optical cable network in Jilin Province. Compared with that of other three typical methods, the network efficiency and connectivity of the proposed method are decreased by 3.58% and 28.79% on average respectively. And the proposed method can not only mine optical cable connection with typical "bridge characteristic" but also can mine optical cables without obvious characteristics of city or voltage, but it have "bridge characteristic" in the topology structure.

이동통신 서비스 개방 기술 동향 (Method for Exposing Capability and Functionality of Mobile Network)

  • 박용직;나지현
    • 전자통신동향분석
    • /
    • 제33권1호
    • /
    • pp.111-122
    • /
    • 2018
  • In this review, several new technologies considered when providing an open service environment in a mobile communication network are described. Recently, 3GPP developed some standards related to IoT services for opening a service platform in an SCS environment based on the OSA concept in a 3GPP LTE system. Similarly, the development of a new framework is underway to allow a plurality of services to commonly use an API environment in which a service provider or client accesses a 5G mobile communication system. Extending the existing LTE SCEF concept, the standardization of the northbound API is applied in the 5G CAPIF environment. Therefore, it is possible to construct a framework that facilitates access from outside, and takes advantage of the common management of various open service environments. An open service platform environment is expected to play an important role in transforming a network with simple connectivity services into a variety of new service markets, or into a service environment that can create added value.

An Adaptive Probe Detection Model using Fuzzy Cognitive Maps

  • Lee, Se-Yul;Kim, Yong-Soo
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.660-663
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using Fuzzy Cognitive Maps(FCM) that can detect intrusion by the Denial of Service(DoS) attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The Sp flooding Preventer using Fuzzy cognitive maps(SPuF) model captures and analyzes the packet information to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulating the "KDD ′99 Competition Data Set" in the SPuF model shows that the Probe detection rates were over 97 percentages.

  • PDF

Graphic User Interface Scheme for Wireless Universal Serial Bus

  • Lee, Hyun-Jeong;Kim, Jong-Won;Huh, Jae-Doo
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.183-186
    • /
    • 2005
  • WUSB is a new technology which combines the speed and the security of wired USB with the easy use of wireless technology. In this paper, GUI for WUSB is designed and implemented to show the connectivity and contents of the WUSB devices. Also, the proposed GUI shows the log window while content transfers occur between the host and device. The proposed GUI can be used for various wireless technologies which provide wireless function with existing USB hosts and devices.

  • PDF

사회네트워크에서 잠재된 신뢰관계망 추론을 위한 ANFIS 모형

  • 송희석
    • 한국데이타베이스학회:학술대회논문집
    • /
    • 한국데이타베이스학회 2010년도 춘계국제학술대회
    • /
    • pp.277-287
    • /
    • 2010
  • We are sometimes interacting with people who we know nothing and facing with the difficult task of making decisions involving risk in social network. To reduce risk, the topic of building Web of trust is receiving considerable attention in social network. The easiest approach to build Web of trust will be to ask users to represent level of trust explicitly toward another users. However, there exists sparsity issue in Web of trust which is represented explicitly by users as well as it is difficult to urge users to express their level of trustworthiness. We propose a fuzzy-based inference model for Web of trust using user behavior information in social network. According to the experiment result which is applied in Epinions.com, the proposed model show improved connectivity in resulting Web of trust as well as reduced prediction error of trustworthiness compared to existing computational model.

  • PDF

Reconstruction of Neural Circuits Using Serial Block-Face Scanning Electron Microscopy

  • Kim, Gyu Hyun;Lee, Sang-Hoon;Lee, Kea Joo
    • Applied Microscopy
    • /
    • 제46권2호
    • /
    • pp.100-104
    • /
    • 2016
  • Electron microscopy is currently the only available technique with a spatial resolution sufficient to identify fine neuronal processes and synaptic structures in densely packed neuropil. For large-scale volume reconstruction of neuronal connectivity, serial block-face scanning electron microscopy allows us to acquire thousands of serial images in an automated fashion and reconstruct neural circuits faster by reducing the alignment task. Here we introduce the whole reconstruction procedure of synaptic network in the rat hippocampal CA1 area and discuss technical issues to be resolved for improving image quality and segmentation. Compared to the serial section transmission electron microscopy, serial block-face scanning electron microscopy produced much reliable three-dimensional data sets and accelerated reconstruction by reducing the need of alignment and distortion adjustment. This approach will generate invaluable information on organizational features of our connectomes as well as diverse neurological disorders caused by synaptic impairments.

삼각형 셀룰러 순열 네트워크에서의 단일 s-a-E 결함 허용 (Single S-a-E fault tolerance of the triangular cellular permutation networks)

  • 김우한;전대성;윤영우
    • 전자공학회논문지B
    • /
    • 제33B권9호
    • /
    • pp.37-48
    • /
    • 1996
  • In this paper, for the single s-a-E fault detected in a triangular cellular permutation network (TCPN), we propose a method which can tolerate a fault by reconfiguring the netowrk and analyze the possibilities of the reconfiguration. The network is set up through iterative decomposition of a permutation into the right or left coset. For the s-a-E fault of a cell which is to be transpositioned for an increasing order mapping, we cna reconfigure it merely by switching te decomposition scheme from right coset to left coset or vice versa. Also for a decreasing order mapping, we make a detour around the faulty cell. Reconfiguring with the redundant connectivity of a TCPN, we could realize form 17% to 90% of the permutation for the number of inputs from 4 to 40. REconfiguration of the network by exchanging the first input with the last input and the first output with the last output resulted in more than 99% realization of the permutation. Also with the exchange of all inputs and outputs with neighboring cells, we could have 100% realization of the permutation.

  • PDF

제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계 (A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test)

  • 이명훈;손성용
    • 전기학회논문지
    • /
    • 제61권8호
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.

IP 기반의 CDMA 이동통신 시스템 상용화 사례 연구 (Research on Commercialization of IP-based CDMA Mobile Communication Systems)

  • 이승희
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.350-354
    • /
    • 2008
  • IP-based mobile communication system is one of the key research items in the mobile networks for a long time. But, due to some technical issues and no need of markets, it is still not full-fledged. Recently, CDMA and WCDMA service providers want to introduce IP-based network connectivity. Even though their efforts, the main network intra-structure depends on ATM or HDLC technology. This article describes a good example of commercialization of IP-based mobile communication systems. Our research is not experimental system but a in-service system - replacing the existing equipments with new IP-based systems. In this paper, we introduce IP related technologies used in our research such as IP-based ATCA(Advanced Telecommunications Computing Architecture) platform, HA(High Availability) redundancy, IP multicast, network redundancy techniques, multi-link bundling and IP header compression. These are already well-known to internet domain. We mix them with mobile communication systems concretely.

  • PDF