• Title/Summary/Keyword: Network Failure Analysis

Search Result 279, Processing Time 0.03 seconds

Boundary Zone Overlapping Scheme for Fast Handoff Based on Session Key Reuse (AAA MIP 환경에서 공유영역 기반 세션키 재사용을 통한 고속 핸드오프 방식 연구)

  • Choi, Yu-Mi;Chung, Min-Young;Choo, Hyun-Seung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.481-488
    • /
    • 2005
  • The Mobile W provides an efficient and scalable mechanism for host mobility within the Internet. However, the mobility implies higher security risks than static operations in fixed networks. In this paper, the Mobile IP has been adapted to allow AAA protocol that supports authentication, authorization, and accounting(AAA) for security and collection for accounting information of network usage by mobile nodes(MNs). For this goal, we Propose the boundary tone overlapped network structure while solidifying the security for the authentication of an MN. That is, the Proposed scheme delivers the session keys at the wired link for MN's security instead of the wireless one, so that it provides a fast and seamless handoff mechanism. According to the analysis of modeling result, the proposed mechanism compared to the existing session key reuse method is up to about $40\%$ better in terms of normalized surcharge for the handoff failure rate that considers handoff total time.

A Study for Performance Evaluation of Distributed Mobility Management based on Proxy Mobile IPv6 (PMIPv6기반의 분산 이동성 관리 방식의 성능 평가에 관한 연구)

  • Wie, Sunghong;Jang, Jaeshin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.97-105
    • /
    • 2015
  • Recently, due to an explosive growth of the internet traffic, the limitations of a current framework for a mobility management have been focused. The current centralized mobility management is prone to several problems and limitations: suboptimal routing, low scalability, signaling overhead, and a single point of failure. To overcome these problems and limitations, IETF is working about the distributed mobility management scheme that the centralized mobility functions of HA(Home Agents) are distributed to networks edges such as access routers. These distributions of mobility functions overcome the limitations of the centralized mobility managements and go with the trend of flat networks e.g. more simple network architecture. This paper analyzes the distributed mobility management based on Proxy Mobile IPv6 and demonstrates the performance superiority.

The Public Choice Analysis of Korean Mobile Telecom Policy (이동통신 정책의 공공 선택 분석)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.917-920
    • /
    • 2014
  • In Korea mobile phone subscribers exceeded 1 million people in 1995, and ten million people in 1998. Prevalence of the mobile phone increased dramatically over 110% compared to the population. And all family members including children and students use one or two mobile terminal. Mobile phone is obviously necessary good more than washer, vacuum cleaner, passenger car. Our daily life with mobile communication are conveniently positioned, but communication related costs including the price of the device has become a big burden on the household. But the government does not seem to do the right role at the right time to prevent the failure of the market to further maximize consumer welfare and social welfare through fair competition. This principal-agent problems exist especially in perspective of joint use of the mobile communication network, number portability, separation of phone distribution and phone service and network neutrality among in mobile communication policies since the early 1990s up to now.

  • PDF

An Ensemble Approach to Detect Fake News Spreaders on Twitter

  • Sarwar, Muhammad Nabeel;UlAmin, Riaz;Jabeen, Sidra
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.294-302
    • /
    • 2022
  • Detection of fake news is a complex and a challenging task. Generation of fake news is very hard to stop, only steps to control its circulation may help in minimizing its impacts. Humans tend to believe in misleading false information. Researcher started with social media sites to categorize in terms of real or fake news. False information misleads any individual or an organization that may cause of big failure and any financial loss. Automatic system for detection of false information circulating on social media is an emerging area of research. It is gaining attention of both industry and academia since US presidential elections 2016. Fake news has negative and severe effects on individuals and organizations elongating its hostile effects on the society. Prediction of fake news in timely manner is important. This research focuses on detection of fake news spreaders. In this context, overall, 6 models are developed during this research, trained and tested with dataset of PAN 2020. Four approaches N-gram based; user statistics-based models are trained with different values of hyper parameters. Extensive grid search with cross validation is applied in each machine learning model. In N-gram based models, out of numerous machine learning models this research focused on better results yielding algorithms, assessed by deep reading of state-of-the-art related work in the field. For better accuracy, author aimed at developing models using Random Forest, Logistic Regression, SVM, and XGBoost. All four machine learning algorithms were trained with cross validated grid search hyper parameters. Advantages of this research over previous work is user statistics-based model and then ensemble learning model. Which were designed in a way to help classifying Twitter users as fake news spreader or not with highest reliability. User statistical model used 17 features, on the basis of which it categorized a Twitter user as malicious. New dataset based on predictions of machine learning models was constructed. And then Three techniques of simple mean, logistic regression and random forest in combination with ensemble model is applied. Logistic regression combined in ensemble model gave best training and testing results, achieving an accuracy of 72%.

Design and Analysis of Fault-Tolerant Object Group Framework for Effective Object Management and Load Distribution (효율적 객체 관리 및 부하 분산을 위한 고장포용 객체그룹 프레임워크 설계)

  • Kang, Myung-Seok;Jung, Jae-Yun;Kim, Hag-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.22-30
    • /
    • 2007
  • In this paper, to achieve consistency maintenance as well as stable service execution, we build a Fault-Tolerant Object Group framework that provides both of the group management service and the load scheduling service. The group management service supports the object management such as registration and authentication, and provides two schemes for failure recovery using the service priority and the checkpointing. In the load scheduling servile, we improve the effectiveness of service execution through the reasoning process of object loads based on the ANFIS architecture. The effectiveness in the performance of the developed framework is validated through a virtual home-network simulation based on the FTOG framework.

The Establishment Plan of Strong-Motion Instrumentation of Dams for Monitoring of Seismic Behavior and Taking An Urgent Countermeasure (댐의 지진관측 및 내진대책 수립을 위한 지진계측시스템 구축 방안에 관한 연구)

  • Oh, Byung-Hyun;Lee, Jong-Wook
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2005.03a
    • /
    • pp.1588-1595
    • /
    • 2005
  • In this study, the installation location of accelerometer and accelerograph for dam are investigated in the field to establish of emergency action against dam failure when earthquake occur and to guarantee the results of seismic stability of dams which are analysed with dynamic analysis method during 1999 to 2003 by KOWACO. By a comparative study concerning of domestic and foreign guidelines of seismic strong motion instrumentation for dams, "Guidelines of Seismic Strong-Motion Instrumentation Installation, Operation and Maintenance for Dams" is established to set up the standard of seismic strong-motion instrumentation for dam, are supervised by KOWACO There is some problems in taking a measure of stability of dams when earthquake event occur because the existing seismic strong motion instruments are operated independently. This make difficult to confirm the occurrence of seismic event. For that reason, in this study the plan of unified operation and maintenance system for strong-motion instrument for dams is designed. It will make possible real-time seismic monitoring, data transmission and receiving, giving warning for earthquake, and exchanging data with national seismic network.

  • PDF

TCP Performance Analysis over Mobile ad-hoc Networks (모바일 ad-hoc 네트워크에서 TCP 성능 분석)

  • Nam, Ho-Seok;Cho, Sol;Lee, Tae-Hoon;Kim, Jun-Nyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.800-808
    • /
    • 2007
  • With the development of wireless data communication technology, all IP-based network will become compositions of wired and wireless networks. TCP is a connection-oriented, reliable transport protocol and has been used as de facto standard in most wired networks. Because TCP's congestion control algorithm could not distinguish congestion from BER, link failure and frequent route changes, TCP shows a poor performance over mobile ad-hoc networks. In this paper, the theoretical feature of TCP was studied and the performance of TCP over mobile ad-hoc networks was analyzed with ns2.

The Mitigation Model Development for Minimizing IT Operational Risks (IT운영리스크 최소화를 위한 피해저감모델 구현에 관한 연구)

  • Lee, Young-Jai;Hwang, Myung-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.95-113
    • /
    • 2007
  • To minimize IT operational risks and the opportunity cost for lost business hours. it is necessary to have preparedness in advance and mitigation activities for minimization of a loss due to the business discontinuity. There are few cases that banks have a policy on systematic management, system recovery and protection activities against system failure. and most developers and system administrators response based on their experience and the instinct. This article focuses on the mitigation model development for minimizing the incidents of disk unit in IT operational risks. The model will be represented by a network model which is composed of the three items as following: (1) the risk factors(causes, attributes and indicators) of IT operational risk. (2) a periodic time interval through an analysis of historical data. (3) an index or an operational regulations related to the examination of causes of an operational risk. This article will be helpful when enterprise needs to hierarchically analyze risk factors from various fields of IT(information security, information telecommunication, web application servers and so on) and develop a mitigation model. and it will also contribute to the reduction of operational risks on information systems.

  • PDF

Loss of strength in asbestos-cement water pipes due to leaching

  • Gil, Lluis;Perez, Marco A.;Bernat, Ernest;Cruz, Juan J.
    • Structural Engineering and Mechanics
    • /
    • v.40 no.5
    • /
    • pp.655-663
    • /
    • 2011
  • Asbestos-cement is a material with valuable strength and durability. It was extensively used for water distribution pipes across the world from the 1950s until the early 1980s. The network of pipes in this case study dates from the 1970s, and after more than 30 to 40 years of service, some pipes have been found to break under common service pressure with no apparent reason. A set of mechanical tests was performed including bending, compression, pressure and crushing tests. Microscopy analysis was also used to understand the material behaviour. Tests showed that there was a clear loss of strength in the pipes and that the safety factor was under the established threshold in most of the specimens. Microscopy results showed morphological damage to the pipes. The loss of strength was attributed to a leaching effect. Leaching damages the cement matrix and reduces the frictional interfacial shear stress.

A Study on Quality Management and Assessment Model for System-Integration Organization

  • Lee, Byung Yong;Jung, Soo Il
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.24 no.68
    • /
    • pp.85-94
    • /
    • 2001
  • Most of customers want to know how to develop the computer system they want to get to use according to the their requirements. This study presents a Computer Integration management System for Quality (CISQ) model for system-integration organizations, which need to demonstrate their capability to consistently provide computer integrated system that meets customer satisfaction and applicable regulatory requirements. The Plan.Do.Check.Act(PDCA) cycle called by Doming wheel expresses the basic concept of continuous improvement action in order to emphasize on achieving business goal. It is useful for providing full competence of a system-integration organization to integrate management systems based on the international management system, and to take an advantage in its market. This study specifies International Certification Network Business Excellence Concept(IBEC) approach to ensure a harmonized integration of the variety of management systems and thereby produce synergy effect. The end part of this study specifies a Assessment Model including an assessment concept adding to the compliance audit according to the CISQ for the continuous improvement. A simple application on Failure Modes and Effects Analysis(FMEA) in testing phase in project life cycle has been done.

  • PDF