• Title/Summary/Keyword: Node Architecture

Search Result 490, Processing Time 0.034 seconds

A Distributed Communication Model and Performance Evaluation for Information Transfer in a Security Policy-based Intrusion Detection System (보안정책 기반 침입탐지시스템에서 정보 전달을 위한 분산 통신 모델과 성능 평가)

  • Jang Jung Sook;Jeon Yong Hee;Jang Jong Soo;Sohn Seung Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1707-1721
    • /
    • 2004
  • In this paper, we propose a distributed communication model of intrusion detection system(IDS) in which integrated security management at networks level is possible, model it at a security node and distributed system levels, design and implement a simulator. At the node level, we evaluate the transfer capability of alert message based on the analysis of giga-bit security node architecture which performs hardware-based intrusion detection. At the distributed system level, we perform the evaluation of transfer capability of detection and alert informations between components of distributed IDS. In the proposed model, we carry out the performance evaluation considering decision factors of communication mechanism and present the results in order to gain some quantitative understanding of the system.

CACHE:Context-aware Clustering Hierarchy and Energy efficient for MANET (CACHE:상황인식 기반의 계층적 클러스터링 알고리즘에 관한 연구)

  • Mun, Chang-min;Lee, Kang-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.571-573
    • /
    • 2009
  • Mobile Ad-hoc Network(MANET) needs efficient node management because the wireless network has energy constraints. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. Previously proposed a hybrid routing CACH prolong the network lifetime and decrease latency. However the algorithm has a problem when node density is increase. In this paper, we propose a new method that the CACHE(Context-aware Clustering Hierarchy and Energy efficient) algorithm. The proposed analysis could not only help in defining the optimum depth of hierarchy architecture CACH utilize, but also improve the problem about node density.

  • PDF

The Design of Remote Monitoring and Warning System for Dangerous Chemicals Based on CPS

  • Kan, Zhe;Wang, Xiaolei
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.632-644
    • /
    • 2019
  • The remote monitoring and warning system for dangerous chemicals is designed with the concept of the Cyber-Physical System (CPS) in this paper. The real-time perception, dynamic control, and information service of major hazards chemicals are realized in this CPS system. The CPS system architecture, the physical layer and the applacation layer, are designed in this paper. The terminal node is mainly composed of the field collectors which complete the data acquisition of sensors and video in the physical layers, and the use of application layer makes CPS system safer and more reliable to monitor the hazardous chemicals. The cloud application layer completes the risk identification and the prediction of the major hazard sources. The early intelligent warning of the major dangerous chemicals is realized and the security risk images are given in the cloud application layer. With the CPS technology, the remote network of hazardous chemicals has been completed, and a major hazard monitoring and accident warning online system is formed. Through the experiment of the terminal node, it can be proved that the terminal node can complete the mass data collection and classify. With this experiment it can be obtained the CPS system is safe and effective. In order to verify feasible, the multi-risk warning based on CPS is simulated, and results show that the system solves the problem of hazardous chemicals enterprises safety management.

Implementation of a Raspberry-Pi-Sensor Network (라즈베리파이 센서 네트워크 구현)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.915-916
    • /
    • 2014
  • With the upcoming era of internet of things, the study of sensor network has been paid attention. Raspberry pi is a tiny versatile computer system which is able to act as a sensor node in hadoop cluster network. In this paper, we deployed 5 Raspberry pi's to construct an experimental testbed of hadoop sensor network with 5-node map-reduce hadoop software framework. We compared and analyzed the network architecture in terms of efficiency, resource management, and throughput using various parameters. We used a learning machine with support vector machine as test workload. In our experiments, Raspberry pi fulfilled the role of distributed computing sensor node in the sensor network.

  • PDF

Review on Energy Efficient Clustering based Routing Protocol

  • Kanu Patel;Hardik Modi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.169-178
    • /
    • 2023
  • Wireless sensor network is wieldy use for IoT application. The sensor node consider as physical device in IoT architecture. This all sensor node are operated with battery so the power consumption is very high during the data communication and low during the sensing the environment. Without proper planning of data communication the network might be dead very early so primary objective of the cluster based routing protocol is to enhance the battery life and run the application for longer time. In this paper we have comprehensive of twenty research paper related with clustering based routing protocol. We have taken basic information, network simulation parameters and performance parameters for the comparison. In particular, we have taken clustering manner, node deployment, scalability, data aggregation, power consumption and implementation cost many more points for the comparison of all 20 protocol. Along with basic information we also consider the network simulation parameters like number of nodes, simulation time, simulator name, initial energy and communication range as well energy consumption, throughput, network lifetime, packet delivery ration, jitter and fault tolerance parameters about the performance parameters. Finally we have summarize the technical aspect and few common parameter must be fulfill or consider for the design energy efficient cluster based routing protocol.

Access Policy Transfer Between Active Nodes Using Identities

  • Kim, Young-Soo;Han, Jong-Wook;Seo, Dong-Il;Sohn, Seung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2178-2181
    • /
    • 2003
  • Active networks allow active node’s functionality to be extended dynamically through the use of active extensions. This flexible architecture facilitates the deployment of new network protocols and services. However, the active nature of a network also raises serious safety and security concerns. These concerns must be addressed before active networks can be deployed. In this paper we look at how we can control active extension’s access to different active nodes. Specifically, the authentication between active nodes is very important in this case. We use unique identity each node has for transferring access policies between active nodes. In this paper, we suggest a new method of transferring access policies performing authentications using identities between active nodes.

  • PDF

XML Based MIB Management Architecture for Virtual Active Node (Virtual Active Node를 위한 XML 기반의 MIB 관리 구조)

  • 이정환;홍충선
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.463-465
    • /
    • 2002
  • 급증하는 인터넷 관련 기술들과 사용자들을 현재의 네트워크 기반 구조로 포용하기에는 한계가 있다. 사용자들은 끊임없이 새로운 서비스들을 요구하고 현재의 망은 그러한 다양한 서비스들을 제공하기 위한 하부구조들이 정의되어 있진 않은 실정이다. 새로운 네트워크 하부 구조를 정의하는데 소요되는 비용과 새로운 서비스들을 제공하기 위해 개발될 프로토콜의 적용 비용을 줄이기 위해서 제안된 것이 액티브 네트워크의 개념이다. 사용자 기반의 네트워크환경을 제공하는 액티브 네트워크는 실행 환경과 노드 운영체제로 구성되어 있는 구조를 제공하며 바로 이 실행 환경을 이용해 노드 사용자들은 가상 액티브 노드를 만들어 새로운 서비스를 생성할 수 있다. 본 논문에서는 노드 사용자에 의해서 생성되는 가상 액티브 노드를 위한 MIB의 관리 구조에 대해서 제안하였으며 마크업 언어인 XML을 적용하여 기존의 표준 망 관리 프로토콜인 SNMP와도 호환성을 가질 수 있고 다양한 MIB 표현을 지원할 수 있는 구조를 제안하였다.

  • PDF

The medium access control protocol of virtual token bus network for real time communication (실시간 통신을 위한 가상토큰버스 통신망의 매체접근제어 프로토콜)

  • 정연괘
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.7
    • /
    • pp.76-91
    • /
    • 1996
  • In this paper, we proposed the new medium access control protocol for the virtual token bus netowrk. The network is applied to inter-processor communication network of large capacity digital switching system and digital mobile system with distributed control architecture. in the virtual token bus netowrk, the existing medium access control protocols hav ea switchove rtime overhead when traffic load is light or asymmetric according ot arbitration address of node that has message to send. The proposed protocol optimized average message delay using cyclic bus access chain to exclude switchover time of node that do not have message to send. Therefore it enhanced bus tuilization and average message delay that degrades the performance of real time communication netowrks. It showed that the proposed protocol is more enhacned than virtual token medium access control protocol and virtual token medium access control protocol iwth reservation through performance analysis.

  • PDF

The development of localization server system for location-awareness in smart home (지능형 홈에서 위치인지를 위한 localization server system 기술 개발)

  • Lim, Ho-Jung;Kang, Jeong-Hoon;Lee, Min-Goo;Yoo, June-Jae;Yoon, Myung-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.606-608
    • /
    • 2005
  • In this paper, we introduce localization server system calculated real location of objects using raw data of location-awareness from sensor node gateway. The software architecture of localization server system consists of location calculation and actuator control based on location. Also, this system supports for collecting raw data, calculating location of real objects using raw data, correcting error from outer environment, and server for applications based on location.

  • PDF

Convergence studies for Enriched Free Mesh Method and its application to fracture mechanics

  • Matsubara, Hitoshi;Yagawa, Genki
    • Interaction and multiscale mechanics
    • /
    • v.2 no.3
    • /
    • pp.277-293
    • /
    • 2009
  • The Enriched Free Mesh Method (EFMM) is a patch-wise procedure in which both a displacement field on an element and a stress/strain field on a cluster of elements connected to a node can be defined. On the other hand, the Superconvergent Patch Recovery (SPR) is known to be an efficient post-processing procedure of the finite element method to estimate the error norm at a node. In this paper, we discuss the relationship between solutions of the EFMM and those of the SPR through several convergence studies. In addition, in order to solve the demerit of the smoothing effect on the fracture mechanics fields, we implement a singular stress field to a local patch in the EFMM, and its effectiveness is investigated.