• Title/Summary/Keyword: Node Management

Search Result 1,132, Processing Time 0.029 seconds

Neck Dissection in Oral Cavity Cancer (구강암환자의 경부청소술)

  • Park, Joo-Yong
    • The Journal of the Korean dental association
    • /
    • v.48 no.8
    • /
    • pp.594-606
    • /
    • 2010
  • Lymph node status is the single most important prognostic factor in oral cancer because lymph node involvement decreases overall survival by 50%. Appropriate management of the regional lymphatics, therefore, plays a central role in the treatment of the oral cancer patients. The purposes of this article are to present the history of neck dissections, including current neck dissection classification, describe the technique of the most common neck dissection applicable to oral cavity cancers, and discuss some of the complications associated with neck dissection. Finally, a brief review of elective neck dissection and sentinel lymph node biopsy will be presented. It is necessary that dentists have to be interested in oral cancer and these interest will make it possible to prevent oral cancer, detect it earlier and also improve the prognosis, survival and the quality of life of survivors.

Overlay Multicast for node of Management in Multi-layer (다중 계층 노드관리를 위한 오버레이 멀티캐스트)

  • Lee, Bum-Jae;Chi, Sam-Hyun;Lee, Kang-Whan
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.623-624
    • /
    • 2008
  • Overlay Multicast Routing Algorithm operates flexibly according to the various limited condition and environment of the MANET. Because of this Algorithm have maintenance and transmission of the network to use virtual Overlay ID. This paper proposes the method to give node ID considering attribute of node. If it uses ID considering attribute of node, it will improve routing speed.

  • PDF

A Study on Routing Protocol using Central Node for Ad hoc Network (Central Node를 이용한 MANET 라우팅 프로토콜에 관한 연구)

  • Kim, Hee-Su
    • Journal of Integrative Natural Science
    • /
    • v.1 no.3
    • /
    • pp.210-215
    • /
    • 2008
  • Ad hoc network는 무선 노드들의 집합으로서 어떤 인프라스트럭처 도움 없이 그들 서로가 multi-hop 경로를 통해 통신한다. 본 논문에서는 ad hoc network에서 사용되는 proactive 라우팅 프로토콜과 on-demand 라우팅 프로토콜의 혼합인 hybrid 라우팅 프로토콜에 대해 제안하였다. 본 논문에서는 기존의 hybrid 라우팅 프로토콜인 ZRP와는 달리 Ad hoc network를 구성하는 노드들 중에 네트워크 서비스를 제공해주는 특별한 노드를 설정하여 라우팅 하는 방법을 제안한다. 이러한 역할을 해주는 특별한 노드를 본 논문에서는 C-Node라 부른다. C-Node를 이용한 라우팅으로 기존의 라우팅 프로토콜보다 경로 설정 시간과 flooding 시간을 줄이므로서 효율적인 라우팅을 수행할 수 있게된다.

  • PDF

Design of Node.js-based IRPE Software Configuration Management System (Node.js 기반의 IRPE 형상 관리 시스템 설계)

  • Jang, Yoon-Jeong;Kim, Min-A;Chae, Tae-Byeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.586-589
    • /
    • 2017
  • 소프트웨어 프로젝트 관리를 위한 여러 항목 중, 형상 관리는 매우 중요한 영역이다. 눈에 보이지 않는 소프트웨어의 결과물을 산출물인 문서로 설명, 이해, 관리하는 활동이기 때문이다. 형상 관리는 현재 한국항공우주연구원에서 운영 중인 지구관측위성에서도 중요하게 여겨지고 있다. 위성 영상 데이터의 효율적인 관리 등을 위해 형상 관리의 필요성이 계속해서 대두되어 왔다. 본 논문에서는, 기존에 다루어지는 일련의 과정들을 체계적으로 정리 및 새롭게 정의하고, 더불어 향상 관리 범위에 포함되어 있는 관리자 및 사용자가 필요로 하는 각 산출 문서의 내용을 편리하게 사용할 수 있도록 지원하는 Node.js 기반의 형상 관리 시스템 개발 방안에 대하여 기술하고자 한다. 아울러, 이 Node.js 플랫폼이 View단과 Server단을 하나로 통합하여 개발하는 방식이기 때문에, 우리가 필요로 하는 위성 영상 데이터의 효율적인 향상 관리 지원을 위한 시스템 개발에 적용해 보았다. 결과적으로, 제안하는 설계 방법이 적합하다는 것을 단계적 단위 시험을 통하여 확인하였다.

Control Frame Design for Improvement Transmit Efficiency in the Wireless Networks (무선 네트워크에서 전송효율증대를 위한 제어프레임 설계)

  • Han, Jae-Kyun;Pyeon, Seok-Beom
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.61-70
    • /
    • 2011
  • IEEE 802.11 wireless network supports control frames like RTS/CTS(Request To Send / Clear To Send). Because they is defend to frame collection problems. It helps to solve the frame collection problem but decreases the throughput rate. Also, control frame makes False Node Problem. This problem is makes to other wireless nodes don't work and don't find channels in the same cell and near cells. We proposed a reformed new control frame for efficiency throughput rate and solution of False Node Problem. New control frame is to have added to 4 bytes of channel detection ability at the RTS frames. Channel detection ability supported to check channel at the wireless node start to transmit data frame, We expect that channel detection ability make prevent False Node Problem for increase to access number to channel. We perform comparative analysis in terms of delay(sec) and load(bits/sec) with reform RTS/CTS method which proves the efficiency of the proposed method.

Identification Technition of Malicious Behavior node Based on Collaboration in MANET (MANET에서 협업기반의 악의적인 노드 행위 식별기법)

  • Jeon, Seo-In;Ryu, Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.83-90
    • /
    • 2012
  • MANET(Mobile Ad-Hoc Network) has a weakness from a security aspect because it operates where no wired network is built, which causes the exposed media, dynamic topology, and the lack of both central monitoring and management. It is especially difficult to detect and mitigate a malicious node because there is not a mediator which controls the network. This kind of malicious node is closely connected to the routing in the field of study of Ad-Hoc security. Accordingly this paper proposes the method on how to enhance the security for the safe and effective routing by detecting the malicious node. We propose MBC(Identification technition of Malicious Behavior node based on Collaboration in MANET) that can effectively cope with malicious behavior though double detecting the node executing the malicious behavior by the collaboration between individual node and the neighbor, and also managing the individual nodes in accordance with the trust level obtained. The simulation test results show that MBC can find the malicious nodes more accurately and promptly that leads to the more effectively secure routing than the existing method.

Secure and Efficient Binding Updates in Host-Based Distributed Mobility Management (호스트 기반 분산형 이동성 관리 기술에서 안전하고 효과적인 바인딩 업데이트)

  • Lee, Seyeong;Choi, Hyoung-Kee;Kim, EJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.397-408
    • /
    • 2017
  • As mobile traffic increases rapidly, DMM (Distributed Mobility Management) has been proposed as a mobility management technology for seamless communication of mobile devices as mobile traffic increases rapidly. the DMM distributes mobility management from the core network to the edge network, enabling stable binding updates with low latency. However, the DMM still have network delay and security problems for sessions. In this paper, we point out the problems existing in the DMM and propose a new protocol in which the MN (Mobile Node) directly participates in authentication and mutual authentication is correctly performed to solve this problem. We demonstrate not only security improvements but also performance improvements with performance analysis.

Distributed System Architecture Modeling of a Performance Monitoring and Reporting Tool (분산 시스템의 성능 모니터링과 레포팅 툴의 아키텍처 모델링)

  • Kim, Ki;Choi, Eun-Mi
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.3
    • /
    • pp.69-81
    • /
    • 2003
  • To manage a cluster of distributed server systems, a number of management aspects should be considered in terms of configuration management, fault management, performance management, and user management. System performance monitoring and reporting take an important role for performance and fault management. In this paper, we present distributed system architecture modeling of a performance monitoring and reporting tool. Modeling architecture of four subsystems are introduced: node agent, data collection, performance management & report, and DB schema. The performance-related information collected from distributed servers are categorized into performance counters, event data for system status changes, service quality, and system configuration data. In order to analyze those performance information, we use a number of ways to evaluate data corelation. By using some results from a real site of a company and from simulation of artificial workload, we show the example of performance collection and analysis. Since our report tool detects system fault or node component failure and analyzes performances through resource usage and service quality, we are able to provide information for server load balancing, in short term view, and the cause of system faults and decision for system scale-out and scale-up, in long term view.

  • PDF

A Robust and Adaptive Trust Management System for Guaranteeing the Availability in the Internet of Things Environments

  • Wu, Xu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2396-2413
    • /
    • 2018
  • Trust management is one of the most challenging issues for the highly heterogeneous Internet of Things (IoT). In the context of the IoT, it is difficult to evaluate the node's trustworthiness in the same trust model when a node provides different services. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of IoT environments. With these issues in mind, this paper propose a robust and adaptive trust management system for the IoT that is able to measure the trustworthiness of nodes based on feedbacks collected from participants in a specific context and ensure the availability of trust management services. The main contributions of our system are: 1) Proposing a partly decentralized trust management framework, which improves the resiliency of the trust mechanism; 2) Proposing an adaptive trust evaluation scheme and a three-dimensional context representation makes trust evaluation more accurate and specific; 3) Enhancing the adaptive trust evaluation scheme by incorporating a bad behavior factor in trust estimation, which efficiently distinguishes misleading feedbacks from On-Off attacks. Simulation results show the good performance of the proposed system and especially show effectiveness against On-Off attacks compared to other trust mechanisms.

Cooperative Video Streaming and Active Node Buffer Management Technique in Hybrid CDN/P2P Architecture

  • Lee, Jun Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.11-19
    • /
    • 2019
  • Recently, hybrid CDN/P2P video streaming architecture is specially designed and deployed to achieve the scalability of P2P networks and the desired low delay and high throughput of CDNs. In this paper, we propose a cooperative video streaming and active node buffer management technique in hybrid CDN/P2P architecture. The key idea of this streaming strategy is to minimize network latency such as jitter and packet loss and to maximize the QoS(quality of service) by effectively and efficiently utilizing the information sharing of file location in CDN's proxy server which is an end node located close to a user and P2P network. Through simulation, we show that the proposed cooperative video streaming and active node buffer management technique based on CDN and P2P network improves the performance of realtime video streaming compared to previous methods.