• Title/Summary/Keyword: Node Management

Search Result 1,126, Processing Time 0.027 seconds

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Design of optimal contents translation node discovery mechanism applying node capability weight in application layer (응용 계층에서 노드 성능가중치 적용을 통한 최적의 컨텐츠 변환 노드 검색 메커니즘의 설계)

  • 전해조;임경식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.580-582
    • /
    • 2004
  • 본 논문에서는 사용자의 다양한 단말환경에 맞게 보다 효율적으로 컨텐츠 변환 서비스를 제공하는 최적의 컨텐츠 변환 노드(Contents Translation Node: CTN) 검색 메커니즘을 개발하였다 이 메커니즘은 컨텐츠 변환 노드로 구성된 서비스 오버레이 네트워크에서 노드부하가 적고, 근거리에 위치한 최적의 노드를 선택하여 신속하고 효율적인 서비스 제공을 가능케 하고 노드간의 부하 배분 기능을 지원한다 그리고 털러 노드 성능 요인들 간에 가중치를 적용하여 현재 상황에 맞게 시의적절한 최적의 노드를 선택할 수 있게 한다. 또한 본 논문에서는 이 메커니즘을 이용하여 인터넷 컨텐츠 최적화 서비스를 제공하는 인터넷 컨텐츠 분산 관리 시스템 (Internet Contents Distribution Management System: ICOMS)을 설계하였다.

  • PDF

Hybrid MAC Protocol for Improving Performance of IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜의 성능 향상을 위한 하이브리드 MAC 프로토콜)

  • Choi, Woo-Yong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.2
    • /
    • pp.220-224
    • /
    • 2015
  • The DCF (Dcistributed Coordination Function) and PCF (Point Coordination Function) are the basic MAC (Medium Access Control) protocols of IEEE 802.11 wireless LANs. According to the DCF, each node performs the exponential backoff algorithm before the transmission of its data frame. Each node doubles the backoff waiting time before the transmission of its data frame whenever it detects the transmission collision with other nodes. Therefore, as the number of the active nodes having the data frames to transmit increases, the overall MAC performance of the DCF decreases. On the other hand, according to the PCF, each node is granted the transmission opportunity by which the PCF transmission is possible without the collision with other nodes. Therefore, as the number of the active nodes increases, the MAC performance of the PCF increases, In this paper, considering the tradeoff of MAC performance between the DCF and PCF, a hybrid MAC protocol is proposed to enhance the performance of IEEE 802.11 wireless LANs.

Cost Effective Mobility Anchor Point Selection Scheme for HMIPv6 Networks (HMIPv6 환경에서의 최소비용 MAP 선택 기법)

  • Roh, Myoung-Hwa;Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.26 no.B
    • /
    • pp.207-213
    • /
    • 2006
  • Mobility Anchor points are used for the mobility management in HMIPv6 networks. Currently a mobile node selects the MAP farthest away from itself as a new MAP among available candidates when it undertakes a macro hand off. With this technique, however, the traffic tends to be concentrated at a MAP with the largest domain size and the communication cost increases due to the distance between the mobile node and the MAP. In this work, we propose a novel scheme to select a MAP to minimize the communication cost, taking the mobile node's moving speed and data rate into account. To come up with the scheme we analyses the communication analyses the communication cost into the binding update cost and the data packet delivery cost, and derive an equation representing the optimal MAP domain size to minimize the total cost.

  • PDF

Performance Analysis of Registration Delay Time by Varying Number of foreign Agent in Regional Registration (지역 등록 방법에서 외부 에이전트 수의 변화에 따른 등록 지연시간의 성능분석)

  • 이용덕;곽경섭
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.106-112
    • /
    • 2004
  • Mobile IP is a solution for mobility on the global Internet. However, it causes service delay incase of frequent movement of mobile node and mobile users. Mobile IP regional registration is Proposed to reduce the service delay. In this paper, we introduce an optimal regional location management mechanism for Mobile IP that reduces the registration delay. The movement of mobile node is described by a discrete analytical model. The proposed model explains analytically average packet rate and registration cost as the size of regional networks with mobility of mobile node.

  • PDF

A Design for a System to Improve Reliability of SCTP association in Mobile SCTP (Mobile SCTP 에서 SCTP association 의 신뢰성 향상을 위한 시스템 설계)

  • 전민경;박재우;이균하
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.227-230
    • /
    • 2003
  • Mobile SCTP (mSCTP) is a new scheme which can be used to provide seamless handover for the mobile node. The reason that is possible is because of the SCTP extension which provides a method to reconfigure IP address on an existing SCTP association (ADDIP). While mSCTP focuses on an association originated ken mobile node (MN) toward fixed correspondent node (CN), mSCTP with Mobile IP support an association originated from CN toward MN by using the Home Agent in Mobile IP and location management. However, there are still some problems related to communication interruption. In this paper, we present a new scheme to solve these problems. The main idea of this scheme is using the home address of MN as a backup path of an SCTP association.

  • PDF

A Study on Real Time Asynchronous Data Duplication Method for the Combat System (전투체계 시스템을 위한 실시간 환경에서의 비동기 이중화 기법 연구)

  • Lee, Jae-Sung;Ryu, Jon-Ha
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.2
    • /
    • pp.61-68
    • /
    • 2007
  • In a naval combat system, the information processing node is a key functional equipment and performs major combat management functions including control sensor and weapon systems. Therefore, a failure of one of the node causes fatal impacts on overall combat system capability. There were many methodologies to enhance system availability by reducing the impact of system failure like a fault tolerant method. This paper proposes a fault tolerant mechanism for information processing node using a replication algorithm with hardware duplication. The mechanism is designed as a generic algorithm and does not require any special hardware. Therefore all applications in combat system can use this functionality. The asynchronous characteristic of this mechanism provides the capability to adapt this algorithm to the module which has low performance hardware.

Bayesian Regression Modeling for Patent Keyword Analysis

  • Choi, JunHyeog;Jun, SungHae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.125-129
    • /
    • 2016
  • In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.

Excess Power를 이용한 HSDPA throughput 개선

  • Kim, Tae-Hyun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.107-111
    • /
    • 2008
  • 3GPP는 사용자의 다운링크 패킷 데이터 Throughput을 높이고,NodeB에 MAC계층을 위치시켜, 사용자의 스케줄링과 재전송을 담당하게 함으로써, 다운링크 패킷의 전송 지연을 감소시키는 HSDPA(High Speed Data Packet Access)기술을 Release 5에서 도입하였다. NodeB에 위치한 MAC-hs 스케줄러는 각각의 사용자에게 가용한 NodeB의 RF power와 code 자원을 제공하며, R99에서 사용했던 Power control을 이용하는 대신, AMC(Adaptive Modulation and Coding)기능을 제공하여 Radio conditions에 따라 전송되는 Data Format을 조정하여 채널환경이 좋은 사용자에게는 높은 data Throughput을 제공하며, 채널환경이 좋지 않은 사용자에게는 낮은 data throughput을 제공하고 있다. 본 고에서는 매 TTI에 스케줄링된 사용자에게 제공하고도, RF power 및 code 자원이 남아 있을 경우, 스케줄러는 남은 자원을 각각의 사용자에게 재 분배하여, 초기에 추정한 HSDPA Throughput보다 향상된 성능을 갖을 수 있음을 설명하였다.

  • PDF

Implementation of ESGF Data Node for International Distribution of CORDEX-East Asia Regional Climate Data

  • Han, Jeongmin;Choi, Jaewon
    • International Journal of Contents
    • /
    • v.17 no.1
    • /
    • pp.61-70
    • /
    • 2021
  • As the resolution of climate change scenario data applied with regional models increased, Earth System Grid Federation (ESGF) was established around major climate-related organizations to jointly operated and manage large-scale climate data. ESGF developed standard software to provide model output, observation data management, dissemination, and analysis using Peer to Peer (P2P) computing technology. Roles of each institution were divided into index and data nodes. Therefore, ESGF data node was established at APEC Climate Center in Korea on behalf of Asia to share data on climate change scenarios of CORDEX-East Asia (CORDEX-EA) to study climate changes in Eastern Asia. Climate researchers are expected to play a large role in researching causes of global warming and responding to climate change by providing CORDEX-EA regional model data to the world through ESGF data node.