• Title/Summary/Keyword: NodeB

Search Result 923, Processing Time 0.021 seconds

Study on the Characteristics of the Korea Internet AS-Level Topology Using Node Degree and Node Connectivity Metrics

  • Oh, Dong Ik;Lee, Kang Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.417-426
    • /
    • 2013
  • The Korea Internet AS-level topology was constructed using three data sources: Border Gateway Protocol (BGP) trace collector, Internet Routing Registry (IRR), and Internet Exchange Point (IXP). It has 685 nodes and 1,428 links. The Korea Internet AS-level topology is a small regional subgraph of the massive global one. We investigate how well the Korea Internet preserves the topological characteristics of the global one or how different they are. We carefully select several topology metrics that can analyze the characteristics of the Korea Internet AS-level topology. We also investigate how well Internet topology generators can represent the characteristics of the Korea Internet AS-level topology.

Building More Secure Femtocell with Improved Proxy Signature (개선된 위임 서명 방식을 이용해서 더 안전한 펨토셀 환경 구축)

  • Choi, Hyoung-Kee;Han, Chan-Kyu;Kim, Seung-Ryong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.75-86
    • /
    • 2014
  • Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP defines new architecture and security requirement for Release 9 to deal with femtocell, Home eNode B referred as HeNB. In this paper, we analyze the HeNB security with respect to mutual authentication, access control, and secure key agreement. Our analysis pointed out that a number of security vulnerabilities have still not been addressed and solved by 3GPP technical specification. These include eavesdropping, man-in-the-middle attack, compromising subscriber access list, and masquerading as valid HeNB. To the best of our knowledge, any related research studying HeNB security was not published before. Towards this end, this paper proposes an improved authentication and key agreement mechanism for HeNB which adopts proxy-signature and proxy-signed proxy-signature. Through our elaborate analysis, we conclude that the proposed not only prevents the various security threats but also accomplishes minimum distance from use-tolerable authentication delay.

Expression of IgG1 Germline Transcripts in Germinal Center B Cells of Mouse Popliteal Lymph Nodes

  • Lee, In-Woo;Kim, Jin-Ho;Chung, Gook-Hyun
    • BMB Reports
    • /
    • v.29 no.2
    • /
    • pp.127-132
    • /
    • 1996
  • Germinal centers (GCs) are formed in peripheral lymphoid tissues in response to protein antigens. In order to see if immunoglobulin isotype switching takes place in GC B-cells, we isolated GC B-cells (PNA positive cells) from mouse popliteal lymph nodes by a flow cytometer after the staining of lymph node cells with PNA-FITC and anti-B220-PE, and determined the expression of ${\gamma}1$ germline transcript and ${\gamma}1$ mRNA by RT-PCR. ${\gamma}1$ germline transcript and ${\gamma}1$ mRNA were amplified specifically in cDNAs from hybridoma expressing IgG1 or splenocytes stimulated LPS plus IL-4. Germinal center B-cells formed in popliteal lymph nodes of mice immunized with chicken ovalbumin were isolated 7 days after immunization. We sorted GC B-cells five times. Immunoglobulin ${\gamma}1$ germline transcripts were expressed in germinal center B-cells in three out of five sorts whereas two out of five sorts did not express ${\gamma}1$ germline transcripts in GC B-cells. The contents of GC B-cells ranged from 5 to 7% of total lymph node cells in most flow cytometric analyses but those of two sorted cells which did not express ${\gamma}1$ germline transcripts were out of normal range. These results imply that isotype switching of immunoglobulins may take place in GCs.

  • PDF

Analytic Model for Performance Evaluation of B-MAC Protocol under Contention Transmission Condition of Two Senders (두 개의 송신 노드가 경쟁하는 상황의 B-MAC 무선 센서 네트워크 프로토콜 성능 분석을 위한 분석적 모델)

  • Jung, Sung-Hwan;Kwon, Tae-Kyoung
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.34 no.3
    • /
    • pp.137-153
    • /
    • 2009
  • In this paper, we present an analytic model that evaluates the performance of B-MAC protocol under contention transmission conditions of two senders in a single-hop wireless sensor network. Our model considers the impact of several important factors such as sleep cycle, the backoff mechanism and incoming traffic loads. After obtaining the service delay distribution of a sending node and expected delay of a receiving node, an iterative algorithm is presented for calculating the performance measures such as expected energy consumption usage per packet and latency. Simulation results show that the proposed analytic model can accurately estimate the performance measures under different traffic conditions.

Formulation and evaluation of incompatible but convergent rational quadrilateral membrane elements

  • Batoz, J.L.;Hammadi, F.;Zheng, C.;Zhong, W.
    • Structural Engineering and Mechanics
    • /
    • v.9 no.2
    • /
    • pp.153-168
    • /
    • 2000
  • This paper presents four incompatible but convergent Rational quadrilateral elements, two four-node elements (RQ4Z and RQ4B) and two five-node elements (RQ5Z and RQ5B). The difference between the so-called Rational Finite Element (Zhong and Zeng 1996) and the Free Formulation (Bergan and Nygard 1984) are discussed and compared. The importance of the mode completeness in these formulations is emphasized. Numerical results for several benchmark problems show the good performance of these elements. The two five-nodes elements RQ5Z and RQ5B, which can be viewed as complete quadratic mode elements (with seven stress modes), always give better results than the four nodes elements RQ4Z and RQ4B.

A Study on Network Planning and Optimization Strategy for Network Scalability (Network Scalability를 위한 네트워크 설계 및 최적화 방법에 관한 연구)

  • Lee, Dong-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.511-518
    • /
    • 2007
  • One of the major issues that has to be carefully considered when upgrading current transport network capacity, is network scalability. A novel full-meshed connected ring expansion methodology and planning tool have been proposed. A 3 to 15 node expansion ring has been studied by demonstrating a dramatic system SNR improvement when the proposed planning tool was used. The results are that node output signal and optical SNR have been improved from -16dBm/10dB to +005dBm/21dB by NPOT.

A File/Directory Reconstruction Method of APFS Filesystem for Digital Forensics

  • Cho, Gyu-Sang;Lim, Sooyeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.8-16
    • /
    • 2022
  • In this paper, we propose a method of reconstructing the file system to obtain digital forensics information from the APFS file system when meta information that can know the structure of the file system is deleted due to partial damage to the disk. This method is to reconstruct the tree structure of the file system by only retrieving the B-tree node where file/directory information is stored. This method is not a method of constructing nodes based on structural information such as Container Superblock (NXSB) and Volume Checkpoint Superblock (APSB), and B-tree root and leaf node information. The entire disk cluster is traversed to find scattered B-tree leaf nodes and to gather all the information in the file system to build information. It is a method of reconstructing a tree structure of a file/directory based on refined essential data by removing duplicate data. We demonstrate that the proposed method is valid through the results of applying the proposed method by generating numbers of user files and directories.

Performance Analysis of Interworking Model for a Broadband Access Network with VB5.2 Interface (광대역 액세스 망의 VB5.2 인터페이스를 위한 연동 모델의 성능분석)

  • Kim, Choon-Hee;Cha, Young-Wook;Han, Ki-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.237-246
    • /
    • 2000
  • A broadband access network in B-ISDN subscriber network, plays a role of concentration or multiplexing of various subscribers into a service node. For call and connection control functions, DSS2 and B-ISUP signalling protocols are standardized for each of a subscriber side and a network node. B-BCC and B-ANCC protocol were proposed for VB5.2 interface. This interface allows dynamic control of ATM connections at the broadband access network. To establish an end-to-end ATM connection, interworking functions between VB5.2 interface's connection control protocol and the signalling protocol, are performed at the service node. A sequential interworking model and a parallel interworking model were proposed for these interworking functions. The sequential interworking model recommended by ITU-T causes an overall connection setup delay by introducing the access network, because this model proceeds the signalling protocol of network node after the response of VB5.2 interface protocol. On the other hand, the parallel interworking model proceeds the signalling protocol and the VB5.2 interface protocol simultaneously. The simultaneity of the parallel interworking model minimizes the overall connection setup delay. In this paper, we analyze and simulate above two interworking models with B-BCC or B-ANCC protocol in terms of a connection setup delay and completion ratio.

  • PDF

Robust Design for WCDMA Node B Amplifier by Taguchi Method and HALT (High Accelerated Life Test) (Taguchi Method 와 HALT(High Accelerated Life Test)를 이용한 WCDMA Node B Amplifier 강건설계)

  • Lee, Jun-Seo;Roh, Young-Seok;Hong, Jin-Pyo;Ahn, Kwang-Eun;Yon, Chul-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.407-410
    • /
    • 2007
  • In the RRH (Radio Remote Head) of a WCDMA Node B System, an HPA (High Power Amplifier) is used in order to amplify the transmission RF signal. Upon designing an HPA, the design requirements demand that the intermodulation characteristics are optimized during design and that the stability of the characteristics is maintained in the field. In this DOE (Design of Experiments) research, a few vital factors that affect intermodulation characteristics were first selected; then, an optimal solution was produced for high reliability in a noisy environment in the field by employing the Taguchi Method, a statistical method used for a robust design. Furthermore, by employing HALT(High Accelerated Life Test) during the verification test, this experiment has verified that an HPA that was designed using the Taguchi Method proved to be a far more robust design than an HPA that was designed without using the method.

  • PDF

Leakage Control and Application Using the Pressure Reducing Valve (압력제어밸브를 통한 누수량의 추정과 활용)

  • Kim, Shin-Geol;Kim, Youn-Hwan;Kim, Kyoung-Pil;Koo, Ja-Yong
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.20 no.2
    • /
    • pp.197-206
    • /
    • 2006
  • The leakage in the water distribution system means both the loss of money and water resource. To minimize the leakage, we introduced the pressure control method using the pressure reducing valve and pump schedule. For the pressure control, the total leakage is needed to divide into each node. In this study, EPANET 2.0 was used to simulate the water networks in two selected blocks after the total leakage was distributed with each node by four ways. The leakage was allocated into each node as water measured by meter, water pressure, water faucets and Lpcd and simulated by EPANET 2.0. Regardless of the leakage distribution ways, there was no significant difference between the measured water and the estimated water pressure. Thus, the leakage distribution way using water pressures estimated by simulation could be recommended. The scenarios controlling the pressure reducing valve and pump were made in two blocks(A and B). $86,713m^3/year$ leakage in the A block and $11,442m^3/year$ in the B block could be reduced as controlling the pressure reducing valve and pump schedule. It was shown that the fifty million won a year can be saved in the A block and 6.8 million won in the B block.