• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.031 seconds

Differentiated RWA Algorithm Providing QoS Recovery in the Next Generation Backbone Network based on DWDM (DWDM 기반의 차세대 백본망에서 QoS Recovery를 제공하는 차등적인 RWA 알고리즘)

  • Bae, Jung-Hyun;Song, Hyun-Su;Lee, Hyun-Jin;Kim, Young-Boo;Kim, Sung-Un
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.105-108
    • /
    • 2003
  • In the next generation backbone networks based on dense-wavelength division multiplexing (DWDM), the routing and wavelength assignment with quality-of-service (QoS) recovery is essentially needed to support a wide range of communication-intensive and real-time multimedia services. This paper proposes a new dpmic routing method called as MW-MIPR (MultiWavelength-Minimum Interference Path Routing), which chooses a route that does not interfere too much with many potential future connection requests. This paper also proposes a differentiated RWA mechanisms combined with MW-MIPR algorithm to provide QoS recovery for various multimedia applications in the next generation backbone networks based on DWDM.

  • PDF

PGM Method for Multicast Service in WDM Single-hop Broadcast Networks (WDM 단일홉 방송망에서 멀티캐스트 서비스를 위한 PGM 기법의 제안 및 성능분석)

  • 진교홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.86-89
    • /
    • 2002
  • Recently, video conferencing, Web-casting service, and network sane service which use multicast-based service are popular in Internet. In order to support the broadband Internet services efficiently, more communication bandwidth are needed. The WDM single-hop broadcast network topology is coming into the spotlight in next-generation access networks area. In this paper, the new multicast scheduling algorithm, PGM, is proposed and is evaluated through the computer simulation. The PGM method shows the better performance comparing with existing multicast scheduling algorithm.

  • PDF

Study on the Operational Environment of Customer Premise Telecommunication Facilities (댁내통신설비의 운영환경에 관한 연구)

  • 이영환;이상무;조평동;류명주;서태석
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.426-429
    • /
    • 2001
  • The customer cabling telecommunication facilities assume an important role in the telecommunication networks. The present technologies for domestic customer cabling facilities are established with the multimedia environment reflected, but are insufficient for accommodation of multimedia services of the ultra high-speed information and communication networks. In the present paper, the status of international and domestic standardization are reviewed and the operational environment of customer premise telecommunication facilities are investigated and analyzed in order to enhance customer cabling facilities in Korea. The problems with the operational environment are analyzed, and how to improve customer cabling telecommunication facilities is suggested based on the above.

  • PDF

A New Backoff algorithm considering Hop Count for the IEEE 802.11 Distributed Coordination Function

  • Nam, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.205-208
    • /
    • 2007
  • The IEEE 802.11 is a MAC protocol which has been standardized by IEEE for Wireless Local Area Networks (WLANs). In the IEEE 802.11 WLANs, network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Binary Exponential Backoff (BEB) algorithm. However, the BEB scheme suffers from a fairness problem; some nodes can achieve significantly larger throughput than others. This paper proposes a new backoff algorithm for the IEEE 802.11 DCF scheme. This algorithm uses the hop count for considering fairness. It causes flows with high hop count to generate short backoff interval than those with low hop count, thus getting high priority. Therefore, when a collision occurs, the modified IEEE 802.11 DCF assigns higher priority to flow to be close to a destination.

Performance Analysis of Amplify and Forward (AF)-based Cooperative Spectrum Sensing in Cognitive Radio Networks

  • Khan, Muhammad Sajjad;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.4
    • /
    • pp.223-228
    • /
    • 2013
  • Cognitive radio has been recently considered a promising technology to improve spectrum utilization by enabling secondary access to licensed bands that are not used by primary users temporarily or spatially. A prerequisite to this secondary access is the lack of interference to the primary system. This requirement makes spectrum sensing a key process for cognitive radio. In this study, we consider amplify and forward (AF)-based cooperative spectrum sensing for cognitive radio networks where multiple relay nodes are utilized to amplify and forward the primary user signal for better spectrum sensing, and maximum ratio combining is used for fusion detection by a cognitive coordinator. Further, the detection probability and the bit error rate of AF-based cooperative spectrum sensing are analyzed in fading multiple cognitive relay channels. The simulation results show that the AF-based cooperative spectrum sensing scheme outperforms the conventional scheme.

Synchronizing to Packet Trains for Underwater Acoustic Networks (패킷트레인 방식의 수중 동기화 프로토콜 설계)

  • Cho, A-ra
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.621-624
    • /
    • 2017
  • In this paper, we propose a protocol synchronizing to packet trains in a underwater acoustic networks with limitations such as long propagation delay, low data rate, high packet loss. The proposed protocol employs an one-way communication scheme to calculate packet arrival time differences of consecutively transferred packets and minimizes uncertain variation effect of long propagation delay. Simulation results shows the superiority of our protocol, compared with a previously proposed one under the given network conditions.

  • PDF

Analyses of Network Performance Based on VPN Protocols (VPN 프로토콜에 기반한 네트워크 성능 분석)

  • Jang, Chang-Whan;Lee, Min-Suk;Jo, Sung-Ho;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.589-590
    • /
    • 2016
  • Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. This is important matters because these networks can be set-up with a lower cost of ownership compared to other means of securing communications. VPN is a proven technology that does provide security strong enough for business use. However, performance of these networks is also important in that lowering network and server resources can lower costs and improve user satisfaction. We analyzed network performance analysis of VPN protocols.

  • PDF

Probabilistic Directional Routing Protocol in Multi-Hop Maritime Communication Networks (다중-홉 선박 통신망에서 확률 기반의 지향성 라우팅 프로토콜)

  • Lee, Junman;Cho, Kumin;Yun, Changho;Kang, Chung G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.857-859
    • /
    • 2015
  • In this letter, we consider a directional routing protocol that reduces the duplicated packets for AODV-based flooding in the course of establishing the end-to-end route in the multi-hop maritime ad-hoc networks. We propose an adaptive means of reducing the routing overhead subject to the node density and the target probability of successful routing that is analyzed by the stochastic geometry.

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem

  • Gupta, Daya;De, Asok;Chatterjee, Kakali
    • Journal of Information Processing Systems
    • /
    • v.8 no.1
    • /
    • pp.145-158
    • /
    • 2012
  • Hyperelliptic Curve Cryptosystem (HECC) is well suited for all kinds of embedded processor architectures, where resources such as storage, time, or power are constrained due to short operand sizes. We can construct genus 3 HECC on 54-bit finite fields in order to achieve the same security level as 160-bit ECC or 1024-bit RSA due to the algebraic structure of Hyperelliptic Curve. This paper explores various possible attacks to the discrete logarithm in the Jacobian of a Hyperelliptic Curve (HEC) and addition and doubling of the divisor using explicit formula to speed up the scalar multiplication. Our aim is to develop a cryptosystem that can sign and authenticate documents and encrypt / decrypt messages efficiently for constrained devices in wireless networks. The performance of our proposed cryptosystem is comparable with that of ECC and the security analysis shows that it can resist the major attacks in wireless networks.

Terminal-Assisted Hybrid MAC Protocol for Differentiated QoS Guarantee in TDMA-Based Broadband Access Networks

  • Hong, Seung-Eun;Kang, Chung-Gu;Kwon, O-Hyung
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.311-319
    • /
    • 2006
  • This paper presents a terminal-assisted frame-based packet reservation multiple access (TAF-PRMA) protocol, which optimizes random access control between heterogeneous traffic aiming at more efficient voice/data integrated services in dynamic reservation TDMA-based broadband access networks. In order to achieve a differentiated quality-of-service (QoS) guarantee for individual service plus maximal system resource utilization, TAF-PRMA independently controls the random access parameters such as the lengths of the access regions dedicated to respective service traffic and the corresponding permission probabilities, on a frame-by-frame basis. In addition, we have adopted a terminal-assisted random access mechanism where the voice terminal readjusts a global permission probability from the central controller in order to handle the 'fair access' issue resulting from distributed queuing problems inherent in the access network. Our extensive simulation results indicate that TAF-PRMA achieves significant improvements in terms of voice capacity, delay, and fairness over most of the existing medium access control (MAC) schemes for integrated services.

  • PDF