• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.027 seconds

A study on the Robust and Systolic Topology for the Resilient Dynamic Multicasting Routing Protocol

  • Lee, Kang-Whan;Kim, Sung-Uk
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.3
    • /
    • pp.255-260
    • /
    • 2008
  • In the recently years, there has been a big interest in ad hoc wireless network as they have tremendous military and commercial potential. An Ad hoc wireless network is composed of mobile computing devices that use having no fixed infrastructure of a multi-hop wireless network formed. So, the fact that limited resource could support the network of robust, simple framework and energy conserving etc. In this paper, we propose a new ad hoc multicast routing protocol for based on the ontology scheme called inference network. Ontology knowledge-based is one of the structure of context-aware. And the ontology clustering adopts a tree structure to enhance resilient against mobility and routing complexity. This proposed multicast routing protocol utilizes node locality to be improve the flexible connectivity and stable mobility on local discovery routing and flooding discovery routing. Also attempts to improve route recovery efficiency and reduce data transmissions of context-awareness. We also provide simulation results to validate the model complexity. We have developed that proposed an algorithm have design multi-hierarchy layered networks to simulate a desired system.

k-Fragility Maximization Problem to Attack Robust Terrorist Networks

  • Thornton, Jabre L.;Kim, Donghyun;Kwon, Sung-Sik;Li, Deying;Tokuta, Alade O.
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.33-38
    • /
    • 2014
  • This paper investigates the shaping operation problem introduced by Callahan et al., namely the k-fragility maximization problem (k-FMP), whose goal is to find a subset of personals within a terrorist group such that the regeneration capability of the residual group without the personals is minimized. To improve the impact of the shaping operation, the degree centrality of the residual graph needs to be maximized. In this paper, we propose a new greedy algorithm for k-FMP. We discover some interesting discrete properties and use this to design a more thorough greedy algorithm for k-FMP. Our simulation result shows that the proposed algorithm outperforms Callahan et al.'s algorithm in terms of maximizing degree centrality. While our algorithm incurs higher running time (factor of k), given that the applications of the problem is expected to allow sufficient amount of time for thorough computation and k is expected to be much smaller than the size of input graph in reality, our algorithm has a better merit in practice.

SoQ-based Relay Transmission Protocol for Wireless USB over WiMedia D-MAC (WiMedia D-MAC 기반 Wireless USB 시스템을 위한 SoQ-based 릴레이 통신 프로토콜)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1324-1329
    • /
    • 2013
  • The WiMedia Alliance has specified a Distributed Medium Access Control (D-MAC) protocol based on UWB for high speed wireless home networks and WPANs. In this paper, firstly, the fair SoQ-based Distributed Reservation Protocol (DRP) for D-MAC is analyzed. And a novel SoQ-based relay transmission protocol is proposed to overcome DRP conflicts fast. In the proposed protocol, each device executes the Satisfaction of QoS (SoQ) time slot allocation algorithm independently. And, in order to give the loser device due to DRP conflicts another chance to maintain QoS resources, the proposed relay transmission protocol helps the device reserve another indirect link maintaining the required QoS resources via a relay node.

A Fairness Based T-MAC Protocol in Wireless Sensor Network (무선 센서 네트워크에서 공평성을 고려한 T-MAC 프로토콜)

  • Nam, Jaehyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1496-1501
    • /
    • 2013
  • IEEE 802.11 has become the main technology in wireless network. However, performance anomalies, especially in terms of fairness, arise in its use in ad hoc networks. Two independent emitters nodes can easily monopolize the medium, preventing other nodes to send packets. This paper proposes the modified (m,k)-firm scheme which is based on T-MAC to improve fairness. The basic idea is to assign higher priorities to nodes that are closer to a dynamic failure so as to improve their chances of meeting their deadlines. The simulation result shows that the proposed scheduling scheme helps improve the fairness of the DCF.

Library automation and its impact on library (도서관자동화와 자동화에 의한 영향)

  • 권은경
    • Journal of Korean Library and Information Science Society
    • /
    • v.15
    • /
    • pp.153-178
    • /
    • 1988
  • This paper consists of three chapters. Changes and objectives of library automation are discussed in chapter 1 and 2 respectively. The dominant trends in library automation which begun in 1960's can be described ; the 1960's was dominated by primitive local systems and the 1970's by online networks. And in the 1980's, there is a return to local system but with various options to networks. The major objectives of library automation are to improve speed of technical process, to get economic efficiency, and to provide better services. But the library planning automation should take account of experiences of the others that those objectives are not easily achieved. The impact of automation on a library is discussed in chapter 3. First, emphasis of libraries shifts from a collection orientation to an access orientation. Computer allowed to access not only to materials of their own library but also to those of others. Second, libraries should reconsider all their activities and services. Those must be reorganized by several principles such as rationalization, intelligent use of automation, and maximizing of human self-fulfillment. Third, change on organizational structure is anticipated. Flat organization in stead of existing hierarchy will provide rapid communication for problem - solving and intensify professionalism. Machine with proper capabilities and well programed software are prerequisites for library automation. But beyond these prerequisites, human factor should be stressed as well as mechanical factor. Therefore, understanding of changes due to automation, aggressive acceptance of trend, and su n.0, pport of organization are required in order to get successful results.

  • PDF

Implementation of Location Tracking Sensor Network Using M2M Technology & Cloud Services (M2M 기술과 상용 클라우드 서비스를 이용한 위치추적 센서 네트워크 구현)

  • Kim, Kyung-Shin;Kang, Moon-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.93-102
    • /
    • 2014
  • Sensor networks are utilized in various fields as the useful system that provides the useful information to the user, by storing, processing and analyzing the various data collected from sensors. In construction of such sensor networks, by utilizing cloud PaaS for both communication server and the database server, the cost reduction and stabilization of the system can be achieved. In this paper, UDIPSN (User Decision Information Providing Sensor Network) was implemented to provide the decision information to the users by being treated as a cloud service for the location information of a moving object as well as various sensor data. Finally, we showed that the operation of the proposed system was performed properly.

Capacity Optimization of Two-way Amplify-and Forward Relay Networks (Two-way 증폭과 전송 릴레이 네트워크의 용량 최적화)

  • Hanif, Mohammad Abu;Lee, Moon Ho;Park, Ju Yong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.27-33
    • /
    • 2013
  • In this paper, we propose a pilot based channel estimation technique in two-way relay networks. We propose to transmit a pilot symbol together with the data symbol during transmission. In absence of Channel State Information (CSI), destination uses the pilot symbol to estimate the channel. In this system, the relay amplifies the pilot and the data symbol then forward them to the destination using amplify and forward (AF) protocol. We assume that the relay gain is fixed, so the relay does not need to estimate the channel, the destination only estimate the channel. We apply well-known Least-square (LS) and minimum mean-square error (MMSE) channel estimation methods to estimate the channel.

Wireless LAN Security Solutions for Secure Wireless Communications

  • Kim, Su-Yong;Ahn, Duck-Ki;Roh, Jae-Sung;Oh, Chang-Reon;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.4
    • /
    • pp.183-188
    • /
    • 2003
  • The $4^{th}$ generation mobile communications, through several radio access networks such as WLAN, Bluetooth, UMTS, GPRS, CDMA 1X, and IMT-2000 in the same area offering different type of coverage, will support interactive multimedia services in additions to wider bandwidths, higher bit rates, and service portability. Regardless of various radio access networks, they will also support robust security mechanisms, as well as seamless mobility and common authentication. In this paper, we give an overview of WLAN security and examine its security problems. We also explain the enhanced security schemes, such as port-based authentication, EAP, and IEEE 802.1X. For secure wireless communications, several possible security solutions are offered and evaluated in various respects to improve WLAN security. This paper will make a contribution to provide more secure wireless communications to cellular operators embracing WLAN technology as a means to generate new revenues based on data services.

MAC Protocol for Multimedia Services in Wireless ATM Networks based on TDMA/TDD (TDMA/TDD 기반 무선 ATM망에서 멀티미디어 서비스를 위한 MAC 프로토콜)

  • 임인택
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.899-906
    • /
    • 2003
  • In this paper, a channel access control algorithm and a slot allocation algorithm are proposed as MAC protocol for multimedia services in TDMA/TDD-based wireless ATM networks. In the proposed protocol, VBR terminals that require real-time services transmit a reservation request through a random access minislot. VBR terminals, which are successfully transmitted the reservation request, transmits the dynamic parameters through a dynamic parameter minislot without contention. On the other hand, ABR terminals transmit a reservation request with contention basis whenever a non-real-time traffic burst is generated. Based on the received dynamic parameters and the number of requested slots, the base station scheduler allocates a dynamic parameter minislot as well as uplink data slots into VBR terminals. Also the scheduler allocates uplink data slots into ABR terminals in proportion to the number of requested slots.

Design and Implementation for Seamless Multimedia Messaging Service over WLAN and CDMA2000

  • kim, Su-Yong;Cho, Yong-Bum;Oh, Chang-Heon;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.4
    • /
    • pp.219-223
    • /
    • 2004
  • MMS has been seen as the key application in its entry into the 3G mobile markets. Furthermore, the combination of WLAN and 3G wireless technologies will make MMS service more popular, bringing benefits to both service providers and their customers. To realize seamless MMS service over WLAN and CDMA2000 networks, we design and implement new platform architecture by reusing the existing standards and network elements at the same time. We employ loose coupling approach and Mobile IP approach to propose new platform architecture, interfacing MMSC with many existing components. Based on our platform architecture, we also present seamless MMS delivery implementations that can't be possible within the current MMS reference architecture. This paper will make a contribution for service providers to offer their customers with seamless MMS service over WLAN and CDMA2000 networks.