• Title/Summary/Keyword: communication networks

Search Result 5,474, Processing Time 0.035 seconds

A Study on the Integrated Simulator Scheme for Communication Networks (통신망 통합시뮬레이터의 구축방안에 관한 연구)

  • Kwon, Ho-Yeol;Kim, Hwa-Jong
    • Journal of Industrial Technology
    • /
    • v.12
    • /
    • pp.37-49
    • /
    • 1992
  • We proposed an integrated simulator scheme for communication networks. The network modeling and Analysis methologies are firstly discussed along the design procedure of a network simulator, and then, the structure, kernel, and user interfaces are defined for the simulator. Finally, for the verification of our approach, simulations are performed for a simple queueing network and a pure ALOHA system using Ptolemy, a multi-paradigm simulation enviroment.

  • PDF

Analyses of Security Mechanism for Wireless Sensor Network (무선 센서 네트워망에서의 보안 메카니즘 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.744-747
    • /
    • 2008
  • Sensor networks will play an important role in the next generation pervasive computing. But its characteristic of wireless communication brings a peat challenge to the security measures used in the communication protocols. These measures are different from conventional security methods. In this paper, we proposed a security architecture for self-organizing mobile wireless sensor networks. It can prevent most of attacks based on intrusion detection.

  • PDF

A New Estimation Method of Video Traffic Specification in QoS-guaranteed Networks

  • Thang, Truong Cong;Ro, Yong Man
    • Journal of Broadcast Engineering
    • /
    • v.8 no.1
    • /
    • pp.45-53
    • /
    • 2003
  • Traffic specification plays a crucial role in the resource reservation for video services over the packet-switching networks. The current development of QoS-guaranteed service still leaves a wide space for the selection of traffic specification. We propose a new method to estimate the traffic specification of variable-bit-rate (VBR) video for deterministic service. The method is based on the concept of empirical envelope and the delay bound. The solution shows to be simple yet it provides excellent network utilization.

When Sensor and Actuator Networks Cover the World

  • Stankovic, John A.
    • ETRI Journal
    • /
    • v.30 no.5
    • /
    • pp.627-633
    • /
    • 2008
  • The technologies for wireless communication, sensing, and computation are each progressing at faster and faster rates. Notably, they are also being combined for an amazingly large multiplicative effect. It can be envisioned that the world will eventually be covered by networks of networks of smart sensors and actuators. This fact will give rise to revolutionary applications. However, to make this vision a reality, many research challenges must be overcome. This paper describes a representative set of new applications and identifies several key research challenges.

  • PDF

Migration Using Reordering Recovery in Wired/Wireless Networks

  • Lee, Dong-Chun
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.115-121
    • /
    • 2007
  • Due on failures of communication nodes for the wireless and wired networks, mobile agents may be blocked even if there is available service in the networks. To solve it, we propose migration policy with reordering of the paths to guarantee the migration of mobile agents and the paper will provide the extension with the autonomous migration of mobile agents.

  • PDF

Analyses of Vulnerability and Security Mechanisms in Wireless Sensor Networks (무선센서네트워크에서의 취약성 및 보안 메카니즘의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.805-808
    • /
    • 2009
  • Security has become a major concern for many real world applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all these approaches are based on wellknown cryptographic algorithms. At the same time, performance studies have shown that the applicability of sensor networks strongly depends on effective routing decisions or energy aware wireless communication. In this paper, we analyses vulnerability and security mechanisms in wireless sensor networks.

  • PDF

Vertical Handover Framework for Maritime Multi-band Networks (해상 멀티대역 네트워크를 위한 수직 핸드오버 프레임워크 설계)

  • Cho, A-Ra;Yun, Changho;Park, Jong-Won;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2847-2856
    • /
    • 2014
  • It is necessary for maritime multi-band networks, which provide ships with diverse and seamless multimedia services, to perform vertical handover. As IEEE 802.21 WG has standardized vertical handover technologies for terrestrial wireless networks that do not consider VHF, HF, satellite networks, they cannot be directly applied to maritime multi-band networks. In this paper, the vertical handover framework for use in maritime mutlti-band networks is proposed, which includes the logical architecture, the communication reference model, re-defined handover primitives, and the handover process. The proposed vertical handover for maritime multi-band network can be applied in the ocean alone, as well as to the heterogeneous wireless networks which embrace both terrestrial and maritime networks.

Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks (무선 센서 네트워크에서 다중 공격 방어를 위한 보안 라우팅 기법)

  • Moon, Soo-Young;Cho, Tae-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.45-56
    • /
    • 2010
  • Sensor Networks are composed of many sensor nodes, which are capable of sensing, computing, and communicating with each other, and one or more sink node(s). Sensor networks collect information of various objects' identification and surrounding environment. Due to the limited resources of sensor nodes, use of wireless channel, and the lack of infrastructure, sensor networks are vulnerable to security threats. Most research of sensor networks have focused on how to detect and counter one type of attack. However, in real sensor networks, it is impractical to predict the attack to occur. Additionally, it is possible for multiple attacks to occur in sensor networks. In this paper, we propose the Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks. The proposed mechanism improves and combines existing security mechanisms, and achieves higher detection rates for single and multiple attacks.

Access Control for D2D Systems in 5G Wireless Networks

  • Kim, Seog-Gyu;Kim, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.103-110
    • /
    • 2021
  • In this paper, we compare two access control mechanisms for D2D(Device-to-Device) systems in 5G wireless networks and propose an effective access control for 5G D2D networks. Currently, there is no specified access control for 5G D2D networks but there can be two access control approaches for 5G D2D networks. One is the UE-to-Network Relay based access control and the other is the Remote UE(User Equipment) based access control. The former is a UE-to-Network Relay carries out the access control check for 5G D2D networks but the latter is a Remote UE performs the access control check for 5G D2D networks. Through simulation and evaluation, we finally propose the Remote UE based access control for D2D systems in 5G wireless networks. The proposed approach minimizes signalling overhead between the UE-to-Network Relay and the Remote UE and more efficiently performs the access control check, when the access control functionalities are different from the UE-to-Network Relay in 5G D2D networks.