• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.035 seconds

A MAC Protocol Mechanism for Mobile IP over Wireless LANs

  • Moon, Il-Young;Roh, Jae-Sung;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.4
    • /
    • pp.194-198
    • /
    • 2003
  • Recently, the use of TCP/IP protocols over wireless LANs poses significant problems. In this paper, we have analyzed transmission control protocol (TCP) packet transmission time for mobile IP over wireless local area networks (LANs) using a proposed a new random backoff scheme. We call it as a proxy backoff scheme. It is considered the transmission time of TCP packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (AWGN) channel. From the results, a proposed proxy backoff scheme produces a better performance than an original random backoff in mobile IP over wireless LANs environment. Also, in OFDM/quadrature phase shift keying (QPSK) medium access control (MAC), we have obtained that the transmission time in wireless channel decreases as the TCP packet size increases.

Clustering Algorithm for a Traffic Control of Wireless Ad Hoc Networks multi-hop (무선 에드혹 망 다중홉 트래픽제어를 위한 Clustering 알고리즘에 관한 연구)

  • 이동철;김기문;김동일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1161-1167
    • /
    • 2003
  • The nodes of Ad hoc network are made up of location registration for sending informations and a great number of packet transmissions to maintain routing route among the nodes. Under this environment, a huge number of traffics would be generated as mobility variable occurs more than in physical network. Hence, in this paper, focused on to study the relationship of nodes to analyze the extent of the traffic in order to control the traffics of the multi-hop in Ad hoc.

Maximum Likelihood (ML)-Based Quantizer Design for Distributed Systems

  • Kim, Yoon Hak
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.3
    • /
    • pp.152-158
    • /
    • 2015
  • We consider the problem of designing independently operating local quantizers at nodes in distributed estimation systems, where many spatially distributed sensor nodes measure a parameter of interest, quantize these measurements, and send the quantized data to a fusion node, which conducts the parameter estimation. Motivated by the discussion that the estimation accuracy can be improved by using the quantized data with a high probability of occurrence, we propose an iterative algorithm with a simple design rule that produces quantizers by searching boundary values with an increased likelihood. We prove that this design rule generates a considerably reduced interval for finding the next boundary values, yielding a low design complexity. We demonstrate through extensive simulations that the proposed algorithm achieves a significant performance gain with respect to traditional quantizer designs. A comparison with the recently published novel algorithms further illustrates the benefit of the proposed technique in terms of performance and design complexity.

Prevention of DDoS Attacks for Enterprise Network Based on Traceback and Network Traffic Analysis

  • Ma, Yun-Ji;Baek, Hyun-Chul;Kim, Chang-Geun;Kim, Sang-Bok
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2009
  • With the wide usage of internet in many fields, networks are being exposed to many security threats, such as DDoS attack and worm/virus. For enterprise network, prevention failure of network security causes the revealing of commercial information or interruption of network services. In this paper, we propose a method of prevention of DDoS attacks for enterprise network based on traceback and network traffic analysis. The model of traceback implements the detection of IP spoofing attacks by the cooperation of trusted adjacent host, and the method of network traffic analysis implements the detection of DDoS attacks by analyzing the traffic characteristic. Moreover, we present the result of the experiments, and compare the method with other methods. The result demonstrates that the method can effectively detect and block DDoS attacks and IP spoofing attacks.

Design and Implementation of Super-peer P2P Overlay Network Protocol and System for mobile IPTV

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.295-300
    • /
    • 2010
  • Recent researches of network structure are moving to high-level networks because there are already many research results of low-level network. Especially, current network services has been changed to the multimedia service using multicast routing such as IPTV(Internet Protocol Television) service. And then previous multicast services were provider oriented. So previous multicast structures were organized server/client model. But future multicast services will make user oriented services. Therefore there will be many service providers in the future. At this point, we study P2P network for supporting multi provider. So we research load balancing and contents lookup protocols in P2P network. In this paper, we propose network protocol and system based on super peer P2P for load balancing and efficiently service search. And we considered mobile environment for mobile IPTV.

A Deep Learning Approach for Classification of Cloud Image Patches on Small Datasets

  • Phung, Van Hiep;Rhee, Eun Joo
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.3
    • /
    • pp.173-178
    • /
    • 2018
  • Accurate classification of cloud images is a challenging task. Almost all the existing methods rely on hand-crafted feature extraction. Their limitation is low discriminative power. In the recent years, deep learning with convolution neural networks (CNNs), which can auto extract features, has achieved promising results in many computer vision and image understanding fields. However, deep learning approaches usually need large datasets. This paper proposes a deep learning approach for classification of cloud image patches on small datasets. First, we design a suitable deep learning model for small datasets using a CNN, and then we apply data augmentation and dropout regularization techniques to increase the generalization of the model. The experiments for the proposed approach were performed on SWIMCAT small dataset with k-fold cross-validation. The experimental results demonstrated perfect classification accuracy for most classes on every fold, and confirmed both the high accuracy and the robustness of the proposed model.

Fuzzy Rule Identification System using Artifical Neural Networks (인공신경망을 이용한 퍼지 규칙 인식 시스템)

  • Jang, Mun-Seok;Jang, Deok-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.2
    • /
    • pp.209-214
    • /
    • 1995
  • It is very hard to identify the fuzzy rules and tune the membership functions of the fuzzy reasoning in fuzzy systems modeling .We propose a method which canautomatically identify the fuzzy rules and tune the membership functions of fuzzy reasoning simultaneously using artifical neural network. In this model,fuzzy rules are identified by backpropagation algorithm. The feasibility of the method is simulated by a simple robot manipulator.

  • PDF

Evaluation of Video Quality Based on Objectively Estimated Metric

  • Koumaras Harilaos;Kourtis Anastasios;Martakos Drakoulis
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.235-242
    • /
    • 2005
  • Multimedia applications and especially encoded video services, are expected to playa major role in the 3rd generation (3G) and beyond mobile communication systems. Given that future service providers are expected to provide video applications at various price and quality levels, quick and economically affordable methods for preparing/encoding the offering media at various qualities are necessary to be developed. This paper presents a method for objective evaluation of the perceived quality of MPEG­4 video content, based on a quantification of subjective assessments. Showing that subjectively derived perceived quality of service (PQoS) vs. bit rate curves can be successfully approximated by a group of exponential functions, the proposed method exploits a simple objective metric, which is obtained from the mean frame rate vs. bit rate curves of an encoded clip. The validity of this metric is assessed by comparing subjectively derived PQoS results to the corresponding ones, which come from the proposed objective method, showing that the proposed technique provides satisfactory PQoS estimation.

Machine to Machine Commerce(M2M Commerce) in the New Era of Network Convergence

  • Gauba, Mike
    • Information and Communications Magazine
    • /
    • v.20 no.11
    • /
    • pp.1550-1559
    • /
    • 2003
  • The convergence of fixed and wireless networks in data communication is providing the necessary driver for M2M commerce to take-off. The opportunities provided by M2M Commerce areonly limited by imagination. Automotive Fleet and Freight, Tolling, Water and Power Metering, Supply Chain Management including Asset Management, Remote Monitoring and Diagnostics, Energy Management and Access Control and Security are among the many M2M applications that are currently getting rolled out. ARC Group expects the worldwide solutions market to be worth in excess of US$ 100 billion by 2007. In addition, operator revenues worldwide from the transport of Telematics data alone will rise from US$ 3.5 billion in 2002 to US$ 78 billion by 2007. This paper discusses some of the lifestyle and business opportunities provided by M2M Commerce in the new ear of network convergence. It also provides some case studies to demonstrate the benefits of M2M Commerce across the supply chain. The key focus of the paper is on achieving enhanced lifestyle, cost reduction, improved profitability and enhanced customer relationship management through M2M Commerce.

Customer Oriented Hierachical Classification of Telecommunication Service (고객 지향적 통신서비스 계층분류체계)

  • 전덕빈;박명환;이인숙;윤종선;김선경;박윤서
    • Information and Communications Magazine
    • /
    • v.11 no.2
    • /
    • pp.123-132
    • /
    • 1994
  • For a telecommunication service evolution plan, it is necessary to analyze the types of the communication demands and to estimate the size of the market for each different demand types. In this paper, we classify the basic services in view of the customer needs the complementary services in terms of their functions and also the functional attributes for services, terminals and networks.

  • PDF