• Title/Summary/Keyword: communication networks

Search Result 5,474, Processing Time 0.03 seconds

Session Control Technique Providing Seamless Service in Next-Generation Communication Environment Based on IMS (IMS 기반 차세대 통신 환경에서 서비스 연속성을 위한 서비스 세션제어 기법)

  • Nam, Seung-Min;Kim, Ji-Ho;Lee, Hyun-Jeong;Song, Oh-Young
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.117-124
    • /
    • 2009
  • Recently, the application of network technology extends to all areas because of development of digital information technology. Thus, networks are being evolved towards a next-generation communication environments where all information devices, home appliances, and object are connected and interoperated. In order to provide adequate convergence services in IMS-based networks that are the core technology of the next-generation communication environments, seamless service should be possible although the underlying network and the device in use may change in the networks. In this paper, we propose an efficient architecture, algorithm, and protocol of service session control for seamless service in such networks.

A Novel Shared Segment Protection Algorithm for Multicast Sessions in Mesh WDM Networks

  • Lu, Cai;Luo, Hongbin;Wang, Sheng;Li, Lemin
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.329-336
    • /
    • 2006
  • This paper investigates the problem of protecting multicast sessions in mesh wavelength-division multiplexing (WDM) networks against single link failures, for example, a fiber cut in optical networks. First, we study the two characteristics of multicast sessions in mesh WDM networks with sparse light splitter configuration. Traditionally, a multicast tree does not contain any circles, and the first characteristic is that a multicast tree has better performance if it contains some circles. Note that a multicast tree has several branches. If a path is added between the leave nodes on different branches, the segment between them on the multicast tree is protected. Based the two characteristics, the survivable multicast sessions routing problem is formulated into an Integer Linear Programming (ILP). Then, a heuristic algorithm, named the adaptive shared segment protection (ASSP) algorithm, is proposed for multicast sessions. The ASSP algorithm need not previously identify the segments for a multicast tree. The segments are determined during the algorithm process. Comparisons are made between the ASSP and two other reported schemes, link disjoint trees (LDT) and shared disjoint paths (SDP), in terms of blocking probability and resource cost on CERNET and USNET topologies. Simulations show that the ASSP algorithm has better performance than other existing schemes.

  • PDF

ITU-R Study on Frequency Sharing for Mobile Satellite Services (ITU-R의 이동위성업무 주파수 공유 연구 현황)

  • B.J. Ku;D.S. Oh
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.1
    • /
    • pp.55-64
    • /
    • 2023
  • Recently, preparations for 6G have led to the increasing interest in integrated or hybrid communication networks considering low-orbit satellite communication networks with terrestrial mobile communication networks. In addition, the demand for frequency allocation for new mobile services from low-orbit small satellites to provide global internet of things (IoT) services is increasing. The operation of such satellites and terrestrial mobile communication networks may inevitably cause interference in adjacent bands and the same band frequency between satellites and terrestrial systems. Focusing on the results of the recent ITU-R WP4C meeting, this study introduces the current status of frequency sharing and interference issues between satellites and terrestrial systems, and frequency allocation issues for new mobile satellite operations. Coexistence and compatibility studies with terrestrial IMT in L band and 2.6 GHz band, operated by Inmassat and India, respectively, and a new frequency allocation study (WRC-23 AI 1.18) are carried out to reflect satellite IoT demand. For the L band, technical requirements have been developed for emission from IMT devices at 1,492 MHz to 1,518 MHz to bands above 1,518 MHz. Related studies in the 2 GHz and 2.6 GHz bands are not discussed due to lack of contributions at the recent meeting. In particular, concerning the WRC-23 agenda 1.18 study on the new frequency allocation method of narrowband mobile satellite work in the Region 1 candidate band 2,010 MHz to 2,025 MHz, Region 2 candidate bands 1,695 MHz to 1,710 MHz, 3,300 MHz to 3,315 MHz, and 3,385 MHz to 3,400 MHz, ITU-R results show no new frequency allocation to narrow mobile satellite services. Given the expected various collaborations between satellites and the terrestrial component are in the future, interference issues between terrestrial IMT and mobile satellite services are similarly expected to continuously increase. Therefore, participation in related studies at ITU-R WP4C and active response to protect terrestrial IMT are necessary to protect domestic radio resources and secure additional frequencies reflecting satellite service use plans.

Design of Industrial Communication Gateway Using Additive Layer Type Communication Module (적층형 통신 모듈을 이용한 산업용 통신 게이트웨이 설계)

  • Nam, Jae-Hyun;Eum, Sang-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1673-1678
    • /
    • 2019
  • There are various networks and communication methods are used in industrial communication. Enterprises need to convert communications between industrial devices and networks for production line expansion, factory upgrades, network segmentation, and SI. This requires designers manufactured by many manufacturers to provide communication equipment for data or protocol conversion in order to connect and transmit various other mechanical devices to the network. This paper designed industrial communication gateway that can support the transformation of industrial communication protocol using multi-layered communication module. Industrial communication gateways have a structure that connects individual communication modules using RS485 communication to multiple layers. Each communication module consisted of analog and digital data card, LAN, and CAN-enabled card. The main board processor used Atmega micro-processor, and the RS485 slot was placed to have a multi-layer communication module structure. These additive layer type communication modules support analog and digital I/O functions and LAN and CAN for wide use in industrial communication control and monitoring.

Performance Analysis of IEEE 802.15.6 MAC Protocol in Beacon Mode with Superframes

  • Li, Changle;Geng, Xiaoyan;Yuan, Jingjing;Sun, Tingting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1108-1130
    • /
    • 2013
  • Wireless Body Area Networks (WBANs) are becoming increasingly important to solve the issue of health care. IEEE 802.15.6 is a wireless communication standard for WBANs, aiming to provide a real-time and continuous monitoring. In this paper, we present our development of a modified Markov Chain model and a backoff model, in which most features such as user priorities, contention windows, modulation and coding schemes (MCSs), and frozen states are taken into account. Then we calculate the normalized throughput and average access delay of IEEE 802.15.6 networks under saturation and ideal channel conditions. We make an evaluation of network performances by comparing with IEEE 802.15.4 and the results validate that IEEE 802.15.6 networks can provide high quality of service (QoS) for nodes with high priorities.

A Study on Secure Routing for a Maritime Network Based on Mobile Multi-hop Wireless Networks (이동 다중 홉 무선망 모델에 기반한 해양통신망을 위한 경로배정 보안 연구)

  • Mun, Seong-Mi;Son, Joo-Young
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.33 no.1
    • /
    • pp.120-130
    • /
    • 2009
  • In recent years, many mobile wireless communication devices and applications have been deployed on the planet. The mobile multi-hop wireless network models appeared to provide means to access to networks where few infrastructure exists. However, the mobile multi-hop wireless networks have weaker points in attacks and intrusions than the wired and one-hop wireless networks. In this paper, the secure routing issues in most mobile multi-hop wireless network models are surveyed in depth. The state-of-the-art technologies and research activities are explained. Finally, the issues and technologies for the secure routing specific to a maritime network model are sufficiently discussed as conclusions.

Ant-based Routing in Wireless Sensor Networks (개미 시스템을 이용한 무선 센서 네트워크 라우팅 알고리즘 개발)

  • Ok, Chang-Soo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.35 no.2
    • /
    • pp.53-69
    • /
    • 2010
  • This paper proposes an ant-based routing algorithm, Ant System-Routing in wireless Senor Networks(AS-RSN), for wireless sensor networks. Using a transition rule in Ant System, sensors can spread data traffic over the whole network to achieve energy balance, and consequently, maximize the lifetime of sensor networks. The transition rule advances one of the original Ant System by re-defining link cost which is a metric devised to consider energy-sufficiency as well as energy-efficiency. This metric gives rise to the design of the AS-RSN algorithm devised to balance the data traffic of sensor networks in a decentralized manner and consequently prolong the lifetime of the networks. Therefore, AS-RSN is scalable in the number of sensors and also robust to the variations in the dynamics of event generation. We demonstrate the effectiveness of the proposed algorithm by comparing three existing routing algorithms: Direct Communication Approach, Minimum Transmission Energy, and Self-Organized Routing and find that energy balance should be considered to extend lifetime of sensor network and increase robustness of sensor network for diverse event generation patterns.

Performance Analysis of Virtual Circuit Services Using Open Queuing Network Models (오픈 큐잉 네트워크 모델을 이용한 가상회선 서비스 성능 분석)

  • 조용구;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.3
    • /
    • pp.225-231
    • /
    • 1992
  • In this paper, queuing networks with open chains are considerd to analyze the performance of packet switching networks. Networks are classified into backbone and local access networks. Networks for performance analysis are distributed to twelve regions and DNS is the backbone. Analysis was conducted using the real values from the input to existing networks and mathematical estimation values. As the result of analysis, the mean of end-to-and delay for each chain was presented. Except special regions, we found that there was a little difference between real values and mathematical estimation values. However, there could be a performance problem in total networks due to the increase of communication volumes in each region. So we proposed some solutions to this problem.

  • PDF

Applying Hebbian Theory to Enhance Search Performance in Unstructured Social-Like Peer-to-Peer Networks

  • Huang, Chester S.J.;Yang, Stephen J.H.;Su, Addison Y.S.
    • ETRI Journal
    • /
    • v.34 no.4
    • /
    • pp.591-601
    • /
    • 2012
  • Unstructured peer-to-peer (p2p) networks usually employ flooding search algorithms to locate resources. However, these algorithms often require a large storage overhead or generate massive network traffic. To address this issue, previous researchers explored the possibility of building efficient p2p networks by clustering peers into communities based on their social relationships, creating social-like p2p networks. This study proposes a social relationship p2p network that uses a measure based on Hebbian theory to create a social relation weight. The contribution of the study is twofold. First, using the social relation weight, the query peer stores and searches for the appropriate response peers in social-like p2p networks. Second, this study designs a novel knowledge index mechanism that dynamically adapts social relationship p2p networks. The results show that the proposed social relationship p2p network improves search performance significantly, compared with existing approaches.

Design and Evaluation of a Weighted Intrusion Detection Method for VANETs (VANETs을 위한 가중치 기반 침입탐지 방법의 설계 및 평가)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.181-188
    • /
    • 2011
  • With the rapid proliferation of wireless networks and mobile computing applications, the landscape of the network security has greatly changed recently. Especially, Vehicular Ad Hoc Networks maintaining network topology with vehicle nodes of high mobility are self-organizing Peer-to-Peer networks that typically have short-lasting and unstable communication links. VANETs are formed with neither fixed infrastructure, centralized administration, nor dedicated routing equipment, and vehicle nodes are moving, joining and leaving the network with very high speed over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connection without centralized control. In this paper, we propose a weighted intrusion detection method using rough set that can identify malicious behavior of vehicle node's activity and detect intrusions efficiently in VANETs. The performance of the proposed scheme is evaluated by a simulation study in terms of intrusion detection rate and false alarm rate for the threshold of deviation number ${\epsilon}$.