• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.035 seconds

Performance Analysis of Improved Movement-based Location Registration and Selective Paging Scheme (개선된 이동기준 위치등록과 선택적 페이징 방식의 성능분석)

  • Lim Seog-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.153-161
    • /
    • 2004
  • An efficient mobility management for mobile stations plays an important role in mobile communication networks. In this paper, we intend to improve the performance of the movement-based location update scheme which is simple to implement and shows good performance. The basic idea used in the proposed location update scheme is to avoid the location update if the mobile subscriber moves around the cell where the last location update was performed. This Is made possible by utilizing the simple movement history information. The performance of the proposed scheme is evaluated and compared with the movement-based location update scheme through simulation. The simulation results show that the proposed location update scheme provides the better performance compared with the movement-based location update scheme by minimizing the unnecessary location updates.

  • PDF

An Algorithm for Preventing Data Loss in Hand-off between Packet Networks of 3GPPx (3GPPx 패킷망간 핸드오프 시 데이터 유실 방지 알고리즘)

  • Choi Seung-Kwon;Ryu Jae-Hong;Ji Hong-IL;Hwang Byeong-Seon;Cho Young-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.237-242
    • /
    • 2005
  • In this paper, a fast handoff algorithm between PDSNs in 3GPPx network for a mobile node, is proposed. It introduces a method by which handoff can be performed without reestablishing PPP connection that may occur in the process of performing handoff between PDSNs. When the PDSN recognizes the mobile node moving into its coverage area, it can quickly establish a communication channel with the mobile node based on the already received subscriber information. As a result, handoff is performed without reestablishing PPP. Accordingly, handoff between PDSNs can be performed faster, removing time needed for establishing a PPP session with a terminal and for terminating a previously set up PPP session.

  • PDF

Efficient Scheduling Method based Cross-Layer on Mobile Communication Multimedia Environments (이동통신 멀티미디어 환경에서의 효율적인 크로스레이어 기반의 스케줄링 기법)

  • Kim, Joo-Seok;Kim, Hyung-Jung;Jo, Gweon-Do;Kim, Kyung-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.10
    • /
    • pp.1-9
    • /
    • 2007
  • Allocation and management of the resource is very important in wireless networks because the wireless resource is limited. Therefore, the importance of designing cross layer, which adapt between different layers, is on the rise. In this paper, we investigate the scheduling techniques of the cross layer. This paper researches conventional scheduling methods and proposes the complementary scheduling method. On multimedia environment, the scheduling method must be applied variably because of offering variable services. Therefore, this paper proposes the new scheduling method according to the variable services. The proposed method shows that utility efficiency of the wireless resource more excellent than the conventional method through the simulations.

Design of single rate Rate Adaptive Shaper Using FPGA (FPGA를 이용한 single rate Rate Adaptive Shaper 설계)

  • Park, Chun-Kwan
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.1
    • /
    • pp.70-78
    • /
    • 2006
  • This paper has addressed the scheme to design single rate Rate Adaptive Shaper (srRAS) proposed in RFC2963. srRAS is the shaper used in conjugation with downstream single rate Three Color Marker (srTCM) described in RFC269. it is tail-drop First Input First Out (FIFO) queue that is drained at a variable rate. srTCM meters IP packet streams from srRAS and marks its packets to be either green, yellow, or red. This shaper has been proposed to use at the ingress of differentiated services networks providing AF PHB. And then srRAS can reduce the burstiness of the upstream traffic of srTCM. This paper addresses algorithm, architecture of srRAS, and the scheme to implement srRAS using Field-Programmable Gate Arrays (FPGA) and the related technology.

  • PDF

A Study on the User Authentication and Key Exchange Service for Group Environment (그룹 환경의 사용자 인증 및 키 교환 서비스 프로토콜 연구)

  • Byun, Jin-Wook;Lee, Su-Mi;Lee, Dong-Hoon
    • Journal of Information Technology Services
    • /
    • v.8 no.2
    • /
    • pp.117-136
    • /
    • 2009
  • Over the years a password has been used as a popular authentication method between a client and a server because of its easy-to-memorize property. But, most password-based authentication services have focused on a same password authentication scheme which provides an authentication and key exchange between a client and a server with the same password. With rapid change of communication environments in the fields such as mobile networks, home networking, etc., the end-to-end security allowing users to hold different password is considered as one of main concerns. In this paper, we consider a new authentication service of how each client with different own password is able to authenticate each other, which is a quite new service paradigm among the existing services. This new service can be used in the current or next generation network environment where a mobile user in cell A wants to establish a secure end-to-end channel with users in ceil B, C, and D using only their memorable passwords. This end-to-end security service minimizes the interferences from the operator controlled by network components. To achieve this end-to-end security, we propose an authentication and key exchange service for group users in different realm, and analyze its security in a formal way. We also discuss a generic construction with the existing authentication schemes.

The Study of Sensor Network for Information Retrieval and Communication protocol High Performance (센서네트워크의 정보검색 및 통신프로토콜 성능향상에 관한 연구)

  • Kang, Jeong-Yong;Kwon, Hyuk-Dae;Roh, Yong-Gi;Kim, Byoung-Man
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.529-532
    • /
    • 2011
  • Recently research efforts for ubiquitous technology that includes RFID(Radio Frequency Deification and sensor networks are conducted very actively The architectural framework of the USN sensor network discovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology USN networking technology and USN middleware along with the service platform, With respect to each technological division domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research outputs. Boasted on the result of the survey we establish a USN software model that includes data sensing, sensor data storage sensor data storage sensor data naming and sensor feed name service. This main objective of this model is to provide a reference model for the facilitation of USN application developments.

  • PDF

A Study on Networks Applications improved Mobile P2P (개선된 모바일 P2P 네트워크 구현에 관한 연구)

  • Kim Yong-Hun;Park Jong-Min;Cho Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1458-1464
    • /
    • 2005
  • A P2P is a method that can share and exchange on digital resources through a direct connection on personnel without a central server. In this paper, Although the P2P application that uses our proposed framework should obtain one or more IP addresses of the neighbor peers manually, after instantiate, the application can do its job while maintaining connection to the network continuously and automatically. To evaluate our proposed scheme, we measured and analyzed the time for a peer to reconnect to the network when the mediating peer fails and the network isolation occurs.

A Study on the Architecture of Edge Optical Label Switched Router in Optical Internet (광인터넷에서의 Edge Optical Label Switched Router의 구조에 관한 연구)

  • 최규봉;이현태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1257-1262
    • /
    • 2001
  • In recent years there has been a lot of interest in carrying IP over WDM networks in an efficient manner. The benefits here include larger bandwidth capacities, better network scalability, and more efficient operation. W based approach, termed "lambda-labeling" is presented for direct If over WDM integration. In this paper, we study on architecture approach method consider of optical Internet evolution that based on MPLamdaS conception of IETF. Label stack conception collect electronic LSP of optical LSP. This paper is proposed method of co-operation between MPLS domain and MPLambdaS domain. Additionally, proposed architecture of Edge Optical LSR.tical LSR.

  • PDF

Network Costing Model Alternatives for Reasonable Interconnection Charging Between Networks (합리적 접속료산정을 위한 통신망비용모형 수립방안)

  • 권수천
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.5
    • /
    • pp.907-917
    • /
    • 2000
  • In this paper the network costing model alternatives for reasonable interconnection charging are suggested. The current interconnection charge regimes is based on fully distributed costing method. Basically this method doesn't consider the common carrier's efficient network cost because it reflects the actual cost of network In this paper, 1 suggest the basic structure of the network costing model fur applications of incremental costing method that considers the efficient cost based on economics-prospective. And I classify network cost with capital cost and operating cost and analysis their reasonable costing methods.

  • PDF

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.