• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.035 seconds

An Efficient Scheme to Create Data Delivery Tree for Community Group Communication (커뮤니티 그룹 통신을 위한 효율적인 데이터 전달 트리 구성 방안)

  • Oh, Je-Jun;Kang, Nam-Hi;Kim, Yong-Hyuk;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.55-63
    • /
    • 2007
  • Multicast is an efficient transport mechanism for community communications and MANET is recently regarded as a promising solution for support ubiquitous computing as an underlying network technology. However, it is hard to deploy multicast mechanism into MANET owing to scarce resources in wireless networks and unpredictable changes in network topology. Several multicast mechanisms have been proposed in the literature to overcome the limitations. Especially, overlay multicasting schemes present several advantages over network based multicasting schemes. Yet, the overlay multicasting schemes still introduce redundant data transmissions that waste network bandwidth and battery of relay nodes. As a result the performance of the network is degraded. To reduce the redundancy, we propose an efficient way to construct an overlay structure as a multicast data delivery tree that utilizes a branch node which belongs to the tree. By using network simulation, we show that the proposed scheme presents higher packet delivery ratio and lower transmission cost than previously proposed schemes.

Performance Evaluation of Low Rate Wireless Home Network Embedded DSSS System (저속 무선 홈 네트워크 임베디드 DSSS 시스템의 성능 평가)

  • Roh, Jae-Sung
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.103-108
    • /
    • 2006
  • Short-range wireless communication and networking technologies are becoming increasingly important in enabling useful mobile applications. for example, ZigBee technology is expected to provide low cost and low power connectivity for equipment that needs battery life as long as several months to several years. In addition, ZigBee can be implemented in mesh networks larger than is possible with Bluetooth. The main features of this ZigBee standard are network flexibility, low cost, very low power consumption, and low data rate in an adhoc self-organizing network among fixed, portable and moving devices. Home network/Home automation is one of the key market areas for Zigbee, with an example of a simple network This paper investigates the effect of short range wireless channel on the performance of Zigbee system and DSSS-BPSK signal transmission in AWGN, interference and Rician fading environments. And we investigate performance degradation due to interference and fading effects in short range wireless channel. In particular, the impacts of the fading and interference level on the bit error probability is shown in BER performance figures.

  • PDF

A Virtual Mobile Ad-Hoc Network Model to Improve Internet Connectivity among Heterogeneous Mobile Devices (이종 모바일 기기들의 인터넷 접속을 개선할 수 있는 가상 모바일 애드혹 네트워크 모델)

  • Uddin, Jia;Kim, Jong-Myon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.31-41
    • /
    • 2014
  • This paper proposes a virtual mobile ad-hoc network (VMANET) model that automatically divides heterogeneous mobile devices of a MANET into a number of network groups depending on the communication capacity(data rate) of different network operational models such as IEEE 802.11g, IEEE 802.11b, and Frequency Hopping. In addition, it supports a distinct routing protocol for each network group of VMANETs, resulting in running multiple routing protocols concurrently on different groups of VMANETs. To reduce the network congestion and improve the network load balance, a default MANET gateway is configured in each VMANET and these gateways are responsible for integrating the MANET and IP networks. Experiment results show that the proposed model outperforms the conventional IMANET by significantly increasing throughput and reducing network congestion and network delay.

Polymer Waveguide Apodized Grating for Narrow-Bandwidth High-Reflectivity Wavelength Filters (협대역 고반사 파장 필터 구현을 위한 폴리머 광도파로 에포다이즈드 격자)

  • Lee, Won-Jun;Huang, Guanghao;Shin, Jin-Soo;Oh, Min-Cheol
    • Korean Journal of Optics and Photonics
    • /
    • v.26 no.4
    • /
    • pp.203-208
    • /
    • 2015
  • Wavelength filters are essential components for selecting a certain wavelength channel of a WDM optical communication system. To realize wavelength filters with narrow bandwidth and high reflectivity, an apodized grating structure with length of 15 mm and index modulation of $5{\times}10^{-4}$ was designed. The device exhibited a reflectivity of 95%, 3-dB bandwidth of 0.28 nm, and 20-dB bandwidth of 0.70 nm on an 18 mm grating length.

Propagation Models for Structural Parameters in Online Social Networks (온라인 소셜 네트워크에서 구조적 파라미터를 위한 확산 모델)

  • Kong, Jong-Hwan;Kim, Ik Kyun;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.125-134
    • /
    • 2014
  • As the social media which was simple communication media is activated on account of twitter and facebook, it's usability and importance are growing recently. Although many companies are making full use of its the capacity of information diffusion for marketing, the adverse effects of this capacity are growing. Because social network is formed and communicates based on friendships and relationships, the spreading speed of the spam and mal-ware is very swift. In this paper, we draw parameters affecting malicious data diffusion in social network environment, and compare and analyze the diffusion capacity of each parameters by propagation experiment with XSS Worm and Koobface Worm. In addition, we discuss the structural characteristics of social network environment and then proposed malicious data propagation model based on parameters affecting information diffusion. n this paper, we made up BA and HK models based on SI model, dynamic model, to conduct the experiments, and as a result of the experiments it was proved that parameters which effect on propagation of XSS Worm and Koobface Worm are clustering coefficient and closeness centrality.

Domain Analysis on the Field of Open Access by Co-Word Analysis (동시출현단어 분석 기반 오픈 액세스 분야 지적구조에 관한 연구)

  • Seo, SunKyung;Chung, EunKyung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.24 no.1
    • /
    • pp.207-228
    • /
    • 2013
  • Due to the advance of scholarly communication, the field of open access has been studied over the last decade. The purpose of this study is to analyze and demonstrate the field of open access via co-word analysis. The data set was collected from Web of Science citation database during the period from January 1998 to July 2012 using the Topic category. A total of 479 journal articles were retrieved and 8,643 noun keywords were extracted from the titles and abstracts. In order to achieve the purpose of this study, network analysis, clustering analysis and multidimensional scaling mapping were used to examine the domain and the sub-domains of open access field. 18 clusters in the network analysis are recognized and 4 clusters are shown in the map of multidimensional scaling. In addition, the centrality analysis in the weighted networks was used to explore the significant keywords in this field. The results of this study are expected to demonstrate and guide the intellectual structure and new approaches of open access field.

A Study on Security Capability of IDPS (침입 탐지 및 차단 시스템의 보안능력에 관한 연구)

  • Woo, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • With the rise of internet and e-commerce, this is more applicable now than ever. People rely on computer networks to provide them with news, stock prices, e-mail and online shopping. People's credit card details, medical records and other personal information are stored on computer systems. Many companies have a web presence as an essential part of their business. The research community uses computer systems to undertake research and to disseminate findings. The integrity and availability of all these systems have to be protected against a number of threats. Amateur hackers, rival corporations, terrorists and even foreign governments have the motive and capability to carry out sophisticated attacks against computer systems. Therefore, the field of information and communication security has become vitally important to the safety and economic well being of society as a whole. This paper provides an overview of IDS and IPS, their functions, detection and analysis techniques. It also presents comparison of security capability and characteristics of IDPS techniques. This will make basis of IDPS(Intrusion Detection and Protection System) technology integration for a broad-based IDPS solutions

Development of Real time Air Quality Prediction System

  • Oh, Jai-Ho;Kim, Tae-Kook;Park, Hung-Mok;Kim, Young-Tae
    • Proceedings of the Korean Environmental Sciences Society Conference
    • /
    • 2003.11a
    • /
    • pp.73-78
    • /
    • 2003
  • In this research, we implement Realtime Air Diffusion Prediction System which is a parallel Fortran model running on distributed-memory parallel computers. The system is designed for air diffusion simulations with four-dimensional data assimilation. For regional air quality forecasting a series of dynamic downscaling technique is adopted using the NCAR/Penn. State MM5 model which is an atmospheric model. The realtime initial data have been provided daily from the KMA (Korean Meteorological Administration) global spectral model output. It takes huge resources of computation to get 24 hour air quality forecast with this four step dynamic downscaling (27km, 9km, 3km, and lkm). Parallel implementation of the realtime system is imperative to achieve increased throughput since the realtime system have to be performed which correct timing behavior and the sequential code requires a large amount of CPU time for typical simulations. The parallel system uses MPI (Message Passing Interface), a standard library to support high-level routines for message passing. We validate the parallel model by comparing it with the sequential model. For realtime running, we implement a cluster computer which is a distributed-memory parallel computer that links high-performance PCs with high-speed interconnection networks. We use 32 2-CPU nodes and a Myrinet network for the cluster. Since cluster computers more cost effective than conventional distributed parallel computers, we can build a dedicated realtime computer. The system also includes web based Gill (Graphic User Interface) for convenient system management and performance monitoring so that end-users can restart the system easily when the system faults. Performance of the parallel model is analyzed by comparing its execution time with the sequential model, and by calculating communication overhead and load imbalance, which are common problems in parallel processing. Performance analysis is carried out on our cluster which has 32 2-CPU nodes.

  • PDF

A Inter-layer Path Provisioning System Architecture in Multi-layer Networks (다계층 광네트워크에서 계층간 경로설정 시스템 구조 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.25-31
    • /
    • 2013
  • Looking at the recent value change of users and the usage pattern of network users, it is changing from simple web information, one-way information acquisition and data transmission to increase of usage of multimedia, increasing demand for security and customization, and increasing demands for free mobility. Due to this change of demand, the services which were provided individually, developed into a form which is merged, the network also seems to develop into the combined network from the individual network for individual service, and the communication network control technology which is the core technology is also rapidly developing. To reflect the users' demands, the next generation network created the multi-layer network which is based on the WDM/IP transmission system and added the to make it easy to restructure. P-OTS (Packet-Optical Transport System) can be defined as a platform that combines SONET/SDH, Ethernet, DWDM, optical transport network (OTN) switching and reconfigurable optical add-drop multiplexers (ROADMs). In this paper, we suggested that the optimum path choice be performed through diversification of the PCE-based path selection using the information of various layers altogether in the multi-layer environment, compared with the established path selection method when the path was selected using the information of each layers.

Design and Implementation of Multipoint VoIP using End-point Mixing Model (단말혼합 방법을 이용하는 다자간 VoIP의 설계 및 구현)

  • Lee, Sung-Min;Lee, Keon-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.335-347
    • /
    • 2007
  • VoIP (Voice over IP) is a technology to transport video and voice traffic over IP networks such as Internet. Today, the VoIP technology is viewed as the right choice for providing voice, video, and data communication among various terminals over the next generation network. This paper discusses a multipoint VoIP implementation with end-point mixing model which can support multipoint conference without a conference bridge. The multipoint VoIP is implemented with SIP (Session Initiation Protocol), and supports STUN (Simple Traversal of UDP Through NATs) since it works in an asymmetric NAT (Network Address Translator) environment. The characteristics of this paper are as follows. It is possible that all terminals in the hierarchical conference don't receive the duplicated media information because we use the end-point mixing model with the new media processing module. And, the paper solves the problem that the hierarchical conference session should be separated into several sessions when a mixing terminal terminates the hierarchical conference session.

  • PDF