• Title/Summary/Keyword: network base control

Search Result 355, Processing Time 0.022 seconds

The Study of Hierarchical Intrusion Detection Based on Rules for MANET (MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구)

  • Jung, Hye Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

Auto-tuning of PID Controller using Neural Network (신경회로망을 이용한 PID 제어기 자동동조)

  • Oh, Hun;Choi, Seok-Ho;Yoon, Yang-Woong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.12 no.3
    • /
    • pp.7-13
    • /
    • 1998
  • In this paper, the control technique that ID controller are autotuned according to system dynamics, driving out sample in the changeable limits of system dynamics and learning neural network, is presented. In order to lean neural network, the backpropagation learning algorithm is used and the controller parameters obtained by rule-base are used as teacher's values. When load changes, the auto-tuning of PID controller proper to system dynamics is conformed by simulation.

  • PDF

Cloud Radio Access Network: Virtualizing Wireless Access for Dense Heterogeneous Systems

  • Simeone, Osvaldo;Maeder, Andreas;Peng, Mugen;Sahin, Onur;Yu, Wei
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.135-149
    • /
    • 2016
  • Cloud radio access network (C-RAN) refers to the virtualization of base station functionalities by means of cloud computing. This results in a novel cellular architecture in which low-cost wireless access points, known as radio units or remote radio heads, are centrally managed by a reconfigurable centralized "cloud", or central, unit. C-RAN allows operators to reduce the capital and operating expenses needed to deploy and maintain dense heterogeneous networks. This critical advantage, along with spectral efficiency, statistical multiplexing and load balancing gains, make C-RAN well positioned to be one of the key technologies in the development of 5G systems. In this paper, a succinct overview is presented regarding the state of the art on the research on C-RAN with emphasis on fronthaul compression, baseband processing, medium access control, resource allocation, system-level considerations and standardization efforts.

A Study on the Collaboration Design System Operation and Component Using the Network in Architectural Design (건축계획에서 네트워크 구축을 통한 공동설계의 운영과 구성에 관한 연구)

  • 조성오
    • Korean Institute of Interior Design Journal
    • /
    • no.18
    • /
    • pp.9-15
    • /
    • 1999
  • Computers and internet have the potential to radically development. But, computer is a just tool by itself. This study is control implement in a way that exploits the capacity of network of processors to execute many tasks concurrently in architectural desigv. The collaboration design system constituted integrated CAD (computer-aided design) system at the base of standardization database environment network and world wide web (WWW). Collaboration design management system is composed of Project Management, Part Management, Process Management , and Appraisement system. They can provide frameworks for effective coordination and management of design work in accordance with the Collaboration Design Support System operating rule accommodatingly. architectural data can be collaboration design environment accessible through a web browser and located at a server. whenever their work investigated each others. Throughout process, the database acted as an individual design and it made them available in realtime. And they can have quick overview of the work. That way a continuous evaluation of best design was distinctly and highly. In the future, New architectural design methods are collaboration environment could result in productivity and quality.

  • PDF

Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks

  • Aldabbagh, Ghadah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.152-161
    • /
    • 2021
  • The paper focuses on Device-to-device (D2D) Architectures evaluation frameworks. D2D communication and discovery can improve spectrum usage efficiency and optimize the tradeoffs between throughput and energy consumption. The target operation modes involve both indirect communication between two nodes via a base station or the direct communication among proximal nodes, enabling use cases that can support communications out of cellular coverage, as well as low end-end delay requirements. The paper will present the architectural evolution of D2D networks within 3GPP standardization and will highlight key network functionalities and signaling protocols. It will also identify key analytical and simulation models that can be used to assess the performance and energy efficiency of resource allocation strategies, and it will present a suitable cross-layer integrated framework.

A Study on the Hierarchical Configuration of Ground Station for the Satellite Based Data Distribution Service (위성 동보 서비스를 위한 지구국의 계층화 구성에 관한 연구)

  • Hong, Wan-Pyo;Kim, Jeong-Ho;Na, Keuk-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1257-1263
    • /
    • 1998
  • To realize a highly reliable satellite-base data distribution system efficiently, a hierarchical distributed control network which utilizers a sub control station(SCS) in addition to a hub and a user station(US) is proposed and evaluated. The results show that there exists an optimum number of sub control stations that minimizes the polling processing time as a parameter of the processing time ratio between US-SCS and SCS-CS links. From a viewpoint of the control network cost, it is shown that the cost can be less compared to the conventional one, when the communication cost between the US and SCS is slightly reduced.

  • PDF

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

An Autonomous Power Control Scheme of Femto Cells for Throughput Improvement and Overhead Reduction in Heterogeneous Networks (이종망 환경에서 오버헤드 감소와 수율 향상을 위한 자율적인 펨토셀 전송 전력 조절 기법)

  • Jo, Younghoon;Lim, Jaechan;Hong, Daehyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.1
    • /
    • pp.26-33
    • /
    • 2013
  • Femto-cells are low power/cost, micro-base stations and are main components in heterogeneous networks. However, some of technical issues arise when femto-cells are initially installed. One approach to resolve the problems is to control the transmission (TX) power autonomously via SON(Self-Organized Network) scheme. By controlling the femto-cell TX power, the system throughput performance can be improved or the system overhead is highly reduced. Generally, the TX power for maximizing the system throughput and that for reduced system overhead may not be identical. Therefore, we propose a TX power control scheme by which we can improve the system throughput and reduce the system overhead, simultaneously. When we apply the proposed method, the simulation results show that the system overhead can be reduced by up to 41% compared to the performance of the method which maximizes throughput performance only, and the throughput performance can be improved by up to 63% compared to that of the method which only optimizes the coverage area.

The Performance Analysis of Cognitive-based Overlay D2D Communication in 5G Networks

  • Abdullilah Alotaibi;Salman A. AlQahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.178-188
    • /
    • 2024
  • In the near future, it is expected that there will be billions of connected devices using fifth generation (5G) network services. The recently available base stations (BSs) need to mitigate their loads without changing and at the least monetary cost. The available spectrum resources are limited and need to be exploited in an efficient way to meet the ever-increasing demand for services. Device to Device communication (D2D) technology will likely help satisfy the rapidly increasing capacity and also effectively offload traffic from the BS by distributing the transmission between D2D users from one side and the cellular users and the BS from the other side. In this paper, we propose to apply D2D overlay communication with cognitive radio capability in 5G networks to exploit unused spectrum resources taking into account the dynamic spectrum access. The performance metrics; throughput and delay are formulated and analyzed for CSMA-based medium access control (MAC) protocol that utilizes a common control channel for device users to negotiate the data channel and address the contention between those users. Device users can exploit the cognitive radio to access the data channels concurrently in the common interference area. Estimating the achievable throughput and delay in D2D communication in 5G networks is not exploited in previous studies using cognitive radio with CSMA-based MAC protocol to address the contention. From performance analysis, applying cognitive radio capability in D2D communication and allocating a common control channel for device users effectively improve the total aggregated network throughput by more than 60% compared to the individual D2D throughput without adding harmful interference to cellular network users. This approach can also reduce the delay.

A design and implementation of the traffic source model considering user's moving characteristics in urban areas (도시 사용자 이동특성을 고려한 traffic source model의 설계 및 구현)

  • 유기홍
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1373-1382
    • /
    • 2001
  • Traditionally, Mobile Teletraffic model consists of two sub-models, i.e. the network traffic model and the traffic source model. In this paper, we present the traffic source model by developing MobCall(Mobile Call Simulator) which analyses various mobile wireless environments based on regional characteristics that the base stations are located. User mobility is presented by regional average vehicle speeds and the transportation share rate. Moreover, the user mobility on subway, which is increasing in urban area, is considered in MobCall. Using MobCall, the accumulated number of calls in residential and commercial regions, the handoff rate with respect to traffic sources of Seoul, the handoff rate on highway, and the handoff rate according to the call duration are presented. MobCall enables the simulation of dynamic handoff buffering and functional entity control of one base station according to the changes in user's calling pattern at the design phase.

  • PDF