• Title/Summary/Keyword: network separation

Search Result 309, Processing Time 0.021 seconds

Identification of mobile terminal for mobility support in all-IP Network (All-IP 기반 이동성 지원 네트워크에서 이동 단말 식별 체계)

  • Kim, Sang-Eon;Park, Se-Jun;Chang, Byung-Soo;Lee, Sang-Hong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.318-322
    • /
    • 2005
  • An IP address plays both endpoint identifier and location identifier in wire based network. However, one IP address can not provide both endpoint identifier and location identifier for mobile Internet environment such as cellular network and portable Internet. To resolve this problem, mobile IPv4 and mobile IPv6 technologies are developed. These technologies are based on the concept of separation the endpoint identifier from location identifier. This paper describes some results of the recent studies such as mobile IPv4, mobile IPv6, host identify protocol and so on. Also, we propose the criteria to decide which technologies are suitable for deployment in the practical network environment.

  • PDF

Energy Aware Routing Protocol over Wireless Sensor Network (센서 네트워크에서 에너지 보유량을 고려한 라우팅 프로토콜)

  • Choi, Hae-Won;Yoo, Kee-Young
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.28-34
    • /
    • 2008
  • This paper reports the problem in the previous routing protocol, EAR, and proposes an energy aware routing protocol to solve the problem in it. Proposed routing protocol considers the number of hops, the possibility of node exhaustion, and the node energy amount at the same time from the source to the sink. Thereby, it could efficiently solve the potential network separation problem and the sensing hole problem in EAR. Proposed routing protocol could remove the problems in the previous routing protocols but it still gets the advantages in them.

  • PDF

A Systematic Treat Model for Software-Defined Networking

  • Zhang, Wenbin;Wu, Zehui;Wei, Qiang;Yuan, Huijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.580-599
    • /
    • 2021
  • Software-Defined Networking (SDN) has three key features: separation of control and forwarding, centralized control, and network programmability. While improving network management flexibility, SDN has many security issues. This paper systemizes the security threats of SDN using spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege (STRIDE) model to understand the current security status of SDN. First, we introduce the network architecture and data flow of SDN. Second, we analyze security threats of the six types given in the STRIDE model, aiming to reveal the vulnerability mechanisms and assess the attack surface. Then, we briefly describe the corresponding defense technologies. Finally, we summarize the work of this paper and discuss the trends of SDN security research.

Artificial neural network for safety information dissemination in vehicle-to-internet networks

  • Ramesh B. Koti;Mahabaleshwar S. Kakkasageri;Rajani S. Pujar
    • ETRI Journal
    • /
    • v.45 no.6
    • /
    • pp.1065-1078
    • /
    • 2023
  • In vehicular networks, diverse safety information can be shared among vehicles through internet connections. In vehicle-to-internet communications, vehicles on the road are wirelessly connected to different cloud networks, thereby accelerating safety information exchange. Onboard sensors acquire traffic-related information, and reliable intermediate nodes and network services, such as navigational facilities, allow to transmit safety information to distant target vehicles and stations. Using vehicle-to-network communications, we minimize delays and achieve high accuracy through consistent connectivity links. Our proposed approach uses intermediate nodes with two-hop separation to forward information. Target vehicle detection and routing of safety information are performed using machine learning algorithms. Compared with existing vehicle-to-internet solutions, our approach provides substantial improvements by reducing latency, packet drop, and overhead.

Enhanced Operator Authentication Method in SCADA Control Network (SCADA제어망에서 강화된 운용자 인증 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.416-424
    • /
    • 2019
  • The authentication technologies used to access computers in both IT and operational technology (OT) network areas include ID/PW, public certificate, and OTP. These authentication technologies can be seen as reflecting the nature of the business-driven IT network. The same authentication technologies is used in SCADA control networks where the operational technology is centered. However, these authentication technologies do not reflect the characteristics of the OT control network environment, which requires strict control. In this paper, we proposed a new enhanced user authentication method suitable for the OT SCADA control network centered on control information processing, utilizing the physical terminal address and operator location information characteristics of the operator's mobile terminal and control network.

Preparation of Composite Membranes of Dense PAA-Poly(BMA-co-MMA) IPN Supported on Porous and Crosslinked Poly(BMA-co-MMA) Sublayer and Their Pervaporation Characteristics

  • Kim, Sung-Chul;Lim, Byung-Yun
    • Macromolecular Research
    • /
    • v.11 no.3
    • /
    • pp.163-171
    • /
    • 2003
  • For the pervaporation of water-ethanol mixtures, new composite membranes having poly(acrylic acid)-poly (butyl methacrylate-co-methyl methacrylate) interpenetrati ng polymer network [PAA-P(BMA-co-MMA) IPN] skin layer supported on porous and crosslinked poly(BMA-co-MMA) were prepared. The morphology of the sub-layer of the composite membrane prepared in the presence of 60 wt% solvent showed cellular structure, on the other hand that of sublayer prepared in the presence of 70 wt% solvent presented very porous interconnected pore structure with macrovoids. Permeation rates of the composite membranes were largely influenced by the morphology of the sublayer. Separation factors increased with the increase of the degree of crosslinking of the PAA network. It was found that permeation rates could be increased by introducing anionic charges on carboxyl groups of the PAA. The permeation rate changes of the PAA-P(BMA-co-MMA) IPN composite membranes according to the feed compositions showed quite similar pattern with the swelling behavior in water-ethanol mixtures.

A Model-based Rate Separation Algorithm Using Multiple Channels in Multi-Radio Ad Hoc Networks (멀티 라디오 애드혹 네트워크에서의 멀티 채널을 이용한 모델 기반 레이트 분할 알고리즘)

  • Kim, Sok-Hyong;Kim, Dong-Wook;Suh, Young-Joo;Kwon, Dong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1A
    • /
    • pp.73-81
    • /
    • 2011
  • IEEE 802.11 PHY and MAC layer provide multiple channels and data rates. To improve the performance of IEEE 802.11 multi-radio ad hoc networks, it is required to utilize available channels and data rates efficiently. However, in IEEE 802.11 multi-rate networks, the rate anomaly (RA) problem occurs that the network performance is severely degraded as low-rate links affect high-rate links. Hence, in this paper, we propose a model-based rate separation (MRS) algorithm that uses multiple channels to separate different data rate links so that the RA problem is mitigated. MRS algorithm utilizes an existing throughput model that estimates the throughput of IEEE 802.11 single-hop networks to separate low-rate links and high-rate links. Through simulations, we demonstrate that the MRS algorithm shows improved network performance compared with existing algorithms in multi-radio ad hoc networks.

LISP based IP Address Virtualization Technique for Resource Utilization on Virtualized SDN (가상화된 SDN에서 효과적인 자원 활용을 위한 LISP 기반 IP 주소 가상화 기법)

  • Go, Youngkeun;Yang, Gyeongsik;Yu, Bong-yeol;Yoo, Chuck
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1404-1411
    • /
    • 2016
  • Network virtualization is a technique that abstracts the physical network to provide multiple virtual networks to users. Virtualized network has the advantage to offer flexible services and improve resource utilization. In SDN architecture, network hypervisor serves to virtualize the network through address virtualization, topology virtualization and policy virtualization. Among them, address virtualization refers to the technique that provides an independent address space for each virtual network. Previous work divided the physical address space, and assigned an individual division to each virtual network. Each virtual address is then mapped one-to-one to a physical address. However, this approach requires a lot of flow entries, thus making it disadvantageous. Since SDN switches use TCAM (Ternary Contents Addressable Memory) for the flow table, it is very important to reduce the number of flow entries in the aspect of cost and scalability. In this paper, we propose a LISP based address virtualization, which separates address spaces for the physical and virtual addresses and transmits packet through tunneling, in order to resolve the limitation of the previous studies. By implementing a prototype, we show that the proposed scheme provides better scalability.

Mobility Support Architecture in Locator-ID Separation based Future Internet using Proxy Mobile IPv6

  • Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.2
    • /
    • pp.209-217
    • /
    • 2014
  • Of several approaches for future Internet, separating two properties of IP address into locator and identifier, is being considered as a highly likely solution. IETF's LISP (Locator ID Separation Protocol) is proposed for this architecture. In particular, the LISP model easily allows for device mobility through simple update of information at MS (Mapping Server) without a separate protocol. In recent years, some of the models supporting device mobility using such LISP attributes have emerged; however, most of them have the limitation for seamless mobility support due to the frequent MS information updates and the time required for the updates. In this paper, PMIPv6 (Proxy Mobile IPv6) model is applied for mobility support in LISP model. PMIPv6 is a method that can support mobility based on network without the help of device; thus, this we define anew the behavior of functional modules (LMA, MAG and MS) to fit this model to the LISP environment and present specifically procedures of device registration, data transfer, route optimization and handover. In addition, our approach improves the communication performance using three tunnels identified with locators between mobile node and corresponding node and using a route optimized tunnel between MN's MAG and CN's MAG. Finally, it allows for seamless mobility by designing a sophisticated handover procedure.

Separation of Subpatern and Recognition of Hanguel Patterns by Analysis of Feature of Contacting Phonemes (자소 접촉특성 분석에 의한 한글패턴의 부분분리 및 인식)

  • Koh, Chan;Chin, Yong-Ohk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.7
    • /
    • pp.618-627
    • /
    • 1990
  • In this paper a new algorithm for separation of contacting subpattern and connective feature extraction of strokes is proposed. This algorithm is able to classification of the type of contacting parts, connective feature extreaction of strokes, separate the phoneme of contacting parts between strokes, classify the character types by feature classification of connecting parts and analysis of connecting attribute. Also, shape normalize into formal patterns and decide on the input pattern from position value of bending feature of this normalized shape and make an recognition experiment by neural network using BEP learining algorithm. This algorithm represents the good achievement ratio by separation of phoneme, classification of character type, connective feature extraction of stroke and recognition experiment.

  • PDF