• Title/Summary/Keyword: network-based distributed control system

Search Result 285, Processing Time 0.021 seconds

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

Performance analysis of call control processor according to SAAL funtion distribution in ATM switching system (ATM 교환기에서 SAAL 기능 분산에 따른 호처리 프로세서의 성능 분석)

  • 여환근;송광석;노승환;기장근
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.2
    • /
    • pp.31-39
    • /
    • 1998
  • In this paper, we have presented a quantitative performance effect of CCP(Call Control Processor) when SAAL(Signalling ATM Adaptation Layer) function is distributed from CCP to SIMs(Subscriber Interface Modules) in an ATM switching system with distributed architecutre. For the performance analysis, SLAM II simulation language is used and subscriber signalling messageand inter-processor communication messages according to Q.2931 based local call processing procedure are taken into consideration in the proposed queuing network model. The results of simulation are compared with in case of processing SAAL function on CCP. It is observed that the processing utilization of CCP reach 24,000 BHCA and 25,700 BHCAwhen SAAL function load amounts to 10% and 20% of the processing time of the total message, respectively. These values shows that the processing utilization of CCP is alleviated about 7% in comparison with 2,000 BHCA in case that SAAL function is carried out on CCP. Consquently, it is shown that we have to consider seriously how to distribute the functions concerning call processing in a large cale ATM switching system architecture accomodating a number of SIMs.

  • PDF

Designed and Implementation of Layered Configuration Management for the Efficient Management of Intranet (효율적인 인트라넷 관리를 위한 계층적 구성 관리 시스템 설계 및 구현)

  • 라연경;김호철;서승호;문해은;김영탁
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1228-1237
    • /
    • 2002
  • Network management is composed of five major functional areas, fault, configuration, account, performance and security management in the ITU standards. Configuration management identifies, exercises control over, collects data from network element node system and provides data to the management systems. The proposed architecture is designed based on the Distributed Processing Environment of CORBA(Common Object Request Broker Architecture) Spec v2.3. In this paper, configuration management system has been designed and implemented with layered managed object. It provides that integrated management of various data link layer technology. We suggest MIB(Management Information Base)/MIT(Management Information Tree) to support integrated management and distributed environment.

Adaptive OLSR Protocol Based on Average Node Distance in Airdropped Distributed Mobility Model (분산 낙하 이동 모델에서의 평균 노드 거리 기반 적응적 OLSR 프로토콜)

  • Lee, Taekmin;Lee, Jinhae;Wang, Jihyeun;Yoo, Joonhyuk;Yoo, Seong-eun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.2
    • /
    • pp.83-91
    • /
    • 2018
  • With the development of IT (Information Technology) technology, embedded system and network technology are combined and used in various environments such as military environment as well as everyday life. In this paper, we propose a new airdropped distributed mobility model (ADMM) modeling the dispersion falling of the direct shot of a cluster bomb, and we compare and analyze some representative MANET routing protocols in ADMM in ns-3 simulator. As a result of the analysis, we show OLSR routing protocol is promising in ADMM environment in the view points of packet delivery ratio (PDR), end to end delay, and jitter. In addition, we propose a new adaptation scheme for OLSR, AND-OLSR (Average Node Distance based adaptive-OLSR) to improve the original OLSR in ADMM environment. The new protocol calculates the average node distance, adapts the period of the control message based on the average node distance increasing rate. Through the simulation study, we show that the proposed AND-OLSR outperforms the original OLSR in PDR and control message overhead.

Distributed Social Medical IoT for Monitoring Healthcare and Future Pandemics in Smart Cities

  • Mansoor Alghamdi;Sami Mnasri;Malek Alrashidi;Wajih Abdallah;Thierry Val
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.135-155
    • /
    • 2024
  • Urban public health monitoring in smart cities focuses on the control of conditions and health challenges in urban environments. Considering the rapid spread of diseases and pandemics, it is important for health authorities to trace people carrying the virus. In smart cities, this tracing must be interoperable and intelligent, especially in indoor surfaces characterized by small distances between people. Therefore, to fight pandemics, it is necessary to start with the already-existing digital equipment of the Internet of Things, such as connected objects and smartphones. In this study, the developed system is employed to provide a social IoT network and suggest a strategy which allows reliable traceability without threatening the privacy of users. This IoT-based system allows respecting the social distance between persons sharing public services in smart cities without applying smartphone applications or severe confinement. It also permits a return to normal life in case of viral pandemic and ensures the much-desired balance between economy and health. The present study analyses previous proposed social distance systems then, unlike these studies, suggests an intelligent and distributed IoT based strategy for positioning students. Two scenarios of static and dynamic optimization-based placement of Bluetooth Low Energy devices are proposed and an experimental study shows the contribution and complementarity of the introduced contact tracing strategy with the applications on smartphones.

Development of UAV Teleoperation Virtual Environment Based-on GSM Networks and Real Weather Effects

  • AbdElHamid, Amr;Zong, Peng
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.16 no.3
    • /
    • pp.463-474
    • /
    • 2015
  • Future Ground Control Stations (GCSs) for Unmanned Aerial Vehicles (UAVs) teleoperation targets better situational awareness by providing extra motion cues to stimulate the vestibular system. This paper proposes a new virtual environment for long range Unmanned Aerial Vehicle (UAV) control via Non-Line-of-Sight (NLoS) communications, which is based on motion platforms. It generates motion cues for the teleoperator for extra sensory stimulation to enhance the guidance performance. The proposed environment employs the distributed component simulation over GSM network as a simulation platform. GSM communications are utilized as a multi-hop communication network, which is similar to global satellite communications. It considers a UAV mathematical model and wind turbulence effects to simulate a realistic UAV dynamics. Moreover, the proposed virtual environment simulates a Multiple Axis Rotating Device (MARD) as Human Machine Interface (HMI) device to provide a complete delay analysis. The demonstrated measurements cover Graphical User Interface (GUI) capabilities, NLoS GSM communications delay, MARD performance, and different software workload. The proposed virtual environment succeeded to provide visual and vestibular feedbacks for teleoperators via GSM networks. The overall system performance is acceptable relative to other Line-of-Sight (LoS) systems, which promises a good potential for future long range, medium altitude UAV teleoperation researches.

Adaptive and Prioritized Random Access and Resource Allocation Schemes for Dynamic TDMA/TDD Protocols

  • Choi, Hyun-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.1
    • /
    • pp.28-36
    • /
    • 2017
  • The medium access control (MAC) protocol based on dynamic time division multiple access/time division duplex (TDMA/TDD) is responsible for random access control and radio resource allocation in dynamic traffic environments. These functions of random access and resource allocation are very important to prevent wastage of resources and improve MAC performance according to various network conditions. In this paper, we propose new random access and resource allocation schemes to guarantee quality of service (QoS) and provide priority services in a dynamic TDMA/TDD system. First, for the QoS guarantee, we propose an adaptive random access and resource allocation scheme by introducing an access probability. Second, for providing priority service, we propose a priority-based random access and resource allocation scheme by extending the first adaptive scheme in both a centralized and a distributed manner. The analysis and simulation results show that the proposed MAC protocol outperforms the legacy MAC protocol using a simple binary exponential backoff algorithm, and provides good differential performance according to priorities with respect to the throughput and delay.

SecureJMoblet : Secure Mobile Agent System based on Jini2.0 (SecureJMoblet : Jini2.0 기반의 안전한 이동에이전트 시스템)

  • Yu Yang-Woo;Moon Nam-Doo;Lee Myung-Joon
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.439-450
    • /
    • 2004
  • Mobile agents are autonomous and dynamic entities that can migrate among various nodes in the network. Java's Jini framework facilitates mobile agent system development, providing hey features for distributed network programming. However, due to the security weakness, Jinil.0 service has a fundamental limitation on developing mobile agent systems which support secure remote communications. In this paper, we describe a Jini2.0-based secure mobile agent system named SecureJMoblet. On the top of Jini2.0, the system provides basic functionalities of a mobile agent system such as creation, transfer and control. In addition, with the SeureJS developed for secure JavaSpace service, SecureJMoblet supports a secure object repository and a reliable communication among mobile agents.

A Study on Cooperation between Kerberos system and Credit-Control Server

  • Choi, Bae-Young;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.281-284
    • /
    • 2005
  • Kerberos is system that offer authorization in internet and authentication service. Can speak that put each server between client and user in distributed environment and is security system of symmetry height encryption base that offer authentication base mutually. Kerberos authentication is based entirely on the knowledge of passwords that are stored on the Kerberos Server. A user proves her identity to the Kerberos Server by demonstrating Knowledge of the key. The fact that the Kerberos Server has access to the user's decrypted password is a rwsult of the fact that Kerberos does not use public key cryptogrphy. It is a serious disadvantage of the Kerbercs System. The Server must be physically secure to prevent an attacker from stealing the Kerberos Server and learning all of the user passwords. Kerberos was designend so that the server can be stateless. The Kerberos Server simply answers requests from users and issues tickets. This study focused on designing a SIP procy for interworking with AAA server with respect to user authentication and Kerberos System. Kerberos is security system of encryption base that offer certification function mutually between client application element and server application element in distributed network environment. Kerberos provides service necessary to control whether is going to approve also so that certain client may access to certain server. This paper does Credit-Control Server's function in AAA system of Diameter base so that can include Accounting information that is connected to Rating inside certification information message in Rating process with Kerberos system.

  • PDF

A Study of ABR Traffic Control in ATM Networks by Integrating EFCI and ER Modes (ATM 네트워크상에서 EFCI와 ER을 결합한 ABR 트래픽 제어에 관한 연구)

  • 김종은;우현구;김봉기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.2
    • /
    • pp.98-104
    • /
    • 2000
  • One of the main features of ABR service is the employment of a rate-based flow control mechanism, and congestion control plays an important role in the effective and stable operation of ATM networks Feedback from the network switches to the end system gives users the information necessary to adjust transmission rates appropriately according to the current networks load. Congestion controls by feedback mechanism are classified as EFCI and ER mode. We analyze the performance of EFCI and ER and propose a new ABR traffic control strategy by integrating EFCI and ER modes to improve the traditional traffic control. Through the distributed simulation. the performance improved by the proposed control strategy is analyzed.

  • PDF