• Title/Summary/Keyword: networking architecture

Search Result 310, Processing Time 0.031 seconds

A design and implementation of an in-service software upgrade technology to provide a seamless networking services (무중단 네트워킹 서비스 제공을 위한 서비스 중 소프트웨어 업그레이드 기술 설계 및 구현)

  • Yoon, Ho-sun;Ryu, Ho-yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1710-1716
    • /
    • 2016
  • In general, software upgrade technique is needed to add new features or fix bug of software on a network devices. However, the problem is that the software must be upgraded after the termination of networking service to replace new package. An ISSU(In-Service Software Upgrade) technique is used to solve such the problem. ISSU is a technology to upgrade the software without interrupting the network service or an offline network equipment. In this paper, to provide a seamless networking service, we design and implement an architecture to apply ISSU technique to a network operating system. In this paper, we use high-availability feature in N2OS which has been developed by ETRI. In addition, in order to verify that the implemented ISSU function is operation properly, we proceed to test using a test environment based on a virtual machine.

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

An Analytical Traffic Model of Control Plane and Application Plane in Software-Defined Networking based on Queuing Theory (대기행렬 이론 기반 SDN 제어 평면 및 응용 평면의 트래픽 성능 분석 모델)

  • Lee, Seungwoon;Roh, Byeong-hee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.4
    • /
    • pp.80-88
    • /
    • 2019
  • Software Defined Networking (SDN) is the future network paradigm of decoupling control and data functions. In SDN structure, it is hard to address scalability in case of large-scale networks because single controller managed thousands of switches in a centralized fashion. Most of previous studies have focused on horizontal scalability, where distributed controllers are assigned to network devices. However, they have abstracted the control plane and the application plane into a single controller. The layer of the common SDN architecture is divided into data plane, control plane, and application plane, but the control plane and application plane have been modeled as a single controller although they are logically separated. In this paper, we propose a analytical traffic model considering the both application plane and control plane based on queuing theory. This model can be used to address scalability issues such as controller placement problem without complicated simulations.

Implementation of Chaotic UWB Systems for Low Rate WPAN

  • Lee, Cheol-Hyo;Kim, Jae-Young;Kim, Young-Kkwan;Choi, Sun-Kyu;Jang, Ui-Gi
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.339-342
    • /
    • 2005
  • In order to support ultrawide-band signal generation for low rate WPAN, several types of signal generation mechanisms are suggested such as Chaos, Impluse, and Chirp signals by the activity of IEEE 802.15.4a. The communication system applied chaos theory may have ultrawide-band characteristics with spread spectrum and immunity from multipath effect. In order to use the advantage of chaotic signal generation, we introduce the system implementation of communication and networking systems with the chaos UWB signal. This system may be composed of mainly three parts in hardware architecture : RF transmission with chaotic signal generation, signal receiver using amplifiers and filters, and 8051 & FPGA unit. The most difficult part is to implement the chaotic signal generator and build transceiver with it. The implementation of the system is devidced into two parts i.e. RF blocks and digital blocks with amplifiers, filters, ADC, 8051 processor, and FPGA. In this paper, we introduce the system block diagram for chaotic communications. Mainly the RF block is important for the system to have good performance based on the chaotic signal generator. And the main control board functions for controlling RF blocks, processing Tx and Rx data, and networking in MAC layer.

  • PDF

무선 홈 네트워킹 기술 표준화 동향 및 발전 전망

  • 전호인
    • Information and Communications Magazine
    • /
    • v.21 no.3
    • /
    • pp.13-40
    • /
    • 2004
  • 홈 네트워킹은 다양한 유ㆍ무선 네트워킹 기술을 적용하여 개개인의 생활을 더 윤택하게 해 주는 서비스를 제공하고 이를 통해 커다란 시장을 형성할 수 있는 미래의 신 성장 동력 산업이다. 이를 위해 PLC, IEEE 1394, HomePNA와 같은 유선 홈 네트워킹 기술은 물론 WLAN, WPAN, UWB 등과 같은 무선 네트워킹 기술이 여러 가지의 응용 분야를 무기로 자신의 영역을 차지하려 하고 있다. 따라서 댁내의 기기는 이와 같은 네트워킹 기술을 지원하도록 설계되어야 하지만, 그 위에 UPnP나 HAVi, Jini, HNCP 등과 같은 미들웨어가 탑재되어야 상호 호환성이 지원된다. 그리고 하나의 표준화된 H/W나 S/W 플랫폼 위에 혼 게이트웨이가 동작하면 집 외부에서 원격으로 새로운 서비스를 지원할 수 있게 되며 응용 분야가 다양하게 확장될 수 있다. 그 위에 유비퀴터스 네트워킹 개념을 도입하여 홈 네트워크가 필요로 하는 서비스를 지원함으로써 커다란 시장을 이끌어 갈 수 있게 된다. 본 논문에서는 홈 네트워킹 기술의 표준화 현황에 대해 정리하고, 차세대 성장 동력으로서의 홈 네트워킹을 위해 반드시 적용해야 할 유비퀴터스 네트워킹 개념과 이로부터 효과를 얻기 위해 집안에 홈 네트워크를 어떻게 수용하게 할 것인지에 대해 논하였다. 끝으로 유비퀴터스 네트리킹을 통한 막대한 시장을 먼저 확보하기 위한 무선 홈 네트워킹 기술의 아키텍처를 정하면서 이를 구현하기 위해 먼저 수행해야 할 Mesh Networking 기술 및 Multi-Hop 네트워킹 기술과 같은 연구분야에 대해 논하였다.(중략)

Fast Recovery Routing Algorithm for Software Defined Network based Operationally Responsive Space Satellite Networks

  • Jiang, Lei;Feng, Jing;Shen, Ye;Xiong, Xinli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2936-2951
    • /
    • 2016
  • An emerging satellite technology, Operationally Responsive Space (ORS) is expected to provide a fast and flexible solution for emergency response, such as target tracking, dense earth observation, communicate relaying and so on. To realize large distance transmission, we propose the use of available relay satellites as relay nodes. Accordingly, we apply software defined network (SDN) technology to ORS networks. We additionally propose a satellite network architecture refered to as the SDN-based ORS-Satellite (Sat) networking scheme (SDOS). To overcome the issures of node failures and dynamic topology changes of satellite networks, we combine centralized and distributed routing mechanisms and propose a fast recovery routing algorithm (FRA) for SDOS. In this routing method, we use centralized routing as the base mode.The distributed opportunistic routing starts when node failures or congestion occur. The performance of the proposed routing method was validated through extensive computer simulations.The results demonstrate that the method is effective in terms of resoving low end-to-end delay, jitter and packet drops.

Design and Realization of a Novel Header Compression Scheme for Ad Hoc Networks

  • Khalid, Shahrukh;Mahboob, Athar;Azim, Choudhry Fahad;Rehman, Aqeel Ur
    • ETRI Journal
    • /
    • v.38 no.5
    • /
    • pp.922-933
    • /
    • 2016
  • IP header compression schemes offer a valuable measure for bandwidth preservation. Such schemes have been practically implemented in infrastructure-based IP networks for point-to-point links. However, minimal research and practical implementation efforts have been conducted in the direction of an IP header compression strategy that can meet the peculiar requirements of multi-hop ad hoc wireless networks. In this paper, we present a practically implemented multi-hop IP header compression scheme using the Robust Header Compression (ROHC) protocol suite. The scheme runs on a novel identifier (ID) based networking architecture, known as an ID-based ad hoc network (IDHOCNET). IDHOCNET additionally solves a number of bottlenecks of pure IP-based ad hoc networks that have emerged owing to IP address auto-configuration service, distributed naming and name resolution, and the role of an IP address as an identifier at the application layer. The proposed scheme was tested on a multi-hop test bed. The results show that the implemented scheme has better gain and requires only O (1) ROHC contexts.

International Interworking Research and Demonstration using FENIUS (FENIUS를 사용한 국제 연동 연구 및 시연)

  • Seok, Woo-Jin;Moon, Jeong-Hoon;Kong, Jong-Wook;Lim, Hyun-Kook;Han, Jang-Su;Cha, Young-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1179-1187
    • /
    • 2010
  • In this paper, we show the research works of the international interworking between networking resource managers over national research networks, and also show the demonstrations about them. Each national research network of each country consists of 10 Giga network facilities which are based on optical technologies, and also has each own networking resource manager. Internationally, most of countries have worked on the standard for interworking over the national research networks, and finally developed FENIUS.as the results. Korea, U.S.A., Japan, and Europe can interwork with each other after developing their own adapting system for FENIUS. We provide the system architecture and the demonstration.

An Extended Work Architecture for Online Threat Prediction in Tweeter Dataset

  • Sheoran, Savita Kumari;Yadav, Partibha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.97-106
    • /
    • 2021
  • Social networking platforms have become a smart way for people to interact and meet on internet. It provides a way to keep in touch with friends, families, colleagues, business partners, and many more. Among the various social networking sites, Twitter is one of the fastest-growing sites where users can read the news, share ideas, discuss issues etc. Due to its vast popularity, the accounts of legitimate users are vulnerable to the large number of threats. Spam and Malware are some of the most affecting threats found on Twitter. Therefore, in order to enjoy seamless services it is required to secure Twitter against malicious users by fixing them in advance. Various researches have used many Machine Learning (ML) based approaches to detect spammers on Twitter. This research aims to devise a secure system based on Hybrid Similarity Cosine and Soft Cosine measured in combination with Genetic Algorithm (GA) and Artificial Neural Network (ANN) to secure Twitter network against spammers. The similarity among tweets is determined using Cosine with Soft Cosine which has been applied on the Twitter dataset. GA has been utilized to enhance training with minimum training error by selecting the best suitable features according to the designed fitness function. The tweets have been classified as spammer and non-spammer based on ANN structure along with the voting rule. The True Positive Rate (TPR), False Positive Rate (FPR) and Classification Accuracy are considered as the evaluation parameter to evaluate the performance of system designed in this research. The simulation results reveals that our proposed model outperform the existing state-of-arts.

Controller Backup and Replication for Reliable Multi-domain SDN

  • Mao, Junli;Chen, Lishui;Li, Jiacong;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4725-4747
    • /
    • 2020
  • Software defined networking (SDN) is considered to be one of the most promising paradigms in the future. To solve the scalability and performance problem that a single and centralized controller suffers from, the distributed multi-controller architecture is adopted, thus forms multi-domain SDN. In a multi-domain SDN network, it is of great importance to ensure a reliable control plane. In this paper, we focus on the reliability problem of multi-domain SDN against controller failure from perspectives of backup controller deployment and controller replication. We firstly propose a placement algorithm for backup controllers, which considers both the reliability and the cost factors. Then a controller replication mechanism based on shared data storage is proposed to solve the inconsistency between the active and standby controllers. We also propose a shared data storage layout method that considers both reliability and performance. Besides, a fault recovery and repair process is designed based on the controller backup and shared data storage mechanism. Simulations show that our approach can recover and repair controller failure. Evaluation results also show that the proposed backup controller placement approach is more effective than other methods.