• Title/Summary/Keyword: networking architecture

Search Result 310, Processing Time 0.028 seconds

Design of Modified Banyan Switch for High Speed Communication Network

  • Kwon, Seung-Tag;Sam-Ho cho
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.537-540
    • /
    • 2000
  • In this paper, we propose and design new architecture of the modified Banyan switch for a high speed networking and the high speed parallel computer. The proposed switching network with a remodeled architecture is a newly modified Banyan network with eight input and output ports. The switch scheme is that two packets may arrive on different inputs destined for the same output. We have analyzed the maximum throughput of the revised switch. The result of the analyses shows good agreement simulation and if we adopt such architecture of the revised model of the Banyan switch, the hardware complexity can be reduced. The FIFO discipline has increased about lloio when we compare the switching system with the input buffer system. We have designed and verified the switching system in VHDL.

  • PDF

An Efficient ATM Traffic Generator for the Real-Time Production of a Large Class of Complex Traffic Profiles

  • Loukatos Dimitrios;Sarakis Lambros;Kontovasilis Kimon;Mitrou Nikolas
    • Journal of Communications and Networks
    • /
    • v.7 no.1
    • /
    • pp.54-64
    • /
    • 2005
  • This paper presents an advanced architecture for a traffic generator capable of producing ATM traffic streams according to fully general semi-Markovian stochastic models. The architecture employs a basic traffic generator platform and enhances it by adding facilities for 'driving' the cell generation process through high-level specifications. Several kinds of optimization are employed for enhancing the software's speed to match the hardware's potential and for ensuring that traffic streams corresponding to models with a wide range of parameters can be generated efficiently and reliably. The proposed traffic generation procedure is highly modular. Thus, although this paper deals with ATM traffic, the main elements of the architecture can be used equally well for generating traffic loads on other networking technologies, IP-based networks being a notable example.

An Architecture for Key Management in Hierarchical Mobile Ad-hoc Networks

  • Rhee, Kyung-Hyune;Park, Young-Ho;Gene Tsudik
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.156-162
    • /
    • 2004
  • In recent years, mobile ad-hoc networks have received a great deal of attention in both academia and industry to provide anytime-anywhere networking services. As wireless networks are rapidly deployed, the security of wireless environment will be mandatory. In this paper, we describe a group key management architecture and key agreement protocols for secure communication in mobile ad-hoc wireless networks (MANETs) overseen by unmanned aerial vehicles (UAVs). We use implicitly certified public keys method, which alleviates the certificate overhead and improves computational efficiency. The architecture uses a two-layered key management approach where the group of nodes is divided into: 1) Cell groups consisting of ground nodes and 2) control groups consisting of cell group managers. The chief benefit of this approach is that the effects of a membership change are restricted to the single cell group.

Design of XML based Information Exchange Format for Consumer Service (전력수용가 서비스를 위한 XML 기반 정보교환 표준 설계)

  • Oh, Do-Eun;Kim, Sun-Ic;Song, Jae-Ju;Yang, Il-Kwon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.10
    • /
    • pp.2052-2058
    • /
    • 2009
  • The standardized and open information model called common language and information exchange format should be firstly defined for the interoperable power system and two-way information exchange among the components of the power system. The information models and information exchange formats for power facilities and power system applications are being defined in power system area, but the information model and information exchange format for the consumer area are not being yet defined besides of metering information model. An architecture and open standard for the information exchange between energy service provider and consumer are required to provide various value added services through the networking with devices in consumer premise. In this paper, an architecture for the two-way communications between energy service provider and consumer is defined and psXML(power system XML) for the information exchange is designed.

A Study on the Re-structuring and Planning Strategies for Regional Healthcare Facilities in Kwang-ju City and Jeon-nam Province (광주, 전남지역의 의료시설 재편 및 그 실행방안에 관한 연구)

  • Choi, Kwang-Seok
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.11 no.1
    • /
    • pp.43-54
    • /
    • 2005
  • This study is a second paper of the re-structuring strategies of healthcare facilities in Kwang-ju and Jeon-nam province for it's competition power in the emerging global health care market. Kwang-Ju city and Jeon-nam province have had difficulties in building a balanced healthcare system because of rapidly declining population, weakened healthcare infra-structure and geographical problems of healthcare supply by numerous islands. This paper presents the new approaching process for re-building healthcare network in the regional healthcare facilities planning. In addition, it analyzes health planning index, healthcare system, the concept of health care networking, etc. Finally, this presents the case study of regional healthcare facilities planning in Kwang-ju city and Jeon-nam Province.

  • PDF

A Ring-Oriented Multicast Architecture over Mobile Ad Hoc Sensor networks

  • Yang, Yubai;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1259-1262
    • /
    • 2004
  • Detecting environmental hazards and monitoring remote terrain are among many sensor network applications. In case of fire detection, it is significantly valuable to monitor fire-spot's shape and trend in time. Mobile ad hoc sensor nodes right round are responsible for sensoring, processing and networking packets, or even launching extinguisher. In this paper, we proposed a ring-oriented Multicast architecture based on "Fisheye State Routing" (MFSR) to organize a group of mobile ad hoc sensor nodes in a multicast way. It is familiar with traditional mesh-based multicast protocol [1] in mobile ad hoc network, trying to concentrates on efficiency and robustness simultaneously. Certain applications-based solution for hazards is proposed, quantitative results including architecture and recovery algorithms of MFSR are also investigated in this paper.

  • PDF

Review on Software-Defined Vehicular Networks (SDVN)

  • Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.376-388
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Software-Defined Vehicular Networks (SDVN)

  • Al-Mekhlafi, Zeyad Ghaleb
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.231-243
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular net- works and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and several architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Efficient Hierarchical Mobility Management Scheme for Mobile Content Centric Networking (이동 컨텐츠 중심 네트워크에서의 효율적인 계층적 이동성 관리 방안)

  • Lee, Jihoon;Lee, Juyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.37-41
    • /
    • 2018
  • As individuals generate and share various content anytime and anywhere, new networking architectures, such as content-centric networking (CCN) using the content name as a packet identifier, have been in the spotlight recently. However, the current CCN hardly takes into account node mobility problems, especially the mobility of content sources. The movement of content sources causes long delivery latency and long service disruptions. To solve that, the tunneling-based redirection scheme was proposed. However, the tunneling-based scheme requires a location-update procedure whenever the network changes, which creates many control messages and causes long latency. So, this paper presents hierarchical mobility management of mobile CCN to reduce the number of control messages and handoff latency. Performance evaluation shows that the proposed scheme can provide low control overhead, which results in network scalability.

Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments (CCN 기반 이동 애드혹 환경에서의 그룹 콘텐츠 요청을 사용한 효율적인 콘텐츠 공유 방안)

  • Shin, Jooho;Lee, Juyong;Lee, Jihoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.817-821
    • /
    • 2014
  • As users generate lots of contents independently of time and places anytime and anywhere together with a rapid development of mobile wireless communication technologies and an explosive dissemination of smart devices, content centric networking (CCN) has emerged as a new networking architecture. However, as CCN is based on one to one message exchanges, it is not appropriate for ad hoc network environment that has frequent network topology changes, which results in high control overhead and low transmission throughput. So, this paper proposes the new content sharing methods using group interest messages in CCN ad hoc environment. It is shown from the simulation that the proposed method can provide low control overhead and high transmission throughput.