• Title/Summary/Keyword: networking scheme

Search Result 478, Processing Time 0.025 seconds

Dynamic Source Multi-path Routing Protocol for Wireless Ad-hoc Network Environments (무선 에드-혹 네트워크 환경을 위한 동적다중경로라우팅 프로토콜)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.336-346
    • /
    • 2001
  • A wireless ad-hoc network is a temporal network formed by a collection of wireless mobile nodes without the aid of any existing network infrastnlcture or centralized administration. Currently, numerous routing protocols have been developed for changing messages between nodes in a wireless ad-hoc network. Applications of wireless ad-hoc network technology are various and proper routing protocol must be used according to application domain or network size. In a wireless ad-hoc network. some hosts want services from fixed networks. For supporting such services, it is necessary to interconnect wireless ad-hoc networks and fixed networks. The DSMIHDynamic Source Multipath Routing) protocol, proposed in this paper, focuses on supporting seamless communication services between the nodes within a wireless ad-hoc network and providing fixed networks to the mobile hosts in wireless an-hoc networks. In DSMR protocol, each node need not broadcast routing messages periodically. and mobile hosts that to send data packets initiate route request and route establishment procedure. By maintaining multiple paths in each node. faster route re-establishment is also possible in our scheme.

  • PDF

A Scheduling Algorithm for Performance Enhancement of Science Data Center Network based on OpenFlow (오픈플로우 기반의 과학실험데이터센터 네트워크의 성능 향상을 위한 스케줄링 알고리즘)

  • Kong, Jong Uk;Min, Seok Hong;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1655-1665
    • /
    • 2017
  • Recently data centers are being constructed actively by many cloud service providers, enterprises, research institutes, etc. Generally, they are built on tree topology using ECMP data forwarding scheme for load balancing. In this paper, we examine data center network topologies like tree topology and fat-tree topology, and load balancing technologies like MLAG and ECMP. Then, we propose a scheduling algorithm to efficiently transmit particular files stored on the hosts in the data center to the destination node outside the data center, where fat-tree topology and OpenFlow protocol between infrastructure layer and control layer are used. We run performance analysis by numerical method, and compare the analysis results with those of ECMP. Through the performance comparison, we show the outperformance of the proposed algorithm in terms of throughput and file transfer completion time.

An Authentication Scheme Using OAuth and Cyber Physical Social System (Cyber-Physical-Social 시스템과 OAuth를 이용한 IoT 인증 기법)

  • Cho, Jeong-woo;Lee, Kuk-young;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.348-351
    • /
    • 2016
  • Recently on IoT environment, there is necessary of protected network, which is only specific user can access it. Applying OAuth protocol on IoT, it can be easier to construct network authentication system, but it is hard to construct protected network authentication system. And there is weakness of OAuth protocol, which is easily attacked by sniffing Token by attacker. So, it is necessary to secondary authentication for OAuth. In ultimate IoT, the fog computing is essential. Fog computing is extension of cloud that enables networking not only in core system but also in edge system and communication node to node. Strength of fog computing is location awareness, support for mobility, and so on. If authentication in fog computing uses this strength, it can be more specialized in Fog Computing. So, in secondary Authentication, using Cyber-Physical-Social System will increase convenience of user than using existing authentication system, such as authentication certificate, id/password and group key, which is inconvenient for user. This study is about authentication based Cyber-Physical-Social System.

  • PDF

On the Design of a New Briadband Personalized Multimedia Network for Future Requirements (미래의 환경에 맞는 새로운 개인 휴대 통신 서비스를 위한 광대역 멀티미디어 통신망의 설계)

  • 최진식;은종관
    • Information and Communications Magazine
    • /
    • v.12 no.10
    • /
    • pp.76-86
    • /
    • 1995
  • In this paper, we propose a new network architecture for the future broadband personalized multimedia network. We first consider the service and technical requirements for supporting future advanced services such as personalized and intelligent communication services. In addition, we consider the design and implementation of the future network. Considering these requirements. we propose a new network architecture and its control scheme that can efficiently support the future personalized and intelligent services as well as broadband multimedia services. The network provides only a relatively simple core set of functions such as basic end-to-end connectivity, integrated access, and primitive network intelligence of user location. More intelligent features (e.g., personalized calling, virtual private networking and so on) can be offered through the additional network facilities or computing devices through an intelligent network.

  • PDF

New Pre-processing Method for Second-Order CPA on the IT Convergence Device (IT융합 디바이스에 대한 물리적 2차 CPA 공격을 위한 새로운 전처리 기법)

  • Lee, Chul-Hee;Hwang, Ah-Reum;Lee, Dong-Geon;Kim, Hyoung-Nam;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1369-1380
    • /
    • 2010
  • In this paper, we propose the efficient Second-Order Differential Power Analysis attack, which has ability to find significant information such as secret key in the devices consisting IT convergence environment such as Smartgrid, Advanced Metering Infrastructure(AMI) and ZigBee-based home networking service. This method helps to find the secret key easily at a device, even though it uses a countermeasure like masking which makes First-Order DPA attack harder. First, we present the performance results of our implementation which implements practical Second-Order DPA attack using the existing preprocessing function, and analyze it. Then we propose a stronger preprocessing function which overcomes countermeasures like masking. Finally, we analyze the results of the Second-Order CPA attack using proposed preprocessing function and verify that proposed scheme is very threatening to the security fields of IT convergence technology through the experimental results.

A Patching-Based VOD System supporting VCR Operations (VCR 동작을 지원하는 패칭 기반의 주문형 비디오 시스템)

  • 조창식;마평수;이기호;강지훈
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.9-16
    • /
    • 2003
  • In this paper, we propose a method for supporting VCR operations in a patching based multicast VOD system. Random access, pause and resume operations are supported in our system, and the channel and session scheduling algorithms for the VCR operations are proposed. When it is necessary to join a sharable multicast channel in the admission control for the VCR operations, the patching technique, which shares an on-going regular channel and allocates a new patching channel for the missing data, is used. Therefore, unlike the previous approach that allocates an excessive number of I-channels, service latency is minimized and channel usage is optimized in our system. Moreover buffered data. which is saved in disk during patching, is reused to prevent unnecessary patching channel allocation. For this. the patching management information is extended and a buffed data management scheme is proposed. In our system, the First-Come-First-Served scheduling is used to inform clients the service latency for the VCR operations immediately.

A Ticket based Authentication and Payment Scheme for Third Generation Mobile Communications (3세대 이동 통신을 위한 티켓 기반 인증 및 지불 기법)

  • Lee, Byung-Rae;Chang, Kyung-Ah;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.368-374
    • /
    • 2002
  • In the third generation mobile telecommunication systems such as UMTS, one of the important problems for value-added services is to check the recoverability of costs used by a mobile user. Previous authentication and payment schemes for value-added services by a mobile user across multiple service domains, rely on the concept of the on-line TTP, which serves as the users certification authority. In the third generation systems with many service providers, a wide range of services, and a diverse user population, authentication mechanisms with the on-line TTP provide a far from ideal solution. In this paper we present an efficient public-key protocol for mutual authentication and key exchange designed for value-added services in the third generation mobile telecommunications systems. The proposed ticket based authentication and payment protocol provides an efficient way for VASP to check the recoverability of costs without communication with the on-line TTP Furthermore, the proposed ticket based protocol can provide anonymous service usage for a mobile user.

Block Device Driver of Linux for Accessing the NRD (NRD 접근을 위한 리눅스 블록 디바이스 드라이버)

  • Son, Tae-Yeong;Rim, Seong-Rak
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3399-3406
    • /
    • 2015
  • NRD(Network RamDisk) is a scheme which allows a system to use the memory of the remote systems just as his own block device via networking. Basically, it consists of a client requesting an NRD access and server providing the NRD. In this paper, we describe the design, implementation and experiment of the block device driver for accessing the NRD in the Linux kernel(2.6) level. First of all, we have analyzed the flow of processing the requests for accessing the block devices in the traditional Linux kernel and figured out the additional functions required for supporting the NRD. Then we have designed and implemented the device diver of NRD client and NRD server for providing these functions. Finally, we have established a NRD server system, and reviewed its functional feasibility by experimenting the requests of NRD access through the NRD device driver implemented on a NRD client.

T2PC: Temperature-aware Transmission Power Control Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 온도인지형 전송파워 제어 기법)

  • Lee, Jung-Wook;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.403-408
    • /
    • 2010
  • The sensor nodes can be installed in the environment in which the temperature change is considerable, such as desert, urban, and data center. Particularly, because the output power becomes less than the targeted power if a temperature is increasing, link quality is degraded and packet losses are occurred. In order to compensate the temperature changes, existing schemes detect the change of the link quality between nodes and control transmission power through a series of feedback process. However, these approaches can cause heavy overhead by additional control packets. In this paper, we propose the T2PC(Temperature-aware Transmission Power Control) to keep up the link quality despite temperature variation. At each node, T2PC compensates the attenuated link quality by controlling the transmission power based on the local temperature measurement. In addition, the packet reception ratio can be improved with less control packets than ones required in existing transmission power control methods based on the feedback control.

Adaptive Route Optimization for Proxy Mobile IPv6 Networks (Proxy Mobile Ipv6 네트워크에서의 적응적 경로 최적화)

  • Kim, Min-Gi;Lee, Su-Kyoung
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.204-211
    • /
    • 2009
  • Proxy Mobile IPv6(PMIPv6) is that network-based mobility management protocol that network supports mobile node's mobility on behalf of the Mobile Node(MN). In PMIPv6 network, data packets from a Correspondent Node(CN) to a MN will always traverse the MN's Local Mobility Anchor(LMA). Even though, CN and MN might be located close to each other or within the same PMIPv6 domain. To solve this problem, several PMIPv6 Route Optimization(RO) schemes have been proposed. However, these RO schemes may result in a high signaling cost when MN moves frequently between MAGs. For this reason, we propose an adaptive route optimization(ARO) scheme. We analyze the performance of the ARO. Analytical results indicate that the ARO outperforms previous schemes in terms of signaling overhead.