• Title/Summary/Keyword: telecommunications network

Search Result 1,807, Processing Time 0.039 seconds

Cross-layer Design of Private MAC with TH-BPPM and TH-BPAM in UWB Ad-hoc Networks

  • Parvez, A.Al;Khan, M.A.;Hoque, M.E.;An, Xizhi;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12A
    • /
    • pp.1189-1197
    • /
    • 2006
  • Ultra-wideband(UWB) is a killer technology for short-range wireless communications. In the past, most of the UWB research focused on physical layer but the unique characteristics of UWB make it different to design the upper layer protocols than conventional narrow band systems. Cross-layer protocols have received high attention for UWB networks. In this paper, we investigate the performance of two physical layer schemes: Time Hopping Binary Pulse Position Modulation(TH-BPPM) and Time Hopping Binary Pulse Amplitude Modulation (TH-BPAM) with proposed private MAC protocol for UWB ad-hoc networks. From pulse level to packet level simulation is done in network simulator ns-2 with realistic network environments for varying traffic load, mobility and network density. Our simulation result shows TH-BPAM outperforms TH-BPPM in high traffic load, mobility and dense network cases but in a low traffic load case identical performance is achieved.

Defense Strategy of Network Security based on Dynamic Classification

  • Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5116-5134
    • /
    • 2015
  • In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.

Degrees of Freedom of 3-user MIMO Interference Channels with Instantaneous Relay Using Interference Alignment

  • Qiang, Wang;Yuquan, Shu;Minhua, Dong;Ji, Xu;Xiaofeng, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1624-1641
    • /
    • 2015
  • Instantaneous relay (relay-without-delay) using interference alignment is a promising approach to neutralizing interference and improving system capacity. In Wang Chenwei's work, a 2-user scenario required both source and relay to access the global channel state information (CSI). This paper shows a new method of interference alignment improves the degrees of freedom (DoF) prominently for the 3-user MIMO interference channel with instantaneous relay. This new method is focused on the relay node that completes the alignment interference neutralization so the global CSI is obtained only once and the pressure on the base station can be mitigated. In addition, the 3-user MIMO interference channels with instantaneous relay can achieve 2M DoF when source and destination have M antennas, respectively. This method shows 33% improvement over the conventional method using interference alignment which obtains 3M/2 DoF.

GAN-Based Local Lightness-Aware Enhancement Network for Underexposed Images

  • Chen, Yong;Huang, Meiyong;Liu, Huanlin;Zhang, Jinliang;Shao, Kaixin
    • Journal of Information Processing Systems
    • /
    • v.18 no.4
    • /
    • pp.575-586
    • /
    • 2022
  • Uneven light in real-world causes visual degradation for underexposed regions. For these regions, insufficient consideration during enhancement procedure will result in over-/under-exposure, loss of details and color distortion. Confronting such challenges, an unsupervised low-light image enhancement network is proposed in this paper based on the guidance of the unpaired low-/normal-light images. The key components in our network include super-resolution module (SRM), a GAN-based low-light image enhancement network (LLIEN), and denoising-scaling module (DSM). The SRM improves the resolution of the low-light input images before illumination enhancement. Such design philosophy improves the effectiveness of texture details preservation by operating in high-resolution space. Subsequently, local lightness attention module in LLIEN effectively distinguishes unevenly illuminated areas and puts emphasis on low-light areas, ensuring the spatial consistency of illumination for locally underexposed images. Then, multiple discriminators, i.e., global discriminator, local region discriminator, and color discriminator performs assessment from different perspectives to avoid over-/under-exposure and color distortion, which guides the network to generate images that in line with human aesthetic perception. Finally, the DSM performs noise removal and obtains high-quality enhanced images. Both qualitative and quantitative experiments demonstrate that our approach achieves favorable results, which indicates its superior capacity on illumination and texture details restoration.

Message Routing Method for Inter-Processor Communication of the ATM Switching System (ATM 교환기의 프로세서간통신을 위한 메시지 라우팅 방법)

  • Park, Hea-Sook;Moon, Sung-Jin;Park, Man-Sik;Song, Kwang-Suk;Lee, Hyeong-Ho
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.289-440
    • /
    • 1998
  • This paper describes an interconnection network structure which transports information among processors through a high speed ATM switch. To efficiently use the high speed ATM switch for the message-based multiprocessor, we implemented the cell router that performs multiplexing and demultiplexing of cells from/to processors. In this system, we use the expanded internal cell format including 3bytes for switch routing information. This interconnection network has 3 stage routing strategies: ATM switch routing using switch routing information, cell router routing using a virtual path identifier (VPI) and cell reassembly routing using a virtual channel indentifier (VCI). The interconnection network consists of the NxN folded switch and N cell routers with the M processor interface. Therefore, the maximum number of NxM processors can be interconnected for message communication. This interconnection network using the ATM switch makes a significant improvement in terms of message passing latency and scalability. Additionally, we evaluated the transmission overhead in this interconnection network using ATM switch.

  • PDF

Cooperative and Competitive Effect in Heterogeneous Networks of Healthcare System

  • Liu, Xiaoshuang;Kang, Guixia;Zhang, Ningbo;Guo, Yanyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4405-4418
    • /
    • 2015
  • Different network provides different service. To maximize the profit, heterogeneous networks form a whole, which may either compete or cooperate with each other. In this paper, the healthcare monitor network architecture is introduced to build the competitive and cooperative mechanisms of heterogeneous networks which contain three networks, namely, cellular network, WLAN and WMAN. This paper considers the natural growth rate of the network with competitive and cooperative effects. Then, the stability of the proposed model and its equilibrium points are analyzed by the ordinary differential principle. Finally, simulation results show that the natural growth rate cannot increase the profit of the network, but effective cooperative among heterogeneous networks can increase the profit of each network, and competitive may decrease the profit of each network.

Social-Aware Resource Allocation Based on Cluster Formation and Matching Theory in D2D Underlaying Cellular Networks

  • Zhuang, Wenqin;Chen, Mingkai;Wei, Xin;Li, Haibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.1984-2002
    • /
    • 2020
  • With the appearance of wireless spectrum crisis in traditional cellular network, device-to-device (D2D) communication has been regarded as a promising solution to ease heavy traffic burden by enabling precise content delivery among mobile users. However, due to the channel sharing, the interference between D2D and cellular users can affect the transmission rate and narrow the throughput in the network. In this paper, we firstly present a weighted interference minimization cluster formation model involving both social attribute and physical closeness. The weighted-interference, which is evaluated under the susceptible-infected(SI) model, is utilized to gather user in social and physical proximity. Then, we address the cluster formation problem via spectrum clustering with iterative operation. Finally, we propose the stable matching theory algorithm in order to maximize rate oriented to accomplish the one-to-one resource allocation. Numerical results show that our proposed scheme acquires quite well clustering effect and increases the accumulative transmission rate compared with the other two advanced schemes.

Torus Network Based Distributed Storage System for Massive Multimedia Contents (토러스 연결망 기반의 대용량 멀티미디어용 분산 스토리지 시스템)

  • Kim, Cheiyol;Kim, Dongoh;Kim, Hongyeon;Kim, Youngkyun;Seo, Daewha
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1487-1497
    • /
    • 2016
  • Explosively growing service of digital multimedia data increases the need for highly scalable low-cost storage. This paper proposes the new storage architecture based on torus network which does not need network switch and erasure coding for efficient storage usage for high scalability and efficient disk utilization. The proposed model has to compensate for the disadvantage of long network latency and network processing overhead of torus network. The proposed storage model was compared to two most popular distributed file system, GlusterFS and Ceph distributed file systems through a prototype implementation. The performance of prototype system shows outstanding results than erasure coding policy of two file systems and mostly even better results than replication policy of them.

A Study on Intrusion Detection of ARP Poisoning Attack on Wireless LAN

  • Ham Young Hwan;Lee Sok Joon;Chung Byung Ho;Chung Kyoll;Chung Jin Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.540-543
    • /
    • 2004
  • Address Resolution Protocol (ARP) cache poisoning is a MAC layer attack that can only be carried out when an attacker is connected to the same local network as the target machines. ARP is not a new problem, but wireless network introduces a new attack point and more vulnerable to the attack. The attack on wireless network cannot be detected by current detection tool installed on wired network. In order to detect the ARP poisoning attack, there must be a ARP poisoning detection tool for wireless LAN environment. This paper proposes linux-based ARP poisoning detection system equipped with wireless LAN card and Host AP device driver

  • PDF

An Optical VPN Service Platform Based on Intelligent Optical Transport Networks (지능형 광 전달망 기반의 Optical VPN 서비스 플랫폼 개발)

  • Kim Byung-Jae;Jeon Hyun-Ho;Lee Yong-Gi;Min Kyoung-Seon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.59-62
    • /
    • 2004
  • 차세대 지능형 광 전달망의 구축, 확산에 따라 새로운 개념의 L1 VPN인 Optical VPN에 대한 많은 연구가 이루어지고 있다. 현재까지의 Optical VPN은 OXC 시스템 제조업체가 제공하는 EMS/NMS의 부가 기능으로 구현되고 있으며 따라서 멀티 벤더 환경의 광 전달망 구조에서는 적용할 수 없는 문제점 있다. 본 논문에서는 표준화된 시그널링 인터페이스를 활용하여 이러한 문제점을 극복하고 CNM 및 bandwidth-on-demand 기능을 제공하는 새로운 Optical VPN 서비스 플랫폼의 개념 및 개발 현황을 소개한다.

  • PDF