• Title/Summary/Keyword: 4K network

Search Result 5,602, Processing Time 0.034 seconds

Wireless Networked Control Systems Using IEEE 802.15.4 (IEEE 802.15.4기반의 제어용 무선 네트워크에 대한 연구)

  • Lee, Jung-Il;Choi, Dong-Hyuk;Kim, Dong-Sung
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.289-292
    • /
    • 2006
  • In this paper, a wireless control network based on IEEE 802.15.4 MAC protocol is proposed. The superframe of IEEE 802.15.4 is applied to the proposed wireless control network. The transmission and bandwidth management method are proposed for efficient transmission in the superframe. By these methods, the proposed wireless control network protocol is able to transmit three types of data (periodic data, sporadic data, and non real-time message), and guarantee real-time transmission within deadline.

  • PDF

The Detection of Signaling Dos on 4G LTE Cellular Network (4G LTE 이동통신망에서의 시그널링 DoS 탐지 기술)

  • Jang, Woung;Kim, Se-Kwon;Oh, Joo-Hyung;Im, Chae-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.146-149
    • /
    • 2013
  • For in recently years, global cellular network service is changing rapidly to 4G. However, the fast introducing of 4G has been going with not enough research about security threat, it could be many kind of vulnerability. Therefore the research about security threat on 4G network is ongoing in external countries, but not sufficient in domestic. particularly in domestic situation of rapidly increased subscribers, The security threats which are hindering stability and usability could make a fatal effect on many users. 4G network should be considered about the feature of mobile network to protect 4G network stable. Mobile network has limited radio resources, it releases the radio resource which is not used in selected time and reallocate when detected the data transmission. Many signaling messages are transferred in the network entities to allocate or release the radio resource. In this paper, it will be introduced the technology to detect signaling DoS traffic hindering the stability and usability of network entities managing the radio resources by huge signaling message from the repetitive wireless connection/release message.

  • PDF

Exploring Flow Characteristics in IPv6: A Comparative Measurement Study with IPv4 for Traffic Monitoring

  • Li, Qiang;Qin, Tao;Guan, Xiaohong;Zheng, Qinghua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1307-1323
    • /
    • 2014
  • With the exhaustion of global IPv4 addresses, IPv6 technologies have attracted increasing attentions, and have been deployed widely. Meanwhile, new applications running over IPv6 networks will change the traditional traffic characteristics obtained from IPv4 networks. Traditional models obtained from IPv4 cannot be used for IPv6 network monitoring directly and there is a need to investigate those changes. In this paper, we explore the flow features of IPv6 traffic and compare its difference with that of IPv4 traffic from flow level. Firstly, we analyze the differences of the general flow statistical characteristics and users' behavior between IPv4 and IPv6 networks. We find that there are more elephant flows in IPv6, which is critical for traffic engineering. Secondly, we find that there exist many one-way flows both in the IPv4 and IPv6 traffic, which are important information sources for abnormal behavior detection. Finally, in light of the challenges of analyzing massive data of large-scale network monitoring, we propose a group flow model which can greatly reduce the number of flows while capturing the primary traffic features, and perform a comparative measurement analysis of group users' behavior dynamic characteristics. We find there are less sharp changes caused by abnormity compared with IPv4, which shows there are less large-scale malicious activities in IPv6 currently. All the evaluation experiments are carried out based on the traffic traces collected from the Northwest Regional Center of CERNET (China Education and Research Network), and the results reveal the detailed flow characteristics of IPv6, which are useful for traffic management and anomaly detection in IPv6.

A 4S DESIGN ON MOBILE AD HOC NETWORKS

  • Lee, Eun-Kyu;Kim, Mi-Jeong;Oh, Byoung-Woo;Kim, Min-Soo
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.844-849
    • /
    • 2002
  • A provision of spatial information is expected to make a market explosion in various fields. A distribution of spatial data on wireless mobile environments indicates a huge expansion of mobile technology as well as a spread of geospatial applications. For high quality spatial information, 4S technology project integrating 4 kinds of spatial systems is currently being executed with the goal of nationwide integration of spatial data and spatial information systems. In terms of network environments, a mobile ad hoc network where mobile terminals communicate with each other without any infrastructures has been standardized for the next generation mobile wireless network. With respect to the future technologies for spatial information, it is necessary to design 4S applications on mobile ad hoc networks. This paper addresses the issue, which is proposing design points for distributing 4S spatial data on mobile ad hoc networks and ad hoc styled 4S applications.

  • PDF

An Extended Version of the CPT-based Estimation for Missing Values in Nominal Attributes

  • Ko, Song;Kim, Dae-Won
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.10 no.4
    • /
    • pp.253-258
    • /
    • 2010
  • The causal network represents the knowledge related to the dependency relationship between all attributes. If the causal network is available, the dependency relationship can be employed to estimate the missing values for improving the estimation performance. However, the previous method had a limitation in that it did not consider the bidirectional characteristic of the causal network. The proposed method considers the bidirectional characteristic by applying prior and posterior conditions, so that it outperforms the previous method.

A Convergence Service Evolution in IMS networks (IMS 망에서의 컨버전스 서비스 진화방향)

  • Hwang, Jin-Ho;Park, Sang-Hoon
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.175-176
    • /
    • 2006
  • 본 논문은 IMS 개발-에 있어서 컨버전스 서비스를 지향하는 망 진화 방향을 제안한다. 4 세대 라고 언급하고 있는 4G 네트워크의 핵심인 IMS 는 3GPP 에서 표준화를 진행하며, ITU-T, MSF, TISPAN 과 같은 표준화 단체에서도 유사한 망구조로 제안하고 있다. 그러나 IMS망을 통하여 생성되는 컨버전스 서비스로의 발전에는 고려해야 할 사항들이 많이 있다. 본 논문에서는 망구조를 통하여 단말의 입장과 서비스의 진화방향을 제안한다.

  • PDF

The prediction of atmospheric concentrations of toluene using artificial neural network methods in Tehran

  • Asadollahfardi, Gholamreza;Aria, Shiva Homayoun;Mehdinejad, Mahdi
    • Advances in environmental research
    • /
    • v.4 no.4
    • /
    • pp.219-231
    • /
    • 2015
  • In recent years, raising air pollutants has become as a big concern, especially in metropolitan cities such as Tehran. Therefore, forecasting the level of pollutants plays a significant role in air quality management. One of the forecasting tools that can be used is an artificial neural network which is able to model the complicated process of air pollution. In this study, we applied two different methods of artificial neural networks, the Multilayer Perceptron (MLP) and Radial Basis Function (RBF), to predict the hourly air concentrations of toluene in Tehran. Hourly temperature, wind speed, humidity and $NO_x$ were selected as inputs. Both methods had acceptable results; however, the RBF neural network produced better results. The coefficient of determination ($R^2$) between the observed and predicted data was 0.9642 and 0.99 for MLP and RBF neural networks, respectively. The results of the mean bias errors (MBE) were 0.00 and -0.014 for RBF and MLP, respectively which indicate the adequacy of the models. The index of agreement (IA) between the observed and predicted data was 0.999 and 0.994 in the RBF and the MLP, respectively which indicates the efficiency of the models. Finally, sensitivity analysis related to the MLP neural network determined that temperature was the most significant factor in air concentration of toluene in Tehran which may be due to the volatile nature of toluene.

Cystic Mass on Right Atrium of Unusual Form of Chiari's Network: A Case Report

  • Bae, Chi-Hoon;Kwon, Oh-Choon;Lee, Sub;Lee, Chul-Ho;Cho, Jun-Woo
    • Journal of Chest Surgery
    • /
    • v.45 no.4
    • /
    • pp.254-256
    • /
    • 2012
  • Chiari's networks are present in 1.5% to 4% of the population. They are a congenital disease characterized by a remnant of the right valve of sinus venosus and rarely have clinical significance. Chiari's network, as the name implies, has network-like shape, but there are other forms of appearance. We have experienced a case of a 60-year-old woman who had a cystic mass on the right atrium. Surgical treatment was performed forthe mass removal and differential diagnosis of the mass. There was no evidence of other tumor, but Chiari's network. As cystic form of Chiari's network have not been reported before, it is the first report of cystic form of Chiari's network.

Defeating IP Source Address Spoofing with Foreign Agent Care-of-Address in Mobile IPv4 (Mobile IPv4 네트워크에서 접속제어리스트와 역터널링을 이용한 IP Spoofing 제거 방안)

  • Kim, Han-Lim;Kim, Sung-Il;Kim, Sang-Eun;Park, Se-Jun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.313-317
    • /
    • 2005
  • The network ingress filtering is a simple and efficient method for preventing IP source spoofing of fixed nodes. Since mobile hosts cannot communicate with its correspondent nodes if the network ingress filtering is configured in mobile IPv4 network, reverse tunneling was considered as a method for avoiding network ingress filtering. But, unfortunately this method does not solve IP source spoofing of mobile nodes. In this paper, we propose a simple and efficient method for preventing IP source spoofing of mobile nodes assuming that only the mobile hosts connected to foreign agents and the network that foreign agent manages is small.

  • PDF

On Antenna Orientation for Inter-Cell Interference Coordination in Cellular Network MIMO Systems

  • Sheu, Jeng-Shin;Lyu, Shin-Hong;Huang, Chuan-Yuan
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.639-648
    • /
    • 2016
  • Next-generation (4G) systems are designed to support universal frequency reuse (UFR) to achieve best use of valuable spectra. However, it leads to undesirable interference level near cell borders. To control this, 4G systems adopt techniques, such as network multiple-input multiple-output (MIMO) and inter-cell interference coordination (ICIC), to improve cell-edge throughput. Network MIMO aims at mitigating inter-cell interference towards cell-edge users (CEUs) through multi-cell cooperation, where each collaborative base station serves both cell-center users (CCUs) and CEUs, including other cells' CEUs, under a power constraint. The present ICIC strategies cannot be directly applied to network MIMO because they were designed in absence of multi-cell coordination. In the presence of network MIMO, this paper investigates antenna orientations in ICIC and the method of power management. Results show that a proper antenna orientation can improve the cell-edge capacity and meantime lower the interference to CCUs. Capacity inconsistency between CCUs and CEUs is detrimental to mobile communications. Simulation results show that the proposed power management for ICIC in network MIMO systems can achieve a uniform data rate regardless users' position.