• Title/Summary/Keyword: Access Network Design

Search Result 690, Processing Time 0.025 seconds

Design of YK2 Cipher Algorithm for Electronic Commerce Security (전자상거래 보안을 위한 YK2 암호 알고리즘 설계)

  • Kang, Young-Ku;Rhew, Sung-Yul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3138-3147
    • /
    • 2000
  • EC(Electronic Commerce) which is cone the virtual space through Internet, has the advantage of time and space. On the contrary, it also has weak point like security probelm because anybody can easily access to the system due to open network attribute of Internet. Theretore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solution is the implemonlation of a strong cipher algorithm. YK2(YoungKu Kang) cipher algorithm proposed in this paper is advantage for the EC security and it overcomes the limit of the current 6/1 bits block cipher algorithm using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is degigned for the increase of time complexity and probability calculation by adapting more complex design for key scheduling regarded as one of the important element effected to enciyption.

  • PDF

Gateway Strategies for VoIP Traffic over Wireless Multihop Networks

  • Kim, Kyung-Tae;Niculescu, Dragos;Hong, Sang-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.24-51
    • /
    • 2011
  • When supporting both voice and TCP in a wireless multihop network, there are two conflicting goals: to protect the VoIP traffic, and to completely utilize the remaining capacity for TCP. We investigate the interaction between these two popular categories of traffic and find that conventional solution approaches, such as enhanced TCP variants, priority queues, bandwidth limitation, and traffic shaping do not always achieve the goals. TCP and VoIP traffic do not easily coexist because of TCP aggressiveness and data burstiness, and the (self-) interference nature of multihop traffic. We found that enhanced TCP variants fail to coexist with VoIP in the wireless multihop scenarios. Surprisingly, even priority schemes, including those built into the MAC such as RTS/CTS or 802.11e generally cannot protect voice, as they do not account for the interference outside communication range. We present VAGP (Voice Adaptive Gateway Pacer) - an adaptive bandwidth control algorithm at the access gateway that dynamically paces wired-to-wireless TCP data flows based on VoIP traffic status. VAGP continuously monitors the quality of VoIP flows at the gateway and controls the bandwidth used by TCP flows before entering the wireless multihop. To also maintain utilization and TCP performance, VAGP employs TCP specific mechanisms that suppress certain retransmissions across the wireless multihop. Compared to previous proposals for improving TCP over wireless multihop, we show that VAGP retains the end-to-end semantics of TCP, does not require modifications of endpoints, and works in a variety of conditions: different TCP variants, multiple flows, and internet delays, different patterns of interference, different multihop topologies, and different traffic patterns.

Design and Development of Management System Standard Software for Aids to Navigation Based on S-201 (S-201 기반 항로표지 관리운영시스템 표준 SW 설계 및 개발)

  • Yeo, Ji-Min;Chae, Jeong-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1927-1934
    • /
    • 2021
  • The AtoN are installed and operated on the sea in order to help the safe navigation of ships. With the development of maritime ICT, to monitor and control the condition of AtoN from land using multiplex communication network such as AtoN AIS, CDMA, and LTE. Currently, The information of AtoN is difficult to integrated manage because AtoN management systems has been independently developed and operatie according to the operating conditions of the Regional Office of Oceans and Fisheries. In addition, in preparation for the introduction for e-navigation and MASS, systematic and unified information of AtoN is required. In this paper, we study to design and develop standard software for AtoN management system based on the international standard for navigation information(S-201). Through this study, it will be possible to provide continuous AtoN information and effective AtoN management.

Apply evolved grey-prediction scheme to structural building dynamic analysis

  • Z.Y. Chen;Yahui Meng;Ruei-Yuan Wang;Timothy Chen
    • Structural Engineering and Mechanics
    • /
    • v.90 no.1
    • /
    • pp.19-26
    • /
    • 2024
  • In recent years, an increasing number of experimental studies have shown that the practical application of mature active control systems requires consideration of robustness criteria in the design process, including the reduction of tracking errors, operational resistance to external disturbances, and measurement noise, as well as robustness and stability. Good uncertainty prediction is thus proposed to solve problems caused by poor parameter selection and to remove the effects of dynamic coupling between degrees of freedom (DOF) in nonlinear systems. To overcome the stability problem, this study develops an advanced adaptive predictive fuzzy controller, which not only solves the programming problem of determining system stability but also uses the law of linear matrix inequality (LMI) to modify the fuzzy problem. The following parameters are used to manipulate the fuzzy controller of the robotic system to improve its control performance. The simulations for system uncertainty in the controller design emphasized the use of acceleration feedback for practical reasons. The simulation results also show that the proposed H∞ controller has excellent performance and reliability, and the effectiveness of the LMI-based method is also recognized. Therefore, this dynamic control method is suitable for seismic protection of civil buildings. The objectives of this document are access to adequate, safe, and affordable housing and basic services, promotion of inclusive and sustainable urbanization, implementation of sustainable disaster-resilient construction, sustainable planning, and sustainable management of human settlements. Simulation results of linear and non-linear structures demonstrate the ability of this method to identify structures and their changes due to damage. Therefore, with the continuous development of artificial intelligence and fuzzy theory, it seems that this goal will be achieved in the near future.

Cache-Filter: A Cache Permission Policy for Information-Centric Networking

  • Feng, Bohao;Zhou, Huachun;Zhang, Mingchuan;Zhang, Hongke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4912-4933
    • /
    • 2015
  • Information Centric Networking (ICN) has recently attracted great attention. It names the content decoupling from the location and introduces network caching, making the content to be cached anywhere within the network. The benefits of such design are obvious, however, many challenges still need to be solved. Among them, the local caching policy is widely discussed and it can be further divided into two parts, namely the cache permission policy and the cache replacement policy. The former is used to decide whether an incoming content should be cached while the latter is used to evict a cached content if required. The Internet is a user-oriented network and popular contents always have much more requests than unpopular ones. Caching such popular contents closer to the user's location can improve the network performance, and consequently, the local caching policy is required to identify popular contents. However, considering the line speed requirement of ICN routers, the local caching policy whose complexity is larger than O(1) cannot be applied. In terms of the replacement policy, Least Recently Used (LRU) is selected as the default one for ICN because of its low complexity, although its ability to identify the popular content is poor. Hence, the identification of popular contents should be completed by the cache permission policy. In this paper, a cache permission policy called Cache-Filter, whose complexity is O(1), is proposed, aiming to store popular contents closer to users. Cache-Filter takes the content popularity into account and achieves the goal through the collaboration of on-path nodes. Extensive simulations are conducted to evaluate the performance of Cache-Filter. Leave Copy Down (LCD), Move Copy Down (MCD), Betw, ProbCache, ProbCache+, Prob(p) and Probabilistic Caching with Secondary List (PCSL) are also implemented for comparison. The results show that Cache-Filter performs well. For example, in terms of the distance to access to contents, compared with Leave Copy Everywhere (LCE) used by Named Data Networking (NDN) as the permission policy, Cache-Filter saves over 17% number of hops.

A Study of Visualizing Relational Information - In Mitologia Project - (관계형 정보의 시각화에 관한 연구 - 미톨로지아 프로젝트를 중심으로 -)

  • Jang, Seok-Hyun;Hwang, Hyo-Won;Lee, Kyung-Won
    • Journal of the HCI Society of Korea
    • /
    • v.1 no.1
    • /
    • pp.73-80
    • /
    • 2006
  • Mitologia is about visualizing relations of information in user-oriented method. Most information given in life has invisible relations with each other. By analyzing the common characters and relations of information, we can not only measure the importance of the information but also grasp the overall properties of the information. Especially human relations are the major concerns of social network having several visualization methodologies shown by analyzing relations of each individual in society. We applied social network theory to grasp relationships between characters in Greek mythology representing a limited society. But the current tools of social network analysis have limits that they show the information one-sided way because of the ignorance of user-oriented design. Mitologia attempts to suggest the visual structure model more effective and easy to understand in analyzing data. We extracted connections among myth characters by evaluating classes, frequencies of appearance and emotional links they have. And we raised the understanding of users with furnishing the proper interaction to the information. The initial interface offers 4 kinds of indexes helping to access character nodes easily, while zoom-in function can be used for the detailed relations. The Zoom-in is quite different from usual filtering methods. It makes the irrelative information invisible so that users can find out the characters' relation more easily and quickly. This project suggests the layout to show overall information relationships and the appropriate interactions to present detailed information at the same time.

  • PDF

Effect of Interference in CSMA/CA Based MAC Protocol for Underwater Network (CSMA/CA 기반 수중 통신망에서 간섭의 영향 연구)

  • Song, Min-je;Cho, Ho-shin;Jang, Youn-seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1631-1636
    • /
    • 2015
  • With the advance of wireless communication technology in terrestrial area, underwater communication is also evolving very fast from a simple point-to-point transmission to an elaborate networked communications. Underwater acoustic channel has quite different features comparing with the terrestrial radio channel in terms of propagation delay, Doppler shift, multipath, and path loss. Thus, existing technologies developed for terrestrial communication might not work properly in underwater channel. Especially medium access control (MAC) protocols which highly depend on propagation phenomenon should be newly designed for underwater network. CSMA/CA has drawn lots of attention as a candidate of underwater MAC protocol, since it is able to resolve a packet collision and the hidden node problem. However, a received signal could be degraded by the interferences from the nodes locating outside the receiver's propagation radius. In this paper, we study the effects of interference on the CSMA/CA based underwater network. We derived the SNR with the interference using the sonar equation and analyzed the degradation of the RTS/CTS effects. These results are compared with the terrestrial results to understand the differences. Finally we summarized the design considerations in CSMA/CA based underwater network.

Conceptual Design of Networking Node with Real-time Monitoring for QoS Coordination of Tactical-Mesh Traffic (전술메쉬 트래픽 QoS 조율을 위한 네트워킹 노드의 개념 설계 및 실시간 모니터링)

  • Shin, Jun-Sik;Kang, Moonjoong;Park, Juman;Kwon, Daehoon;Kim, JongWon
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • With the advancement of information and communication technology, tactical networks are continuously being converted to All-IP future tactical networks that integrate all application services based on Internet protocol. Futuristic tactical mesh network is built with tactical WAN (wide area network) nodes that are inter-connected by a mesh structure. In order to guarantee QoS (quality of service) of application services, tactical service mesh (TSM) is suggested as an intermediate layer between infrastructure and application layers for futuristic tactical mesh network. The tactical service mesh requires dynamic QoS monitoring and control for intelligent QoS coordination. However, legacy networking nodes used for existing tactical networks are difficult to support these functionality due to inflexible monitoring support. In order to resolve such matter, we propose a tactical mesh WAN node as a hardware/software co-designed networking node in this paper. The tactical mesh WAN node is conceptually designed to have multi-access networking interfaces and virtualized networking switches by leveraging the DANOS whitebox server/switch. In addition, we explain how to apply eBPF-based traffic monitoring to the tactical mesh WAN node and verify the traffic monitoring feasibility for supporting QoS coordination of tactical-mesh traffic.

Design of detection method for malicious URL based on Deep Neural Network (뉴럴네트워크 기반에 악성 URL 탐지방법 설계)

  • Kwon, Hyun;Park, Sangjun;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.30-37
    • /
    • 2021
  • Various devices are connected to the Internet, and attacks using the Internet are occurring. Among such attacks, there are attacks that use malicious URLs to make users access to wrong phishing sites or distribute malicious viruses. Therefore, how to detect such malicious URL attacks is one of the important security issues. Among recent deep learning technologies, neural networks are showing good performance in image recognition, speech recognition, and pattern recognition. This neural network can be applied to research that analyzes and detects patterns of malicious URL characteristics. In this paper, performance analysis according to various parameters was performed on a method of detecting malicious URLs using neural networks. In this paper, malicious URL detection performance was analyzed while changing the activation function, learning rate, and neural network structure. The experimental data was crawled by Alexa top 1 million and Whois to build the data, and the machine learning library used TensorFlow. As a result of the experiment, when the number of layers is 4, the learning rate is 0.005, and the number of nodes in each layer is 100, the accuracy of 97.8% and the f1 score of 92.94% are obtained.

TV Anytime and MPEG-21 DIA based Ubiquitous Consumption of TV Contents in Digital Home Environment (TV Anytime 및 MPEG-21 DIA 기반 콘텐츠 이동성을 이용한 디지털 홈 환경에서의 유비쿼터스 TV 콘텐츠 소비)

  • Kim Munjo;Yang Chanseok;Lim Jeongyeon;Kim Munchurl;Park Sungjin;Kim Kwanlae;Oh Yunje
    • Journal of Broadcast Engineering
    • /
    • v.10 no.4 s.29
    • /
    • pp.557-575
    • /
    • 2005
  • Much research in core technologies has been done to make it possible the ubiquitous video services over various kinds of user information terminals anytime anywhere in the way the users want to consume. In this paper, we design plototypesystem architecture for the ubiquitous TV program content consumption based on user preference via various kinds of intelligent information terminals in digital home environment, and present an implementation and testing results for the prototype system. For the system design, we utilize the TV Anytime specification fur the consumption of TV program contents based on user preference in TV programs, and also use the MPEG-21 DIA (Digital Item Adaptation) tools which are the representation schema formats in order to describe the context information for user environments, user terminal characteristics, user characteristics for universal access and consumption of the preferred TV program contents. The proposed ubiquitous content mobility prototype system is designed to make it possible to seamlessly consume contents by a single user or multiple users via various kinds of user terminals for the TV program contents they watch together. The proposed ubiquitous content mobility prototype system in digital home environment consists of a home server, a display TV terminal, and an intelligent information terminal. We use 42 TV programs contents in eight different genres from four different TV channels in order to test our prototype system.