• Title/Summary/Keyword: Centralized Architecture

Search Result 182, Processing Time 0.023 seconds

Pipelined and Prioritized Round Robin Scheduling in an Input Queueing Switch (입력큐 교환기에서의 우선순위 파이프라인 순환 스케줄링)

  • 이상호;신동렬
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.52 no.6
    • /
    • pp.365-371
    • /
    • 2003
  • Input queued switch is useful for high bandwidth switches and routers because of lower complexity and fewer circuits than output queued. The input queued switch, however, suffers the HOL-Blocking, which limits its throughput to 58%. To overcome HOL-Blocking problem, many input-queued switch controlled by a scheduling algorithm. Most scheduling algorithms are implemented based on a centralized scheduler which restrict the design of the switch architecture. In this paper, we propose a simple scheduler called Pipelined Round Robin (PRR) which is intrinsically distributed by each input port. We presents to show the effectiveness of the proposed scheduler.

An Authentication Mechanism Based on Clustering Architecture in Mobile Ad Hoc Networks (이동 Ad Hoc 네트워크 환경에서 클러스터링 구조에 기반한 인증 메커니즘)

  • Lee, Tao;Shin, Young-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1461-1464
    • /
    • 2005
  • In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories, but those are not well-suited for securing ad hoc networks. Moreover, a fundamental issue of securing mobile ad hoc networks is to ensure mobile nodes can authenticate each other. Because of its strength and efficiency, public key and digital signature is an ideal mechanism to construct the authentication service. Although this is already mature in the internet application, providing public key based authentication is still very challenging in mobile ad hoc networks. In this paper I propose a secure public key authentication service based on clustering model and trust model to protect nodes from getting false public keys of the others efficiently when there are malicious nodes in the network.

  • PDF

A Performance Estimation Simulation of Grouping Method for Performance Elevation under Mobile Database Environment (모바일 데이터베이스 환경하에서의 성능 향상을 위한 군집화 기법의 성능 평가 시뮬레이션)

  • 신성욱;정동원;백두권
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.55-62
    • /
    • 2003
  • The explosive Increase of wireless networks and the advancement of mobile devices lead to the expansion of mobile environment. In accordance with the development of mobile environment, the need to use mobile database is increased sharply, and also it accompanies the related problems. The current mobile database system is based on the centralized method from which a synchronized server manages multiple mobile database management system to synchronize. From this mobile system architecture, several kinds of problems can be detected such as the management of synchronization issues between mobile databases and the transaction management issues. Furthermore, the current mobile database management system does not consider any solution on the fault tolerance. To solve those problems, this paper proposes the mobile agent-based mobile database management system. The proposed system provide high confidence and efficiency by enhancing the network efficiency and fault tolerance through the mobile grouping.

  • PDF

Scalable Quasi-Dynamic-Provisioning-Based Admission Control Mechanism in Differentiated Service Networks

  • Rhee, Woo-Seop;Lee, Jun-Hwa;Yu, Jae-Hoon;Kim, Sang-Ha
    • ETRI Journal
    • /
    • v.26 no.1
    • /
    • pp.27-37
    • /
    • 2004
  • The architecture in a differentiated services (DiffServ) network is based on a simple model that applies a per-class service in the core node of the network. However, because the network behavior is simple, the network structure and provisioning is complicated. If a service provider wants dynamic provisioning or a better bandwidth guarantee, the differentiated services network must use a signaling protocol with QoS parameters or an admission control method. Unfortunately, these methods increase the complexity. To overcome the problems with complexity, we investigated scalable dynamic provisioning for admission control in DiffServ networks. We propose a new scalable $qDPM^2$ mechanism based on a centralized bandwidth broker and distributed measurement-based admission control and movable boundary bandwidth management to support heterogeneous QoS requirements in DiffServ networks.

  • PDF

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

Cloud Radio Access Network: Virtualizing Wireless Access for Dense Heterogeneous Systems

  • Simeone, Osvaldo;Maeder, Andreas;Peng, Mugen;Sahin, Onur;Yu, Wei
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.135-149
    • /
    • 2016
  • Cloud radio access network (C-RAN) refers to the virtualization of base station functionalities by means of cloud computing. This results in a novel cellular architecture in which low-cost wireless access points, known as radio units or remote radio heads, are centrally managed by a reconfigurable centralized "cloud", or central, unit. C-RAN allows operators to reduce the capital and operating expenses needed to deploy and maintain dense heterogeneous networks. This critical advantage, along with spectral efficiency, statistical multiplexing and load balancing gains, make C-RAN well positioned to be one of the key technologies in the development of 5G systems. In this paper, a succinct overview is presented regarding the state of the art on the research on C-RAN with emphasis on fronthaul compression, baseband processing, medium access control, resource allocation, system-level considerations and standardization efforts.

Spectrum Management Models for Cognitive Radios

  • Kaur, Prabhjot;Khosla, Arun;Uddin, Moin
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.222-227
    • /
    • 2013
  • This paper presents an analytical framework for dynamic spectrum allocation in cognitive radio networks. We propose a distributed queuing based Markovian model each for single channel and multiple channels access for a contending user. Knowledge about spectrum mobility is one of the most challenging problems in both these setups. To solve this, we consider probabilistic channel availability in case of licensed channel detection for single channel allocation, while variable data rates are considered using channel aggregation technique in the multiple channel access model. These models are designed for a centralized architecture to enable dynamic spectrum allocation and are compared on the basis of access latency and service duration.

SDN-based Hybrid Distributed Mobility Management

  • Wie, Sunghong
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.2
    • /
    • pp.97-104
    • /
    • 2019
  • Distributed mobility management (DMM) does not use a centralized device. Its mobility functions are distributed among routers; therefore, the mobility services are not limited to the performance and reliability of specific mobility management equipment. The DMM scheme has been studied as a partially distributed architecture, which distributes only a packet delivery domain in combination with the software defined network (SDN) technology that separates the packet delivery and control areas. Particularly, a separated control area is advantageous in introducing a new service, thereby optimizing the network by recognizing the entire network situation and taking an optimal decision. The SDN-based mobility management scheme is studied as a method to optimize the packet delivery path whenever a mobile node moves; however, it results in excessive signaling processing cost. To reduce the high signaling cost, we propose a hybrid distributed mobility management method and analyze its performance mathematically.

A Systematic Treat Model for Software-Defined Networking

  • Zhang, Wenbin;Wu, Zehui;Wei, Qiang;Yuan, Huijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.580-599
    • /
    • 2021
  • Software-Defined Networking (SDN) has three key features: separation of control and forwarding, centralized control, and network programmability. While improving network management flexibility, SDN has many security issues. This paper systemizes the security threats of SDN using spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege (STRIDE) model to understand the current security status of SDN. First, we introduce the network architecture and data flow of SDN. Second, we analyze security threats of the six types given in the STRIDE model, aiming to reveal the vulnerability mechanisms and assess the attack surface. Then, we briefly describe the corresponding defense technologies. Finally, we summarize the work of this paper and discuss the trends of SDN security research.

Technological Trends in Open 5G Fronthaul (개방형 5G 프론트홀 기술 동향)

  • Lee, J.S.;Park, J.W.;Lee, M.S.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.3
    • /
    • pp.1-10
    • /
    • 2022
  • Traditional centralized radio access network architecture used for 4G is based on Option 8, a functional split between PHY and RF. This option is commonly used with a fronthaul interface based on common public radio interface (CPRI) specifications; however, the increased data rates in 5G make this option impractical because of the fronthaul interface's high bandwidth requirement. Since CPRI specifications have many vendor-specific options, achieving multi-vendor interoperability becomes challenging. Open RAN (O-RAN) Alliance is developing novel open fronthaul interface specifications based on the functional split Option 7-2x, one of the intra-PHY split options, to relax the bandwidth requirement of the fronthaul interface and achieve multi-vendor interoperability. This article provides a brief overview of the various functional split options for 5G fronthaul that have been reported so far and existing fronthaul technologies. Further, the technological trends in the 5G open fronthaul interface is discussed, focusing on the O-RAN Alliance specifications under standardization.