• Title/Summary/Keyword: Complete network

Search Result 516, Processing Time 0.029 seconds

A Simulation Study of MAC Protocol Based on Beacon Mode for Considering IEEE 802.15.7 Star Topology Visible Personal Area Network System (IEEE 802.15.7 스타 토폴로지 VPAN 시스템을 고려한 비콘 모드 기반 MAC 프로토콜 성능 평가)

  • Hwang, Junho;Yoo, Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.247-256
    • /
    • 2013
  • According to the complete standard document for PHY/MAC layer of visible light communication through the IEEE 802.15.7 WG on Sept. 2011, visible light communication lays a good foundation for developing a variety of application services. Thus, visible light communication moves to the advanced research period for developing application services, but most of applications are limited only to PtP service model. However, PtMP communication environment for VLC is required to accommodate more various applications. In this paper, we analyze an effect of key parameters on network performance in the star topology based visible personal area network system. We implement a simulator with considering attributes of PHY and MAC layer which are defined by IEEE 802.15.7 standard documents, and analyze the VLC performance.

Bandwidth Management of WiMAX Systems and Performance Modeling

  • Li, Yue;He, Jian-Hua;Xing, Weixi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.2
    • /
    • pp.63-81
    • /
    • 2008
  • WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, large service coverage, and flexible quality of services (QoS). Due to the large number of connections and flexible QoS supported by WiMAX, the uplink access in WiMAX networks is very challenging since the medium access control (MAC) protocol must efficiently manage the bandwidth and related channel allocations. In this paper, we propose and investigate a cost-effective WiMAX bandwidth management scheme, named the WiMAX partial sharing scheme (WPSS), in order to provide good QoS while achieving better bandwidth utilization and network throughput. The proposed bandwidth management scheme is compared with a simple but inefficient scheme, named the WiMAX complete sharing scheme (WCPS). A maximum entropy (ME) based analytical model (MEAM) is proposed for the performance evaluation of the two bandwidth management schemes. The reason for using MEAM for the performance evaluation is that MEAM can efficiently model a large-scale system in which the number of stations or connections is generally very high, while the traditional simulation and analytical (e.g., Markov models) approaches cannot perform well due to the high computation complexity. We model the bandwidth management scheme as a queuing network model (QNM) that consists of interacting multiclass queues for different service classes. Closed form expressions for the state and blocking probability distributions are derived for those schemes. Simulation results verify the MEAM numerical results and show that WPSS can significantly improve the network’s performance compared to WCPS.

A Formal Modeling for Temporal and Active Properties of Managed Object Behavior (망관리 객체의 시간지원 능동 특성에 대한 전형적 모델링)

  • Choe, Eun-Bok;Lee, Hyeong-Ho;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2479-2492
    • /
    • 1999
  • Network management system(NMS) provides not only effective monitoring and controlling of network which consists of heterogeneous network elements but prompt response to users' need for high-level communication services. Recommendations of ITU-T and ISO stipulate the managerial abstraction of static and dynamic characteristics of network elements, management functions as well as management communication protocol. But the current description method does not provide the formal mechanism for the behavior characteristics of managed objects in clear manner but in natural language form, the complete specification of managed objects is not fully described. In this paper, we describe determinants for the behaviour of managed objects applicable to every managed object, and present a language for specifying behavioral aspects of managed objects based on their temporal and active properties.

  • PDF

The Effect of the Buffer Size in QoS for Multimedia and bursty Traffic: When an Upgrade Becomes a Downgrade

  • Sequeira, Luis;Fernandez-Navajas, Julian;Saldana, Jose
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3159-3176
    • /
    • 2014
  • This work presents an analysis of the buffer features of an access router, especially the size, the impact on delay and the packet loss rate. In particular, we study how these features can affect the Quality of Service (QoS) of multimedia applications when generating traffic bursts in local networks. First, we show how in a typical SME (Small and Medium Enterprise) network in which several multimedia flows (VoIP, videoconferencing and video surveillance) share access, the upgrade of the bandwidth of the internal network may cause the appearance of a significant amount of packet loss caused by buffer overflow. Secondly, the study shows that the bursty nature of the traffic in some applications traffic (video surveillance) may impair their QoS and that of other services (VoIP and videoconferencing), especially when a certain number of bursts overlap. Various tests have been developed with the aim of characterizing the problems that may appear when network capacity is increased in these scenarios. In some cases, especially when applications generating bursty traffic are present, increasing the network speed may lead to a deterioration in the quality. It has been found that the cause of this quality degradation is buffer overflow, which depends on the bandwidth relationship between the access and the internal networks. Besides, it has been necessary to describe the packet loss distribution by means of a histogram since, although most of the communications present good QoS results, a few of them have worse outcomes. Finally, in order to complete the study we present the MOS results for VoIP calculated from the delay and packet loss rate.

Virtual Source and Flooding-Based QoS Unicast and Multicast Routing in the Next Generation Optical Internet based on IP/DWDM Technology (IP/DWDM 기반 차세대 광 인터넷 망에서 가상 소스와 플러딩에 기초한 QoS 제공 유니캐스트 및 멀티캐스트 라우팅 방법 연구)

  • Kim, Sung-Un;Park, Seon-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.33-43
    • /
    • 2011
  • Routing technologies considering QoS-based hypermedia services have been seen as a crucial network property in next generation optical Internet (NGOI) networks based on IP/dense-wavelength division multiplexing (DWDM). The huge potential capacity of one single fiber. which is in Tb/s range, can be exploited by applying DWDM technology which transfers multiple data streams (classified and aggregated IP traffics) on multiple wavelengths (classified with QoS-based) simultaneously. So, DWDM-based optical networks have been a favorable approach for the next generation optical backbone networks. Finding a qualified path meeting the multiple constraints is a multi-constraint optimization problem, which has been proven to be NP-complete and cannot be solved by a simple algorithm. The majority of previous works in DWDM networks has viewed heuristic QoS routing algorithms (as an extension of the current Internet routing paradigm) which are very complex and cause the operational and implementation overheads. This aspect will be more pronounced when the network is unstable or when the size of network is large. In this paper, we propose a flooding-based unicast and multicast QoS routing methodologies(YS-QUR and YS-QMR) which incur much lower message overhead yet yields a good connection establishment success rate. The simulation results demonstrate that the YS-QUR and YS-QMR algorithms are superior to the previous routing algorithms.

Development of the Automatic Method for Detecting the National River Networks Using the Sentinel-2 Satellite Imagery -A Case Study for Han River, Seoul- (Sentinel-2 위성영상을 활용하여 국가하천망 제작을 위한 자동화 기술 개발 -서울시 한강을 사례로-)

  • KIM, Seon-Woo;KWON, Yong-Ha;CHUNG, Youn-In;CHOUNG, Yun-Jae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.2
    • /
    • pp.88-99
    • /
    • 2022
  • The river network is one of the essential topographical characteristics in river management. The river network which as previously constructed by the ground surveying method has recently begun to be efficiently constructed using the remote sensing datasets. Since it is difficult to remove these obstacles such as bridges in the urban rivers, it is rare to construct the urban river networks with the various obstacles. In this study, the Sentinel-2 satellite imagery was used to develop the automatic method for detecting the urban river networks without the obstacles and with the preserved boundaries as follows. First, the normalized difference water index image was generated using the multispectral bands of the given Sentinel-2 satellite imagery, and the binary image that could classify the water body and other regions was generated. Next, the morphological operations were employed for detecting the complete river networks with the obstacles removed and the boundaries preserved. As a result of applying the proposed methodology to Han River in Seoul, the complete river networks with the obstacles removed and the boundaries preserved were well constructed.

Use of Tree Traversal Algorithms for Chain Formation in the PEGASIS Data Gathering Protocol for Wireless Sensor Networks

  • Meghanathan, Natarajan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.612-627
    • /
    • 2009
  • The high-level contribution of this paper is to illustrate the effectiveness of using graph theory tree traversal algorithms (pre-order, in-order and post-order traversals) to generate the chain of sensor nodes in the classical Power Efficient-Gathering in Sensor Information Systems (PEGASIS) data aggregation protocol for wireless sensor networks. We first construct an undirected minimum-weight spanning tree (ud-MST) on a complete sensor network graph, wherein the weight of each edge is the Euclidean distance between the constituent nodes of the edge. A Breadth-First-Search of the ud-MST, starting with the node located closest to the center of the network, is now conducted to iteratively construct a rooted directed minimum-weight spanning tree (rd-MST). The three tree traversal algorithms are then executed on the rd-MST and the node sequence resulting from each of the traversals is used as the chain of nodes for the PEGASIS protocol. Simulation studies on PEGASIS conducted for both TDMA and CDMA systems illustrate that using the chain of nodes generated from the tree traversal algorithms, the node lifetime can improve as large as by 19%-30% and at the same time, the energy loss per node can be 19%-35% lower than that obtained with the currently used distance-based greedy heuristic.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks

  • Xu, Xiaorong;Hu, Andi;Yao, Yingbiao;Feng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.1-19
    • /
    • 2020
  • In an underlay cognitive simultaneous wireless information and power transfer (SWIPT) network, communication from secondary user (SU) to secondary destination (SD) is accomplished with decode-and-forward (DF) relays. Multiple energy-constrained relays are assumed to harvest energy from SU via power splitting (PS) protocol and complete SU secure information transmission with beamforming. Hence, physical layer security (PLS) is investigated in cognitive SWIPT network. In order to interfere with eavesdropper and improve relay's energy efficiency, a destination-assisted jamming scheme is proposed. Namely, SD transmits artificial noise (AN) to interfere with eavesdropping, while jamming signal can also provide harvested energy to relays. Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization. We solve this non-convex optimization problem via a general two-stage procedure. Firstly, we obtain the optimal beamforming vector through semi-definite relaxation (SDR) method with a fixed power splitting ratio. Secondly, the best power splitting ratio can be obtained by one-dimensional search. We provide simulation results to verify the proposed solution. Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks.

An IBC and Certificate Based Hybrid Approach to WiMAX Security

  • Rodoper, Mete;Trappe, Wade;Jung, Edward Tae-Chul
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.615-625
    • /
    • 2009
  • Worldwide inter-operability for microwave access (WiMAX) is a promising technology that provides high data throughput with low delays for various user types and modes of operation. While much research had been conducted on physical and MAC layers, little attention has been paid to a comprehensive and efficient security solution for WiMAX. We propose a hybrid security solution combining identity-based cryptography (IBC) and certificate based approaches. We provide detailed message exchange steps in order to achieve a complete security that addresses the various kind of threats identified in previous research. While attaining this goal, efficient fusion of both techniques resulted in a 53% bandwidth improvement compared to the standard's approach, PKMv2. Also, in this hybrid approach, we have clarified the key revocation procedures and key lifetimes. Consequently, to the best of knowledge our approach is the first work that unites the advantages of both techniques for improved security while maintaining the low overhead forWiMAX.