• Title/Summary/Keyword: Computer Network

Search Result 12,667, Processing Time 0.039 seconds

Clustering Algorithms for Reducing Energy Consumption - A Review

  • Kinza Mubasher;Rahat Mansha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.109-118
    • /
    • 2023
  • Energy awareness is an essential design flaw in wireless sensor network. Clustering is the most highly regarded energy-efficient technique that offers various benefits such as energy efficiency and network lifetime. Clusters create hierarchical WSNs that introduce the efficient use of limited sensor node resources and thus enhance the life of the network. The goal of this paper is to provide an analysis of the various energy efficient clustering algorithms. Analysis is based on the energy efficiency and network lifetime. This review paper provides an analysis of different energy-efficient clustering algorithms for WSNs.

Implementation of a security system using the MITM attack technique in reverse

  • Rim, Young Woo;Kwon, Jung Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.9-17
    • /
    • 2021
  • In this paper, we propose a reversely using the "Man In The Middle Attack" attack technique as a way to introduce network security without changing the physical structure and configuration of the existing network, a Virtual Network Overlay is formed with only a single Ethernet Interface. Implementing In-line mode to protect the network from external attacks, we propose an integrated control method through a micro network security sensor and cloud service. As a result of the experiment, it was possible to implement a logical In-line mode by forming a Virtual Network Overlay with only a single Ethernet Interface, and to implement Network IDS/IPS, Anti-Virus, Network Access Control, Firewall, etc.,. It was possible to perform integrated monitor and control in the service. The proposed system in this paper is helpful for small and medium-sized enterprises that expect high-performance network security at low cost, and can provide a network security environment with safety and reliability in the field of IoT and embedded systems.

Opportunity Coefficient for Cluster-Head Selection in LEACH Protocol

  • Soh, Ben;AlZain, Mohammed;Lozano-Claros, Diego;Adhikari, Basanta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.6-11
    • /
    • 2021
  • Routing protocols play a pivotal role in the energy management and lifespan of any Wireless Sensor Network. Lower network lifetime has been one of the biggest concerns in LEACH protocol due to dead nodes. The LEACH protocol suffers from uneven energy distribution problem due to random selection of a cluster head. The cluster head has much greater responsibility compared to other non- cluster head nodes and consumes greater energy for its roles. This results in early dead nodes due to energy lost for the role of cluster- head. This study proposes an approach to balance the energy consumption of the LEACH protocol by using a semi-deterministic opportunity coefficient to select the cluster head. This is calculated in each node with the battery energy level and node ID. Ultimately, based on the opportunity cost, cluster head will be selected and broadcasted for which other nodes with higher opportunity cost will agree. It minimizes the chances of nodes with lower battery level being elected as cluster head. Our simulation experiments demonstrate that cluster heads chosen using our proposed algorithm perform better than those using the legacy LEACH protocol.

Developing a Quality Prediction Model for Wireless Video Streaming Using Machine Learning Techniques

  • Alkhowaiter, Emtnan;Alsukayti, Ibrahim;Alreshoodi, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.229-234
    • /
    • 2021
  • The explosive growth of video-based services is considered as the dominant contributor to Internet traffic. Hence it is very important for video service providers to meet the quality expectations of end-users. In the past, the Quality of Service (QoS) was the key performance of networks but it considers only the network performances (e.g., bandwidth, delay, packet loss rate) which fail to give an indication of the satisfaction of users. Therefore, Quality of Experience (QoE) may allow content servers to be smarter and more efficient. This work is motivated by the inherent relationship between the QoE and the QoS. We present a no-reference (NR) prediction model based on Deep Neural Network (DNN) to predict video QoE. The DNN-based model shows a high correlation between the objective QoE measurement and QoE prediction. The performance of the proposed model was also evaluated and compared with other types of neural network architectures, and three known machine learning methodologies, the performance comparison shows that the proposed model appears as a promising way to solve the problems.

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

HoAaRO: Home Agent-Assisted Route Optimization Protocol for Nested Network

  • Sun, Shi-Min;Lee, Sang-Min;Nam, Ki-Ho;Kim, Jong-Wan;Yoo, Jae-Pil;Kim, Kee-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1035-1038
    • /
    • 2008
  • Network mobility (NEMO) has been studied extensively due to its potential applications in military and public transportation. NEMO Basic Support Protocol (NBSP) [1], the current NEMO standard based on mobile IPv6, can be readily deployed using the existing mobile IPv6 infrastructure. However, for Nested network mobility, multi-level tunnel and too many Binding Update packets results in substantial performance overhead, generally known as route sub-optimality, especially in the bottleneck root mobile router (root-MR) and Access Router. In this paper, we propose a route optimization mechanism for nested network mobility management to reduce the overhead of root-MR. In this system, Mobile Router (MR) has a cache that stores Mobile Network Nodes' (MNN) information, Correspondent Nodes' (CN) information for every MNN,and the attachments information with its subnet MRs. Home Agent performs Binding Update with CNs responsible for MRs. Through this mechanism, the number of tunnel is limited between CN and MR and the overhead of root-MR is reduced obviously.

Design for an Efficient Architecture for a Reflective Memory System and its Implementation

  • Baek, Il-Joo;Shin, Soo-Young;Choi, Jae-Young;Park, Tae-Rim;Kwon, Wook-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1767-1770
    • /
    • 2003
  • This paper proposes an efficient network architecture for reflective memory system (RMS). Using this architecture, the time for broadcasting a shared-data to all nodes can be significantly shortened. The device named topology conversion switch (TCS) is implemented to realize the network architecture. The implemented TCS is applied to the ethernet based real time control network (ERCnet) to evaluate the performance.

  • PDF

Research on the Energy Hole Problem Based on Non-uniform Node Distribution for Wireless Sensor Networks

  • Liu, Tang;Peng, Jian;Wang, Xiao-Fen;Yang, Jin;Guo, Bing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2017-2036
    • /
    • 2012
  • Based on the current solutions to the problem of energy hole, this paper proposed a nonuniform node distribution clustering algorithm, NNDC. Firstly, we divide the network into rings, and then have an analysis and calculation on nodes' energy consumption in each ring of the network when clustering algorithm is applied to collect data. We also put forward a scheme of nonuniform node distribution on the basis of the proportion of nodes' energy consumption in each ring, and change nodes' active/hibernating states under density control mechanism when network coverage is guaranteed. Simulation shows NNDC algorithm can satisfyingly balance nodes' energy consumption and effectively avoid the problem of energy hole.

A Study on Multicast Routing Metric for Wireless Mesh Network (WMN의 멀티캐스트 라우팅 메트릭에 대한 연구)

  • Gao, Hui;Lee, Hyung-Ok;Nam, Ji-Seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.01a
    • /
    • pp.101-103
    • /
    • 2012
  • This paper gives an introduction to multicast in wireless mesh networks. The factors to be addressed when designing a multicast protocol for wireless mesh network are presented. Emphases are paid on selection of multicast routing metrics in wireless mesh networks. Also details of adapting these metrics to gain high-throughput multicast in wireless mesh network are described in the paper.

  • PDF

Design for Network Design Architecture Using Database System (데이터베이스를 이용한 망 설계 구조의 설계)

  • Lee, Min-Hee;Kim, Young-Jae;Yoon, Kyeong-Mo;Kim, Byung-Jae;Lee, Yong-Gi;Kim, Dong-Hyuk;Lee, Chan-Seob;Choi, Eui-In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.19-22
    • /
    • 2002
  • 기존의 광선로 특성 데이터에 대한 관리는 대부분 수작업에 의존하였기 때문에 처리 절차가 제대로 정립되어 있지 않고 사용의 어려움이 많았다. 이로 인해 선로 자원의 사용이 원활하지 못하였고, 최적의 땅 구축하는데 많은 시간이 소요되는 등 많은 문제점들이 도출되었다. 따라서, 이러한 문제점을 해결하기 위해 본 논문에서는 수작업에 의존했던 황 선로의 특성 정보 데이터를 데이터베이스화하고, 구축된 데이터베이스를 통해 최적의 광통신망 설계를 지원할 수 있도록 망 설계 처리 구조를 제안한다.

  • PDF