• Title/Summary/Keyword: En-Router

Search Result 5, Processing Time 0.016 seconds

ARARO: Aggregate Router-Assisted Route Optimization for Mobile Network Support

  • Rho, Kyung-Taeg;Jung, Soo-Mok
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.11 no.4
    • /
    • pp.9-17
    • /
    • 2007
  • Network Mobility basic support protocol (NEMO Basic) extends the operation of Mobile IPv6 to provide uninterrupted Internet connectivity to the communicating nodes of mobile networks. The protocol uses a mobile router (MR) in the mobile network to perform prefix scope binding updates with its home agent (HA) to establish a bi-directional tunnel between the HA and MR. This solution reduces location-update signaling by making network movements transparent to the mobile nodes (MNs) behind the MR. However, delays in data delivery and higher overheads are likely to occur because of sub-optimal routing and multiple encapsulation of data packets. To manage the mobility of the mobile network, it is important to minimize packet overhead, to optimize routing, and to reduce the volume of handoff signals over the nested mobile network. This paper proposes en aggregate router-assisted route optimization (ARARO) scheme for nested mobile networks support which introduces a local anchor router in order to localize handoff and to optimize routing. With ARARO, a mobile network node (MNN) behind a MR performs route optimization with a correspondent node (CN) as the MR sends a binding update message (BU) to aggregate router (AGR) via root-MR on behalf of all active MNNs when the mobile network moves. This paper describes the new architecture and mechanisms and provides simulation results which indicate that our proposal reduces transmission delay, handoff latency and signaling overhead. To evaluate the scheme, we present the results of simulation.

  • PDF

A New Architecture for Packet Classification

  • Lee, Bo-Mi;Yoon, Myung-Hee;Lim, Hye-Sook
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.179-182
    • /
    • 2004
  • The process of categorizing packets into 'class' in an Internet router is called packet classification. All packets with same class obey predefined rule specified in routing tables. Performing classification in real time on an arbitrary number of fields is a very challenge task. In this paper, we present a new algorithm named EnBiT-PC (EnBiT Packet Classification). and evaluate its performance against real classifiers in use today. We compare with previous algorithms, and found out that EnBiT-PC classify packets very efficiently and has relatively small storage requirements.

  • PDF

ADE: Agent Development Environment for Engineering (ADE : 공학 에이전트 개발 환경)

  • 구본석;이수홍
    • Korean Journal of Computational Design and Engineering
    • /
    • v.8 no.1
    • /
    • pp.55-63
    • /
    • 2003
  • ADE i,1 a software tool for the design and implementation of multi-agent systems. ADE allows a designer to draw a multi-agent system graphically, specify the necessary properties, and deploy their applications. ADE offers a set of intuitive, easy to use interfaces that enable a designer to completely specify the agents and agent interactions in a multi-agent system. In this environment, JATLite/sup [1]/ is improved significantly. Furthermore, ADE provides a unique set of features for a multi-agent system design tool. An agent description method based on Design roadmap/sup [2]/ theory, a hierarchy of agents, and a fully featured Java-based Graphical User Interface are combined in ADE. This distinct combination of features mates ADE stand out among the existing multi-agent system design tools. This paper presents the research related to the application of the ADE, along with descriptions of its design and implementation.

A New Pipelined Binary Search Architecture for IP Address Lookup (IP 어드레스 검색을 위한 새로운 pipelined binary 검색 구조)

  • Lim Hye-Sook;Lee Bo-Mi;Jung Yeo-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.18-28
    • /
    • 2004
  • Efficient hardware implementation of address lookup is one of the most important design issues of internet routers. Address lookup significantly impacts router performance since routers need to process tens-to-hundred millions of packets per second in real time. In this paper, we propose a practical IP address lookup structure based on the binary tree of prefixes of different lengths. The proposed structure produces multiple balanced trees, and hence it solve the issues due to the unbalanced binary prefix tree of the existing scheme. The proposed structure is implemented using pipelined binary search combined with a small size TCAM. Performance evaluation results show that the proposed architecture requires a 2000-entry TCAM and total 245 kbyte SRAMs to store about 30,000 prefix samples from MAE-WEST router, and an address lookup is achieved by a single memory access. The proposed scheme scales very well with both of large databases and longer addresses as in IPv6.

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.