• Title/Summary/Keyword: Hierarchical Network

Search Result 975, Processing Time 0.024 seconds

A Content-Name Encoding Scheme for CCN (콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.

An Analysis of Effects of TMN Functions on Performance of ATM Switches Using Jackson's Network

  • Hyu, Dong-Hyun;Chung, Sang-Wook;Lee, Gil-Haeng
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1533-1536
    • /
    • 2001
  • This paper considers the TMN system for management of public ATM switching network which has the four-level hierarchical structure consisting of one network management system, a few element management system and several agent-ATM switch pairs, respectively. The effects of one TMN command on the local call processing performance of the component ATM switch an analyzed using Jackson's queueing model. The TMN command considered is the permanent virtual call connection, and the performance measures of ATM switch are the utilization, mean queue length and mean waiting time for the processor interfacing the subscriber lines and trunks directly, and the call setup delay of the ATM switch.

  • PDF

Performance Analysis of Saturation Routing Algorithm in Non-Hierarchical Networks (비계층 통신망에서의 포화 경로 선정 알고리즘의 성능분석)

  • Park Young-Chul
    • Journal of Digital Contents Society
    • /
    • v.3 no.1
    • /
    • pp.89-99
    • /
    • 2002
  • Saturation routing algorithm is known to be an effective routing mechanism for tactical application and packet radio networks, since it minimizes the call set-up time and does not have to maintain routing tables. But, it is known that it has significant drawbacks with respect to the network efficiency, the overhead on the control messages [1]. We consider a tactical circuit-switched grid network with a maximum of tour links and two priority classes of voice traffic. Using the minimum first-derivative length (MFDL) path, we improve the blocking probability performance of a circuit-switched network without increasing the call set-up time and processor loading of the algorithm.

  • PDF

A Study of Cluster Head Election of TEEN applying the Fuzzy Inference System

  • Song, Young-il;Jung, Kye-Dong;Lee, Seong Ro;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • v.5 no.1
    • /
    • pp.66-72
    • /
    • 2016
  • In this paper, we proposed the clustering algorithm using fuzzy inference system for improving adaptability the cluster head selection of TEEN. The stochastic selection method cannot guarantee available of cluster head. Furthermore, because the formation of clusters is not optimized, the network lifetime is impeded. To improve this problem, we propose the algorithm that gathers attributes of sensor node to evaluate probability to be cluster head.

Improvement of cluster head selection method in L-SEP

  • Jin, Seung Yeon;Jung, Kye-Dong;Lee, Jong-Yong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.51-58
    • /
    • 2017
  • This paper deals with the improvement of cluster head selection method in L-SEP for heterogeneous nodes among hierarchical routing protocols of wireless sensor network. Wireless sensor networks are classified into homogeneous and heterogeneous network. In heterogeneous network, SEP, L-SEP are mainly used because cluster head selection probability is different depending on node type. But, since protocol based on SEP has different cluster head selection probabilities depending on the node type, clusters that transmit data inefficiently can be formed. to improve this, it is necessary to select the cluster head that minimizes the transmission distance of member node and the cluster head. Therefore, we propose a protocol that improve the cluster head selection method.

A Performance Analysis of TMN Systems Using Models of Networks of Queues, Jackson's Theorem, and Simulation

  • Hwang, Young-Ha;Chung, Sang-Wook;Lee, Gil-Haeng;Kim, Young-Il
    • ETRI Journal
    • /
    • v.24 no.5
    • /
    • pp.381-390
    • /
    • 2002
  • We analyze the performance of a telecommunications management network (TMN) system using models of networks of queues, Jackson's theorem, and simulation. TMN systems for managing public asynchronous transfer mode (ATM) networks generally have a four-level hierarchical structure consisting of a network management system, a few element management systems (EMSs), and several pairs of agents and ATM switches. We construct a Jackson's queuing network and present formulae to calculate its performance measures: distributions of queue lengths and waiting times, mean message response time, and maximum throughput. We perform a numerical analysis and a simulation analysis and compare the results.

  • PDF

Intrusion Detection Algorithm in Mobile Ad-hoc Network using CP-SVM (Mobile Ad - hoc Network에서 CP - SVM을 이용한 침입탐지)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.41-47
    • /
    • 2012
  • MANET has vulnerable structure on security owing to structural characteristics as follows. MANET consisted of moving nodes is that every nodes have to perform function of router. Every node has to provide reliable routing service in cooperation each other. These properties are caused by expose to various attacks. But, it is difficult that position of environment intrusion detection system is established, information is collected, and particularly attack is detected because of moving of nodes in MANET environment. It is not easy that important profile is constructed also. In this paper, conformal predictor - support vector machine(CP-SVM) based intrusion detection technique was proposed in order to do more accurate and efficient intrusion detection. In this study, IDS-agents calculate p value from collected packet and transmit to cluster head, and then other all cluster head have same value and detect abnormal behavior using the value. Cluster form of hierarchical structure was used to reduce consumption of nodes also. Effectiveness of proposed method was confirmed through experiment.

The Study of Hierarchical Intrusion Detection Based on Rules for MANET (MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구)

  • Jung, Hye Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

Karyotype Classification of Chromosome Using the Hierarchical Neu (계층형 신경회로망을 이용한 염색체 핵형 분류)

  • Chang, Yong-Hoon;Lee, Young-Jin;Lee, Kwon-Soon
    • Proceedings of the KIEE Conference
    • /
    • 1998.07b
    • /
    • pp.555-559
    • /
    • 1998
  • The human chromosome analysis is widely used to diagnose genetic disease and various congenital anomalies. Many researches on automated chromosome karyotype analysis have been carried out, some of which produced commercial systems. However, there still remains much room for improving the accuracy of chromosome classification. In this paper, We proposed an optimal pattern classifier by neural network to improve the accuracy of chromosome classification. The proposed pattern classifier was built up of two-step multi-layer neural network(TMANN). We reconstructed chromosome image to improve the chromosome classification accuracy and extracted four morphological features parameters such as centromeric index (C.I.), relative length ratio(R.L.), relative area ratio(R.A.) and chromosome length(C.L.). These Parameters employed as input in neural network by preprocessing twenty human chromosome images. The experiment results shown that the chromosome classification error was reduced much more than that of the other classification methods.

  • PDF

A Study on the Design of Addressing in Defense Computer Network (국방전산망의 주소지정방식 설계에 관한 연구)

  • Park Jong-Tae;Kim Hwa-Su;Ra Yong-Su
    • Journal of the military operations research society of Korea
    • /
    • v.18 no.2
    • /
    • pp.44-55
    • /
    • 1992
  • According to the plan on Defense Computer Network, hundreds of troops and ten thousands of end users will be joined in the Defense Computer Networn the near future. Thus, we need hierarchical addressing methods between source station and destination station in order to send a message efficiently. On the basis of the above background, we proposed the addressing methods for both TCP/IP environment which is a current standard protocol and OSI environment which will be a future protocol in this paper. The network interface. routings and address management have considered in our proposed addressing methods.

  • PDF