• 제목/요약/키워드: Hierarchical Network

검색결과 975건 처리시간 0.026초

콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법 (A Content-Name Encoding Scheme for CCN)

  • 김대엽
    • 한국멀티미디어학회논문지
    • /
    • 제17권6호
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.

An Analysis of Effects of TMN Functions on Performance of ATM Switches Using Jackson's Network

  • 허동현;정상욱;이길행
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2001년도 추계학술발표논문집 (하)
    • /
    • pp.1533-1536
    • /
    • 2001
  • This paper considers the TMN system for management of public ATM switching network which has the four-level hierarchical structure consisting of one network management system, a few element management system and several agent-ATM switch pairs, respectively. The effects of one TMN command on the local call processing performance of the component ATM switch an analyzed using Jackson's queueing model. The TMN command considered is the permanent virtual call connection, and the performance measures of ATM switch are the utilization, mean queue length and mean waiting time for the processor interfacing the subscriber lines and trunks directly, and the call setup delay of the ATM switch.

  • PDF

비계층 통신망에서의 포화 경로 선정 알고리즘의 성능분석 (Performance Analysis of Saturation Routing Algorithm in Non-Hierarchical Networks)

  • 박영철
    • 디지털콘텐츠학회 논문지
    • /
    • 제3권1호
    • /
    • pp.89-99
    • /
    • 2002
  • 포화 경로 선정 알고리즘은 주로 전술적 응용 및 패킷 라디오 망에 유용한 경로 선정 알고리즘으로 알려져 있는데, 이유는 통화로 개설 시간이 짧고 경로 선정 테이블을 갖고 있지 않기 때문이다. 통신망 효율 면에서는 통제 메시지의 오버 해드로 인해 약점이 있기도 하다. 본 논문에서는 4개의 링크로 구성된 격자형 전술 회선 교환망에 두개의 우선 순위 음성 트래픽을 갖는 망을 고려하였다. 최소 1차 미분 길이를 갖는 경로를 이용하여 통화로 개설 시간 및 알고리즘 처리 부하를 증가 시키지 않으면서 회선망의 차단 확률을 향상 시켰다.

  • PDF

A Study of Cluster Head Election of TEEN applying the Fuzzy Inference System

  • Song, Young-il;Jung, Kye-Dong;Lee, Seong Ro;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • 제5권1호
    • /
    • pp.66-72
    • /
    • 2016
  • In this paper, we proposed the clustering algorithm using fuzzy inference system for improving adaptability the cluster head selection of TEEN. The stochastic selection method cannot guarantee available of cluster head. Furthermore, because the formation of clusters is not optimized, the network lifetime is impeded. To improve this problem, we propose the algorithm that gathers attributes of sensor node to evaluate probability to be cluster head.

Improvement of cluster head selection method in L-SEP

  • Jin, Seung Yeon;Jung, Kye-Dong;Lee, Jong-Yong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제9권4호
    • /
    • pp.51-58
    • /
    • 2017
  • This paper deals with the improvement of cluster head selection method in L-SEP for heterogeneous nodes among hierarchical routing protocols of wireless sensor network. Wireless sensor networks are classified into homogeneous and heterogeneous network. In heterogeneous network, SEP, L-SEP are mainly used because cluster head selection probability is different depending on node type. But, since protocol based on SEP has different cluster head selection probabilities depending on the node type, clusters that transmit data inefficiently can be formed. to improve this, it is necessary to select the cluster head that minimizes the transmission distance of member node and the cluster head. Therefore, we propose a protocol that improve the cluster head selection method.

A Performance Analysis of TMN Systems Using Models of Networks of Queues, Jackson's Theorem, and Simulation

  • Hwang, Young-Ha;Chung, Sang-Wook;Lee, Gil-Haeng;Kim, Young-Il
    • ETRI Journal
    • /
    • 제24권5호
    • /
    • pp.381-390
    • /
    • 2002
  • We analyze the performance of a telecommunications management network (TMN) system using models of networks of queues, Jackson's theorem, and simulation. TMN systems for managing public asynchronous transfer mode (ATM) networks generally have a four-level hierarchical structure consisting of a network management system, a few element management systems (EMSs), and several pairs of agents and ATM switches. We construct a Jackson's queuing network and present formulae to calculate its performance measures: distributions of queue lengths and waiting times, mean message response time, and maximum throughput. We perform a numerical analysis and a simulation analysis and compare the results.

  • PDF

Mobile Ad - hoc Network에서 CP - SVM을 이용한 침입탐지 (Intrusion Detection Algorithm in Mobile Ad-hoc Network using CP-SVM)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권2호
    • /
    • pp.41-47
    • /
    • 2012
  • MANET has vulnerable structure on security owing to structural characteristics as follows. MANET consisted of moving nodes is that every nodes have to perform function of router. Every node has to provide reliable routing service in cooperation each other. These properties are caused by expose to various attacks. But, it is difficult that position of environment intrusion detection system is established, information is collected, and particularly attack is detected because of moving of nodes in MANET environment. It is not easy that important profile is constructed also. In this paper, conformal predictor - support vector machine(CP-SVM) based intrusion detection technique was proposed in order to do more accurate and efficient intrusion detection. In this study, IDS-agents calculate p value from collected packet and transmit to cluster head, and then other all cluster head have same value and detect abnormal behavior using the value. Cluster form of hierarchical structure was used to reduce consumption of nodes also. Effectiveness of proposed method was confirmed through experiment.

MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구 (The Study of Hierarchical Intrusion Detection Based on Rules for MANET)

  • 정혜원
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

계층형 신경회로망을 이용한 염색체 핵형 분류 (Karyotype Classification of Chromosome Using the Hierarchical Neu)

  • 장용훈;이영진;이권순
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1998년도 하계학술대회 논문집 B
    • /
    • pp.555-559
    • /
    • 1998
  • The human chromosome analysis is widely used to diagnose genetic disease and various congenital anomalies. Many researches on automated chromosome karyotype analysis have been carried out, some of which produced commercial systems. However, there still remains much room for improving the accuracy of chromosome classification. In this paper, We proposed an optimal pattern classifier by neural network to improve the accuracy of chromosome classification. The proposed pattern classifier was built up of two-step multi-layer neural network(TMANN). We reconstructed chromosome image to improve the chromosome classification accuracy and extracted four morphological features parameters such as centromeric index (C.I.), relative length ratio(R.L.), relative area ratio(R.A.) and chromosome length(C.L.). These Parameters employed as input in neural network by preprocessing twenty human chromosome images. The experiment results shown that the chromosome classification error was reduced much more than that of the other classification methods.

  • PDF

국방전산망의 주소지정방식 설계에 관한 연구 (A Study on the Design of Addressing in Defense Computer Network)

  • 박종태;김화수;라용수
    • 한국국방경영분석학회지
    • /
    • 제18권2호
    • /
    • pp.44-55
    • /
    • 1992
  • According to the plan on Defense Computer Network, hundreds of troops and ten thousands of end users will be joined in the Defense Computer Networn the near future. Thus, we need hierarchical addressing methods between source station and destination station in order to send a message efficiently. On the basis of the above background, we proposed the addressing methods for both TCP/IP environment which is a current standard protocol and OSI environment which will be a future protocol in this paper. The network interface. routings and address management have considered in our proposed addressing methods.

  • PDF