• Title/Summary/Keyword: Internet Connectivity

Search Result 333, Processing Time 0.027 seconds

A Method for Minimizing the Number of Clusters in Ad-Hoc Networks (Ad-Hoc 네트워크에서 클러스터 수를 최소화하기 위한 방안)

  • Bang Sang-Won
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.21-30
    • /
    • 2004
  • In Ad-Hoc network, the cluster structure enables effective use of multiple channels, reduces the number of control messages, and increase the scalability of network, Also, it is employed for reducing the number of broadcast messages in an Ad-Hoc network. With the consideration of these advantages, it is desirable that a cluster structure keeps a few clusters in the network, Generally, the cluster formation scheme based on connectivity yields fewer clusters than the other schemes. However, the connectivity based scheme may yield even more clusters than the other schemes according to the network topology. In this paper, a cluster formation scheme dividing the cluster formation into two phases is proposed. In the first phase, the lowest connectivity host in neighborhood initiates the cluster formation. Then, an adjustment procedure for affiliating a lot of the lowest connectivity hosts is employed. In the second phase, the hosts which were not affiliated to the first phase clusters are grouped into one or more clusters through criterions of connectivity and host ID. As a result, the proposed scheme yields a fewer clusters compared with existing other schemes in fully distributed method. The simulation results proves that our scheme is better than LIDCP(3) and HCCP(3).

  • PDF

Internet Revolution in Bangladesh

  • Rahman, Mizanoor
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.65-72
    • /
    • 2004
  • The Internet is a social and economic foundation, apparently destined for human communication and interaction. It is supposed to allow for more interactive and innovative ways for people to do what they do in 'real lift'. There is no shilly-shallying to say that at present, Internet has become a commanding and useful tool for empowerment and income making in developing countries. It is very difficult to say that at present internet has turned into a popular and useful thing among the Bangladeshi people like students, doctors, engineers, businessmen, researchers as well as politician who are being logged into the internet for getting information what they want. Though the Internet was invented in 1970 but it came late in Bangladesh through UUCPs (Unix-to-Unix copy) email connectivity in 1993 and IP connectivity in 1996. Having launched Internet, on June 1996 National polls result were broadcast through the using of World Wide Web (WWW) that was the first ever practice trial in Bangladesh. On June 1996, the government has approved to allow VSAT (Very Small Aperture Terminal) in the country's private sector to operate as Internet Service Provider (ISPs). At the end of year, there were only two ISPs in the country and number of users near about one thousand only. But next year in 1997, the total number of ISPs was more than a dozen and the clientele growth was ten times higher than that of the previous year. From then, the number of Internet users and ISPs are increasing significantly in Bangladesh. About 40 ISP are providing internet service among as many as 3, 20,000 users at present out of almost 130 license holder ISP provider but among the ISPs, most of the ISPs are placed in Dhaka and few are working in Comilla, Sylhet, Rajshahi, Chittagong and Khulna. It should be mention that currently, broadband internet (Radio, Cable) connection is working side by side dial -up connection where broadband accounts 10,000. This paper will have a comprehensive discussion on the current situations of Internet and some of the contemporary issues in the matter concerned.

  • PDF

Cultural Differences in Perceptions on the Convenience of Internet Shopping: Based on Transaction Process Model

  • Kim, Tae-Hwan
    • International Commerce and Information Review
    • /
    • v.7 no.1
    • /
    • pp.19-33
    • /
    • 2005
  • Although the fast advancing information infrastructure makes the connectivity possible to reach almost anywhere, it does not ensure a successful development of e-commerce for every country. The challenge will not come only from the technology, but also from the people. To examine the effect of cultural differences on the perception for Internet shopping, shoppers from two different countries - the U.S. and Korea - were chosen, and the perception for Internet shopping from each is contrasted.

  • PDF

Dynamic Reverse Route for On-Demand Routing Protocol in MANET

  • Zuhairi, Megat;Zafar, Haseeb;Harle, David
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1354-1372
    • /
    • 2012
  • Route establishment in Mobile Ad Hoc Network (MANET) is the key mechanism to a successful connection between a pair of source and destination nodes. An efficient routing protocol constructs routing path with minimal time, less routing overhead and capable of utilizing all possible link connectivity. In general, most on-demand MANET routing protocols operates over symmetrical and bidirectional routing path, which is infeasible due to the inherent heterogeneous properties of wireless devices. Simulation results show that the presence of unidirectional links on a network severely affect the performance of a routing protocol. In this paper, a robust protocol independent scheme is proposed, which enable immediate rediscovery of alternative route for a path blocked by a unidirectional link. The proposed scheme is efficient; route rediscovery is locally computed, which results in significant minimization of multiple route packets flooding. Nodes may exploit route information of immediate neighbors using the local reply broadcast technique, which then redirect the control packets around the unidirectional links, therefore maintaining the end-to-end bidirectional connection. The proposed scheme along with Ad Hoc On-demand Distance Vector (AODV) and AODV-Blacklist routing protocol is investigated over three types of mobility models. Simulation results show that the proposed scheme is extremely reliable under poor network conditions and the route connectivity can be improved by as much as 75%.

Structure Modeling of Machine Tools and Internet-based Implementation (공작기계 구조 모델링과 인터넷 기반 구현)

  • Hong Dong-Phyo;Seo Yoon-Ho;Kim In-Soo;Lee Gyu-Bong;Sheen Dong-Mok
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.785-791
    • /
    • 2005
  • Reconfigurability of machine tools is one of the critical factors to realize the responsive manufacturing systems to satisfy the mass-customization production. This paper presents the methods to model and simulate the machine tools on Internet in response to change in the machining requirements. Specifically, a set of module combination rules and a modeling method of the structure of machine tools using connectivity graph are developed. In response to the user requirements, kinematic relations and structures of machine tools can be derived using the module combination rules and connectivity graph relationships. Internet-based simulator of machine tools is implemented and presented. The developed machine tool simulator can be used to verify the structure of machine tools derived from the user requirements.

  • PDF

Design of the Security Evaluation System for Internet Secure Connectivity Assurance Platform (인터넷 패킷 보호 보증 플랫폼에서의 보안성 평가 시스템 설계)

  • 김상춘;한근희
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.207-216
    • /
    • 2004
  • IPsec protocol has been developed to provide security services to Internet. Recently IPsec is implemented on the various operating systems Hence, it is very important to evaluate the stability of the Ipsec protocol as well as other protocols that provide security services. However, there has been little effort to develop the tools that require to evaluate the stability of IPsec protocols. Therefore, in this paper, we develope the security requirements and suggest a security evaluation system for the Internet packet protection protocols that provide security services at the If level that can be used to check if the security protocols Provide the claimed services correctly This system can be used as debugging tool for developing IPsec based security system.

A Rate Separating Multi-Channel Protocol for Improving Channel Diversity and Node Connectivity in IEEE 802.11 Mesh Networks (IEEE 802.11 메쉬 네트워크에서 채널 다양성과 노드 연결성 향상을 위한 레이트 분할 멀티 채널 프로토콜)

  • Kim, Sok-Hyong;Suh, Young-Joo;Kwon, Dong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12A
    • /
    • pp.1152-1159
    • /
    • 2010
  • Wireless Mesh Networks (WMNs) provides Internet accesses to users by forming backbone networks via wireless links. A key problem of WMN is network capacity. For this, multi-channel and multi-rate functions of IEEE 802.11 can be utilized. Depending on channel assignments, multi-channel determines node connectivity and channel diversity. Also, in IEEE 802.11 multi-rate networks, the rate anomaly problem occurs, the phenomenon that low-rate links degrades the performance of high-rate links. In this paper, we propose rate separating multi-channel (RSMC) protocols that improves the node connectivity and channel diversity, and mitigates the rate anomaly problem. RSMC increases the channel diversity by forming tree-based WMNs and decreases the rate anomaly by separating different rate links on the tree via channels. In addition, it uses network connectivity (NC) algorithm to increase the node connectivity. Through simulations, we demonstrate that the RSMC shows improved performance than existing multi-channel protocols in terms of aggregate throughput, node connectivity, channel diversity.

Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks

  • Mohaisen, Abedelaziz;Nyang, Dae-Hun;AbuHmed, Tamer
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.5
    • /
    • pp.222-238
    • /
    • 2008
  • In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduced. As the communication overhead is one of the most critical constraints of any successful protocol design, we introduce an alternative scheme in which the connectivity is maintained at the same level as in the original work, while the communication overhead is reduced by about 40% of the original overhead, for various carefully chosen parameters. The main modification relies on the use of a two-level key pool design and two round assignment/key establishment phases. Further analysis demonstrates the efficiency of our modification.

Service Provision for Future Access Networks Using PPP Extensions

  • Lee, Jungjoon;Park, Jun-Kyun
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.695-698
    • /
    • 2000
  • The services such as real-time audio and video applications have become increasingly popular, especially over the Internet. Furthermore, as being commercialized those contents on the Internet require quality of service (QoS) support to ensure their performance. PPP is the best solution to of for those kinds of services. The reason why we want to employ PPP is this satisfies most of the requirements associated with remote connectivity to an NSP, such as IP address assignment, security, and AAA (authentication, authorization and accounting). In addition, since ISPs and corporations are familiar with PPP based connectivity, easy migration from existing ISP infrastructure is expected, if QoS is guaranteed. But so for PPP has had no field to ensure the quality of service. This article presents the solution by using some tunneling protocols and the draft [1] that proposed additional LCP option fields to negotiate QoS. To communicate each other, after negotiating those option fields, over various protocols such as ATM, Ethernet, and etc. tunneling protocol is used. Following sections will mention those briefly. And the service provision to offer the end-to-end communication with negotiated QoS will also be proposed.

  • PDF

Mobile Sensor Network Simulator for efficiency Coverage (효율적인 Coverage 결정을 위한 모바일 센서 네트워크 시뮬레이터)

  • Lee, Chang-Wu;Lee, Heon-Jong;Han, Youn-Hee;Jeong, Young-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.131-132
    • /
    • 2009
  • 지형의 상태를 알 수 없는 타겟 지역에 구축되는 USN 환경은 각기 서로 다른 connectivity degree와 이동 가능한 센서들의 수를 가지면서 coverage의 최대화를 요구한다. 본 논문에서 설계한 모바일 센서 네트워크 시뮬레이터(MSNS)는 USN 환경을 GML로 구성하고, 각 센서들의 센싱/통신 범위가 설정된 센서 노드들의 수와 유지해야할 connectivity를 입력받아 주어진 조건에서 타겟 영역이 얼마나 효율적으로 coverage되는지를 가시화한다.