• Title/Summary/Keyword: Network Isolation

Search Result 239, Processing Time 0.024 seconds

Influence of Discrimination Experience in Daily Life and Social Isolation on Depression of Older Adults (노인의 일상생활에서의 차별 경험과 사회적 고립이 우울에 미치는 영향)

  • Ko, Young;Kwak, Chanyeong
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.42-52
    • /
    • 2021
  • This study was conducted to identify the influence of the discrimination experienced in daily life and social isolation on depression among older adults living in the community. This study was a secondary analysis of the data of 2017 Living Profiles of Older Adults Survey. The participants was a representative sample among the older adults 65 years and older. Data from 10,041 older adults were analyzed for this study. Hierarchical logistic regression analyses were used. When the discrimination experiences was added in model 1, the likelihood of being depressed was 1.95(1.60-2.36) times higher for those who experienced discrimination comparing with those who didn't experienced discrimination. When the social isolation was added in model 2, the likelihood of being depressed was 1.89(1.55-2.30) times higher in those who experienced discrimination. In addition, as the number of close friends, neighbors, and acquaintances decreased by one, the likelihood of being depressed increased by 1.14 times. Those who were isolated from family, friends, neighbors and acquaintances were 3.90 times more likely to be depressed. Therefore, social efforts are needed to reduce the experience of discrimination. Maintaining a social network or creating a new network will contribute to lowering the level of depression in older adults who have experienced discrimination.

An evaluation of the pipe failure impact in a water distribution system considering subsystem isolation (상수관 파괴시 관망의 부분적 격리를 고려한 피해범위 산정)

  • Jun, Hw-Andon
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.2 s.163
    • /
    • pp.89-98
    • /
    • 2006
  • To evaluate the pipe failure impact, current methodologies consider only a broken pipe as the impacted area. However, these approaches are accurate if the broken pipe is the only area isolated from tile system. Depending on the number and locations of on-off valves, more pipes which are adjacent to a broken pipe may be isolated. Using the concept of Segment suggested by Walski, the methodology evaluating the pipe failure impact incorporated with on-off valve locations has been suggested by Jun. However, a segment cannot account for all possible pipe failure impacted areas since it does not consider additional failures, namely the network topological failure and the hydraulic pressure failure. For this reason, a methodology which can consider the network topology and hydraulic pressure limitation as well as on-off valve locations is suggested. The suggested methodology is applied to a real network to verify its applicability As results, it is found that a single pipe failure can affect huge areas depending on the configuration of on-off valves and the network topology. Thus, the applicability of the suggested methodology for evaluating the pipe failure impacts on a water distribution network is proved.

Priority- and Budget-Based Protocol Processing Using The Bottom-Half Mechanism for End-to-End QoS Support (종단간 QoS 지원을 위해 Bottom-half 메커니즘을 이용한 우선순위 및 예산 기반의 네트워크 프로토콜 처리)

  • Kim, Ji-Min;Ryu, Min-Soo
    • The KIPS Transactions:PartA
    • /
    • v.16A no.3
    • /
    • pp.189-198
    • /
    • 2009
  • The traditional interrupt-based protocol processing at end hosts has two priority-inversion problems. First, low-priority packets may interrupt and delay high-priority process executionssince interrupts have the highest priority in most operating systems. Second, low-priority packet may delay high priority packets when they arrive almost simultaneously since interrupt processing is performed in a FCFS (first come, first served) order. These problems can be solved by a priority-based protocol processing policy and implementation. However, general priority-based schemes commonly have the problem of starvation and cannot support the each network flow requiring the mutually exclusive QoS since the packets are processed in the FCFS order. Therefore, the priority-based schemes are not appropriate for different QoS-demanding applications. In this paper, we present a bottom-half-based approach that relies on priority- and budget-based processing. The proposed approach allows us to solve both the starvation and priority-inversion problems, and further enables effective QoS isolation between different network connections. This feature also enables bounding the protocol processing time at an end host. We finally show through experiments that the proposed approach achieves QoS isolation and control.

A Study on Seamless Handover Mechanism with Network Virtualization for Wireless Network (WLAN 환경에서 네트워크 가상화를 통한 끊김 없는 핸드오버 매커니즘 연구)

  • Ku, Gi-Jun;Jeong, Ho-Gyoun
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.594-599
    • /
    • 2014
  • The routinized wireless devices such as smart phone have promoted to expand the use of IEEE 802.11 groups. The challenge environments of the wireless network utilizes effectively and user-oriented seamless services that handover is the most desirable issues under the wireless circumstance. In data center software defined network (SDN) has provided the flow routing to reduce costs and complexities. Flow routing has directly offered control for network administrator and has given to reduce delay for users. Under the circumstance of being short of network facilities, SDNs give the virtualization of network environments and to support out of the isolation traffic conditions. It shows that the mechanism of handover makes sure seamless services for higher density of the network infrastructure which is SDN to support network service re-configurable.

Neural Networks-based Statistical Approach for Fault Diagnosis in Nonlinear Systems (비선형시스템의 고장진단을 위한 신경회로망 기반 통계적접근법)

  • Lee, In-Soo;Cho, Won-Chul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.6
    • /
    • pp.503-510
    • /
    • 2002
  • This paper presents a fault diagnosis method using neural network-based multi-fault models and statistical method to detect and isolate faults in nonlinear systems. In the proposed method, faults are detected when the errors between the system output and the neural network nominal system output cross a predetermined threshold. Once a fault in the system is detected, the fault classifier statistically isolates the fault by using the error between each neural network-based fault model output and the system output. From the computer simulation results, it is verified that the proposed fault diagonal method can be performed successfully to detect and isolate faults in a nonlinear system.

A Study on Networks Applications improved Mobile P2P (개선된 모바일 P2P 네트워크 구현에 관한 연구)

  • Kim Yong-Hun;Park Jong-Min;Cho Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1458-1464
    • /
    • 2005
  • A P2P is a method that can share and exchange on digital resources through a direct connection on personnel without a central server. In this paper, Although the P2P application that uses our proposed framework should obtain one or more IP addresses of the neighbor peers manually, after instantiate, the application can do its job while maintaining connection to the network continuously and automatically. To evaluate our proposed scheme, we measured and analyzed the time for a peer to reconnect to the network when the mediating peer fails and the network isolation occurs.

Energy efficient watchman based flooding algorithm for IoT-enabled underwater wireless sensor and actor networks

  • Draz, Umar;Ali, Tariq;Zafar, Nazir Ahmad;Alwadie, Abdullah Saeed;Irfan, Muhammad;Yasin, Sana;Ali, Amjad;Khattak, Muazzam A. Khan
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.414-426
    • /
    • 2021
  • In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and network isolation occur because of long routing distances between nodes. Void holes usually occur around the sink because nodes die early due to the high energy consumed to forward packets sent and received from other nodes. These void holes are a major challenge for I-UWSANs and cause high end-to-end delay, data packet loss, and energy consumption. They also affect the data delivery ratio. Hence, this paper presents an energy efficient watchman based flooding algorithm to address void holes. First, the proposed technique is formally verified by the Z-Eves toolbox to ensure its validity and correctness. Second, simulation is used to evaluate the energy consumption, packet loss, packet delivery ratio, and throughput of the network. The results are compared with well-known algorithms like energy-aware scalable reliable and void-hole mitigation routing and angle based flooding. The extensive results show that the proposed algorithm performs better than the benchmark techniques.

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

  • Surinder Singh;Hardeep Singh Saini
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.119-128
    • /
    • 2024
  • The moveable ad hoc networks are untrustworthy and susceptible to any intrusion because of their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are planned. From a number of attacks, the wormhole attack is considered to be the hazardous one. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system regards the wormhole intrusions in the absence of intermediary sensor nodes amid target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops are presented amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better performance in comparison with existing approaches.

An SDN-based Bandwidth Control Scheme considering Traffic Variation in the Virtualized WLAN Environment (가상화된 WLAN 환경에서 트래픽 변화를 고려한 SDN 기반 대역폭 제어 기법)

  • Moon, Jaewon;Chung, Sanghwa
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1223-1232
    • /
    • 2016
  • A virtual network technology can provide a network reflecting the requirements of various services. The virtual network can distribute resources of the physical network to each virtual slice. An efficient resource distribution technique is needed to reflect the requirements of various services. Existing bandwidth distribution techniques can only control downlink traffic without taking traffic conditions on the network into account. Downlink and uplink share the same resources in a wireless network. The existing bandwidth distribution techniques assumed that all stations generate saturated traffic. Therefore, the existing bandwidth distribution technique cannot make traffic isolation in a virtual wireless network. In this paper, we proposed a traffic-based bandwidth control techniques to solve these problems. We applied Software-Defined Networking(SDN) to the virtual wireless network, monitored the traffic at each station, and searched for stations that generated unsaturated traffic. We also controlled both uplink and downlink traffics dynamically based on monitoring information. Our system can be implemented with legasy 802.11 clients and SDN-enabled APs. After the actual test bed configuration, it was compared to existing techniques. As a result, the distribution performance of the proposed technique was improved by 14% in maximum.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.