• Title/Summary/Keyword: Network Performance

Search Result 13,828, Processing Time 0.049 seconds

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

An Implementation of Network Intrusion Detection Engines on Network Processors (네트워크 프로세서 기반 고성능 네트워크 침입 탐지 엔진에 관한 연구)

  • Cho, Hye-Young;Kim, Dae-Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.113-130
    • /
    • 2006
  • Recently with the explosive growth of Internet applications, the attacks of hackers on network are increasing rapidly and becoming more seriously. Thus information security is emerging as a critical factor in designing a network system and much attention is paid to Network Intrusion Detection System (NIDS), which detects hackers' attacks on network and handles them properly However, the performance of current intrusion detection system cannot catch the increasing rate of the Internet speed because most of the NIDSs are implemented by software. In this paper, we propose a new high performance network intrusion using Network Processor. To achieve fast packet processing and dynamic adaptation of intrusion patterns that are continuously added, a new high performance network intrusion detection system using Intel's network processor, IXP1200, is proposed. Unlike traditional intrusion detection engines, which have been implemented by either software or hardware so far, we design an optimized architecture and algorithms, exploiting the features of network processor. In addition, for more efficient detection engine scheduling, we proposed task allocation methods on multi-processing processors. Through implementation and performance evaluation, we show the proprieties of the proposed approach.

Improving the Performance of Network Management Protocol SNMP (네트워크 관리 프로토콜 SNMP의 성능 향상)

  • Na, Ho-Jin;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.99-107
    • /
    • 2010
  • SNMP(Simple Network Management Protocol) is most commonly used as a standard protocol for effective network management by supporting the increasing size of the network and the variety of network elements such as router, switch, server and so on. However, SNMP has performance drawbacks of network overhead, processing latency, and the inefficiency in data retrieval. In this paper, we propose two schemes to improve the performance of SNMP; 1) the first scheme to reduce the amount of redundant OID information within a SNMP-GetBulk response message, 2) the second scheme of newly proposed SNMP-GetUpdate message combined with the cache in MNS. Through the analysis with real experiments, we show that our first scheme reduces the network overhead and the second scheme improves the processing latency and the retrieval of SNMP MB tables. And, therefore the scalability of network management can be improved.

Experimental Verification of the Optimized TCN-Ethernet Topology in Autonomous Multi-articulated Vehicles (자율주행형 다관절 차량용 이더넷 TCN의 최적 토폴로지에 대한 실험적 검증)

  • Kim, Jungtai;Hwang, Hwanwoong;Lee, Kang-Won;Yun, Ji-Hoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.106-113
    • /
    • 2017
  • In this paper, we propose a suitable network topology for the Ethernet based Train Communication Network (TCN) for control system in a autonomous multi-articulated vehicle. We propose a network topology considering the structural constraints such as the number of cables and ports, and the performance constraints such as network response time and maximum throughput. We compare the network performances of star topology and daisy chain topology as well as hybrid topology, which is proposed in previous studies and a compromise between daisy chain and star topology. Here, the appropriate number of nodes in a group is obtained for the configuration of the hybrid topology. We first derive estimates of the network performance through simulation with different topologies, and then, implement the network by connecting the actual devices with each network topology. The performance of each topology is measured using various network performance measurement programs and the superiority of the proposed topology is described through comparison.

Analyzing Performance and Dynamics of Echo State Networks Given Various Structures of Hidden Neuron Connections (Echo State Network 모델의 은닉 뉴런 간 연결구조에 따른 성능과 동역학적 특성 분석)

  • Yoon, Sangwoong;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.338-342
    • /
    • 2015
  • Recurrent Neural Network (RNN), a machine learning model which can handle time-series data, can possess more varied structures than a feed-forward neural network, since a RNN allows hidden-to-hidden connections. This research focuses on the network structure among hidden neurons, and discusses the information processing capability of RNN. Time-series learning potential and dynamics of RNNs are investigated upon several well-established network structure models. Hidden neuron network structure is found to have significant impact on the performance of a model, and the performance variations are generally correlated with the criticality of the network dynamics. Especially Preferential Attachment Network model showed an interesting behavior. These findings provide clues for performance improvement of the RNN.

Constellation Multi-Objective Optimization Design Based on QoS and Network Stability in LEO Satellite Broadband Networks

  • Yan, Dawei;You, Peng;Liu, Cong;Yong, Shaowei;Guan, Dongfang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1260-1283
    • /
    • 2019
  • Low earth orbit (LEO) satellite broadband network is a crucial part of the space information network. LEO satellite constellation design is a top-level design, which plays a decisive role in the overall performance of the LEO satellite network. However, the existing works on constellation design mainly focus on the coverage criterion and rarely take network performance into the design process. In this article, we develop a unified framework for constellation optimization design in LEO satellite broadband networks. Several design criteria including network performance and coverage capability are combined into the design process. Firstly, the quality of service (QoS) metrics is presented to evaluate the performance of the LEO satellite broadband network. Also, we propose a network stability model for the rapid change of the satellite network topology. Besides, a mathematical model of constellation optimization design is formulated by considering the network cost-efficiency and stability. Then, an optimization algorithm based on non-dominated sorting genetic algorithm-II (NSGA-II) is provided for the problem of constellation design. Finally, the proposed method is further evaluated through numerical simulations. Simulation results validate the proposed method and show that it is an efficient and effective approach for solving the problem of constellation design in LEO satellite broadband networks.

The Effect of Team Members' Psychological Characteristics and Knowledge Network Characteristics among Team Members on Team Performance (팀 구성원의 심리적 다양성과 구성원 간 지식네트워크 특성이 팀 성과에 미치는 효과: 학습 분위기의 조절효과를 중심으로)

  • Moon, Yun-Ji;Kang, So-Ra
    • The Journal of Information Systems
    • /
    • v.20 no.1
    • /
    • pp.1-20
    • /
    • 2011
  • This study investigated the factors that facilitate knowledge creation of team with the aspect of knowledge management. We considered two characteristics which are team members' psychological characteristics (achievement needs and conflict emotion) and knowledge network characteristics among team members (internal cohesion and external bridging) and verified the relationship between these characteristics and team performance. Furthermore, we examined whether these characteristics have a different effect on team performance according to the mastery climate. This study performed a survey targeting team members in knowledge based firms and 376 final surveys to be used as a sample in this study. The result showed that team members' psychological characteristics and knowledge network characteristics among Team members have an influence on team performance significantly. In addition, the master climate moderated the relationship between team members' psychological characteristics and team performance.

A Performance Measurement of Premium Service in Differentiated Service Testbed on KOREN (선도시험망에서 트래픽 측정을 통한 차등화 서비스의 성능 평가에 대한 연구)

  • Kim, Ki-Hwan;Seok, Woo-Jin;Kwak, Jai-Seung;Byeon, Ok-Hwan;Chin, Yong-Ohk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1319-1322
    • /
    • 2001
  • 본 논문에서는 WAN 환경에서의 선도시험망 기반 QoS 테스트베드를 구성하고 차등화 서비스에 의한 QoS 의 성능을 측정하였다. 전송율, RTT, 패킷 손실, FTP 소요시간을 대상으로 QoS 보장 서비스와 베스트-에포트 서비스에 대한 성능을 비교 분석하였다. 모든 측정대상에 대하여 QoS 보장 트래픽이 좋은 성능을 보여주었으며, 특히 멀티미디어 어플리케이션의 비디오 트래픽에 대해서도 QoS 보장 서비스에 의한 전송서비스가 고품질의 영상을 제공하였다.

  • PDF

Development of integrated network performance manager for factory automation networks (공장자동화용 네트워크를 위한 통합성능관리기의 개발)

  • Lee, Sang-Ho;Kim, In-Joon;Lee, Kyung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.5 no.5
    • /
    • pp.600-613
    • /
    • 1999
  • This paper focuses on development of a performance manager for IEEE 802.4 token bus networks to serve large-scale integrated systems. In order to construct the management algorithm, the principles of fuzzy logic, genetic algorithm, and neural network have been combined to represent human knowledge and to imitate of human inference mechanism. Through the simulation experiments, it is shown that the proposed performance manager is capable of improving the network performance without a priori knowledge.

  • PDF

Performance Management of Token Bus Networks for Computer Integrated Manufacturing (컴퓨터 통합생산을 위한 토큰버스 네트워크의 성능관리)

  • Lee, Sang-Ho;Lee, Suk
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.13 no.6
    • /
    • pp.152-160
    • /
    • 1996
  • This paper focuses on development and evaluation of a performance management algorithm for IEEE 802.4 token bus networks to serve large-scale integrated manufacturing systems. Such factory automation networks have to satisfy delay constraints imposed on time-critical messages while maintaining as much network capacity as possible for non-time-critical messages. This paper presents a network performance manager that adjusts queue capacity as well as timers by using a set of fuzzy rules and fuzzy inference mechanism. The efficacy of the performance management has been demonstrated by a series of simulation experiments.

  • PDF