• 제목/요약/키워드: Network Technique

검색결과 4,389건 처리시간 0.031초

액티브 네트워크 응용의 검증 (Verifying Active Network Applications)

  • 박준철
    • 한국정보과학회논문지:정보통신
    • /
    • 제29권5호
    • /
    • pp.510-523
    • /
    • 2002
  • The routers in an active network perform customized computations on the messages flowing through them, while the role of routers in the traditional packet network, such as the Internet, is to passively forward packets as fast as possible. In contrast to the Internet, the processing in active networks can be customized on a per user or per application basis. Active networks allow users to inject information into the network, where the information describes or controls a program to be executed for the users by the routers as well as the end hosts. So the network users can realize the active networks by "programming" the network behavior via the programming interface exposed to them. In this paper, we devise a network protocol model and present a verification technique for reasoning about the correctness of an active application defined using the model. The technique is developed in a platform- and language-independent way, and it is algorithmic and can be automated by computer program. We give an example dealing with network auction to illustrate the use of the model and the verification technique.

Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구 (A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제10권1호
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

하이브리드 Ad-hoc 네트워크에서 다중 게이트웨이를 이용한 끊김없는 핸드오프 기법 (A Seamless Handoff Method Using Multiple Gateway in Hybrid Ad-hoc Networks)

  • 조성민;박성한
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2005년도 추계종합학술대회
    • /
    • pp.1059-1062
    • /
    • 2005
  • A hybrid ad-hoc network consists of a wired network and a mobile ad-hoc network connected by the internet gateway. To provide seamless service for internet user in hybrid ad-hoc network, an efficient internet gateway selection technique and a fast handover technique are needed. In this paper, we propose a seamless handoff technique for providing mobility of mobile hosts in hybrid ad-hoc networks. The proposed technique improves general handoff performance by an internet gateway re-registration algorithm for ad-hoc networks. Moreover, it reduces handoff processing time in the range of certain region by using mobility management agent (MMA) and also the packet loss when handoff occurs out of the range of MMA by tunneling technique.

  • PDF

ADVANTAGE OF USING FREE NETWORK ADJUSTMENT TECHNIQUE IN THE CRUSTAL MOVEMENT MONITORING GEODETIC NETWORKS

  • AhmedM.Hamdy;Jo,Bong-Gon
    • 지구물리
    • /
    • 제6권1호
    • /
    • pp.1-11
    • /
    • 2003
  • 측지망 조정에는 여러 가지 기법이 있으나 가장 보편적인 것이 최소자승법이다. 지각 변위 연구 등 지구역학적 연구를 위해 GPS 자료를 처리할 때 일반적으로 두 가지 망조정 기법이 사용되는데 그 중 하나는 자유망 조정법이고 나머지 하나는 제한적망 조정법이다. 이 두가지 기법 중에서 어느 것이 더 지구역학적 목적에 적절한지 결정하기 위해 두 개의 다른 측지망 즉, "이집트의 시나이 측지망"과 "한국의 HGN 측지망"의 데이터를 사용하여 조사하였다. 사용된 두 개의 망은 서로 모양이 다를 뿐만 아니라 지진학적 활동이 다른 지역에 위치해 있다. 이 연구의 결과는 두 기법이 모두 RMS 입장에서 보면 고정밀성을 가지고 있고 큰 차이가 없을을 보인다. 그러나 좌표값 결과를 볼 때 제한적망 고정법이 자유망 조정법에 비해 더 많은 왜곡을 일으켰을 분만 아니라 측지망을 정의하는 고정점이 변하면 좌표값도 다르게 결정되었다. 이러한 왜곡은 측정점의 위치 이동량은 물론 자료처리 결과의 지구역학적 해석에 중요한 역할을 하는 변위요소들의 추정에도 영향을 미친다. 이 연구의 대상 지역에 대해 널리 알려진 지구역학 모델과 두 기법으로부터 얻어진 결과를 비교해 보면, 자유망 조정법의 결과가 이들 모델에 확실히 잘 맞는 반면 제한적망 조정법의 결과는 전혀 맞지 않는것으로 나타났다. 이런 결과를 종합해 볼 때 자유망 조정법이 지구역학적 목적에 더 부합하는 측지망 조정기법이라고 판단된다.

  • PDF

Designing of Dynamic Sensor Networks based on Meter-range Swarming Flight Type Air Nodes

  • Kang, Chul-Gyu;Kim, Dae-Hwan
    • Journal of information and communication convergence engineering
    • /
    • 제9권6호
    • /
    • pp.625-628
    • /
    • 2011
  • Dynamic sensor network(DSN) technology which is based on swarming flight type air node offers analyzed and acquired information on target data gathered by air nodes in rotation flight or 3 dimension array flight. Efficient operation of dynamic sensor network based on air node is possible when problems of processing time, data transmission reliability, power consumption and intermittent connectivity are solved. Delay tolerant network (DTN) can be a desirable alternative to solve those problems. DTN using store-and-forward message switching technology is a solution to intermittent network connectivity, long and variable delay time, asymmetric data rates, and high error rates. However, all processes are performed at the bundle layer, so high power consumption, long processing time, and repeated reliability technique occur. DSN based on swarming flight type air node need to adopt store-and-forward message switching technique of DTN, the cancelation scheme of repeated reliability technique, fast processing time with simplified layer composition.

진화 스트레티지를 이용한 CMAC 망 최적 설계 (Optimal Design of CMAC network Using Evolution Strategies)

  • 이선우;김상권;김종환
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 1997년도 춘계학술대회 학술발표 논문집
    • /
    • pp.271-274
    • /
    • 1997
  • This paper presents the optimization technique for design of a CMAC network by using an evolution strategies(ES). The proposed technique is designed to find the optimal parameters of a CMAC network, which can minimize the learning error between the desired output and the CMAC network's as well as the number of memory used in the CMAC network. Computer simulations demonstrate the effectiveness of the proposed design method.

  • PDF

Rule-Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks

  • Gowri, Muthukrishnan;Paramasivan, Balasubramanian
    • ETRI Journal
    • /
    • 제38권6호
    • /
    • pp.1145-1152
    • /
    • 2016
  • Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rule-based anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that all nodes in the network are covered by at least one honeypot. Honeypots check every new connection by letting the centralized administrator collect the information regarding the new connection by slowing down the communication with the new node. Certain predefined rules are applied on the new node to make a decision regarding the anomality of the node. When the timer value of each honeypot expires, other sensor nodes are appointed as honeypots. Owing to this honeypot rotation, the intruder will not be able to track a honeypot to impair the network. Simulation results show that this technique can efficiently handle the anomaly detection in a WSN.

Wireless Ad-hoc Network에서 보안 협력 캐싱 기법에 관한 연구 (A Study on Secure Cooperative Caching Technique in Wireless Ad-hoc Network)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권3호
    • /
    • pp.91-98
    • /
    • 2013
  • Node which plays the role of cache server does not exist in the wireless ad-hoc network consisting of only mobile nodes. Even if it exists, it is difficult to provide cache services due to the movement of nodes. Therefore, the cooperative cache technique is necessary in order to improve the efficiency of information access by reducing data access time and use of bandwidth in the wireless ad-hoc network. In this paper, the whole network is divided into zones which don't overlap and master node of each zone is elected. General node of each zone has ZICT and manages cache data to cooperative cache and gateway node use NZCT to manage cache information of neighbor zone. We proposed security structure which can accomplish send and receive in the only node issued id key in the elected master node in order to prepare for cache consistent attack which is vulnerability of distributed caching techniques. The performance of the proposed method in this paper could confirm the excellent performance through comparative experiments of GCC and GC techniques.

송전혼잡하에서 한계비용 민감도를 이용한 새로운 계통 분할 기법 (A New Network Partition Technique using Marginal Cost Sensitivity Under Transmission Congestion)

  • 장시진;정해성;박종근
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 추계학술대회 논문집 학회본부 A
    • /
    • pp.223-225
    • /
    • 2000
  • Network congestion is important problem that must be managed for active power contracts in deregulated power industry. Existing network partition technique is based on statistical method don't suggest clear network partition criterion. So in this paper we proposed a new network partition technique using the marginal cost sensitivity to fairly allocate congestion cost to network user.

  • PDF

An Expanded Patching Technique using Four Types of Streams for True VoD Services

  • Ha, Sook-Jeong;Bae, Ihn-Han;Kim, Jin-Gyu;Park, Young-Ho;Oh, Sun-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권5호
    • /
    • pp.444-460
    • /
    • 2009
  • In this paper, we propose an expanded patching technique in order to reduce the server network bandwidth requirements to support true VoD services in VoD Systems. Double Patching, which is a typical multicast technique, ensures that a long patching stream delivers not only essential video data for the current client but also extra video data for future clients. Since the extra data may include useless data, it results in server network bandwidth wastage. In order to prevent a server from transmitting useless data, the proposed patching technique uses a new kind of stream called a linking stream. A linking stream is transmitted to clients that have received short patching streams, and it plays a linking role between a patching stream and a regular stream. The linking stream enables a server to avoid transmitting unnecessary data delivered by a long patching stream in Double Patching, so the server never wastes its network bandwidth. Mathematical analysis shows that the proposed technique requires less server network bandwidth to support true VoD services than Double Patching. Moreover, simulation results show that it has better average service latency and client defection rate compared with Double Patching.