• Title/Summary/Keyword: Network topology

Search Result 1,195, Processing Time 0.024 seconds

A Study on Region-based Secure Multicast in Mobile Ad-hoc Network (Mobile Ad-hoc Network에서 영역기반 보안 멀티캐스트 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.75-85
    • /
    • 2016
  • MANET is a network composed only mobile network having limited resources and has dynamic topology characteristics. Therefore, every mobile node acts as a route and delivers data by using multi-hop method. In particular, group communication such as multicast is desperately needed because of characteristics such as battery life of limited wireless bandwidth and mobile nodes. However, the multicast technique can have different efficient of data transmission according to configuring method of a virtual topology by the movement of the nodes and the performance of a multicast can be significantly degraded. In this paper, the region based security multicast technique is proposed in order to increase the efficiency of data transmission by maintaining an optimal path and enhance the security features in data transmission. The group management node that manages the state information of the member nodes after the whole network is separated to area for efficient management of multicast member nodes is used. Member node encrypts using member key for secure data transmission and the security features are strengthened by sending the data after encrypted using group key in group management node. The superiority of the proposed technique in this paper was confirmed through experiments.

Arrangement Lightwave Network : An Application of Arrangement Graphs to Multihop Lightwave Network (순열 방사형 광 통신망 : 다중 홉 광 통신망을 위한 순열 방사형 그래프의 응용)

  • Kim, Won;Jun, Moon-Seog
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.12-21
    • /
    • 2000
  • Arrangement graph has desirable properties for design requirements of a multihop lightwave network, such as node and edge symmetry, low diameter, simple routing, etc. In this paper, arrangement lightwave network based on arrangement graph model is proposed as new logical topology of multihop lightwave network. In the proposed scheme, multistar and grouping of network are used for improving reusability of wavelength and scalability. Also, this paper shows that the proposed scheme is an alternative logical topology for application requiring more nodes with limited wavelengths by evaluating performance with related works.

  • PDF

Design and Performance Analysis of Security Network Management Architecture for Auto-managing Security Systems (보안 시스템의 자동 관리를 위한 보안 네트워크 관리 구조의 설계 및 성능 분석)

  • Ahn Gae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8B
    • /
    • pp.525-534
    • /
    • 2005
  • This paper proposes the architecture and the methods of security network management for auto-configuration of security systems by extending the existing policy-based network management architecture. The architecture and the methods proposed in this paper enable a security management sewer to automatically decide the best-suited security policy to apply to a security system and the most effective and efficient security system to perform security policy rule, based on the role and capability information of security systems and the role and time information of security policy. For integrated control of network system and security system, this paper also proposes SNMP protocol based security network topology map generator. To show the excellence of the proposed architecture and methods, we simulate and evaluate the automatic response against attacks.

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

  • Raazi, Syed Muhammad Khaliq-Ur-Rahman;Lee, Sung-Young
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.1
    • /
    • pp.23-51
    • /
    • 2010
  • Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.

Multiple Access Protocols for a Multichannel Optical Fibre Local Area Network Using a Passive Star Topology and WDM (Passive Star 토플로지와 WDM을 사용한 다중채널 광섬유 LAN을 위한 Multiple Access 르로토콜)

  • ;Jon W. Mark
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.9
    • /
    • pp.1184-1201
    • /
    • 1995
  • Two multiple access protocols are proposed for a multichannel WDM optical fibre local area network or metropolitan area network in which users are interconnected using a passive star topology. Each user has a single tunable transmitter and a single tunable receiver. A transmitter sends a control packet before its data packet transmission so that its intended receivers can tune to the proper data channel wavelength. The maximum throughput of the proposed protocols are independent of the effective normalized propagation delay which may include the transmitter and receiver tuning times and the processing delays. The maximum throughputs of the protocols are analyzed and compared with those of the existing ones by numerical examples. The message delay of the R- Aloha/synchronous N-server switch protocol which is suitable for the queued users is also analyzed.

  • PDF

Improved Paired Cluster-Based Routing Protocol in Vehicular Ad-Hoc Networks

  • Kim, Wu Woan
    • International journal of advanced smart convergence
    • /
    • v.7 no.2
    • /
    • pp.22-32
    • /
    • 2018
  • In VANET, frequent movement of nodes causes dynamic changes of the network topology. Therefore the routing protocol, which is stable to effectively respond the changes of the network topology, is required. Moreover, the existing cluster-based routing protocol, that is the hybrid approach, has routing delay due to the frequent re-electing of the cluster header. In addition, the routing table of CBRP has only one hop distant neighbor nodes. PCBRP (Paired CBRP), proposed in this paper, ties two clusters in one pair of clusters to make longer radius. Then the pair of the cluster headers manages and operates corresponding member nodes. In the current CBRP, when the cluster header leaves the cluster the delay, due to the re-electing a header, should be occurred. However, in PCBRP, another cluster header of the paired cluster takes the role instead of the left cluster header. This means that this method reduces the routing delay. Concurrently, PCBRP reduces the delay when routing nodes in the paired cluster internally. Therefore PCBRP shows improved total delay of the network and improved performance due to the reduced routing overhead.

Location-awareness based Hybrid P2P System (위치 인식 기반 계층형 P2P 시스템)

  • Min, Su-Hong;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.448-450
    • /
    • 2007
  • Peer-to-Peer system has emerged as a popular model aiming at further utilizing Internet information and resources, complementing the available client-server services. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical location aware topology can cause serious performance degradation. In this paper, we consider the network distance between peers so that it helps peers select neighbors located at the nearest when they exchange queries for sharing of resources. To reduce the unnecessary signaling traffic and delay of query exchange, we propose a location aware topology based Hybrid P2P system. This system calculates the network distance which combines the direct measurement such as RTT (Round Trip Time) with geographic space of peers using IP address

  • PDF

Performance analysis of the B-NT system using simulstor (시뮬레이터를 이용한 B-NT 시스템 성능분석)

  • 이규호;기장근;노승환;최진규;김재근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.6
    • /
    • pp.1503-1513
    • /
    • 1998
  • This paper is related to a performance analysis of B-NT system, which is essential compositional equipment of B-ISDN access network. A simulator enabling performance analysis according to the change of network configuration topology and the change of user traffic is developed in this study. The developed B-NT, system simulator consists of graphic user interface module, simulation program automatic generator module, and B-NT system model library module. As examples of the results of performance analysis using the simulator, end-to-end user cell transmission delay time, queueing delay time in each system, and cell loss rate in the head node switch are presented. The simulator developed in this paper can be utilized in determining the network topology of B-NT system.

  • PDF

Performance analysis of large-scale MIMO system for wireless backhaul network

  • Kim, Seokki;Baek, Seungkwon
    • ETRI Journal
    • /
    • v.40 no.5
    • /
    • pp.582-591
    • /
    • 2018
  • In this paper, we present a performance analysis of large-scale multi-input multi-output (MIMO) systems for wireless backhaul networks. We focus on fully connected N nodes in a wireless meshed and multi-hop network topology. We also consider a large number of antennas at both the receiver and transmitter. We investigate the transmission schemes to support fully connected N nodes for half-duplex and full-duplex transmission, analyze the achievable ergodic sum rate among N nodes, and propose a closed-form expression of the achievable ergodic sum rate for each scheme. Furthermore, we present numerical evaluation results and compare the resuts with closed-form expressions.

Analysis of Channel Capacity according to Power Line Network-Topology (전력선망 구조별 통신 용량 해석)

  • Park, Jong-Yeon;Choe, Gyu-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.4
    • /
    • pp.17-24
    • /
    • 2000
  • To use the power line as the communication channel, we have analyzed channel characteristics with the noise data and signal attenuation levels measured on power lines per loom. In this paper, channel capacities are calculated in the best or the worst case noise states and signal attenuations on power lines for three kinds of network-topologies. Analyzed the channel capacity by the best and worst conditions, we concluded that the serious factors influenceing on the channel capacity are the length from a transmitter to a receiver and the network topology.

  • PDF