• 제목/요약/키워드: Node connectivity

검색결과 178건 처리시간 0.025초

IEEE 802.11 네트워크 기반 Mobile IPv6 Fast Handover 성능 향상 방안 (Enhancement of Fast Handover for Mobile IPv6 based on IEEE 802.11 Network)

  • 류성근;문영성
    • 한국정보과학회논문지:정보통신
    • /
    • 제35권1호
    • /
    • pp.46-55
    • /
    • 2008
  • IP계층에서의 이동성 지원에 대한 연구가 활발히 진행되어, Internet Engineering Task Force(IETF)에서 Mobile IPv6(MIPv6) 프로토콜이 표준화 되었다. 이러한 MIPv6은 이동노드가 서브넷 사이를 이동할 때, 네트워크에 대한 연결성을 유지하여 끊김 없는 통신을 가능하게 해주며 이러한 과정을 핸드오버라고 한다. 이동노드가 서브넷 사이를 이동할 때마다 핸드오버 처리를 수행하게 되는데, 이러한 핸드오버 처리 동안에는 이동노드가 통신을 할 수 없는 긴 지연시간이 생긴다. 이러한 지연시간을 줄이기 위해서 IETF에서 Fast Handovers for Mobile IPv6(FMIPv6)를 표준화하였다. 하지만 FMIPv6 또한 홈에이전트와 상대노드에게 바인딩을 갱신하기 위한 시간은 길게 남아 있다. 이러한 문제점을 해결하기 위해서, 본 논문에서는 2계층 프로토콜로 IEEE 802.11을 사용하는 FMIPv6을 기반으로 하여 2계층 핸드오버 수행 중에 3계층 핸드오버 과정인 홈에이전트로의 바인딩 갱신과 Return Routability 과정을 미리 시작하여 전체적인 핸드오버 지연시간을 단축시키는 방법을 제안한다. 수학적인 비용 분석 방법을 통하여 제안하는 방법을 MIPv6과 FMIPv6의 방법과 비교 분석하였으며, MIPv6에 비하여 79%, FIMPv6에 비하여 31%의 성능 향상을 얻었다.

Design and Evaluation of a Dynamic Continuous Media Streaming Supporting Method on the basis of Logical Grid Hierarchy for MANETs

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • 제19권2호
    • /
    • pp.645-655
    • /
    • 2008
  • As wireless connectivity is integrated into many handheld devices, streaming multimedia content among mobile ad-hoc peers is becoming a popular application. In this paper, we propose a dynamic service replication algorithm for providing guaranteed continuous streaming services to all nodes in mobile ad-hoc networks (MANETs). First, a MANET is comprised of logical grid hierarchy, and a streaming service is replicated to a lower server region of the logical grid hierarchy by considering the link availability between a mobile node and the streaming server within a server region or the popularity of the streaming service. We evaluate analytically the performance of the proposed algorithm, and compared with that of existing Qin's algorithm. Evaluation results show that our algorithm can achieve better streaming performance than Qin's algorithm. Therefore, the proposed algorithm not only improves the sharing availability of replicated streaming services but also controls efficiently the number of streaming service replications.

  • PDF

Internet Worm Propagation Model Using Centrality Theory

  • Kwon, Su-Kyung;Choi, Yoon-Ho;Baek, Hunki
    • Kyungpook Mathematical Journal
    • /
    • 제56권4호
    • /
    • pp.1191-1205
    • /
    • 2016
  • The emergence of various Internet worms, including the stand-alone Code Red worm that caused a distributed denial of service (DDoS), has prompted many studies on their propagation speed to minimize potential damages. Many studies, however, assume the same probabilities for initially infected nodes to infect each node during their propagation, which do not reflect accurate Internet worm propagation modelling. Thus, this paper analyzes how Internet worm propagation speed varies according to the number of vulnerable hosts directly connected to infected hosts as well as the link costs between infected and vulnerable hosts. A mathematical model based on centrality theory is proposed to analyze and simulate the effects of degree centrality values and closeness centrality values representing the connectivity of nodes in a large-scale network environment on Internet worm propagation speed.

다중분할구조기법을 이용한 병렬전단벽의 효율적인 비선형 해석 (Effective Nonlinear Analysis of Coupled Wall Structures using Multi-Level Substructuring)

  • 김호수;홍성목;윤성준
    • 한국전산구조공학회:학술대회논문집
    • /
    • 한국전산구조공학회 1994년도 봄 학술발표회 논문집
    • /
    • pp.65-72
    • /
    • 1994
  • This study presents the application of multi-level substructuring for the effective nonlinear analysis of coupled wall structures. Also, the transition elements with 8 or 12 d. o. f, 5-node plane stress elements and concrete nonlinear model are considered as the basic finite elements of substructuring. In particular, the concept of localized nonlinearity is considered for the probable nonlinear zones of the structure, and the effective bottom-up and top-down process are presented through connectivity trees. The nonlinear analysis based on localized nonlinearity and multi-level substructuring, compared with the complete nonlinear analysis of the structure, gives the greater saving effects in computational efforts and cost.

  • PDF

ZigBee/IEEE802.15.4 표준을 사용하는 Ad Hoc 네트워크 상의 전력 통제 (Power control in Ad Hoc network using ZigBee/IEEE802.15.4 Standard)

  • ;이재광
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.219-222
    • /
    • 2006
  • In this paper an intrusion detection system technique of wireless Ad Hoc network is explained and the advantage of making them work in IEEE 802.15.4/ZigBee wireless standard is also discussed. The methodology that is mentioned here is intrusion detection architecture based on a local intrusion database [1]. An ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Due to increased connectivity (especially on the Internet), and the vast spectrum of financial possibilities that are opening up, more and more systems are subject to attack by intruders. An ideal IDS should able to detect an anomaly caused by the intruders quickly so that the misbehaving node/nodes can be identified and appropriate actions (e.g. punish or avoid misbehaving nodes) can be taken so that further damage to the network is minimized

  • PDF

Secure Pre-authentication Schemes for Fast Handoff in Proxy Mobile IPv6

  • Baek, Jaejong
    • Journal of information and communication convergence engineering
    • /
    • 제14권2호
    • /
    • pp.89-96
    • /
    • 2016
  • In mobile communication, there are various types of handoff for the support of all forms of mobility. Proxy mobile IPv6 (PMIPv6) enables local network-based mobility management of a mobile node without any effect of mobility-related signaling. Recently, PMIPv6 has been considered for supporting mobility management in LTE/SAE-based mobile networks. To support seamless mobility in heterogeneous mobile networks, the overall cost of handoffs needs to be minimized and the procedure should be guaranteed to be secure. However, the reduction of the authentication cost has not been fully investigated to provide seamless connectivity when mobile users perform a handoff between the PMIPv6 domains. This paper proposes secure pre-authentication schemes, completing an authentication procedure before performing a handoff, for a fast handoff in PMIPv6. Analytic models have been used for measuring the authentication latency and for the overhead cost analysis. In addition to providing fast authentication, the proposed pre-authentication schemes can prevent threats such as replay attacks and key exposure.

통신망의 다중연결성을 이용한 결함허용 알고리즘 (Fault-Tolerant Algorithm using Multi-Connectivity of Communication Networks)

  • 문윤호;김병기
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제27권1호
    • /
    • pp.53-60
    • /
    • 2000
  • 본 논문의 목적은 네트워크상에서 한 시스템의 요소가 결함으로 인해 통신장애를 일으키는 경우에 대하여 새로운 회복알고리즘을 제안하는 것이다. 또한 인접행렬을 사용하면서 그 알고리즘을 시뮬레이션한다. 우리는 제안된 알고리즘의 한 번 수행시 하나의 결함노드를 복구하도록 하여 결국 결함시스템을 점진적으로 통신가능한 네트워크로 재구성 할 수 있다. 그렇게 하기위해 본문에서는 인접행렬을 이용하며 시뮬레이션된 회복과정을 연결한 MATRECO라는 새로운 회복알고리즘을 제시하였다.

  • PDF

효율적인 원거리 데이터 전송을 위한 Zigbee 노드들의 그룹화 알고리즘 (Grouping Algorithms of Zigbee Nodes for Efficient Data Transmission to Long Range)

  • 우성제;신복덕
    • 전기학회논문지
    • /
    • 제61권4호
    • /
    • pp.632-638
    • /
    • 2012
  • ZigBee network, based on PHY, MAC layer provides a specification for a suite of high level communication protocols using small, low-power digital radio based on an IEEE 802.15.4 standard. Meshing is a type of daisy chaining from one device to another. This technique allows the short range of an individual node to be expanded and multiplied, covering a much larger area. Each wireless technology that makes it to market serves a special purpose or function. Zigbee provides short-range connectivity in what is called a personal-area network (PAN). Within ZigBee PAN coordinator as manages an entire ZigBee network, the short range of frequency band was only selected because the technology allows typically less than 100 kbp or ZigBee troubles in retransmission processing and delaying data tranmission works to create unproductive condition of work. This research was proposed the method, based on short range frequency of zigBee nodes enable to long range of remote data transmission with specific algorithm tools.

Edge-Node Deployed Routing Strategies for Load Balancing in Optical Burst Switched Networks

  • Barradas, Alvaro L.;Medeiros, Maria Do Carmo R.
    • ETRI Journal
    • /
    • 제31권1호
    • /
    • pp.31-41
    • /
    • 2009
  • Optical burst switching is a promising switching paradigm for the next IP-over-optical network backbones. However, its burst loss performance is greatly affected by burst contention. Several methods have been proposed to address this problem, some of them requiring the network to be flooded by frequent state dissemination signaling messages. In this work, we present a traffic engineering approach for path selection with the objective of minimizing contention using only topological information. The main idea is to balance the traffic across the network to reduce congestion without incurring link state dissemination protocol penalties. We propose and evaluate two path selection strategies that clearly outperform shortest path routing. The proposed path selection strategies can be used in combination with other contention resolution methods to achieve higher levels of performance and support the network reaching stability when it is pushed under stringent working conditions. Results show that the network connectivity is an important parameter to consider.

  • PDF

Performance Evaluation of a Smart CoAP Gateway for Remote Home Safety Services

  • Kim, Hyun-Sik;Seo, Jong-Su;Seo, Jeongwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권8호
    • /
    • pp.3079-3089
    • /
    • 2015
  • In this paper, a smart constrained application protocol (CoAP)-based gateway with a border router is proposed for home safety services to remotely monitor the trespass, fire, and indoor air quality. The smart CoAP gateway controls a home safety sensor node with a pyroelectric infrared motion sensor, a fire sensor, a humidity and temperature sensor, and a non-dispersive infrared CO2 sensor and gathers sensing data from them. In addition, it can convert physical sensing data into understandable information and perform packet conversion as a border router for seamless connection between a low-power wireless personal area network (6LoWPAN) and the Internet (IPv6). Implementation and laboratory test results verify the feasibility of the smart CoAP gateway which especially can provide about 97.20% data throughput.