• Title/Summary/Keyword: Open network

Search Result 1,727, Processing Time 0.026 seconds

Mobility Scenarios into Future Wireless Access Network

  • Gilani, Syed Mushhad Mustuzhar;Hong, Tang;Cai, Qiqi;Zhao, Guofeng
    • Journal of Information Processing Systems
    • /
    • v.13 no.2
    • /
    • pp.236-255
    • /
    • 2017
  • The rapid growth of smart devices demands an enhanced throughput for network connection sustainability during mobility. However, traditional wireless network architecture suffers from mobility management issues. In order to resolve the traditional mobility management issues, we propose a novel architecture for future wireless access network based on software-defined network (SDN) by using the advantage of network function virtualization (NFV). In this paper, network selection approach (NSA) has been introduced for mobility management that comprises of acquiring the information of the underlying networking devices through the OpenFlow controller, percepts the current network behavior and later the selection of an appropriate action or network. Furthermore, mobility-related scenarios and use cases to analyze the implementation aspects of the proposed architecture are provided. The simulation results confirm that the proposed scenarios have obtained a seamless mobility with enhanced throughput at minimum packet loss as compared to the existing IEEE 802.11 wireless network.

Design and Implementation of Cable Data Subscriber Network Management System for High Speed Internet Service (초고속 인터넷서비스를 위한 케이블 데이터 가입자 망관리 시스템 설계 및 구현)

  • Yun Byeonh-Soo;Ha Eun-Ju
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.87-98
    • /
    • 2004
  • There are several types of distributed subscribers network using Asymmetric Digital Subscriber Line (ADSL), Very high-bit rate Digital Subscriber Line (VDSL), and Data Over Cable Service Interface Specifications (DOCSIS), The efficient and concentrated network management of those several distributed subscribers networks and resources require the general information model of network, which has abstract and conceptional managed objects independent of type of network and its equipment to manage the integrated subscriber network, This paper presents the general Internet subscribers network modeling framework using RM-ODP (Reference Model Open Distributed Processing) to manage that network In the form of integrated hierarchy, This paper adopts the object-oriented development methodology with UML (Unified Modeling Language) and designs and implements the HFC network of DOCSIS as an example of the subscriber network.

  • PDF

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

Development of virtio Network Driver for RTEMS Open-Source Operating System (RTEMS 오픈소스 운영체제를 위한 virtio 네트워크 드라이버 개발)

  • Kim, Jin-Hyun;Jin, Hyun-Wook
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.4
    • /
    • pp.262-267
    • /
    • 2017
  • RTEMS is a real-time operating system using a GPLv2-based license, and is used in the aerospace industry, such as satellites. It is difficult to build a development environment for these special-purpose systems because of problems related to the hardware platform. This can be resolved by applying virtualization technology. However, increased execution time and performance degradation due to virtualization overhead can change timing behavior of real-time application, and needs to be minimized. In this paper, we aim to implement the network device driver of RTEMS for the standardized virtual network device called virtio in order to effectively utilize RTEMS in a virtualized environment. In addition, we describe the process of submitting implemented driver to the RTEMS community for contributing open source software and reflecting the various requirements of the community.

A Study on Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 아키텍처에 관한 연구)

  • Kim, Chang-Su;Kim, Tak-Chen;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.782-785
    • /
    • 2007
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

  • PDF

Development of Convergence Smart Home Platform based on Image Processing and Sensor Network in IoT Environment (IoT환경에서의 센서 네트워크와 영상처리 기반의 융합 스마트 홈 플랫폼 개발)

  • Ahn, Ye-Chan;Lee, Jeong-Pil;Lee, Jae-Wook;Song, Jun-Kwun;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.37-41
    • /
    • 2016
  • In this thesis, we sought to build a home and business environment based on the rapid prototyping technology and network technologies that enabled rapid access to high-speed technologies and technologies. Using the analytic algorithm for image processing techniques, using the analytic algorithm for analyzing and tracking objects in the OpenCV library, trace objects and track objects and control various sensors. It also wants to implement a platform enabling various sensors to collect and record various services by controlling and connecting various sensors through the master Single board and the slave single.

A Scheduling Algorithm for Performance Enhancement of Science Data Center Network based on OpenFlow (오픈플로우 기반의 과학실험데이터센터 네트워크의 성능 향상을 위한 스케줄링 알고리즘)

  • Kong, Jong Uk;Min, Seok Hong;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1655-1665
    • /
    • 2017
  • Recently data centers are being constructed actively by many cloud service providers, enterprises, research institutes, etc. Generally, they are built on tree topology using ECMP data forwarding scheme for load balancing. In this paper, we examine data center network topologies like tree topology and fat-tree topology, and load balancing technologies like MLAG and ECMP. Then, we propose a scheduling algorithm to efficiently transmit particular files stored on the hosts in the data center to the destination node outside the data center, where fat-tree topology and OpenFlow protocol between infrastructure layer and control layer are used. We run performance analysis by numerical method, and compare the analysis results with those of ECMP. Through the performance comparison, we show the outperformance of the proposed algorithm in terms of throughput and file transfer completion time.

Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 구조)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.643-650
    • /
    • 2008
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

A Study on the Improvement of Security Threat Analysis and Response Technology by IoT Layer (IoT 계층별 보안위협 분석 및 대응기술 개선 방안 연구)

  • Won, Jong-Hyuk;Hong, Jung-Wan;You, Yen-Yoo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.149-157
    • /
    • 2018
  • In this paper, we propose an attack detection technology using SDN Controller to study security threats in IoT environment. The research methodology has been developed by applying IoT security threat management technology to the IoT layer and analyzing the research trend of applied security technology. The study results show that the effectiveness of the detection method using the sampling method is studied by adding OpenFlow based SDN Controller to the network switch equipment of the existing IoT network. This method can detect the monitoring and attack of the whole network by interworking with IDS and IPS without affecting the performance of existing IoT devices. By applying such improved security threat countermeasure technology, we expect to be able to relieve anxiety of IoT security threat and increase service reliability.

A Study of Fusing Scheme of Image and Sensing Data Using Index Method (인덱스를 이용한 동영상과 센싱 데이터 융합 방안 연구)

  • Hyun, Jin Gyu;Lee, Young Su;Kim, Do Hyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.141-146
    • /
    • 2008
  • Recently, it is studying to provide to users through internet in the SensorWeb of OGC(Open Geospatial Consortium) saving and maintaining data and image information gathered from sensor network. It is necessary to study about data convergence as binding audio and video for delivering the sensing data and image information to users with real-time system. In this article, it suggests how to convergence sensing data and moving picture collected from the sensor network using index. This program indicates both of them that collected sensing data and information identified of moving picture in the integration index and based on this program provides sensing data moving picture at the same time referencing integration index, if the user asks. To verify suggested method designing real-time multimedia service structure using sensor network and image installation and implementing Ubiquitous realtime multimedia system integrating moving picture and sensing data based on index. As a result of this program, it is confirmed providing real-time multimedia service to request information of application service using integration index collected image and sensing data from wireless sensor network and image installation suggested data convergence method.

  • PDF