• Title/Summary/Keyword: Topology changes

Search Result 202, Processing Time 0.026 seconds

Tactical Service Mesh for Intelligent Traffic QoS Coordination over Future Tactical Network (미래 전술망의 지능적 트래픽 QoS 조율을 위한 전술 서비스 메쉬)

  • Kang, Moonjoong;Shin, Jun-Sik;Park, Juman;Park, Chan Yi;Kim, JongWon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.369-381
    • /
    • 2019
  • As tactical networks are gradually shifting toward IP-based flexible operation for diversified battlefield services, QoS(Quality-of-Service) coordination for service differentiation becomes essential to overcome the heterogeneous and scarce networking resources limitations. QoS coordination for tactical network traffic should be able to monitor and react the dynamic changes in underlying network topology and service priorities. In this paper, by adopting the emerging cloud-native service mesh concept into tactical network context, we study the feasibility of intelligent QoS coordination by employing tactical service mesh(TSM) as an additional layer to support enhanced traffic quality monitoring and control. The additional TSM layer can leverage distributed service-mesh proxies at tactical mesh WAN(Wide Area Network) nodes so that service-aware differentiated QoS coordination can be effectively designed and integrated with TSM-assisted traffic monitoring and control. Also, by validating the feasibility of TSM layer for QoS coordination with miniaturized experimental setup, we show the potential of the proposed approach with several approximated battlefield traffics over a simulated TSM-enabled tactical network.

A study of set route path avoiding traffic concentration in Mobile Ad hoc Network (MANET에서 트래픽 집중현상을 회피하는 경로설정에 관한 연구)

  • Oh, Dong-keun;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.781-783
    • /
    • 2014
  • Mobile ad hoc network(MANET) consists of node that has mobility. MANET has increased overhead that caused by frequent topology changes. For reducing overhead, hierarchical network that communicates through cluster head node has been researched. When traffic is concentrated on cluster head node, cluster member node can't send message. To solve this problem, we proposed Step Parent algorithm. Proposed algorithm, cluster member node checks traffic of cluster head node using route path of other cluster head node in efficient coverage area. When cluster head node has increased traffic, cluster member node make a new route path by route path by routing path to another cluster head node. So cluster member node sends a message to destination node, we check improving delivery ratio.

  • PDF

The Modified IPv6 NDP Mechanism for Preventing IP Spoofing (IP 스푸핑 방지를 위한 수정된 IPv6 NDP 메커니즘)

  • Kim Ji-Hong;Nah Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.95-103
    • /
    • 2006
  • IPv6 is a new version of the Internet protocol, designed as the successor to IPv4. Among the changes from IPv4 to IPv6, we focused on the stateless address auto-configuration mechanism. The address auto-configuration mechanism is used by nodes in an IPv6 network to learn the local topology. The current specifications suggest that IPsec AH may be used to secure the mechanism, but there is no security association during address auto-configuration process because it has no initial IP address. As there are so many suity threats, SEND protocol was designed to counter these threats. In this paper we analyzed the security problems in NDP and SEND protocol. So we proposed the Modified NDP mechanism using PKC and AC in order to solve these problems.

Machine Learning-based Optimal VNF Deployment Prediction (기계학습 기반 VNF 최적 배치 예측 기술연구)

  • Park, Suhyun;Kim, Hee-Gon;Hong, Jibum;Yoo, Jae-Hyung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.34-42
    • /
    • 2020
  • Network Function Virtualization (NFV) environment can deal with dynamic changes in traffic status with appropriate deployment and scaling of Virtualized Network Function (VNF). However, determining and applying the optimal VNF deployment is a complicated and difficult task. In particular, it is necessary to predict the situation at a future point because it takes for the process to be applied and the deployment decision to the actual NFV environment. In this paper, we randomly generate service requests in Multiaccess Edge Computing (MEC) topology, then obtain training data for machine learning model from an Integer Linear Programming (ILP) solution. We use the simulation data to train the machine learning model which predicts the optimal VNF deployment in a predefined future point. The prediction model shows the accuracy over 90% compared to the ILP solution in a 5-minute future time point.

Holocarpic oomycete parasites of red algae are not Olpidiopsis, but neither are they all Pontisma or Sirolpidium (Oomycota)

  • Giuseppe C. Zuccarello;Claire M. M. Gachon;Yacine Badis;Pedro Murua;Andrea Garvetto;Gwang Hoon Kim
    • ALGAE
    • /
    • v.39 no.1
    • /
    • pp.43-50
    • /
    • 2024
  • Oomycetes are ubiquitous heterotrophs of considerable economic and ecological importance. Lately their diversity in marine environments has been shown to be greatly underappreciated and many lineages of intracellular holocarpic parasites, infecting micro- and macro-algae, remain to be fully described taxonomically. Among them, pathogens of marine red algae have been studied extensively as they infect important seaweed crops. Throughout the 20th century, most intracellular, holocarpic biotrophic oomycetes that infect red algae have been assigned to the genus Olpidiopsis Cornu. However, 18S rRNA sequencing of Olpidiopsis saprolegniae, the species considered the generitype for Olpidiopsis, suggests that this genus is not closely related to the marine pathogens and that the latter requires a nomenclatural update. Here, we compile and reanalyze all recently published 18S rRNA sequence data for marine holocarpic oomycetes, with a particular focus on holocarpic pathogens of red algae. Their taxonomy has been revised twice over the past four years, with suggestions to transfer them first into the genus Pontisma and then Sirolpidium, and into a monogeneric order, Pontismatales. We show however, that previously published topologies and the proposed taxa Pontisma, Sirolpidium, and Pontismatales are unsupported. We highlight that name changes that are unfounded and premature create confusion in interested parties, especially concerning pathogens of marine red algae that infect important seaweed crops. We thus propose that the names of these holocarpic biotrophic parasites of red algae are retained temporarily, until a supported topology is produced with more genetic markers to enable the circumscription of species and higher-level taxa.

A Digital Twin-based Approach for VANET Simulation in Real Urban Environments

  • Jonghyeon Choe;Youngboo Kim;Sangdae Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.113-122
    • /
    • 2024
  • In this paper, we conducted a thorough investigation of existing simulators for running simulations of Vehicular Adhoc Networks (VANET) in realistic road environments, such as digital twins. After careful consideration, we chose a simulator that combines OSM (OpenStreetMap), SUMO (Simulation of Urban MObility), and OMNeT++ due to its open-source nature and efficient performance. Using this integrated simulator, we carried out VANET simulations in both simple virtual road environments and realistic road environments. Our findings revealed significant differences in VANET performance between the two types of environments, emphasizing the need to consider realistic road and traffic environments for reliable VANET operation. Furthermore, our simulations demonstrated significant performance variability, with performance degradation observed as vehicle density decreased and dynamic changes in network topology increased. These results underscore the importance of digital twin-based approaches in VANET research, highlighting the need to simulate real-world road and traffic conditions rather than relying on simple virtual road environments.

Multi-Protocol Based Routing Selection Scheme for MANET Using Mobility and Connectivity (MANET에서 이동성과 연결성을 고려한 다중 모드 라우팅 프로토콜 적용 기법)

  • Heo, Ung;Wan, Xin;Zhao, Yi;You, Kang-Soo;Choi, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.5
    • /
    • pp.40-52
    • /
    • 2010
  • A mobile ad hoc network is instant and heuristic, and it is also vulnerable and volatile. Since topology and route changes are frequent, no single routing protocol designed for a conventional network performs well. Some protocols suffer from significant performance degradation when the number of nodes increases, or when nodes become highly mobile. In this paper we investigate a way to adaptively select a routing protocol that fits to the real-time network conditions. The first phase of our study is to analyze the performances of two classes of routing protocols under various network scenarios. The second phase consists of constructing a routing protocol selection reference. All nodes continue to monitor the status of neighbor nodes and control packets exchanged. Then, the aggregated information is periodically compared against the protocol selection reference. The selected routing protocol is maintained throughout the network until the network property changes substantially. The performance of the proposed algorithm is verified by a set of computer simulations using the OPNET modeler. The experimental results show that selectively changing routing protocol adaptive to the network conditions greatly improves the efficacy of bandwidth utilization.

Switching Positionality of Border Region as Exceptional Space (예외 공간으로서 접경지역의 위치성 전환)

  • Kim, Boo-Heon;Lee, Sung-Cheol
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.267-286
    • /
    • 2017
  • The main purpose of this paper is to identify the spatiality of North Korea and China border regions through investigating the exceptional characteristics of the regions with the concept of positionality, which allows us to realize the relative position between subject and object. Border regions could be identified appropriately by considering the concept of switching positionality, as it is a kind of multiple space in which its sudden closure and opening should be configured in accordance with geopolitical and geoeconomic changes centering around border line. The main arguments of this research concerned with border regions with the concept of switching positionality are fallen into three. Firstly, changes in border regions should be analyzed by investigating more broader contexts and conjunctural perspectives, and even an internal condition stemmed from locality. Secondly, trajectories of border regions could be analyzed by the assemblages of various powers. Finally, the positionality of economic actors should be examined by identifying dynamic relations between geoeconomics and geopolitics. In particular, the concept of positionality has led to a number of insights into discussions on time-space, and spatiality in relational-dialectical, socio-spatial, and power-topological perspectives. Based upon this concept of positionality, the research has identified exceptional characteristics in North Korea and China border regions. It argues that the exceptionality of the region has stemmed from the intersection between the unstability of geopolitical security and various geoeconomic benefits.

A Compact 370 W High Efficiency GaN HEMT Power Amplifier with Internal Harmonic Manipulation Circuits (내부 고조파 조정 회로로 구성되는 고효율 370 W GaN HEMT 소형 전력 증폭기)

  • Choi, Myung-Seok;Yoon, Tae-San;Kang, Bu-Gi;Cho, Samuel
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.11
    • /
    • pp.1064-1073
    • /
    • 2013
  • In this paper, a compact 370 W high efficiency GaN(Gallium Nitride) HEMT(High Electron Mobility Transistor) power amplifier(PA) using internal harmonic manipulation circuits is presented for cellular and L-band. We employed a new circuit topology for simultaneous high efficiency matching at both fundamental and 2nd harmonic frequency. In order to minimize package size, new 41.8 mm GaN HEMT and two MOS(Metal Oxide Semiconductor) capacitors are internally matched and combined package size $10.16{\times}10.16{\times}1.5Tmm^3$ through package material changes and wire bonded in a new package to improve thermal resistance. When drain biased at 48 V, the developed GaN HEMT power amplifier has achieved over 80 % Drain Efficiency(DE) from 770~870 MHz and 75 % DE at 1,805~1,880 MHz with 370 W peak output power(Psat.). This is the state-of-the-art efficiency and output power of GaN HEMT power amplifier at cellular and L-band to the best of our knowledge.

Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks (무선 메쉬 네트워크에서의 아이디 기반 프록시 암호화를 이용한 안전한 다대다 멀티캐스트 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.72-83
    • /
    • 2010
  • Group communication in a wireless mesh network is complicated due to dynamic intermediate mesh points, access control for communications between different administrative domains, and the absence of a centralized network controller. Especially, many-to-many multicasting in a dynamic mesh network can be modeled by a decentralized framework where several subgroup managers control their members independently and coordinate the inter-subgroup communication. In this study, we propose a topology-matching decentralized group key management scheme that allows service providers to update and deliver their group keys to valid members even if the members are located in other network domains. The group keys of multicast services are delivered in a distributed manner using the identity-based encryption scheme. Identity-based encryption facilitates the dynamic changes of the intermediate relaying nodes as well as the group members efficiently. The analysis result indicates that the proposed scheme has the advantages of low rekeying cost and storage overhead for a member and a data relaying node in many-to-many multicast environment. The proposed scheme is best suited to the settings of a large-scale dynamic mesh network where there is no central network controller and lots of service providers control the access to their group communications independently.