• Title/Summary/Keyword: active network

Search Result 1,657, Processing Time 0.027 seconds

Implementation of Security Enforcement Engine for Active Nodes in Active Networks (액티브 네트워크 상에서 액티브 노드의 보안 강화를 위한 보안 엔진 구현)

  • Kim, Ok-Kyeung;Lim, Ji-Young;Na, Hyun-Jung;Na, Ga-Jin;Kim, Yeo-Jin;Chae, Ki-Joon;Kim, Dong-Young
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.413-422
    • /
    • 2003
  • An active network is a new generation network based on a software-intensive network architecture in which applications are able to inject new strategies or code into the infrastructure for their immediate needs. Therefore, the secure active node architecture is needed to give the capability defending an active node against threats that may be more dynamic and powerful than those in traditional networks. In this paper, a security enforcement engine is proposed to secure active networks. We implemented an operating engine with security, authentication and a authorization modules. Using this engine, it is possible that active networks are protected from threats of the malicious active node.

Active Node Architecture considering He Characteristics of Active Applications (능동 응용의 특성을 고려한 능동 노드 구조)

  • 안상현;김경춘;손선경;손승원
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.712-721
    • /
    • 2002
  • The active network is a new networking approach to allow new protocols to be developed easily by solving the limitation of the existing protocol development procedure and the long protocol standardization process. So far many research institutes and universities have proposed active node architectures and active packet formats, but still there are some problems needed to be solved. One of them is the active packet format and the routing approach which consider the requirements of various active applications. Therefore, in this paper, we figure cut the requirements of various active applications and design four types of active packet formats that reflect these requirements and propose routing schemes appropriate for these characteristics. Also we propose an active node architecture which reflect these requirements.

Design and Implementation of the Active Multi-Agent Middleware for the Sensor Network Application (센서 네트워크 응용을 위한 능동적 다중 에이전트 미들웨어 설계 및 구현)

  • Lee, Yon-Sik;Jang, Min-Seok
    • The KIPS Transactions:PartA
    • /
    • v.18A no.4
    • /
    • pp.159-164
    • /
    • 2011
  • In this paper, we suggest the active multi-agent middleware for the sensor network application. For this, firstly we design and implement the active rule based mobile agent middleware. The mobile agent in the proposed system visits the destination sensor nodes according to the migration list offered by the meta table in the name space of the naming agent, acquires and transmits sensor data according to the purpose and needs through the active rules, and directly executes the actions corresponding to the optional events(changed sensor data and/or time etc.). And then, we show the potential applicability of the active rule based mobile agent middleware in various active sensor networks through the interaction with the rule base system and context database system.

A Study on The Performance Analysis of IEEE 802,11 Wireless LAN (IEEE 802.11 무선 LAN의 성능분석에 관한 연구)

  • Hong, Seong-Cheol;Bae, Seong-Su;O, Yeong-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.2
    • /
    • pp.7-16
    • /
    • 2000
  • In this paper, IEEE 802.11 MAC layer protocol is modeled by p-persistent CSMA method. And We introduce performance analysis model based on Basic CSMA/CA protocol, CTS/RTS protocol and hidden node effect reflected Basic CSMA/CA Protocol, Which is mathematically assayed by renewal theory. In this throughput, the result shown that Basic CSMA/CA protocol is profitable when the number of active node is smaller, or the length of packet is shorter, and CTS/RTS protocol is lucrative when the number of active node is larger, or the length of packet is longer. Also the result shown that hidden node less affected when the active node has small one, rather than when the active node has larger one.

  • PDF

Optimal Design of Semi-Active Mid-Story Isolation System using Supervised Learning and Reinforcement Learning (지도학습과 강화학습을 이용한 준능동 중간층면진시스템의 최적설계)

  • Kang, Joo-Won;Kim, Hyun-Su
    • Journal of Korean Association for Spatial Structures
    • /
    • v.21 no.4
    • /
    • pp.73-80
    • /
    • 2021
  • A mid-story isolation system was proposed for seismic response reduction of high-rise buildings and presented good control performance. Control performance of a mid-story isolation system was enhanced by introducing semi-active control devices into isolation systems. Seismic response reduction capacity of a semi-active mid-story isolation system mainly depends on effect of control algorithm. AI(Artificial Intelligence)-based control algorithm was developed for control of a semi-active mid-story isolation system in this study. For this research, an practical structure of Shiodome Sumitomo building in Japan which has a mid-story isolation system was used as an example structure. An MR (magnetorheological) damper was used to make a semi-active mid-story isolation system in example model. In numerical simulation, seismic response prediction model was generated by one of supervised learning model, i.e. an RNN (Recurrent Neural Network). Deep Q-network (DQN) out of reinforcement learning algorithms was employed to develop control algorithm The numerical simulation results presented that the DQN algorithm can effectively control a semi-active mid-story isolation system resulting in successful reduction of seismic responses.

ANC Caching Technique for Replacement of Execution Code on Active Network Environment (액티브 네트워크 환경에서 실행 코드 교체를 위한 ANC 캐싱 기법)

  • Jang Chang-bok;Lee Moo-Hun;Cho Sung-Hoon;Choi Eui-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.610-618
    • /
    • 2005
  • As developed Internet and Computer Capability, Many Users take the many information through the network. So requirement of User that use to network was rapidly increased and become various. But it spend much time to accept user requirement on current network, so studied such as Active network for solved it. This Active node on Active network have the capability that stored and processed execution code aside from capability of forwarding packet on current network. So required execution code for executed packet arrived in active node, if execution code should not be in active node, have to take by request previous Action node and Code Server to it. But if this execution code take from previous active node and Code Server, bring to time delay by transport execution code and increased traffic of network and execution time. So, As used execution code stored in cache on active node, it need to increase execution time and decreased number of request. So, our paper suggest ANC caching technique that able to decrease number of execution code request and time of execution code by efficiently store execution code to active node. ANC caching technique may decrease the network traffic and execution time of code, to decrease request of execution code from previous active node.

A Policy-Based Active Framework for the Management of QoS in MANET (MANET에서의 QoS 관리를 위한 정책 기반 액티브 프레임워크)

  • Kim, Kyu-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.119-125
    • /
    • 2007
  • On account of limited resources and diverse topology change. it is difficult to manage MANET and guarantee QoS. In current MANET, QoS grantee is exceedingly significant. However, today's MANET are being concentrately worked on MAC protocols and routing protocols. Thus we proposed a framework for effective management of MANET and supporting QoS using policy based network management paradigm and active network technology. Since this framework employs the policy-based management approach in active network environment, it provides an abstract and autonomous management method to network managers.

  • PDF

A Secure Active Packet Transfer using Cryptographic Techniques (암호 기술을 이용한 안전한 능동 패킷 전송)

  • 김영수;나중찬;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • Active networks represent a new approach to network architecture. Nodes(routers, switches, etc.) can perform computations on user data, while packets can carry programs to be executed on nodes and potentially change the state of them. While active networks provide a flexible network iufrastructure, they are more complex than traditional networks and raise considerable security problems. Nodes are Public resources and are essential to the proper and contract running of many important systems. Therefore, security requirements placed upon the computational environment where the code of packets will be executed must be very strict. Trends of research for active network security are divided into two categories: securing active nodes and securing active packets. For example, packet authentication or monitoring/control methods are for securing active node, but some cryptographic techniques are for the latter. This paper is for transferring active packets securely between active nodes. We propose a new method that can transfer active packets to neighboring active nodes securely, and execute executable code included in those packets in each active node. We use both public key cryptosystem and symmetric key cryptosystem in our scheme

Implementation of a System for RFID Education to be based on an EPC global Network Standard (EPC global Network 표준을 따르는 RFID 교육용 시스템의 구현)

  • Kim, Dae-Hee;Chung, Joong-Soo;Kim, Hyu-Chan;Jung, Kwang-Wook;Kim, Seog-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.90-99
    • /
    • 2009
  • This paper presents the implementation of RFID EPC global network educational system based on using 900MHz air interface between the reader and the active tag. The software of reader and the active tag is developed on embedded environment, and the software of PC controlling the reader is based on window OS operated as the server. The ATmega128 VLSI chip is used for the processor of the reader and the active tag. As the development environment, AVR compiler is used for the reader and the active tag of which the programming language is C. The visual C++language of the visual studio on the PC activated as the server is used for development language. Main functions of this system are to control tag containing EPC global Data by PC through the reader, to obtain information of tag through the internet and to read/write data on tag memory. Finally the data written from the active tag's memory is sent to the PC via the reader as "read" operation and compare the received data with one already sent to the tag. Software implementation of 900MHz EPC global RFID educational system is done on the basis of these functions.

An Advanced Three-Phase Active Power Filter with Adaptive Neural Network Based Harmonic Current Detection Scheme

  • Rukonuzzaman, M.;Nakaoka, Mutsuo
    • Journal of Power Electronics
    • /
    • v.2 no.1
    • /
    • pp.1-10
    • /
    • 2002
  • An advanced active power filter for the compensation of instantaneous harmonic current components in nonlinear current load is presented in this paper. A novel signal processing technique using an adaptive neural network algorithm is applied for the detection of harmonic components generated by three-phase nonlinear current loads and this method can efficiently determine the instantaneous harmonic components in real time. The control strategy of the switching signals to compensate current harmonics of the three-phase inverter is also discussed and its switching signals are generated with the space voltage vector modulation scheme. The validity of this active filtering processing system to compensate current harmonics is substantiated on the basis of simulation results.