• Title/Summary/Keyword: channel access policy

Search Result 36, Processing Time 0.028 seconds

Test on the Security and Performance on the Basis of the Access Control Policy Implemented by Secure OS (안전한 운영체제 접근제어 정책에 대한 보안성 및 성능 시험)

  • Kim, Jeong-Nyeo;Sohn, Sung-Won;Lee, Chelo-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.5
    • /
    • pp.773-780
    • /
    • 2003
  • SecuROS(Secure & Reliable Operating System) prevents and blocks possible system cracking by implementing additional security functions in FreeBSD 4.3 operating system (OS) kernel, including access control, user authentication, audit trail, encryption file system and trusted channel. This paper describes access control technique, which is one of core technologies of SecuROS, introduces the implementations of DAC, MAC and RBAC, all of which are corresponding access control policies, and show security and results of performance measurement on the basis of application of access control policies. Finally, security and performance between conventional OS environment and environment adopting access control policy is described.

Performance Evaluation of the HIPERLAN Type 2 Media Access Control Protocol (HIPERLAN 타입 2 매체접근제어 프로토콜의 성능평가)

  • Cho, Kwang-Oh;Park, Chan;Lee, Jong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.11-17
    • /
    • 2003
  • In this paper, we presented the dynamic random access channel allocation method under the priority based scheduling policy in order to improve the system performance of HIPERLAN/2 standardized by ETSI According to the scheduling policy, AP scheduler primarily allocates the resource to the collision MT This scheduling policy bring about decreasing the transmission delay of collision MT Dynamic RCH(random access channel) allocation method decreases the collision probability by increasing the number of RCH slots in case of low traffic. While it increases the maximum throughput by increasing the number of the data transmission slots in case of high traffic Therefore dynamic allocation method of RCH slots decreases the scheduling delay and increases the throughput When we evaluate the performance of presented method based on standards, we saw that the presented method improve the performance of the MAC protocol in terms of throughput and transmission delay.

Analysis on the candidate number of channels to transmit second users in the myopic/CA method for dynamic spectrum access (동적 스팩트럼 접속을 위한 myopic/CA 방식에서 이차 사용자가 전송할 후보채널수에 대한 분석)

  • Yang, Geun-ho;Ma, Hwan-gu;Lee, Yutae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.401-403
    • /
    • 2013
  • Myopic method which is one of dynamic spectrum access method is an advantage that it maximizes immediate throughput is not complicated, and the simple and effective. The disadvantage of myopic method is that there may become less efficient because of conflicts between users secondary secondary user becomes many. Between the secondary if the secondary all users, select a channel to maximize the throughput of their own without considering the secondary other users, but it will try transfer secondary most users select the same channel collision will be more. Myopic / CA method has been proposed to solve this problem. Instead of selecting one channel to maximize their performance, select a candidate channels plurality of their advantage, the secondary user transfers to randomly selected channel that one in this way is a scheme. In this paper, we analyze whether it can be defined in a number of the channel number of candidates, depending on the network environment, maximizes the performance of the entire network.

  • PDF

A Dynamic Channel Switching Policy Through P-learning for Wireless Mesh Networks

  • Hossain, Md. Kamal;Tan, Chee Keong;Lee, Ching Kwang;Yeoh, Chun Yeow
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.608-627
    • /
    • 2016
  • Wireless mesh networks (WMNs) based on IEEE 802.11s have emerged as one of the prominent technologies in multi-hop communications. However, the deployment of WMNs suffers from serious interference problem which severely limits the system capacity. Using multiple radios for each mesh router over multiple channels, the interference can be reduced and improve system capacity. Nevertheless, interference cannot be completely eliminated due to the limited number of available channels. An effective approach to mitigate interference is to apply dynamic channel switching (DCS) in WMNs. Conventional DCS schemes trigger channel switching if interference is detected or exceeds a predefined threshold which might cause unnecessary channel switching and long protocol overheads. In this paper, a P-learning based dynamic switching algorithm known as learning automaton (LA)-based DCS algorithm is proposed. Initially, an optimal channel for communicating node pairs is determined through the learning process. Then, a novel switching metric is introduced in our LA-based DCS algorithm to avoid unnecessary initialization of channel switching. Hence, the proposed LA-based DCS algorithm enables each pair of communicating mesh nodes to communicate over the least loaded channels and consequently improve network performance.

Implementation of Memory Efficient Flash Translation Layer for Open-channel SSDs

  • Oh, Gijun;Ahn, Sungyong
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.142-150
    • /
    • 2021
  • Open-channel SSD is a new type of Solid-State Disk (SSD) that improves the garbage collection overhead and write amplification due to physical constraints of NAND flash memory by exposing the internal structure of the SSD to the host. However, the host-level Flash Translation Layer (FTL) provided for open-channel SSDs in the current Linux kernel consumes host memory excessively because it use page-level mapping table to translate logical address to physical address. Therefore, in this paper, we implemente a selective mapping table loading scheme that loads only a currently required part of the mapping table to the mapping table cache from SSD instead of entire mapping table. In addition, to increase the hit ratio of the mapping table cache, filesystem information and mapping table access history are utilized for cache replacement policy. The proposed scheme is implemented in the host-level FTL of the Linux kernel and evaluated using open-channel SSD emulator. According to the evaluation results, we can achieve 80% of I/O performance using the only 32% of memory usage compared to the previous host-level FTL.

A Study on Bush Administration’s Foreign Policy of North Korea (부시행정부의 대북정책에 관한 소고)

  • Lee, Gang-Eon;Jang, Myeong-Sun
    • Journal of National Security and Military Science
    • /
    • s.3
    • /
    • pp.169-196
    • /
    • 2005
  • The point of Bush administraion’s foreign policy is to support the promotion and stability of Democracy in Iraq and counter terrorism and spread of WMD with his strong propulsive force caused by his reelection. In such an environment, there are his leadership, his team, himself, Kim Jung Il, and a new understanding of North Korea after September 11 as the effective factors of Bush administration’s policy toward Pyongyang. Bush administration’s foreign policy of North Korea also shows the process of North Korea’s nuclear weapon program and the future scenario of the Korean Peninsula with "the persistence of solving North Korea’s nuclear weapon program such as the method having done in Lybia", "the holding unconditional talks with Pyongyang, and "the continual concerns with human rights in North Korea." The purpose of Bush administration’s foreign policy of North Korea is to make North Korea do not support terrorism rather than remove the nuclear weapon in North Korea. The process of outlining South Korea’s policy toward North Korea must be considered for "national interest" with reasonable analyses not just hopes For this, South Korea must access systematically human rights of North Korea, prepare projects for a daring approach on North Korea, and strengthen South Korea’s defense ability toward North Korea with deep alliance with U.S and systematize the mutual understanding channel between U.S and South Korea. In conclusion, South Korea must try to get specific methods and practices about Bush administration’s foreign policy of North Korea with national wisdom

  • PDF

Unlicensed Band Traffic and Fairness Maximization Approach Based on Rate-Splitting Multiple Access (전송률 분할 다중 접속 기술을 활용한 비면허 대역의 트래픽과 공정성 최대화 기법)

  • Jeon Zang Woo;Kim Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2023
  • As the spectrum shortage problem has accelerated by the emergence of various services, New Radio-Unlicensed (NR-U) has appeared, allowing users who communicated in licensed bands to communicate in unlicensed bands. However, NR-U network users reduce the performance of Wi-Fi network users who communicate in the same unlicensed band. In this paper, we aim to simultaneously maximize the fairness and throughput of the unlicensed band, where the NR-U network users and the WiFi network users coexist. First, we propose an optimal power allocation scheme based on Monte Carlo Policy Gradient of reinforcement learning to maximize the sum of rates of NR-U networks utilizing rate-splitting multiple access in unlicensed bands. Then, we propose a channel occupancy time division algorithm based on sequential Raiffa bargaining solution of game theory that can simultaneously maximize system throughput and fairness for the coexistence of NR-U and WiFi networks in the same unlicensed band. Simulation results show that the rate splitting multiple access shows better performance than the conventional multiple access technology by comparing the sum-rate when the result value is finally converged under the same transmission power. In addition, we compare the data transfer amount and fairness of NR-U network users, WiFi network users, and total system, and prove that the channel occupancy time division algorithm based on sequential Raiffa bargaining solution of this paper satisfies throughput and fairness at the same time than other algorithms.

Developing Trend of an Ubiquitous Interface Technologies (유비쿼터스 인터페이스 기술의 개발 동향)

  • Lee, Hyeon-Jae;O, Chang-Heon
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.299-311
    • /
    • 2005
  • This article introduces developing trends of an "Ubiquitous Interface" as an access method for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. "Ubiquitous Interface" is include a relatively wide sense meaning not only physical interface of specified device or between processors, but anything method for access USN. These "Ubiquitous Interface" able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Recently, strongly recommended candidates are RFID, NFC, Multi-mode mobile terminal, Wearable computer and OSGi for integrated digital home networking system as a future ubiquitous interface. These candidates are have to have flexibility and multiple physical communication channel for seamless service hand over and serve easy connection at huge USN to user. And, must have flexible software structure and multi-functional middleware. Consequently, for more enhance performance of an ubiquitous interface and developing, need more structured and integrated future plan.

  • PDF

Computation Offloading with Resource Allocation Based on DDPG in MEC

  • Sungwon Moon;Yujin Lim
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.226-238
    • /
    • 2024
  • Recently, multi-access edge computing (MEC) has emerged as a promising technology to alleviate the computing burden of vehicular terminals and efficiently facilitate vehicular applications. The vehicle can improve the quality of experience of applications by offloading their tasks to MEC servers. However, channel conditions are time-varying due to channel interference among vehicles, and path loss is time-varying due to the mobility of vehicles. The task arrival of vehicles is also stochastic. Therefore, it is difficult to determine an optimal offloading with resource allocation decision in the dynamic MEC system because offloading is affected by wireless data transmission. In this paper, we study computation offloading with resource allocation in the dynamic MEC system. The objective is to minimize power consumption and maximize throughput while meeting the delay constraints of tasks. Therefore, it allocates resources for local execution and transmission power for offloading. We define the problem as a Markov decision process, and propose an offloading method using deep reinforcement learning named deep deterministic policy gradient. Simulation shows that, compared with existing methods, the proposed method outperforms in terms of throughput and satisfaction of delay constraints.

A Verified Formal Specification of A Secured Communication Method For Smart Card Applications

  • Kim, Donald D.
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.172-187
    • /
    • 2021
  • In remote villages without access to modern IT technology, simple devices such as smartcards can be used to carry out business transactions. These devices typically store multiple business applications from multiple vendors. Although devices must prevent malicious or accidental security breaches among the applications, a secure communication channel between two applications from different vendors is often required. In this paper, first, we propose a method of establishing secure communication channels between applications in embedded operating systems that run on multi-applet smart cards. Second, we enforce the high assurance using an intransitive noninterference security policy. Thirdly, we formalize the method through the Z language and create the formal specification of the proposed secure system. Finally, we verify its correctness using Rushby's unwinding theorem.