• Title/Summary/Keyword: international network

Search Result 4,198, Processing Time 0.033 seconds

Performance Variations of AODV, DSDV and DSR Protocols in MANET under CBR Traffic using NS-2.35

  • Chandra, Pankaj;Soni, Santosh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.13-20
    • /
    • 2022
  • Basically Mobile Ad Hoc Network (MANET) is an autonomous system with the collection of mobile nodes, these nodes are connected to each other by using wireless networks. A mobile ad hoc network poses this quality which makes topology in dynamic manner. As this type of network is Ad Hoc in nature hence it doesn't have fixed infrastructure. If a node wishes to transfer data from source node to a sink node in the network, the data must be passed through intermediate nodes to reach the destination node, hence in this process data packet loss occurs in various MANET protocols. This research study gives a comparison of various Mobile Ad Hoc Network routing protocols like proactive (DSDV) and reactive (AODV, DSR) by using random topology with more intermediate nodes using CBR traffic. Our simulation used 50, 100, and 150 nodes variations to examine the performance of the MANET routing protocols. We compared the performance of DSDV, AODV and DSR, MANET routing protocols with the result of existing protocol using NS-2 environment, on the basis of different performance parameters like Packet Delivery Ratio, average throughput and average end to end delay. Finally we found that our results are better in terms of throughput and packet delivery ratio along with low data loss.

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Review on Energy Efficient Clustering based Routing Protocol

  • Kanu Patel;Hardik Modi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.169-178
    • /
    • 2023
  • Wireless sensor network is wieldy use for IoT application. The sensor node consider as physical device in IoT architecture. This all sensor node are operated with battery so the power consumption is very high during the data communication and low during the sensing the environment. Without proper planning of data communication the network might be dead very early so primary objective of the cluster based routing protocol is to enhance the battery life and run the application for longer time. In this paper we have comprehensive of twenty research paper related with clustering based routing protocol. We have taken basic information, network simulation parameters and performance parameters for the comparison. In particular, we have taken clustering manner, node deployment, scalability, data aggregation, power consumption and implementation cost many more points for the comparison of all 20 protocol. Along with basic information we also consider the network simulation parameters like number of nodes, simulation time, simulator name, initial energy and communication range as well energy consumption, throughput, network lifetime, packet delivery ration, jitter and fault tolerance parameters about the performance parameters. Finally we have summarize the technical aspect and few common parameter must be fulfill or consider for the design energy efficient cluster based routing protocol.

East Asian Intra-Trade and Logistics Network-Tasks (동아시아 역내무역과 물류네트워크에 관한 연구)

  • Park, Joung-Moon;Hong, Seung-lin
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.46
    • /
    • pp.237-261
    • /
    • 2010
  • Resent East Asian economic growth has lead the increase of global trade volume and global logistics to the level of full-scale development as aiming to have quantitative growth in world trades in one hand and increasing mutual dependence among the East Asian Economic Bloc on the other. In other words, East Asian economic current growth is going along as connecting with 2 different process that are the increase of global trade volume and the technical development of global logistics system. And mutual dependence among the East Asian Economic Bloc shows the deepening trend in production and consumption. While having the flow of expansion in East Asian trade volume and logistics network in mind, this paper will study on trend in East Asian intra-trade and then study on change & tasks in the East Asian Logistics system.

  • PDF

Wireless network design for construction of atmospheric and marine environment monitoring system using buoy

  • Lim, ChaeYoung;Lee, SangHyun
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.269-274
    • /
    • 2020
  • It has used buoy for efficient domestic farm operations and fishermen fish. Buoy uses IoT-based communication to transmit water temperature, salinity, humidity, wind speed, etc. to fishers in real time. In this paper, we utilize LoRa, which enables communication in the marine environment, to construct a network and apply it to an actual buoy for monitoring. The implemented LoRa uses the 900MHz band to configure the network. The sensor consisted of a sensor that can monitor the atmospheric environment and a sensor that can monitor the marine environment. In addition, the information received in real time will be provided to the fishing village host. The fishermen were fully aware of this and took appropriate measures to conduct sea trials.

Productivity on the Chinese Logistics Network and Korean Economic Strategy (중국 물류네트워크의 생산성과 한국의 글로벌통상전략)

  • Choi, Yong-Lock
    • International Commerce and Information Review
    • /
    • v.9 no.1
    • /
    • pp.259-274
    • /
    • 2007
  • The paradigm of the global logistics network has been rapidly changing from traditional concept of productivity in cost terms, toward the new characteristics of innovative productivity in terms of economies of scale, economies of scope, and economies of network. As the ship or airplane becomes larger and speedier, the less logistics hub required. The more diverse logistics parties integrate each other horizontally or vertically, the higher synergy effects they get. The more systematic concurrent engineering available for global supply chain management such as Korean manufacturers in China, the higher productivity they get. The paper analyzes these three paradigms of logistics into the application for the Korean manufacturers in China and concludes that the Korean government, the companies in China should be more focused on the governance of the logistics and the intermediary such as the 4th party logistics(4PL) is definitely developed its role and functions based on three paradigms above mentioned.

  • PDF

Secure Transmission for Interactive Three-Dimensional Visualization System

  • Yun, H.Y.;Yoo, Sun Kook
    • Journal of International Society for Simulation Surgery
    • /
    • v.4 no.1
    • /
    • pp.17-20
    • /
    • 2017
  • Purpose Interactive 3D visualization system through remote data transmission over heterogeneous network is growing due to the improvement of internet based real time streaming technology. Materials and Methods The current internet's IP layer has several weaknesses against IP spoofing or IP sniffing type of network attacks since it was developed for reliable packet exchange. In order to compensate the security issues with normal IP layer, we designed a remote medical visualization system, based on Virtual Private Network. Results Particularly in hospital, if there are many surgeons that need to receive the streaming information, too much load on the gateway can results in deficit of processing power and cause the delay. Conclusion End to end security through the network method would be required.

A Study on International Countermeasures to Cyber-terrorism (사이버 테러리즘에 대한 국제적 대응에 관한 연구)

  • Kim Jeong-Tae;Lee Hyeon-U
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.644-647
    • /
    • 2004
  • Developing into information oriented society, dependency on network systems increases gradually in the area of economy, society and so on. Under that circumstance, temporary stop or damage of integrity of network system may have a strong impact on economic activities and overall society. Recently, threat of cyber terrorism, organized hostile action to government or industry through network, is increasing. Because of the features of network, it is not sufficient only a nation's countermeasure against Cyber terrorism, so international cooperation is needed. We review the status of countermeasure against cyber terrorism and examine several considerations for policy establishment.

  • PDF

Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext

  • Alsariera, Yazan Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.56-62
    • /
    • 2021
  • The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classification algorithms as the multi-classification method suffers from detection oversight. However, there is a need to improve the accuracy and reduce the false alarm rate. Therefore, this study aims to improve generic attack classification by implementing two hybridized decision tree algorithms namely Naïve Bayes Decision tree (NBTree) and Logistic Model tree (LMT). The proposed hybridized methods were developed using the 10-fold cross-validation technique to avoid overfitting. The generic attack detector produced a 99.8% accuracy, an FPR score of 0.002 and an MCC score of 0.995. The performances of the proposed methods were better than the existing decision tree method. Similarly, the proposed method outperformed multi-classification methods for detecting generic attacks. Hence, it is recommended to implement hybridized decision tree method for detecting generic attacks on a computer network.

Application Of Information Technologies In Network Mass Communication Media

  • Ulianova, Kateryna;Kovalova, Tetiana;Mostipan, Tetiana;Lysyniuk, Maryna;Parfeniuk, Ihor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.344-348
    • /
    • 2021
  • The article examines one of the most important means of visualization of mass information on the Internet - information graphics in the broadest sense of the term as a visual technology for presenting mass information. The main objectives of the article are to determine the genre-typological features of infographics and basic technological principles; identification of features of creation and use of information graphics in modern network. Certain benefits of online infographic editors include savings in resources and time. They allow the user, who has basic PC skills, to create standardized infographics based on their own data. In addition, the use of online services develops visual thinking, allows you to get an idea of quality criteria and current trends in infographics, as well as to gain initial experience in the visual presentation of data.