• Title/Summary/Keyword: k-networks

Search Result 10,962, Processing Time 0.038 seconds

Performance Analysis of IEEE 802.15.6 MAC Protocol in Beacon Mode with Superframes

  • Li, Changle;Geng, Xiaoyan;Yuan, Jingjing;Sun, Tingting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1108-1130
    • /
    • 2013
  • Wireless Body Area Networks (WBANs) are becoming increasingly important to solve the issue of health care. IEEE 802.15.6 is a wireless communication standard for WBANs, aiming to provide a real-time and continuous monitoring. In this paper, we present our development of a modified Markov Chain model and a backoff model, in which most features such as user priorities, contention windows, modulation and coding schemes (MCSs), and frozen states are taken into account. Then we calculate the normalized throughput and average access delay of IEEE 802.15.6 networks under saturation and ideal channel conditions. We make an evaluation of network performances by comparing with IEEE 802.15.4 and the results validate that IEEE 802.15.6 networks can provide high quality of service (QoS) for nodes with high priorities.

Enhanced Dynamic Segment Protection in WDM Optical Networks under Reliability Constraints

  • Guo, Lei;Cao, Jin;Yu, Hongfang;Li, Lemin
    • ETRI Journal
    • /
    • v.28 no.1
    • /
    • pp.99-102
    • /
    • 2006
  • In this letter, we study the protection problem in wavelength division multiplexing (WDM) optical networks, and propose a novel dynamic heuristic algorithm called differentiated reliable segment protection (DRSP). Differing from previous work, DRSP can effectively avoid the trap problem and is able to find a feasible solution for each connection request. Therefore, DRSP outperforms the previous work. Simulation results have shown to be promising.

  • PDF

A study of architecture to network internetworing in modebile networks (이동 네트워크에서 망연동 구조에 대한 연구)

  • Park, Sangjoon;Lee, Jongchan;Shin, Sungyun;Park, Gi-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.677-678
    • /
    • 2012
  • The B3G network architecture by the connection of access network is divided into two forms:tightly-coupled networks and loosely-coupled networks. In this paper, we consider the tightly-coupled networks in the internetworking architecture of mobile network.

  • PDF

A study to network access in modebile networks (이동 네트워크에서 네트워크 접속에 대한 연구)

  • Park, Sangjoon;Lee, Jongchan;Shin, Sungyun;Park, Gi-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.679-680
    • /
    • 2012
  • The B3G network architecture by the connection of access network is divided into two forms:tightly-coupled networks and loosely-coupled networks. In this paper, we consider the loosely-coupled networks in the internetworking architecture of mobile network.

  • PDF

Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks

  • Lim, Sun-Hee;Yun, Seung-Hwan;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.634-644
    • /
    • 2009
  • A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical crosslayer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.

Natural vibration analysis of diagonal networks

  • Chai, W.S.;Li, Y.;Chan, H.C.
    • Structural Engineering and Mechanics
    • /
    • v.6 no.5
    • /
    • pp.517-527
    • /
    • 1998
  • This paper describes an exact method of analysis for natural vibration of diagonal networks by considering an equivalent cyclic periodic structure and adopting the double U-transformation technique. Both a lumped mass system and a distributed mass system are considered to investigate the diagonal networks. The exact solution for the frequency equations and the natural modes of the networks can be derived. As numerical examples, square diagonal cable networks with different meshes are worked out.

A Congestion Control Mechanism for Supporting Differentiated Service in Mobile Ad hoc Networks

  • Kim Jin-Nyun;Ha Nam-Koo;Cho Dong-Hoon;Kim Hyun-Sook;Han Ki-Jun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.143-146
    • /
    • 2004
  • Differentiated services (DiffServ) has been widely accepted as the service model to adopt for providing quality-of­service (QoS) over the next-generation IP networks. There is a growing need to support QoS in mobile ad hoc networks. Supporting DiffServ in mobile ad hoc networks, however, is very difficult because of the dynamic nature of mobile ad hoc networks, which causes network congestion. The network congestion induces long transfer packet delay and low throughput which make it very difficult to support QoS in mobile ad hoc networks. We propose DiffServ module to support differentiated service in mobile ad hoc networks through congestion control. Our DiffServ module uses the periodical rate control for real time traffic and also uses the best effort bandwidth concession when network congestion occurs. Network congestion is detected by measuring the packet transfer delay or bandwidth threshold of real time traffic. We evaluate our mechanism via a simulation study. Simulation results show our mechanism may offer a low and stable delay and a stable throughput for real time traffic in mobile ad hoc networks.

  • PDF

Relations among the multidimensional linear interpolation fuzzy reasoning , and neural networks

  • Om, Kyong-Sik;Kim, Hee-Chan;Byoung-Goo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.562-567
    • /
    • 1998
  • This paper examined the relations among the multidimensional linear interpolation(MDI) and fuzzy reasoning , and neural networks, and showed that an showed that an MDI is a special form of Tsukamoto's fuzzy reasoning and regularization networks in the perspective of fuzzy reasoning and neural networks, respectively. For this purposes, we proposed a special Tsukamoto's membership (STM) systemand triangular basis function (TBF) networks, Also we verified the condition when our proposed TBF becomes a well-known radial basis function (RBF).

  • PDF

Considerations and Issues for Applying the Existing Network Security to Underwater Acoustic Sensor Networks (수중 음파 센서네트워크에 기존 네트워크 보안을 적용하기 위한 고려사항과 논쟁점)

  • Shin, DongHyun;Lee, Seung-Jun;Kim, Changhwa
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1940-1950
    • /
    • 2017
  • The security threat types in underwater communication networks environment are almost the same as the terrestrial, but the security of mechanisms the terrestrial RF-based networks environment can not be directly applied due to not only the limited resources of each node but also unsafe channel such as low propagation delay, high bit error rate etc. Nevertheless there has not been much research on the security of underwater acoustic communication networks. Therefore, in this paper analyzes the differences between the terrestrial communication networks and underwater acoustic communication networks, and identifies issues that are the starting points of underwater communication networks security research.

Applying Hebbian Theory to Enhance Search Performance in Unstructured Social-Like Peer-to-Peer Networks

  • Huang, Chester S.J.;Yang, Stephen J.H.;Su, Addison Y.S.
    • ETRI Journal
    • /
    • v.34 no.4
    • /
    • pp.591-601
    • /
    • 2012
  • Unstructured peer-to-peer (p2p) networks usually employ flooding search algorithms to locate resources. However, these algorithms often require a large storage overhead or generate massive network traffic. To address this issue, previous researchers explored the possibility of building efficient p2p networks by clustering peers into communities based on their social relationships, creating social-like p2p networks. This study proposes a social relationship p2p network that uses a measure based on Hebbian theory to create a social relation weight. The contribution of the study is twofold. First, using the social relation weight, the query peer stores and searches for the appropriate response peers in social-like p2p networks. Second, this study designs a novel knowledge index mechanism that dynamically adapts social relationship p2p networks. The results show that the proposed social relationship p2p network improves search performance significantly, compared with existing approaches.