• 제목/요약/키워드: network-based

Search Result 25,682, Processing Time 0.048 seconds

A Fast Inter-Domain Network-based IP Mobility Scheme for Urban Areas

  • Taghizadeh, Alireza;Wan, Tat-Chee;Budiarto, Rahmat
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.645-655
    • /
    • 2014
  • Latency, an identified element of Internet protocol (IP) mobility protocol execution, can reduce handover performance in mobile networks. Although the performance can be improved by applying an effective network-based IP mobility scheme in place of the traditional host-based alternatives, the existing inter-domain extensions of network-based IP mobility continue to suffer from an extended handover latency. This paper proposes a new inter-domain network-based IP mobility scheme based on node movement prediction. The proposed scheme accelerates the handover by preparing the future domain of the mobile node in a proactive manner. Analytical and simulation-based evaluations confirm improved performance of the proposed scheme in terms of handover latency and packet loss compared with existing schemes.

NUND: Non-Uniform Node Distribution in Cluster-based Wireless Sensor Networks

  • Ren, Ju;Zhang, Yaoxue;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2302-2324
    • /
    • 2014
  • Cluster-based wireless sensor network (WSN) can significantly reduce the energy consumption by data aggregation and has been widely used in WSN applications. However, due to the intrinsic many-to-one traffic pattern in WSN, the network lifetime is generally deteriorated by the unbalanced energy consumption in a cluster-based WSN. Therefore, energy efficiency and network lifetime improvement are two crucial and challenging issues in cluster-based WSNs. In this paper, we propose a Non-Uniform Node Distribution (NUND) scheme to improve the energy efficiency and network lifetime in cluster-based WSNs. Specifically, we first propose an analytic model to analyze the energy consumption and the network lifetime of the cluster-based WSNs. Based on the analysis results, we propose a node distribution algorithm to maximize the network lifetime with a fixed number of sensor nodes in cluster-based WSNs. Extensive simulations demonstrate that the theoretical analysis results determined by the proposed analytic model are consistent with the simulation results, and the NUND can significantly improve the energy efficiency and network lifetime.

Optimization of Cyber-Attack Detection Using the Deep Learning Network

  • Duong, Lai Van
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.159-168
    • /
    • 2021
  • Detecting cyber-attacks using machine learning or deep learning is being studied and applied widely in network intrusion detection systems. We noticed that the application of deep learning algorithms yielded many good results. However, because each deep learning model has different architecture and characteristics with certain advantages and disadvantages, so those deep learning models are only suitable for specific datasets or features. In this paper, in order to optimize the process of detecting cyber-attacks, we propose the idea of building a new deep learning network model based on the association and combination of individual deep learning models. In particular, based on the architecture of 2 deep learning models: Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM), we combine them into a combined deep learning network for detecting cyber-attacks based on network traffic. The experimental results in Section IV.D have demonstrated that our proposal using the CNN-LSTM deep learning model for detecting cyber-attacks based on network traffic is completely correct because the results of this model are much better than some individual deep learning models on all measures.

Implementation of Multiple Connectivity using CANopen in IEEE 1451.0-based Smart Sensor (IEEE 1451.0 기반 스마트 센서에서 CANopen을 이용한 다중 접속 기능의 구현)

  • Park, Jee-Hun;Lee, Suk;Song, Young-Hun;Lee, Kyung-Chang
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.28 no.4
    • /
    • pp.436-445
    • /
    • 2011
  • As automation systems become intelligent and autonomous for productibility, industrial networks (fieldbuses) and network-based devices are essential components of intelligent manufacturing systems. However, there are obstacles for the wide acceptance of the network-based devices such as smart sensor and network-based actuator. First, there exist numerous fieldbus protocols that a network-based device should be able to support. Second, the whole network-based device has to be replaced when only the sensor of the module fails. In order to overcome these obstacles, a smart sensor/actuator is implemented as two units; one responsible for network communication and the other for sensor/actuator operations using IEEE 1451.0 standard. This paper presents a structure of the 1451.0-based smart sensor with multiple connectivity function designed by CANopen.

Implementation of an OpenFlow-based Access Point Virtual Switch for Monitoring and Virtualization of Legacy Wireless LAN

  • Lee, Hyung-Bong;Park, Ji-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.65-72
    • /
    • 2016
  • Network virtualization is an emerging technology for solving the rigidity of the physical network infrastructure. The innovative technique virtualizes all resources in the network, including the network links and nodes, and provides a number of virtual networks on a single network infrastructure. In order to realize a virtual network, a thorough and complete monitoring of all resources in the network should be performed firstly. OpenFlow is an open source stack for network virtualization. However, it is impossible to apply OpenFlow to AP-based legacy wireless LAN environment because OpenFlow targets ethernet-based LAN environment. In this paper, we implement an adaptor-styled virtual switch for AP-based wireless LAN through customizing the Open vSwitch which is a virtual switch of OpenFlow. The evaluation test results show that the implemented OpenFlow stack operates successfully. The implemented OpenFlow stack can now be plugged immediately in existing AP-based wireless LAN environment and plays network resource monitoring. In the future, we can develop wireless LAN virtualization applications on the wireless OpenFlow stack.

A Study on Timing Modeling and Response Time Analysis in LIN Based Network System (LIN 프로토콜 시간 모델링 및 메시지 응답 시간 해석에 관한 연구)

  • Youn, Jea-Myoung;Sunwoo, Myoung-Ho;Lee, Woo-Taik
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.13 no.6
    • /
    • pp.48-55
    • /
    • 2005
  • In this paper, a mathematical model and a simulation method for the response time analysis of Local Interconnect Network(LIN) based network systems are proposed. Network-induced delays in a network based control system can vary widely according to the transmission time of message and the overhead time of transmission. Therefore, in order to design a distributed control system using LIN network, a method to predict and verify the timing behavior of LIN protocol is required at the network design phase. Furthermore, a simulation environment based on a timing model of LIN protocol is beneficial to predict the timing behavior of LIN. The model equation is formulated with six timing parameters deduced from timing properties of LIN specification. Additionally, LIN conformance test equations to verify LIN device driver are derived with timing constraints of the parameters. The proposed model equation and simulation method are validated with a result that is measured at real LIN based network system.

A Study on Network detection technique using Human Immune System (인간 면역 체계를 이용한 네트워크 탐지기술 연구)

  • ;Peter Brently
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.06a
    • /
    • pp.307-313
    • /
    • 1999
  • This paper reviews and assesses the analogy between the human immune system and network intrusion detection systems. The promising results from a growing number of proposed computer immune models for intrusion detection motivate this work. The paper begins by briefly introducing existing intrusion detection systems (IDS's). A set of general requirements for network-based IDS's and the design goals to satisfy these requirements are identified by a careful examination of the literature. An overview of the human immune system is presented and its salient features that can contribute to the design of competent network-based IDS's are analysed. The analysis shows that the coordinated actions of several sophisticated mechanisms of the human immune system satisfy all the identified design goals. Consequently, the paper concludes that the design of a novel network-based IDS based on the human immune system is promising for future network-based IDS's

  • PDF

A Study on Network detection technique using Human Immune System (인간 면역 체계를 이용한 네트워크 탐지기술 연구)

  • ;Peter Brently
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.03a
    • /
    • pp.307-313
    • /
    • 1999
  • This paper reviews and assesses the analogy between the human immune system and network intrusion detection systems. The promising results from a growing number of proposed computer immune models for intrusion detection motivate this work. The paper begins by briefly introducing existing intrusion detection systems (IDS's). A set of general requirements for network-based IDS's and the design goals to satisfy these requirements are identified by a careful examination of the literature. An overview of the human immune system is presented and its salient features that can contribute to the design of competent network-based IDS's are analysed. The analysis shows that the coordinated actions of several sophisticated mechanisms of the human immune system satisfy all the identified design goals. Consequently, the paper concludes that the design of a network-based IDS based on the human immune system is promising for future network-based IDS's

  • PDF

Network-based Feature Modeling in Distributed Design Environment (네트워크 기반 특징형상 모델링)

  • Lee, J.Y.;Kim, H.;Han, S.B.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.5 no.1
    • /
    • pp.12-22
    • /
    • 2000
  • Network and Internet technology opens up another domain for building future CAD/CAM environment. The environment will be global, network-centric, and spatially distributed. In this paper, we present an approach for network-centric feature-based modeling in a distributed design environment. The presented approach combines the current feature-based modeling technique with distributed computing and communication technology for supporting product modeling and collaborative design activities over the network. The approach is implemented in a client/server architecture, in which Web-enabled feature modeling clients, neutral feature model server, and other applications communicate with one another via a standard communication protocol. The paper discusses how the neutral feature model supports multiple views and maintains naming consistency between geometric entities of the server and clients. Moreover, it explains how to minimize the network delay between the server and client according to incremental feature modeling operations.

  • PDF

Scalable Quasi-Dynamic-Provisioning-Based Admission Control Mechanism in Differentiated Service Networks

  • Rhee, Woo-Seop;Lee, Jun-Hwa;Yu, Jae-Hoon;Kim, Sang-Ha
    • ETRI Journal
    • /
    • v.26 no.1
    • /
    • pp.27-37
    • /
    • 2004
  • The architecture in a differentiated services (DiffServ) network is based on a simple model that applies a per-class service in the core node of the network. However, because the network behavior is simple, the network structure and provisioning is complicated. If a service provider wants dynamic provisioning or a better bandwidth guarantee, the differentiated services network must use a signaling protocol with QoS parameters or an admission control method. Unfortunately, these methods increase the complexity. To overcome the problems with complexity, we investigated scalable dynamic provisioning for admission control in DiffServ networks. We propose a new scalable $qDPM^2$ mechanism based on a centralized bandwidth broker and distributed measurement-based admission control and movable boundary bandwidth management to support heterogeneous QoS requirements in DiffServ networks.

  • PDF