• Title/Summary/Keyword: networking

Search Result 3,278, Processing Time 0.033 seconds

A Percolation based M2M Networking Architecture for Data Transmission and Routing

  • Lu, Jihua;An, Jianping;Li, Xiangming;Yang, Jie;Yang, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.649-663
    • /
    • 2012
  • We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server-free and router-free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases: routing and data transmission phases. In the routing phase, probe packets will be transmitted and forwarded in the network thus multiple paths are selected and performed based on the constriction of the maximum hop number. In the second phase, the information will be encoded, say, with the fountain codes, and transmitted using the paths generated in the first phase. In such a way, an efficient routing and data transmission mechanism can be built, which allow us to construct a low-cost, flexible and ubiquitous network. Such a networking architecture and data transmission can be used in many M2M communications, such as the stub network of internet of things, and deep space networking, and so on.

Implementation of Node Mapping-based FlexRay-CAN Gateway for In-vehicle Networking System (차량 네트워크 시스템을 위한 노드 매핑 기반 FlexRay-CAN 게이트웨이 구현)

  • Bae, Yong-Gyung;Kim, Man-Ho;Lee, Suk;Lee, Kyung-Chang
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.19 no.6
    • /
    • pp.37-45
    • /
    • 2011
  • As vehicles become more intelligent, in-vehicle networking (IVN) systems such as controller area network (CAN) or FlexRay are essential for convenience and safety of drivers. To expand the applicability of IVN systems, attention is currently being focused on the communication between heterogeneous networks such as body networking and chassis networking systems. A gateway based on message mapping method was developed to interconnect FlexRay and CAN networks. However, this type of gateways has the following shortcomings. First, when a message ID was changed, the gateway must be reloaded with a new mapping table reflecting the change. Second, if the number of messages to be transferred between two networks increase, software complexity of gateway increases very rapidly. In order to overcome these disadvantages, this paper presents FlexRay-CAN gateway based on node mapping method. More specifically, this paper presents a node mapping based FlexRay-CAN gateway operation algorithm along with the experimental evaluation for ID change.

An Architecture Supporting Adaptation and Evolution in Fourth Generation Mobile Communication Systems

  • Prehofer, Christian;Kellerer, Wolfgang;Hirschfeld, Robert;Berndt, Hendrik;Kawamura, Katsuya
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.336-343
    • /
    • 2002
  • A major challenge for next generation mobile communication is capturing the system architecture’s complexity with all its internal and external dependencies. Seamless integration of heterogeneous environments in all system parts is a key requirement. Moreover, future systems have to consider the different evolution cycles of individual system parts. Among those, services are expected to change the fastest. With respect to these considerations, we propose an overall architecture for next generation mobile communication systems. It covers all system parts from wireless transmission to applications including network and middleware platform. Our approach focuses on adaptability in terms of recon- figurability and programmability to support unanticipated system evolution. Therefore, we consider abstraction layers which consist of adaptable cooperating components grouped by open platforms rather than rigid system layers. In addition to that, we introduce cross-layer cooperation allowing an efficient use of the available resources. Specific scenarios illustrate the feasibility of our approach.

Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments (CCN 기반 이동 애드혹 환경에서의 안전한 라우팅 방안)

  • Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.304-308
    • /
    • 2014
  • As users generate lots of contents anytime and anywhere with an explosive growth of the number of mobile devices, Content centric networking (CCN) has emerged as a new networking architecture. However, the efficient CCN routing scheme is required for ad hoc network support because of its one to one message exchange characteristics. So, this paper proposes the new CCN ad hoc routing scheme using on-demand approach, which includes the secure routing configuration scheme based on multiple hash operation. It is shown from the simulation that the proposed method can provide lower control overhead because of its two-fold routing configuration architecture.

A Study of Security Threats and Security Requirements of Software Defined Networking Technology (소프트웨어 정의 네트워킹 기술의 보안 위협 및 보안 요구사항에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.561-562
    • /
    • 2017
  • Software defined networking technology allows centralized and powerful network control by separating packet processing and network control. However, powerfulness of software-defined networking technology threats the network itself. Most security researches of software-defined networking focus on discovering and defending network vulnerabilities. But, there is not much security for this technology itself. In this paper, the security vulnerabilities that can occur in this networking technology are analyzed and the security requirements of it are proposed. The biggest threats are the threats to the controller, the reliability problem between the controller and the switch must be solved, and a technique to detect attacks that malfunction by manipulating configuration information are needed.

  • PDF

Identifying Influential People Based on Interaction Strength

  • Zia, Muhammad Azam;Zhang, Zhongbao;Chen, Liutong;Ahmad, Haseeb;Su, Sen
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.987-999
    • /
    • 2017
  • Extraction of influential people from their respective domains has attained the attention of scholastic community during current epoch. This study introduces an innovative interaction strength metric for retrieval of the most influential users in the online social network. The interactive strength is measured by three factors, namely re-tweet strength, commencing intensity and mentioning density. In this article, we design a novel algorithm called IPRank that considers the communications from perspectives of followers and followees in order to mine and rank the most influential people based on proposed interaction strength metric. We conducted extensive experiments to evaluate the strength and rank of each user in the micro-blog network. The comparative analysis validates that IPRank discovered high ranked people in terms of interaction strength. While the prior algorithm placed some low influenced people at high rank. The proposed model uncovers influential people due to inclusion of a novel interaction strength metric that improves results significantly in contrast with prior algorithm.

Low-Complexity Energy Efficient Base Station Cooperation Mechanism in LTE Networks

  • Yu, Peng;Feng, Lei;Li, Zifan;Li, Wenjing;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3921-3944
    • /
    • 2015
  • Currently Energy-Saving (ES) methods in cellular networks could be improved, as compensation method for irregular Base Station (BS) deployment is not effective, most regional ES algorithm is complex, and performance decline caused by ES action is not evaluated well. To resolve above issues, a low-complexity energy efficient BS cooperation mechanism for Long Time Evolution (LTE) networks is proposed. The mechanism firstly models the ES optimization problem with coverage, resource, power and Quality of Service (QoS) constraints. To resolve the problem with low complexity, it is decomposed into two sub-problems: BS Mode Determination (BMD) problem and User Association Optimization (UAO) problem. To resolve BMD, regional dynamic multi-stage algorithms with BS cooperation pair taking account of load and geographic topology is analyzed. And then a distributed heuristic algorithm guaranteeing user QoS is adopted to resolve UAO. The mechanism is simulated under four LTE scenarios. Comparing to other algorithms, results show that the mechanism can obtain better energy efficiency with acceptable coverage, throughput, and QoS performance.

Performance Evaluation of Low-Powered Computing Cluster Prototype using Mobile Processors (모바일 프로세서 기반 저전력 컴퓨팅 클러스터 프로토타입 성능 분석)

  • Nam, Dukyun;Gu, Gibeom;Park, Chan Yeol;Ryu, Hoon;Kim, Jik-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.230-233
    • /
    • 2015
  • 본 논문에서는 저전력 클러스터 구축을 위해 확장가능성, 저전력 노드 구성, 자율동작 기능 구현, 플러그인을 통한 기능 확장 등 4가지 핵심 추진사항을 도출하고, 모바일 단말기에 사용되는 저전력 프로세서를 이용하여 컴퓨팅 클러스터 프로토타입을 구축했다. 슈퍼컴퓨터 Top500의 성능 측정으로 활용되는 HPL 벤치마크을 이용하여 프로토타입의 성능을 측정 및 분석하고 모바일 프로세서를 이용한 클러스터의 대규모 확장 시 개선되어야 할 사항을 파악했다.

Cyberbullying Detection in Twitter Using Sentiment Analysis

  • Theng, Chong Poh;Othman, Nur Fadzilah;Abdullah, Raihana Syahirah;Anawar, Syarulnaziah;Ayop, Zakiah;Ramli, Sofia Najwa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.1-10
    • /
    • 2021
  • Cyberbullying has become a severe issue and brought a powerful impact on the cyber world. Due to the low cost and fast spreading of news, social media has become a tool that helps spread insult, offensive, and hate messages or opinions in a community. Detecting cyberbullying from social media is an intriguing research topic because it is vital for law enforcement agencies to witness how social media broadcast hate messages. Twitter is one of the famous social media and a platform for users to tell stories, give views, express feelings, and even spread news, whether true or false. Hence, it becomes an excellent resource for sentiment analysis. This paper aims to detect cyberbully threats based on Naïve Bayes, support vector machine (SVM), and k-nearest neighbour (k-NN) classifier model. Sentiment analysis will be applied based on people's opinions on social media and distribute polarity to them as positive, neutral, or negative. The accuracy for each classifier will be evaluated.

Designing and Building the Model of Fisheries Information Systems with Information Technology. (정보기술(IT)을 응용한 수산정보시스템모형의 설계 및 구축에 관한 연구)

  • 김하균
    • The Journal of Fisheries Business Administration
    • /
    • v.29 no.2
    • /
    • pp.65-76
    • /
    • 1998
  • This paper tries to suggest the Model of Fisheries Information Systems(FIS) with information technology. The paper shows the analysis and design of FIS. FIS consists of three inportant parts. They are database system, modelbase system and networking. Database systems report to infer the statistic, institute, maket of fisheries. Modelbase systems are used to forecast and plan the automation of fisheries. Networking is needed to develop the Value-Added Networking(VAN). FIS will be highly possible to develop the biggest VAN in Korea.

  • PDF