• Title/Summary/Keyword: networking of networks

Search Result 815, Processing Time 0.04 seconds

A Distance and Angle Based Routing Algorithm for Vehicular Ad hoc Networks

  • Wang, Jing;Rhee, Kyung-Hyune
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.190-192
    • /
    • 2012
  • Vehicular Ad hoc Networks (VANETs) is the new wireless networking concept of mobile ad hoc networks in research community. Routing in vehicular is a major challenge and research area. The majority of current routing algorithms for VANETs utilize indirect metrics to select the next hop and produce optimal node path. In this paper, we propose a distance and angle based routing algorithm for VANETs, which combines a distance approach with an angle based geographical strategy for selecting the next hop, with the purpose of using direct metrics to build a optimal node route. The proposed algorithm has better performance than the previous scheme.

  • PDF

Paving the Road to Systems Beyond 3G - The IST BRAIN and MIND Projects

  • Wisely, Dave;Mitjana, Enric
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.292-301
    • /
    • 2002
  • Wireless LAN technology is complementary to 3G systems and could be used to provide high bandwidth hotspot coverage, for example in railway stations and offices, in order to provide the high bandwidth video and broadband services such as those emerging on DSL fixed access. The IST Projects BRAIN and MIND have investigated a number of key technical enablers for such a system beyond 3G. These include scenarios and business models, design of an all-IP access network, consideration of ad hoc network extensions, enhancing Wireless LAN efficiency and compatibility with IP and, finally, terminal middleware and signalling for rapid adaptations to network QoS changes.

SDN Based Mobility in Enterprise Wireless Network (엔터프라이즈 무선네트워크에서 SDN 기반 이동성 연구)

  • Challa, Rajesh;Yeom, Sanggil;Choo, Hyunseung
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.335-336
    • /
    • 2015
  • Seamless mobility is one of the most crucial feature of telecommunication industry. Researches are going on in full swing to deal with this feature in most efficient manner. Software Defined Networking (SDN) is seen as the next generation paradigm which can facilitate seamless mobility across heterogeneous networks by segregating the control plane and data plane functionalities, and logically centralizing the control plane. In this paper, we propose a simplified Layer 2 handover mechanism for enterprise wireless networks, based on SDN framework. We present a network assisted L2 handover method using the IEEE 802.21 Media Independent Handover (MIH) protocol and SDN concepts, to achieve seamless mobility across heterogeneous networks.

Security and Hacking on Wireless Networking for Small and Medium Business: Survey (중소기업형 무선 네트워크의 해킹과 보안)

  • Shin, Pan-Seop;Kim, Jeong-Min
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.15-20
    • /
    • 2014
  • Wireless network is convenient as compared to the wire, and it is also easy. Therefore, SMEs in the country is the trend that many SMEs prefer the radio using a lot of radio as an extension of the wired network modification felt the burden of fixed installations. Wireless networks are vulnerable to security together than a wired network, since it passes the packet through the broadcasting. Therefore, analyzing the vulnerability of wireless networks, and proposes countermeasures about wireless network security in small and medium-sized businesses.

  • PDF

TwittsIn: Twitter Friend Notification Service for Mobile Devices Using Place Recognition (TwittsIn: 장소 인식을 이용한 모바일 트위터 친구 알림 서비스)

  • Chang, Lae-Young;Lee, Min-Kyu;Cho, Jun-Hee;Han, Dong-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.7
    • /
    • pp.814-818
    • /
    • 2010
  • Online social networking services help people to migrate social networks from offline to online. Twitter, which has achieved incredible growth, showed that an online social networking service without offline bases can become large and successful. In this paper, we propose a twitter friend notification service using user‘s twitter messages and place recognizing technology. When there is a friend in user‘s nearby place, the service notifies the information to the users. Through the friend notification service, a user can easily extend his online social network to offline.

A Study on the Performance of VPN based on MPLS Networks (MPLS 망을 기반으로 하는 VPN의 성능에 관한 연구)

  • Shin, Tae-Sam;Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2007
  • In this paper we introduce the concept of MPLS-based VPN and propose a scheme for providing VPN services in MPLS networks. Furthermore, we design the control components and the operational procedures and evaluated the performance of traditional VPN implementation methods and MPLS-based VPN. In this scheme it is possible to solve several problems that IP-based VPN pertains via the allocation of VPN ID and virtual space without tunneling, thereby providing effective VPN services. In other words, the MPLS-based VPN scheme uses MPLS networking technology together with the PSTN which can achieve a perfect segregation of user traffic on per-customer basis in a physical link and can guarantee high reliability and security levels. Specially, in the perspective of customers, it can save networking facilities installation and maintenance costs considerably. On the contrary, it possesses some shortcomings in that its deployment tends to be restricted within an ISP's network boundary and it is vulnerable to external security break-ins when going through public networks such as the Internet due to its lack of data encryption capability.

  • PDF

Analysis of Anti-SPAM Regulations in Korean IT Law (정보통신망법 스팸 규제 개선 방안 연구)

  • Kim, Seongjun;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2011
  • Spam refers to any unwanted or unauthorized commercial messages. Spam may violate individuals' privacy or other personal rights. Spam often overloads network traffic, wastes individuals' time, lowers productivity and quality of life, and limits the trustworthiness of Internet businesses. As the use of mobile messaging services and social networking services both on mobile communication networks and on the Internet increase, newer and more complex types of IT applications and services are often used as new means of spam. In this research, the characteristics and impact of new and future forms of spam, and anti-spam related policies and regulations are surveyed. To improve the effectiveness of anti-spam policies and regulations in Korea, adding a definition of spam in the law, changing policies to focus on the 'type of services' rather on the medium of transmission, and redefining the scope of 'commercial purposes' in Korean law are suggested.

UPnP-based QoSAgent for QoS-guaranteed Streaming Service in Home Networks (서비스 품질이 보장되는 홈 네트워크 스트리밍 전송을 위한 UPnP 기반의 QoSAgent에 대한 연구)

  • Lee Hyun-Ryong;Moon Sung-Tae;Kim Jong-Won;Shin Dong-Yun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.430-441
    • /
    • 2006
  • As the various A/V devices and home networks are delivered to users, home networks are changing to an entertainment network. It is expected that the required network bandwidth and the amount of usage of media content in home entertainment networks will be increased. Although the access networks and home networks becoming a high speed network, there remains the problems for QoS-guaranteed media content transfer in home networks. Also, in the home network, there can be network traffic caused by applications like video conferencing, video telephone, and VoIP(voice over IP) as well as inner network traffic of home network. Since media content transfer requires the real-time delivery, it is very important and basic requirement that is to transfer media content to A/V device user wants while keeping the media quality. Even though there are many middleware protocol for home networking, they provide basic device discovery and control or simple functions for QoS-guaranteed media content transfer that are not enough to provide QoS-guaranteed media transfer service that user wants. Thus, in this paper, we propose the technique based on UPnP(universal plug and play) protocol for QoS-guaranteed media content transfer in the home network. The proposed technique is compatible with UPnP and can be used with UPnP as additional functions. In this paper, we utilize VideoLAN application to verify the proposed technique. We add the additional modules that support the proposed technique's function to VideoLAN and we verify the its functions through various test scenarios.

A Study on the Method of CAN Identifier assignment for Real-Time Network (실시간 네트워크를 위한 CAN 식별자 지정 방법에 관한 고찰)

  • 정의헌;이홍희
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.34-34
    • /
    • 2000
  • One of the basic goals, when considering networks for communication in industrial control applications, is the reduction of complexity of related wiring harnesses. In addition, the networking offers the advantages for industrial control applications, such as ease of cabling, ease of changes in the cabling, ease of adding controller modules, etc. CAN (Controller Area Network) is generally applied in car networking in order to reduce the complexity of the related wiring harnesses. These traditional CAN application techniques are modified to achieve the real time communication for the industrial control applications. In this paper, we propose the method of CAN Identifier assignment for Real-Time network system. This method is can be used to scheduling messages on CAN for Real-Time network system. And also, the real-time network system is developed and the proposed moth(Ids are verified experimentally.

  • PDF

Wide-Area SCADA System with Distributed Security Framework

  • Zhang, Yang;Chen, Jun-Liang
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.597-605
    • /
    • 2012
  • With the smart grid coming near, wide-area supervisory control and data acquisition (SCADA) becomes more and more important. However, traditional SCADA systems are not suitable for the openness and distribution requirements of smart grid. Distributed SCADA services should be openly composable and secure. Event-driven methodology makes service collaborations more real-time and flexible because of the space, time and control decoupling of event producer and consumer, which gives us an appropriate foundation. Our SCADA services are constructed and integrated based on distributed events in this paper. Unfortunately, an event-driven SCADA service does not know who consumes its events, and consumers do not know who produces the events either. In this environment, a SCADA service cannot directly control access because of anonymous and multicast interactions. In this paper, a distributed security framework is proposed to protect not only service operations but also data contents in smart grid environments. Finally, a security implementation scheme is given for SCADA services.