• Title/Summary/Keyword: wired internet

Search Result 341, Processing Time 0.029 seconds

A USB classification system using deep neural networks (인공신경망을 이용한 USB 인식 시스템)

  • Woo, Sae-Hyeong;Park, Jisu;Eun, Seongbae;Cha, Shin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.535-538
    • /
    • 2022
  • For Plug & Play of IoT devices, we develop a module that recognizes the type of USB, which is a typical wired interface of IoT devices, through image recognition. In order to drive an IoT device, a driver for communication and device hardware is required. The wired interface for connecting to the IoT device is recognized by using the image obtained through the camera of smartphone shooting to recognize the corresponding communication interface. For USB, which is a most popular wired interface, types of USB are classified through artificial neural network-based machine learning. In order to secure sufficient data set of artificial neural networks, USB images are collected through the Internet, and additional image data sets are secured through image processing. In addition to the convolution neural networks, recognizers are implemented with various deep artificial neural networks, and their performance is compared and evaluated.

  • PDF

Efficient Peer-to-Peer Lookup in Multi-hop Wireless Networks

  • Shin, Min-Ho;Arbaugh, William A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.5-25
    • /
    • 2009
  • In recent years the popularity of multi-hop wireless networks has been growing. Its flexible topology and abundant routing path enables many types of applications. However, the lack of a centralized controller often makes it difficult to design a reliable service in multi-hop wireless networks. While packet routing has been the center of attention for decades, recent research focuses on data discovery such as file sharing in multi-hop wireless networks. Although there are many peer-to-peer lookup (P2P-lookup) schemes for wired networks, they have inherent limitations for multi-hop wireless networks. First, a wired P2P-lookup builds a search structure on the overlay network and disregards the underlying topology. Second, the performance guarantee often relies on specific topology models such as random graphs, which do not apply to multi-hop wireless networks. Past studies on wireless P2P-lookup either combined existing solutions with known routing algorithms or proposed tree-based routing, which is prone to traffic congestion. In this paper, we present two wireless P2P-lookup schemes that strictly build a topology-dependent structure. We first propose the Ring Interval Graph Search (RIGS) that constructs a DHT only through direct connections between the nodes. We then propose the ValleyWalk, a loosely-structured scheme that requires simple local hints for query routing. Packet-level simulations showed that RIGS can find the target with near-shortest search length and ValleyWalk can find the target with near-shortest search length when there is at least 5% object replication. We also provide an analytic bound on the search length of ValleyWalk.

Design and Implementation of a Mobile Middleware System for Mobile Business (모바일 비즈니스를 위한 모바일 미들웨어 시스템 설계 및 구현)

  • Lee, Il-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.2
    • /
    • pp.102-113
    • /
    • 2014
  • Present communication and network environment have been moving rapidly toward wireless and mobile base from existing wired internet base. This change of trend influences greatly on business methods accordingly. Therefore many enterprises are trying hard to adopt mobile business in order to gain competitive edge of their products and they are in need of more effective and stable mobile solutions. However, the method of establishing optimal mobile computing environment and how to handle existing business process and use vast amount of database are still needed. Therefore this paper tries to realize a mobile middleware system as a mobile business establishment supporting tool that could link various computational resource on wired internet with wireless LAN, mobile phone network, and mobile devices. To accomplish that specific goal, this paper provides a powerful tool of mobile and wireless application data access that could expand the line of business already set up in general enterprises easily and rapidly into mobile environment. When this suggested solution is applied in the field of industry, it can economically change legacy business process into mobile environment without having to change existing logic and resources at all.

Design and Evaluation on End-to-End Seamless QoS in Mobile SCTP (이동성 SCTP 환경에서 종단간 seamless QoS 관리체계 설계 및 평가)

  • Kim, Dae-Young;Ahn, Byung-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10B
    • /
    • pp.909-918
    • /
    • 2006
  • Recently, the qualities of the call and QoS of data service in mobile wireless IP networks inclusive of internet wired networks are very challenging issues. IntServ, DiffServ and MPLS model for supporting QoS in wired networks are representative models which are investigated generally up to now. While, MIPv4(Mobile IPv4) and MIPv6 are proposed to support mobility management for mobile wireless internet networks. But, MIPv4 and MIPv6 based UDP and TCP/IP protocol have many issues to be solved like efficient QoS and frequent handover management. In this paper, we propose a efficient management platform to support seamless data services and end-to-end QoS management in IP-based wireless mobility environments using transport layer protocol, SCTP which support multi-homing and multi-streaming. We used SCTP protocol and IntServ technology for end-to-end communications to support multi-homing and seamless QoS management in the IP-based mobile wireless networks.

Design and Evaluation of an Anomaly Detection Method based on Cross-Feature Analysis using Rough Sets for MANETs (모바일 애드 혹 망을 위한 러프 집합을 사용한 교차 특징 분석 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.27-35
    • /
    • 2008
  • With the proliferation of wireless devices, mobile ad-hoc networking (MANETS) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of anomaly detection in MANET. The focus of our research is on techniques for automatically constructing anomaly detection models that are capable of detecting new or unseen attacks. We propose a new anomaly detection method for MANETs. The proposed method performs cross-feature analysis on the basis of Rough sets to capture the inter-feature correlation patterns in normal traffic. The performance of the proposed method is evaluated through a simulation. The results show that the performance of the proposed method is superior to the performance of Huang method that uses cross-feature based on the probability of feature attribute value. Accordingly, we know that the proposed method effectively detects anomalies.

  • PDF

An Establishment of Super Wi-Fi Environment in Ships Based on UHF System of TMS

  • Kim, Jungwoo;Son, Jooyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2103-2123
    • /
    • 2018
  • Ships built today are larger in scale and feature more complex structures. The ever-evolving systems used on board a ship require vast amounts of data processing. In the future, with the advent of smart ships, unmanned ships and other next-generation ships, the volumes of data to be processed will continue to increase. Yet, to date, ship data has been processed using wired networks. Placed at fixed locations, the nodes on wired networks often fail to process data from mobile devices. Despite many attempts made to use Wi-Fi on ships just as on land to create wireless networks, Wi-Fi has hardly been available due to the complex metal structures of ships. Therefore, Wi-Fi on ships has been patchy as the ship-wide total Wi-Fi coverage has not properly implemented. A new ship-wide wireless network environment is part of the technology conducive to the shipbuilding industry. The wireless network environment should not only serve the purpose of communication but also be able to manage and control multiple features in real-time: fault diagnostics, tracking, accident prevention and safety management. To better understand the characteristics of wireless frequencies for ships, this paper tests the widely used TETRA, UHF and Wi-Fi and sheds light on the features, advantages and disadvantages of each technology in ship settings. The proposed deployment of a Super Wi-Fi network leveraging the legacy UHF system of TMS generates a ship-wide wireless network environment. The experimental findings corroborate the feasibility of the proposed ship-wide Super Wi-Fi network environment.

Improved AODV Routing Protocol for Optimized Path over Wireless Mesh Network (무선 메쉬 네트워크에서 최적의 경로 설정을 위한 개선된 AODV 라우팅 프로토콜)

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.4
    • /
    • pp.350-356
    • /
    • 2008
  • The recent networks are trending toward wireless networks. So wireless internet used to service of wired networks. But wireless networks can't show same performance of wired networks. Therefore, we are must concerned about Routing Protocol for improvement of a weak point of physical feature. But many researchers are not focusing on developing Routing Protocol. In this paper, we improve on AODV(Ad-hoc On-demand Distance Vector) for Wireless Mesh Networks. And it analyzed the result of simulation.

  • PDF

A Study on the Improvement of Wired and Wireless Network Survivability using Integrated IP Management (IP 통합 관리를 통한 유·무선 네트워크의 생존성 향상에 관한 연구)

  • Kim, Si-hung;Koo, Ja-Hwan;Park, Byung-Yeon;Park, Hark-Soo;Choi, Jang-Won;Lee, Jae Young
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.43-50
    • /
    • 2003
  • Computer Communications and networks have been revolutionized by technological advances in the last decade. There has been an increasing interest in the network security because of the growing popularity of Internet and the importance of networking in business area. With this growing interest, Network engineers come to more concern about improving network survivability. In this paper, we suggest the method that improves the survivability of wired and wireless network. To achieve this goal, we propose the integrated IP management with monitoring network nodes in the same network and controlling its activities.

  • PDF

Enhancements of T-REFWA to Mitigate Link Error-Related Degradations in Hybrid Wired/Wireless Networks

  • Nishiyama, Hiraki;Taleb, Tarik;Nemoto, Yoshiaki;Jamalipour, Abbas;Kato, Nei
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.391-400
    • /
    • 2006
  • With the on-going wireless access technologies, the Internet has become accessible anytime anywhere. In wireless networks, link errors significantly degrade the performance of the transmission control protocol (TCP). To cope with this issue, this paper improves the recently-proposed terrestrial REFWA (T-REFWA) scheme by adding a new error recovery mechanism to its original design. In the T-REFWA scheme, senders are acknowledged with appropriate sending rates at which an efficient and fair utilization of network resources can be achieved. As the feedback values are computed independently of link errors, senders can keep transmitting data at high rates even in case of link error occurrences. Using this feature, the proposed error recovery mechanism can achieve high throughput in environments with high bit error rates. The throughput is further improved by disabling the exponential back-off algorithm of TCP so that long idle times are avoided in case of link errors. We show through simulations that the proposed method improves TCP performance in high bit error rates. Compared with several TCP variants, the proposed error recovery scheme exhibits higher link utilization and guarantees system fairness for different bit error rates.

Mechanism of Authentication Procedure between Ad Hoc Network and Sensor Network (에드 홉 네트워크와 개별 센서 네트워크 간의 인증 절차 메카니즘)

  • Kim, Seungmin;Yang, Jisoo;Kim, Hankyu;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.160-161
    • /
    • 2013
  • Extending mobile IP to ad hoc networks with the foreign agent acting as the bridge between the wired network and ad hoc networks can provide the global Internet connectivity for ad hoc hosts. The existing research in the area of the integrated wired and ad hoc network is carried out in a non-adversarial setting. This paper analysed an effective solution to solve the security related problems encountered in these integrated networks. This security protocol also excludes malicious nodes from performing the ad hoc network routing. This paper focuses on preventing ad hoc hosts from the attacks of anti-integrity.

  • PDF