• Title/Summary/Keyword: 가상 하위 노드

Search Result 8, Processing Time 0.025 seconds

An Efficient Split Algorithm to Minimize the Overlap between Node Index Spaces in Multi-dimensional Indexing Scheme M-tree (다차원 색인구조 M-트리에서 노드 색인공간의 중첩을 최소화하기 위한 효율적인 분할 알고리즘)

  • 임상혁;김유성
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.124-126
    • /
    • 2003
  • 다차원 색인 기법 M-트리는 노드의 중심점과 객체간의 상대적 거리로 색인을 구성하고, 검색 공간에 포함되는 객체를 액세스하는 기법으로서 노드들은 페이지 단위로 구성되며 하위 엔트리들을 포함할 수 있는 반경, 즉 유사도 거리에 의해 노드의 영역이 표현되어진다. 그러나 이와 같은 노드의 영역 표현에 있어서 노드 색인공간의 중첩으로 인해 질의 시 검색 패스가 증가하고 이로 인해 거리계산과 디스크 입출력의 증가를 야기하는 문제를 갖는다. 본 논문에서는 M-트리에서 문제가 되고 있는 노드 색인 공간의 중첩을 최소화할 수 있는 노드 분할 정책을 제안한다. 기존의 M-트리와는 다르게 노드의 가상 중심점을 계산하여 그것을 라우팅 객체로 만들어 노드를 커버하는 영역을 최소화하고 노드 안의 엔트리를 재분배하여 밀도 높은 노드를 구성 하도록 한다. 제안된 분할 알고리즘의 효율성을 증명하기 위한 실험 결과 색인공간의 중첩이 줄고 이로 인해 거리계산과 디스크 입출력의 횟수가 줄어듦을 보였다.

  • PDF

A Study on Hierarchical Routing for Supporting The Complex Node Representation on PNNI Network (PNNI 망에서 복합 노드 표현 방식을 지원하는 다계층 라우팅에 관한 연구)

  • 조일권;박영진;김은아
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.408-410
    • /
    • 1999
  • 본 논문에서는 PNNI의 복합 노드 표현을 지원하는 다계층 라우팅 알고리듬에 대해서 제안한다. PNNI는 다 계층 방법으로 여러 망을 연결하여 비교적 광범위한 망을 지원할 수 있다. 다계층 형성시 가상 그룹 노드(Logical Group Node)는 하위 피어 그룹(Peer Group)에 대한 묘사를 하게 되며 이를 복합 노드 표현(Complex Node Representation)이라 한다. 복합 노드 표현 정보를 이용한 최단 경로 결정은 매우 어려운 일이다. 이에 복합 노드 표현 정보를 단순 노드 표현(Simple Node Representation)화 하여 보다 쉽고, 정확하며, 보편적으로 적용 가능한 라우팅 방법에 대해서 제안하고자 한다.

  • PDF

Overlay Multicast for File Distribution using Virtual Sources (파일전송의 성능향상을 위한 다중 가상소스 응용계층 멀티캐스트)

  • Lee Soo-Jeon;Lee Dong-Man;Kang Kyung-Ran
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.289-298
    • /
    • 2006
  • Algorithms for application-level multicast often use trees to deliver data from the source to the multiple receivers. With the tree structure, the throughput experienced by the descendant nodes will be determined by the performance of the slowest ancestor node. Furthermore, the failure of an ancestor node results in the suspension of the session of all the descendant nodes. This paper focuses on the transmission of data using multiple virtual forwarders, and suggests a scheme to overcome the drawbacks of the plain tree-based application layer multicast schemes. The proposed scheme elects multiple forwarders other than the parent node of the delivery tree. A receiver receives data from the multiple forwarders as well as the parent node and it can increase the amount of receiving data per time unit. The multiple forwarder helps a receiver to reduce the impact of the failure of an ancestor node. The proposed scheme suggests the forwarder selection algorithm to avoid the receipt of duplicate packets. We implemented the proposed scheme using MACEDON which provides a development environment for application layer multicast. We compared the proposed scheme with Bullet by applying the implementation in PlanetLab which is a global overlay network. The evaluation results show that the proposed scheme enhanced the throughput by 20 % and reduced the control overhead over 90 % compared with Bullet.

The MCSTOP Algorithm about the Minimum Cost Spanning Tree and the Optimum Path Generation for the Multicasting Path Assignment (최적 경로 생성 및 최소 비용 신장 트리를 이용한 멀티캐스트 경로 배정 알고리즘 : MCSTOP)

  • Park, Moon-Sung;Kim, Jin-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.1033-1043
    • /
    • 1998
  • In this paper, we present an improved multicasting path assignment algorithm based on the minimum cost spanning tree. In the method presented in this paper, a multicasting path is assigned preferentially when a node to be received is found among the next degree nodes of the searching node in the multicasting path assignment of the constrained steiner tree (CST). If nodes of the legacy group exist between nodes of the new group, a new path among the nodes of new group is assigned as long as the nodes may be excluded from the new multicasting path assignment taking into consideration characteristics of nodes in the legacy group. In assigning the multicasting path additionally, where the source and destination nodes which can be set for the new multicasting path exist in the domain of identical network (local area network) and conditions for degree constraint are satisfied, a method of producing and assigning a new multicasting path is used. The results of comparison of CST with MCSTOP, MCSTOp algorithm enhanced performance capabilities about the communication cost, the propagation delay, and the computation time for the multicasting assignment paths more than CST algorithm. Further to this, research activities need study for the application of the international standard protocol(multicasting path assignment technology in the multipoint communication service (MCS) of the ITU-T T.120).

  • PDF

An Efficient Split Algorithm to Minimize the Overlap between Node Index Spaces in a Multi-dimensional Indexing Scheme M-tree (다차원 색인구조 M-트리에서 노드 색인 공간의 중첩을 최소화하기 위한 효율적인 분할 알고리즘)

  • Im Sang-hyuk;Ku Kyong-I;Kim Ki-chang;Kim Yoo-Sung
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.233-246
    • /
    • 2005
  • To enhance the user response time of content-based retrieval service for multimedia information, several multi-dimensional index schemes have been proposed. M-tree, a well-known multidimensional index scheme is of metric space access method, and is based on the distance between objects in the metric space. However, since the overlap between index spaces of nodes might enlarge the number of nodes of M-tree accessed for query processing, the user response time for content-based multimedia information retrieval grows longer. In this paper, we propose a node split algorithm which is able to reduce the sire of overlap between index spaces of nodes in M-tree. In the proposed scheme, we choose a virtual center point as the routing object and entry redistribution as the postprocessing after node split in order to reduce the radius of index space of a node, and finally in order to reduce the overlap between the index spaces of routing nodes. From the experimental results, we can see the proposed split algorithm reduce the overlap between index space of nodes and finally enhance the user response time for similarity-based query processing.

A Scheme for Load Distribution and Macro Mobility in Hierarchical Mobile IPv6 (HMIPv6에서 부하분산 및 매크로 이동성 지원 방안)

  • Seo, Jae-Kwon;Lee, Kyung-Geun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.4
    • /
    • pp.49-58
    • /
    • 2007
  • Hierarchical Mobile IPv6 (HMIPv6) has been proposed by Internet Engineering Task Force (IETF) to compensate for such problems as handover latency and signaling overhead in employing Mobile IPv6 (MIPv6). HMIPv6 supports micro-mobility within a domain and introduces a new entity, namely mobility anchor point (MAP) as a local home agent. However, HMIPv6 causes load concentration at a particular MAP and longer handover latency when inter-domain handover occurs. In order to solve such problems, this paper establishes a virtual domain (VD) of a higher layer MAP and proposes a MAP changing algorithm in which the routing path changes between mobile node (MN) and correspondent node(CN) according to the mobile position and the direction of the MN before inter-domain handover occurs. The proposed algorithm not only enables complete handover binding-update of the on-link care of address (LCoA) only when inter-domain handover occurs, but concentrated load of a particular MAP is distributed as well. This is because the MNs registered with higher layer MAP and lower layer MAP coexist in the VD. We simulate the performance of the proposed algorithm and compare with HMIPv6.

A MAC Protocol based on Hi.erarchical Virtual Clusters (계층적 가상 클러스터 기반 MAC 프로토콜)

  • Back, Doo-Sung;Pyun, Ki-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.93-102
    • /
    • 2009
  • Environmental monitoring applications measure temporature, humidity, and pollution degrees of large areas periodically and are essential for ubiquitous society. In this paper, we propose a sensor network MAC protocol that is applicable to environmental monitoring applications. The proposing MAC protocol has scalability by constructing multiple groups of sensor nodes as in SMAC protocol. Differently from SMAC protocol, however, ours have hierarchical structure between adjacent groups. Data transmission schedules are efficient since lower groups are synchronized to higher groups. Thus. the end-to-end delays and energy consumption can be reduced due to sequential transmission schedules. But since the nodes within the same group are synchronized to themselves. they have good adaptability and scalability compared to existing hierarchical approaches such as DMAC. We show by simulations that the proposing MAC protocol is superior to SMAC for environmental monitoring applications.

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.