• Title/Summary/Keyword: 동적 결정 네트워크

Search Result 166, Processing Time 0.03 seconds

A Mobility Management Scheme based on the Mobility Pattern of Mobile Networks (이동 네트워크의 이동 패턴에 기반을 둔 이동성 관리 기법)

  • Yang, Sun-Ok;Kim, Sung-Suk
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.345-354
    • /
    • 2008
  • Recently, small-scale mobile network which is composed of many mobile devices in a man becomes popular. Also, Examples of large-scale mobile network can be thought access networks deployed on public transportation such as ships, trains and buses. To provide seamless mobility for mobile nodes in this mobile network, binding update messages must be exchanged frequently. However, it incurs network overhead increasingly and decreases energy efficiency of mobile router. If we try to reduce the number of the messages to cope with the problem, it may happen the security -related problems conversely Thus, mobile router needs a effective algorithm to update location information with low cost and to cover security problems. In this paper, mobility management scheme based on mobile router's mobility pattern is proposed. Whenever each mobile router leaves a visiting network, it records related information as moving log. And then it periodically computes mean resident time for all visited network, and saves them in the profile. If each mobile router moves into the visited network hereafter, the number of binding update messages can be reduced since current resident time may be expected based on the profile. At this time, of course, security problems can happen. The problems, however, are solved using key credit, which just sends some keys once. Through extensive experiments, bandwidth usages are measured to compare binding update messages in proposed scheme with that in existing scheme. From the results, we can reduce about 65% of mobility-management-related messages especially when mobile router stays more than 50 minutes in a network. Namely, the proposed scheme improves network usage and energy usage of mobile router by decreasing the number of messages and authorization procedure.

Characteristics of active optical ring network and performance evaluation in Bandwidth on Demand (능동형 광 링 네트워크의 특징 및 요구 대역폭에 따른 성능 분석)

  • Lee Sang-Wha;Song Hae-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.209-218
    • /
    • 2005
  • In this paper, we present an Active Optical Network(AON) . The AON uses the Dense Wavelength Division Multiplexing(DWDM) from optical communication access network of ring type, and will be able to provide the smoothly service in the Bandwidth on Demand by using DWDM. It supports the connection of the multiple wavelength and the Sub-Carrier from the optical gigabit ethernet switch. The Wavelength Add Drop Multiplexer(WADM) extracts a specific wavelength, and composes a node of the ring network. The specific wavelength becomes demultiplexing in the Sub-Carrier and it is distributed in the user The active connection of optical gigabit ethernet switch where the distribution of access network is started and access terminal connection equipment is possible. By the BoD from the AON it compares the buffer size which changes, and it analyzes. Also the Time delay of bit compares with the throughput of server The limit of amount of time is decided. Consequently it will be able to realize the dynamic use protocol and an efficient algorithm of the network.

  • PDF

Study on the Sensor Gateway for Receive the Real-Time Big Data in the IoT Environment (IoT 환경에서 실시간 빅 데이터 수신을 위한 센서 게이트웨이에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.417-422
    • /
    • 2015
  • A service size of the IoT environment is determined by the number of sensors. The number of sensors increase means increases the amount of data generated by the IoT environment. There are studies to reliably operate a network for research and operational dynamic buffer for data when network congestion control congestion in the network environment. There are also studies of the stream data that has been processed in the connectionless network environment. In this study, we propose a sensor gateway for processing big data of the IoT environment. For this, review the RESTful for designing a sensor middleware, and apply the double-buffer algorithm to process the stream data efficiently. Finally, it generates a big data traffic using the MJpeg stream that is based on the HTTP protocol over TCP to evaluate the proposed system, with open source media player VLC using the image received and compare the throughput performance.

An Adaptive Storage System for Enhancing Data Reliability in Solar-powered Sensor Networks (태양 에너지 기반 센서 네트워크에서 데이터의 안정성을 향상시키기 위한 적응형 저장 시스템)

  • Noh, Dong-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.360-370
    • /
    • 2009
  • Using solar power in wireless sensor networks requires a different approach to energy optimization from networks with battery-based nodes. Solar energy is an inexhaustible supply which can potentially allow a system to run forever, but there are several issues to be considered such as the uncertainty of energy supply and the constraint of rechargeable battery capacity. In this paper, we present SolarSS: a reliable storage system for solar-powered sensor networks, which provides a set of functions, in separate layers, such as sensory data collection, replication to prevent failure-induced data loss, and storage balancing to prevent depletion-induced data loss. SolarSS adapts the level of layers activated dynamically depending on solar energy availability, and provides an efficient resource allocation and data distribution scheme to minimize data loss.

A Multistriped Checkpointing Scheme for the Fault-tolerant Cluster Computers (다중 분할된 구조를 가지는 클러스터 검사점 저장 기법)

  • Chang, Yun-Seok
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.607-614
    • /
    • 2006
  • The checkpointing schemes should reduce the process delay through managing the checkpoints of each node to fit the network load to enhance the performance of the process running on the cluster system that write the checkpoints into its global stable storage. For this reason, a cluster system with single IO space on a distributed RAID chooses a suitable checkpointng scheme to get the maximum IO performance and the best rollback recovery efficiency. In this paper, we improved the striped checkpointing scheme with dynamic stripe group size by adapting to the network bandwidth variation at the point of checkpointing. To analyze the performance of the multi striped checkpointing scheme, we applied Linpack HPC benchmark with MPI on our own cluster system with maximum 512 virtual nodes. The benchmark results showed that the multistriped checkpointing scheme has better performance than the striped checkpointing scheme on the checkpoint writing efficiency and rollback recovery at heavy system load.

Congestion Control of Self-Similar Traffic in Two-way Network (양방향 네트워크에서 자기유사성 트래픽 혼잡 제어)

  • 석경휴;송선희;김철영;나상동
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.295-303
    • /
    • 2004
  • In this Paper, we discuss an active TCP link of unsynchronized transmission mode network in two-way traffic and the Improvement of its traffic patron thorough the network pathway of protocol is shown. This is because the traffic pattern is performed on the basis of existing windows which are distributing information in several periods of time in the way of interfacing LTS control module, which is controlling by an information of exceeding the time limit of feedback loop determined by RTP, with TCP. The simulation to utilize this efficiently is performed with the circumstance of bench mark based on physical modeling of the self-similarity traffic in the performance of TCP. In this paper, we use a methodology to understand and evaluate the effect of change of transmitting protocol in sticks under the condition of the self-similar traffic in two-way network and it is shown that an improvement of congestion control by self-similarity under a heavy condition.

Network analysis for assessing urban resilience from the perspective of urban flooding: case study of Seoul, Korea (도시침수 관점에서의 도시회복력 평가를 위한 네트워크 분석: 서울특별시 중심으로)

  • Park, HyungJun;Song, Sumin;Kim, DongHyun;Lee, Seung Oh
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.6
    • /
    • pp.371-383
    • /
    • 2024
  • The quantification methods and definitions of resilience vary and are studied across many fields. However, this diversity can lead to gaps in interpretation regarding the meaning and indicators of resilience, potentially having a negative impact on resilience assessments. Therefore, uniform standards for defining and quantifying resilience are essential. This study presented a definition of resilience and socio-structural evaluation methods of resilience through network analysis. Furthermore, through analyzing various definitions of resilience, the definition of resilience in the context of urban flooding was presented. Distinguishing between static and dynamic resilience, an evaluation method based on common attributes was proposed. Lastly, the economic effects of introducing resilience were analyzed using an inundation trace map. Future research on the secondary effects through standardized resilience assessments is expected to be widely utilized in decision-making stages within urban flood policies.

Development and Implementation of a secure e/m-Commerce Application which integrates wire and wireless environments (유.무선 통합 보안 e/m-Commerce 애플리케이션 설계 및 구현)

  • Kim, Man-Soo;Chung, Mok-Dong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2045-2048
    • /
    • 2003
  • 정보통신기술의 발전으로 유 무선 인터넷 사용자가 기하급수적으로 증가하고 있는 가운데 무선 인터넷을 이용한 m-Commerce 의 활성화가 기대되고 있다. 이와 더불어 무선 인터넷에서 안전한 m-Commerce를 제공하기 위해서는 다양한 모바일 기기 환경에 맞춘 무선 인터넷 PKI 서비스가 요구된다. 본 논문에서는 모바일 기기 성능, 네트워크 환경, 서비스 종류, 사용자의 보안 요구 사항에 맞추어 경제학 이론에서 출발한 MAUT(Multi-Attribute Utility Theory)와 간결한 휴리스틱스(Simple Heuristics) 알고리즘을 이용한 보안 등급 프로토콜을 동적으로 결정하는 적응적 보안 정책 알고리즘을 제안한다. 이를 바탕으로 PKI와 X9.59 기반의 보안 e/m-Commerce를 구축한다.

  • PDF

A Simulator for Logistic Network Planning (물류망 운영계획을 위한 시뮬레이터의 개발)

  • 박양병
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1999.04a
    • /
    • pp.199-203
    • /
    • 1999
  • 물류망의 운영을 계획하는 일은 기업의 물류망 전반을 함께 다루어야 하기 때문에 매우 복잡하고 어렵다. 물류망은 그 특성상 네트워크로써 표현되고, 많은 확률적 성질을 가지는 활동들이 존재하고, 동적 환경에서 진행되고, 또 활동들이 상호 의존적 관계를 유지하고 있다는 사실에 비추어, 물류망의 운영계획을 위해 컴퓨터 시뮬레이션 기법의 적용이 매우 효과적이다. 본 논문에서는 AweSim 시뮬레이션 전용언어와 Visual Basic 윈도우용 범용 프로그래밍 언어를 가지고 물류망 운영계획을 위해 사용할 수 있는 시뮬레이터 프로토타입(prototype)의 개발을 간단한 실행 예와 함께 소개한다. 시뮬레이터와 사용자와의 모든 인터페이스는 Visual Basic 윈도우 환경에서 진행되며, AweSim 시뮬레이션은 Visual Basic 화면의 background에서 이루어진다. 개발된 물류망 시뮬레이터는 기업에서 통합 물류관리를 위해 필수적인 물류망 운영계획의 의사결정지원 도구로서 효과적으로 사용될 수 있을 것이며, 이에 따라 기업에서는 설정된 고객서비스 수준을 최소의 물류비로서 만족시킬 수 있는 최적의 물류망 운영계획을 수립할 수 있을 것이다.

  • PDF

A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy System (동적 여과 프로토콜 적용 센서 네트워크에서의 퍼지 기반 보안 경계 값 결정 기법)

  • Lee, Sang-Jin;Lee, Hae-Young;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.197-200
    • /
    • 2008
  • In most sensor networks, nodes can be easily compromised by adversaries due to hostile environments. Adversaries may use compromised nodes to inject false reports into the sensor networks. Such false report attacks will cause false alarms that can waste real-world response effort, and draining the finite amount of energy resource in the battery-powered network. A dynamic enroute scheme proposed by Yu and Guan can detect and drop such false reports during the forwarding phase. In this scheme, choosing a threshold value is very important, as it trades off between security power and energy consumption. In this paper, we propose a threshold determining method which uses the fuzzy rule-based system. The base station periodically determines a threshold value though the fuzzy rule-based system. The number of cluster nodes, the value of the key dissemination limit, and the remaining energy of nodes are used to determine the threshold value.

  • PDF