• Title/Summary/Keyword: Even Network

Search Result 2,084, Processing Time 0.025 seconds

Optimal Stochastic Policies in a network coding capable Ad Hoc Networks

  • Oh, Hayoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4389-4410
    • /
    • 2014
  • Network coding is a promising technology that increases system throughput by reducing the number of packet transmissions from the source node to the destination node in a saturated traffic scenario. Nevertheless, some packets can suffer from end-to-end delay, because of a queuing delay in an intermediate node waiting for other packets to be encoded with exclusive or (XOR). In this paper, we analyze the delay according to packet arrival rate and propose two network coding schemes, iXOR (Intelligent XOR) and oXOR (Optimal XOR) with Markov Decision Process (MDP). They reduce the average delay, even under an unsaturated traffic load, through the Holding-${\chi}$ strategy. In particular, we are interested in the unsaturated network scenario. The unsaturated network is more practical because, in a real wireless network, nodes do not always have packets waiting to be sent. Through analysis and extensive simulations, we show that iXOR and oXOR are better than the Distributed Coordination Function (DCF) without XOR (the general forwarding scheme) and XOR with DCF with respect to average delay as well as delivery ratio.

A Novel Network Reduction Method based on Similarity Index between Bus Pairs (모선 간 유사지수에 근거한 새로운 계통축약 기법)

  • Chun, Yeong-Han;Lee, Dong-Su
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.4
    • /
    • pp.156-162
    • /
    • 2006
  • Transmission zones can be defined based on LMPs. Each zone consists of nodes with similar LMPs, and zonal price is determined by average nodal prices in each zone.[1] Network reduction is still important for the analysis of zonal systems under electricity market environments, even though the computing capability of computer system can deal with entire power systems. The Similarity Index is a good performance measure for the network reduction.[2] It can be applied to the network reduction between zones categorized by the nodal prices. This paper deals with a novel network reduction method between zones based on the similarity Index. Line admittances of reduced network were determined by using the least square method. The proposed method was verified by IEEE 39 bus test system.

Optimal Control Approach for a Smart Grid

  • Imen Amdouni;Naziha Labiadh;Lilia El amraoui
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.194-198
    • /
    • 2023
  • The current electricity networks will undergo profound changes in the years to come to be able to meet the growing demand for electricity, while minimizing the costs of consumers and producers, etc. The electricity network of tomorrow or even the intelligent « Smart Grids » network will be the convergence of two networks: the electricity network and the telecommunications network. In this context falls our work which aims to study the impact of the integration of energy decentralization into the electricity network. In this sense, we have implemented a new smart grid model where several coexisting suppliers can exchange information with consumers in real time. In addition, a new approach to energy distribution optimization has been developed. The simulation results prove the effectiveness of this approach in improving energy exchange and minimizing consumer purchase costs and line losses.

The Effects of Middle School Students' Belongingness Orientation on their Psychological Adaptation and Friend Networks: A Short-term Longitudinal Social Network Analysis (중학생의 소속감 지향성이 심리적 적응 및 친구 네트워크에 미치는 영향력 비교: 소셜 네트워크 분석을 활용한 단기-종단적 분석)

  • Lee, Seungjin;Ko, Young-gun
    • Korean Journal of School Psychology
    • /
    • v.18 no.2
    • /
    • pp.175-195
    • /
    • 2021
  • Intimate friendships and a sense of belonging have positive effects on adolescent's psychological adaptation. Belongingness orientation is the motivation to belong. It is divided into growth orientation and deficit-reduction orientation, both of which have different effects on psychological adaptation and interpersonal characteristics. This study was conducted to determine how adolescents' belongingness orientation affected their psychological adaptation and friend networks. Students in their second year of middle school were surveyed both at the beginning and end of the spring semester. Friend networks were measured through network centrality analysis. Multilevel regression analysis produced three major results. The first major result was that the correlations between growth orientation and loneliness and between growth orientation and stress at the beginning of the spring semester was statistically significant even when friend network centrality was included in the analysis model, but the correlation between deficit-reduction orientation and loneliness and between deficit-reduction orientation and stress were not statistically significant. The second major result was that growth orientation significantly predicted friend network centrality at the end of the spring semester. This effect was significant even when friend network centrality at the beginning of the semester and psychological adaptation level at the end of the spring semester were added to the analysis model. The third major result was that the correlation between friend network centrality at the end of the semester and psychological adaptation level was statistically significant even when psychological adaptation levels at the beginning and the end of the semester were included in the analysis model. This study is meaningful in that it had a short-term longitudinal design and empirically demonstrated the relationship between belongingness orientation and psychological adaptation level of adolescents and between belongingness orientation and the development of friend networks. Lastly, we discussed limitations of this study and provided suggestions for future research.

A Study on Secure Cooperative Caching Technique in Wireless Ad-hoc Network (Wireless Ad-hoc Network에서 보안 협력 캐싱 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.91-98
    • /
    • 2013
  • Node which plays the role of cache server does not exist in the wireless ad-hoc network consisting of only mobile nodes. Even if it exists, it is difficult to provide cache services due to the movement of nodes. Therefore, the cooperative cache technique is necessary in order to improve the efficiency of information access by reducing data access time and use of bandwidth in the wireless ad-hoc network. In this paper, the whole network is divided into zones which don't overlap and master node of each zone is elected. General node of each zone has ZICT and manages cache data to cooperative cache and gateway node use NZCT to manage cache information of neighbor zone. We proposed security structure which can accomplish send and receive in the only node issued id key in the elected master node in order to prepare for cache consistent attack which is vulnerability of distributed caching techniques. The performance of the proposed method in this paper could confirm the excellent performance through comparative experiments of GCC and GC techniques.

A Secure Clustering Methodology and an Arrangement of Functional Firewall for the Enhancement of Performance in the Inbound Network (인바운드 네트워크의 성능향상을 위한 보안 클러스터링 기법과 기능성방화벽의 배치)

  • Jeon, Sang-Hoon;Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.1050-1057
    • /
    • 2010
  • Nowadays, the network attack occurs frequently. At the same time, the inbound network is also attacked. Even though the security system has been continuously developed in order to prevent from attacks, the network performance is sacrificed for the network security. Therefore, a security system which obtains performance and security together is urgently needed. In this paper, an arrangement of functional firewall and a secure clustering methodology, obtained from distributing functions of a conventional firewall, are proposed based on the idea that performance and security should be obtained together.

Strengthening Authentication Through Content Centric Networking

  • Kim, Sung-Jin;Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.75-82
    • /
    • 2017
  • While the internet has evolved in terms of information sharing and efficiency, it is still prone to security attacks and remains vulnerable even when equipped with a security mechanism. Repeated patching against hacks involves excessive wear of system equipment and high costs. Methods of improving network security include the introduction of security equipment and network partitions, but they have not been fully effective. A fundamental solution is the Operation Content Network (OCN), which enables the strengthening of authentication. In this paper, Instead of following the existing TCP/IP system, OCN establishes an immunity-based security system through content-centric communications. Data transmission occurs over a Content Centric Network (CCN), which is provided with a protocol verified by the CCNx group. Areas protected by OCN rely only on CCN for communication without using any IP. As such, it defends the system against unknown attacks, including zero-day attacks.

A survey on the topological design models for fiberoptic subscriber loop networks (광가입자 선로망 구성을 위한 설계모형 조사연구)

  • 윤문길;백영호
    • Korean Management Science Review
    • /
    • v.11 no.3
    • /
    • pp.103-128
    • /
    • 1994
  • Due to the trend of evolution toward a broadband communication network with fiber-optics, the design and operation of fiber-optic network have been received a great deal of research attention recently. Furthermore, even a single fiber link failure in the network may result in severe service loss. Thus, the network survivability becomes an importantissue in planning and designing the network. This survey is on modelling of various fiber-optic subscriber loop network(FSLN) design problems, which are essential ones for providing broadband communication services and B-ISDN services. Models are classified and investigated as either conventional decomposition-iteration approach or integrated design method. To build survivable networks, SHR models are also suggested by ring control schemes. The result of this study will be effectively applied to build a design model for FSLN in the practical applications.

  • PDF

Methodology to Estimate the Cost of Network Facilities with ABC and its Application (ABC를 활용한 통신 설비 원가 산정 방법론 및 활용 방안)

  • Yoon, Bong-Kyoo;Yang, Won-Seok
    • IE interfaces
    • /
    • v.20 no.3
    • /
    • pp.395-406
    • /
    • 2007
  • In the telecommunication industry, estimation of the cost of network facilities is very important since depreciation cost of the facilities accounts for a large portion of the product cost. Moreover, cost estimation in the industry becomes more difficult because of increasing indirect cost upon digital convergence, expanding multi-purpose facilities, complexity of service product, etc. Nevertheless, not much seem to have been done in improving estimation methodology of the cost of network facilities. As a result, the quality of cost information on network facilities has deteriorated, and now even decision-makers in the industry dismiss the information. Recently, two major telecommunication companies adopted a new network cost estimation method to deal with the issue. In this paper, we study the concept of new cost estimation method and the procedure to develop and apply it. We also suggest the method to carry out the cost allocation using Matlab which is more efficient and time-saving than other commercial cost calculation packages.

State Feedback Stabilization of Network Based Control Systems with Time-varying Delay (시변시간지연을 가지는 네트워크 기반 시스템의 상태궤환 안정화)

  • Jung Eui-Heon;Shu Young-Su;Lee Hong-Hee
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.11
    • /
    • pp.741-746
    • /
    • 2004
  • When investigating a control problem for network based control systems, the main issue is network-induced delay. This delay can degrade the performance of control systems designed without considering the delay and even destabilize the system. In this paper, we consider the stabilization of network based control systems, where there is bounded time-varying delay. This delay is treated like parameter variation of a discrete time system. The state feedback controller design is formulated as linear matrix inequality. Finally, we show that the stability of control systems designed with considering the delay is superior to that is not so.