• Title/Summary/Keyword: Hierarchical Network

Search Result 975, Processing Time 0.025 seconds

Analysis of Network Dynamics from the Romance of the Three Kingdoms (소설 삼국지 등장인물 네트워크의 동적 변화 분석)

  • Lee, Yoon-Kyeong;Shin, Hyun-Il;Ku, Ja-Eul;Kim, Hak-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.364-371
    • /
    • 2009
  • We analyzed romance of the three kingdoms written by Luo Guanzhong by using complex network to compare its properties with those of social network. The three kingdom network has a scale free and hierarchical network properties. Human-human interaction networks are dramatically changing in response to time and space. Due to lack of the dynamic interacting data, the researches only focus to analysis for properties of the statical networks. The romance of the three kingdoms is a Chinese historical novel based upon events from the end of the Han Dynasty, the Three Kingdoms era of China, and the reunification of the land. There are over a thousand characters, over a three thousand human-human interactions, and the dynamic changed in human-human interactions in the historical novel. Here, we introduce that a possible method for analyzing about dynamic changing of the complex network.

Effective address assignment method in hierarchical structure of Zigbee network (Zigbee 네트워크 계층 구조에서의 효율적인 주소 할당 방법)

  • Kim, Jae-Hyun;Hur, Soo-Jung;Kang, Won-Sek;Lee, Dong-Ha;Park, Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.20-28
    • /
    • 2007
  • Zigbee sensor network base on IEEE802.15.4 has local address of 2 byte on transmit packet data which is pick up the address for each sensor node. Sensor network is requested low power, low cost, many nodes at hues physical area. There for Zigbee is very good solution supporting for next Ubiquitous generation but the Zigbee sensor network has address allocation problem of each sensor node. Is established standard from Zigbee Alliance, to the address allocation method uses Cskip algorithm. The Cskip algorithm use the hazard which allocates an address must blow Hop of the maximum modification and child node number. There is to address allocation and from theoretically it will be able to compose a personal 65536 sensor nodes only actual with concept or space, only 500 degree will be able to compose expansion or the low Zigbee network. We proposed an address allocation method using coordinate value for Zigbee sensor network.

Configuration of clustering and routing algorithms for energy efficiency by wireless sensor network in ship (선박 내 무선 센서 네트워크에서 에너지 효율을 위한 클러스터링 및 라우팅 알고리즘의 구성)

  • Kim, Mi-jin;Yu, Yun-Sik;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.435-438
    • /
    • 2012
  • Today, In all fields, As combination of ubiquitous computing-based technologies between electronic space and physical space, has been active trend research about wireless integration sensor network between sensors and wireless technology. Also, but in ship is underway research about Ship Area Network(SAN) of intelligent ship to integrate wireless technology, ship is required SAN-bridge technology of a variety of wired, wireless network integration and heterogeneous sensor and interoperability of the controller and SAN configuration management technology of remote control. Ship keep safe of all the surrounding environment including crew besides structural safety and freight management monitoring. In this paper, for monitoring design such as on climate change detection and temperature, pressure about various structures, there identify technology trends for routing and data aggregation to use energy efficiency in wireless sensor network. And to analyze self-organizing clustering method, study For wireless sensor network configuration in ship.

  • PDF

A Study on the Design of Network Management Architecture based on TMN Concept (TMN 개념을 응용한 통신망 관리구조 설계에 관한 연구)

  • 김영명;조영현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.1
    • /
    • pp.170-182
    • /
    • 1994
  • With the evolution of telecommunications network, the operational enviroments of a morden telecommunication network are becoming more complex and diverse. Therefore. the design of NMA( Network Management Aechitecture) that pursues standardization and openness in order to accommodatae them actively will be required. In such a network environment which composes various and heterogeneous network elements, it is not easy to surpport efficiently TMN MSs(Management Services) because it has lack of interoperability among them. This paper proposes a top-down approach being taken to design a network management architecture with establishing the hierarchical relationships of management services based on ITU-TS(Telecommunication Standardization in Europe) TMN concept, and allocating MSC(Management Service Component) by TMN management layer, and analyzing the information flow between FAs(Functional Areas).

  • PDF

A Study on the Method of Assigning Ipv6 address for M-BcN (M-BcN을 위한 IPv6 주소 할당 방안 연구)

  • Kim, Gweon-Il;Lee, Sang-Hoon
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.87-100
    • /
    • 2007
  • The aspect of future warfare is NCW(Network Centric Warfare) in accordance with the IT development, so MND have the planning of M-BcN(Military Broadband convergence Network) establishment as the basic system of NCW by the end of 2008. IPv6 address must be managed systematically as a essential element of NCW. In the previous study, it is designed on the basis of the present military information communication network topology. However, it makes some problems. First, it is difficult for present topology to adapt the future M-BcN which is different from the present military network topology. Second, it has defects of inefficiency of route aggregation and enlargement of routing table size. In this paper, we improved the route aggregation and routing table size by assigning the hierarchical address on the basis of M-BcN topology and adjusting the position of field identifying service network. Furthermore, it is proved by the network simulation program(OPNET 12.0).

Communication Network Analysis of General Corporate IT Staff : A Case Study of Company "K" (일반기업의 IT조직 내 직원간 의사소통 네트워크 분석: K사(社)를 중심으로)

  • Jeong, Cheon-Su;Shin, Kil-Hwan;Han, Woo-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.219-232
    • /
    • 2011
  • The purpose of this study is to give implications for cooperative network building for general corporate IT staffs as well as operational improvement of the IT organization which is a specialized unit in general company though analysis of characteristics of communication networks of the IT organization. 39 IT employees of company "A" were surveyed and interviewed, and the data collected were analyzed in a network analysis method. The analysis shows that a variety of networks were built across employees - e.g. strong/weak ties or centralized/decentralized structure - by each communication area. IT competency network was found weak ties. Career-rela ted network showed centralized and hierarchical characteristics. At the center of each network was positioned manager of each team. To address improvement of the findings, I presented the followings: more active networking over IT competency, enhancement of work centralization and collection of research data as to communication network of IT organization.

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.

VPN Traversal Scheme in Hierarchical MIPv4 environment (계층적 이동 IPv4 환경에서 VPN 운영 방안)

  • Sung, Su-Lyun;Kang, Jung-Ho;Shin, Young-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.519-526
    • /
    • 2004
  • This paper presents an efficient interoperation scheme of a VPN(Virtual Private Network) and Mobile IP using a hierarchical structure of a FA(Foreign Agent). In the proposed scheme, the GFA(Gateway Foreign Agent) plays a role of VPN gateway on behalf of the MN(Mobile Node). When the MN moves in the same GFA domain, because the GFA has already an IPsec security association with a VPN gateway in the home network of the MN, the MN does not need an IPsec re-negotiaion. In this way, our mechanism reduces a message overhead and a delay resulted from an IPsec negotiation. And a MN can send a data to a correspondent node without a packet leakage. We show a performance of our scheme by using a discrete analytical model. Analytical results demonstrated that the total processing cost calculated by a registration update cost and a packet delivery cost is significantly reduced through our proposed scheme.

A Handover Mechanism in Internetworking with UMTS/WLAN based on HMIPv6 (HMIPv6 기반의 UMTS/WLAN 연동 네트워크에서의 핸드오버 방안)

  • Jeong Eunjoo;Park Sangjun;Lee Hyewon K.;Kim Jaeha;Kim Byunggi
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.508-514
    • /
    • 2005
  • The research in internetworking between UMTS and WLAN, which is completed with merits and demerits, Is actively progressed to establish global roaming environments. This internetworking is classified into two groups: loosely-coupled and tightly-coupled. h tightly-coupled mechanism demands lots of investment and considerable amountof time to construct, which is directly connoted between UNTS and WLAN via IWU. On the other hand, a tersely-coupled mechanism is more scalable and easier to implement than a tightly-coupled one while it has critical drawbacks of packet loss and blocking of services due to handover delay. To alleviate these drawbacks. this work proposes a handover scheme between UMTS and WLAN, which is based on HMIPv6. The performance of the proposed scheme is evaluated by the simaulation. The proposed internetworking scheme based on HMIPv6 shows hotter performance than those based on MIPv6.

Hierarchical GMPLS Label Merging Implementation methods Using ns-2 simulator (ns-2 시뮬레이터를 이용한 계층 구조를 갖는 GMPLS 레이블 머징 구현 방안)

  • Kim, Kyoung-Mok;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.200-209
    • /
    • 2006
  • In recent years, studies on effective data services based on GMPLS are introduced so as to support excessive internet traffic. and filled operation can reduce transmission effectiveness. In this thesis we proposed merging algorithm with hierarchical structure and implementation procedure using ns -2 simulator. The structure composed of tunnel nodes and general nodes. Each node has threshold processing time. Result of that, the operation labels can be calculated. In order to evaluate the performance, we used ns-2 network simulator tool and used variable time parameters. The evaluated values can be used in surplus wavelength and be Possible to process additional traffic. Label merging will bring a decrease in the cost of channel sources for future network configuration.