• Title/Summary/Keyword: Hierarchical Network

Search Result 975, Processing Time 0.032 seconds

Performance Management Tool for SPAX (SPAX를 위한 성능 관리 툴)

  • Kim, Do-Hyeong;Park, Chang-Sun;Jeon, Jin-Ok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.639-650
    • /
    • 1999
  • Generally, a performance management consists of the iterative process of performance monitoring, performance analysis, and performance tuning. In this paper, we describe the design and implementation of performance monitor and performance tuner which can be used on the top of SPAX, also known as TICOM IV. SPAX has a hierarchical structure. All nodes, each of which has a local memory, are connected to the interconnection network and constructed to form clusters. Therefore, it is necessary to develop a new performance monitor reflecting the underlying hierarchical structure of SPAX, to implement performance monitoring more effectively. Implemented performance monitor can monitor the state of nodes, clusters, and total system of SPAX at realtime. And, implemented performance tuner can change the value of variables related to the performance of SPAX. System manager can perform an effective performance management by using the proposed performance management tools.

A Development of Extreme Rainfall Outlook Using Bayesian 4P-Beta Model (Bayesian 4P-Beta 모형을 이용한 극치 강수량 전망 기법 개발)

  • Kim, Yong-Tak;Kim, Ho Jun;Kwon, Hyun-Han
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.312-312
    • /
    • 2019
  • 지구온난화로 인하여 기상학적 변동성 증가 및 수질, 수자원, 생태계 등의 다양한 영역에 영향을 야기하고 있으며, 이를 통한 피해가 전 세계적으로 증가하고 있는 추세이다. 이에 본 연구에서는 최근 다양한 분야에서 수문학적 빈도에 영향을 미친다고 알려진 AO(Arctic Oscillation), NAO(North Atlantic Oscillation), ENSO(El $Ni{\tilde{n}}o$-Southern Oscillation), PDO(Pacific Decadal Oscillation), MJO(Madden-Julian Oscillation)등의 외부인자중 SST, MJO를 활용하여 계절단위의 수문량 정도에서 기상학적 변량과 관측유역 강수량의 관계를 정립하고 발생 가능한 24시간 지속시간 극치강수량을 모의하였다. 이를 위하여 Bayesian 통계기법을 이용한 비정상성 빈도해석모형을 근간으로 외부 기상인자에 의한 계절강수량 예측모형인 계층적 베이지안 네트워크(Hierarchical Bayesian Network, HBN)를 구축한 후 산정된 결과를 입력 자료로 하여 직접적으로 일단위 이하의 극치강수량을 상세화 시킬 수 있는 베타 모델(four parameter beta, 4PB)을 연계한 계층적 베이지안 네트워크 베타모델(Hierarchical Bayesian Network-4beta Model, HBN4BM)을 개발하여 기상변동성을 고려한 상세화 모형을 개발하였다. 여름강수량 산정 결과 한강 유역의 경우 2016년은 관측값 573.85mm, 모의 값 567.15mm를 나타내어 약 1.2%의 오차를 나타냈으며, 2017년 및 2018년은 4.5%, 6.8%의 오차에서 모의가 이루어졌다. 금강의 경우 2016년은 다른 연도에 비하여 35.2%라는 큰 오차를 보였지만 불확실성 구간에서 모의가 이루어 졌으며, 2017년 및 2018년은 0.3%, 2.1%의 작은 오차가 발생하였다. 24시간 모의 결과는 최소 0.7%에서 최대 27.1%의 오차를 나타냈으며, 평균적으로 16.4%의 오차 결과가 모의되어 모형의 신뢰성을 확인하였다.

  • PDF

A Handover Authentication Scheme initiated by Mobile Node for Heterogeneous FMIPv6 Mobile Networks (이기종 FMIPv6 기반의 이동 망에서 이동 노드 주도형 핸드오버 인증 기법)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.103-114
    • /
    • 2007
  • The existing handover authentication schemes have authentication delay and overhead of the authentication server since they have been separately studied handover authentication at the link layer and the network layer. This paper proposes a handover authentication scheme initiated by Mobile Node on FMIPv6 based mobile access networks. The main idea of the paper is to generate a session key at the mobile node side, and transfer it to the next Access Router through the authentication server. Also, the scheme has a hierarchical key management at access router. There are two advantages of the scheme. First, the generated session key can be utilized for protecting the binding update messages and also for access authentication. Second, hierarchical key management at the access router reduced the handover delay time. The security aspects on the against PFS, PBS, and DoS attack of proposed scheme are discussed.

Improving Transmission Performance of Real Time Traffic in HMIPv6 (HMIPv6에서 실시간 트래픽의 전송 성능 향상 방안)

  • Park, Won-Gil;Kim, Byung-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.960-968
    • /
    • 2006
  • HMIPv6 improved the handover management of basic MIPv6 by introducing the new protocol agent MAP. In this new protocol, MAP instead of the Mobile Node intercepts all packets and redirects the packets to CoA of the Mobile Node. However, this process may degrade the network performance due to the centralization phenomenon of registration occurring in the hierarchical MAP structure. ffe propose two schemes to improve real time traffic performance. First proposal is a MAP selection mettled in which MAP is selected based on traffic characteristics. And we also propose differentiated traffic processing scheme with multi-level queues when Home Agent or Correspondent Nodes process Binding Update messages. Performances of the proposed scheme are analyzed. Analysis result shows that our model has good performance in the respect of location update cost and total cost of Mobile Nodes.

The Evolution of Market Mechanism in B2B Electronic Commerce: An Exploratory Study (기업간 전자상거래시장의 시장 메커니즘 진화에 관한 탐색적 연구 -Electronic Market 가설을 중심으로-)

  • 김효근;홍진영;정성휘
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.3
    • /
    • pp.41-61
    • /
    • 2001
  • Many markets are forecast to see significant changes due to the growth of electronic commerce made possible by the internet. The way of doing business with internet affects the market mechanism. It is now over 10 years since Malone et al(1987) set out their hypothesis on electronic markets, and electronic hierarchies. An electronic market is an interorganizational information system through which multiple buyers and sellers interact to accomplish one or more of the following market-making activities. And they predicted that markets evolve toward electronic markets, by reducing search cost, which may result in significantly. higher price competition among sellers and therefore lower prices for buyers. And the degree of two factors; asset specificity and uncertainty, affect the market mechanism. Products with low asset specificity and low uncertainty are compatible with a market relationship while the greater the asset specificity and uncertainty, the more likely it is to favour a hierarchical structure. Based on the these researches, we observed and analyzed a case study of market mechanism in Internet business. We found the fact that even though Internet could make the business environment in which lots of buyers and suppliers participate, electronic market will evolve market mechanism. 1 analyzed two factors, which affected market evolution. First, When Asset specificity is low in electronic commerce, market structure should be preferred to hierarchical structure. Second, When transaction uncertainty is low in electronic commerce, market structure should be preferred In hierarchical structure. This research covers conceptual and empirical aspects on electronic market structure. Future research should be variously done about the influential factors of electronic market mechanism.

  • PDF

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

Secure MAP Discovery Schemes in Hierarchical MIPv6 (계층적 Mobile IPv6에서의 안전한 MAP 검색 기법)

  • Choi, Jong-Hyoun;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.41-47
    • /
    • 2007
  • The Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the Mobile Node and to reduce the signaling load. A Mobility Anchor Point is a router located in a network visited by the Mobile Node. The Mobile Node uses the Mobile Anchor Point as a local Home Agent. The absence of any protections between Mobile Node and Mobile Anchor Point may lead to malicious Mobile Nodes impersonating other legitimate ones or impersonating a Mobile Anchor Point. In this paper, we propose a mechanism of the secure Mobile Anther Point discovery in HMIPv6. The performance analysis and the numerical results presented in this paper show that our proposal has superior performance to other methods.

Star-Based Node Aggregation for Hierarchical QoS Routing (계층적 QoS 라우팅을 위한 스타 기반의 노드 집단화)

  • Kwon, So-Ra;Jeon, Chang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.361-368
    • /
    • 2011
  • In this study, we present a method for efficiently aggregating networks state information required to determine feasible paths in transport networks that uses the source routing algorithm for hierarchical QoS routing. It is proposed to transform the full mesh topology whose Service Boundary Line serves as its logical link into the star topology. This is an aggregation method that can be used when there are two or more QoS parameters for the link to be aggregated in an asymmetric network, and it improves the information accuracy of the star topology. For this purpose, the Service Boundary Line's 3 attributes, splitting, joining and integrating, are defined in this study, and they are used to present a topology transformation method. The proposed method is similar to space complexity and time complexity of other known techniques. But simulation results showed that aggregated information accuracy and query response accuracy is more highly than that of other known method.

A Design and Implementation of Dynamic Hybrid P2P System with Hierarchical Group Management and Maintenance of Reliability (계층적 그룹관리와 신뢰성을 위한 동적인 변형 P2P 시스템 설계 및 구현)

  • Lee, Seok-Hee;Cho, Sang;Kim, Sung-Yeol
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.975-982
    • /
    • 2004
  • In current P2P concept, pure P2P and Hybrid P2P structures are used commonly. Gnutella and Ktella are forms of pure P2P. and forms of Hybrid P2P are innumerable. File searching models exist in these models. These models provide group management for file sharing, searching and indexing. The general file sharing model is good at maintaining connectivity. However, it is defective in group management. Therefore, this study approaches hierarchical structure in file sharing models through routing technique and backup system. This system was designed so that the user was able to maintain group efficiency and connection reliability in large-scale network.

A Fast Authentication based on Hierarchical Key Structure for Roaming Mobile Nodes Between Domains (모바일 네트워크에서 로밍을 위한 계층적 인증 방법)

  • Hong, Ki-Hun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1288-1296
    • /
    • 2006
  • This paper proposes a fast authentication scheme based on hierarchical key structure (HiFA) for roaming mobile nodes in both intra-domain and inter-domain. The full authentication procedure standardized in IEEE 802.11 and 802.16 is difficult to be applied to a handover since it needs a heavy operation and long delay time during a handover. Though a number of schemes were proposed to solve the problem, the existing schemes might degrade the security of authentication or impose heavy administrative burden on the Pome authentication server. The main contribution of this paper is to reduce the communication and computation overhead of the home authentication sewer without degrading the security strength of the fast roaming authentication using hierarchical authentication key structure. The proposed scheme iii this paper decentralizes the administrative burden of the home authentication server to other network entities such as a local authentication server or access point and supports the security separation of the authentication key among local authentication servers using hash key chain.