• Title/Summary/Keyword: Inbound Network

Search Result 34, Processing Time 0.033 seconds

A Mathematical Model for Strategic Decision Making in Two Level Supply Chain Network Design (2단계 공급사슬 네트워크에서 전략적 의사결정을 위한 수리적 모형)

  • Chung, Ki-Ho
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.107-125
    • /
    • 2013
  • This study deals with a strategic decision making in two level supply chain network design. This study presents more realistic mathematical model than the previous studies by considering simultaneous location of plants and distribution centers, determination of capacity level for both plants and distribution centers, and upper limit condition for numbers of locating plants and distribution centers. This paper tries to help the strategic decision making for two level supply chain network design. For this purpose, three different sized numerical examples are generated and optimal solutions are obtained by applying Excel Solver program. And sensitivity analysis is performed for the biggest sized example problem, which has 10 potential plants, 20 potential distribution centers, and 200 customer zones. After the plants being located are fixed, optimal minimum costs are obtained and compared for each of 7 different numbers of distribution centers to be located. As the number of distribution centers increases, changes in inbound transportation cost and outbound transportation cost can be derived. In case of considering cost as well as customer satisfaction level for two level supply chain network design, the analysis of this changes may help more sophisticated decision making.

  • PDF

Modeling and Network Simulator Implementation for analyzing Slammer Worm Propagation Process (슬래머 웜 전파과정 분석을 위한 네트워크 모델링 및 시뮬레이터 구현)

  • Lim, Jae-Myung;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5B
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we present a simulation model of Slammer worm propagation process which caused serious disruptions on Internet in the you of 2003 and analyze the process of Slammer by using NS-2. Recently introduced NS-2 modeling called "Detailed Network-Abstract Network Model" had enabled packet level analysis. However, it had deficiency of accommodating only small sized network. By extending the NS-2 DN-AN model to AN-AN model (Abstract Network-Abstract Network model), it is effectively simulated that the whole process from the initial infection to the total network congestion on hourly basis not only for the Korean network but also for the rest of the world networks. Furthermore, the progress of the propagation from Korean network to the other country was also simulated through the AN-AN model. 8,848 hosts in Korean network were infected in 290 second and 66,152 overseas hosts were infected in 308 second. Moreover, the scanning traffics of the worm at the Korean international gateway saturated the total bandwidth in 154 seconds for the inbound traffic and in 135 seconds for the outbound one.

Simulation and Analysis of Slammer Worm Propagation With Automatic Quarantine (자동 격리를 감안한 슬래머 웜 전파과정에 대한 모의실험 및 분석)

  • Lim, Jae-Myung;Jung, Han-Gyun;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.529-538
    • /
    • 2007
  • In this paper, we have analyzed a simulation model of Slammer worm propagation process which caused serious disruptions on the Internet in the year of 2003 by using NS-2. Previously we had presented and analyzed Abstract Network to Abstract Network(AN-AN) model being modified from the Detailed Network to Abstract Network(DN-AN) of NS-2. However, packet analysis in AN-AN model had a problem of taking 240 hours to simulate the initial 300 seconds of infection. We have reduced the AN-AN model to save the simulation time and analyzed total 3.5 hours of the network congestions within 107 hours. Moreover, we have derived optimal quarantine rate of 0.0022 considering service outage of network devices caused by the heavy infected traffics, which was not taken into consideration in previous works. As the result of simulation, Although the inbound traffic at the Korean international gateway was back in normal conditions at 4,787 second, due to the revese direction saturation was maintained until 12,600 seconds, the service outage was persisted for 3.5 hours.

A Model-based Performance Study of the EPCglobal Network (모델 기반 EPCglobal 네트워크의 성능 분석)

  • Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae
    • IE interfaces
    • /
    • v.24 no.2
    • /
    • pp.139-150
    • /
    • 2011
  • The EPCglobal Network is a computer network used to share product data among trading partners. It provides the supply chain with improved visibility and traceability by using Electronic Product Code (EPC), which is stored on an RFID tag. Although this network model is widely accepted as a global standard and the growth of EPCglobal-subscriber base is considerable, the EPC technology adoption process is still in its infancy. This is because some of the critical issues on this model still remain to be verified such as scalability, data management, security, privacy and the economic value of data sharing. In this paper, we focus on scalability issue among the challenges to overcome and we regard performance of the EPCglobal Network only as a track and trace query-processing cost in the network. We developed performance models consisting of three elements of the EPCglobal Network : Discovery Services (DS), EPC Information Services (EPCIS), Object Naming Services (ONS). Then we abstracted out the track and trace query execution model to evaluate performance of the overall EPCglobal Network. Finally using the proposed models, we carried out simulation analysis based on an RFID-based inbound logistics process of automobile parts. This work is an important step towards the EPC technology diffusion and provides guidelines for businesses looking to buy or build the EPCglobal Network-based systems.

Case Study on the continuous pickup and delivery vehicle routing problem in Multi-level Logistic Network based on S automobile Part Logistics Process (다단계 물류 네트워크에서 A/S 부품 집화 및 배송이 연속적으로 발생하는 문제에 관한 사례연구 -자동차 부품 물류 프로세스를 중심으로-)

  • Song, Jun-Woo;Kim, Kyung-Sup;Jeong, Suk-Jae
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.2
    • /
    • pp.193-204
    • /
    • 2013
  • The growing logistics strategy of a company is to optimize their vehicle route scheduling in their supply chain system. It is very important to analyze for continuous pickups and delivery vehicle scheduling. This paper is a computational study to investigate the effectiveness of continuous pickups and delivery vehicle routing problems. These scheduling problems have 3 subproblems; Inbound Vehicle Routing Problem with Makespan and Pickup, Line-haul Network Problem, and Outbound Vehicle Routing Problem with Delivery. In this paper, we propose 5 heuristic Algorithms; Selecting Routing Node, Routing Scheduling, Determining Vehicle Type with Number and Quantity, and Modification Selecting Routing Node. We apply these Algorithms to S vehicle company. The results of computational experiments demonstrate that proposed methods perform well and have better solutions than other methods considering the basic time and due-date.

Performance Evaluation on the Learning Algorithm for Automatic Classification of Q&A Documents (고객 질의 문서 자동 분류를 위한 학습 알고리즘 성능 평가)

  • Choi Jung-Min;Lee Byoung-Soo
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.133-138
    • /
    • 2006
  • Electric commerce of surpassing the traditional one appeared before the public and has currently led the change in the management of enterprises. To establish and maintain good relations with customers, electric commerce has various channels for customers that understand what they want to and suggest it to them. The bulletin board and e-mail among em are inbound information that enterprises can directly listen to customers' opinions and are different from other channels in characters. Enterprises can effectively manage the bulletin board and e-mail by understanding customers' ideas as many as possible and provide them with optimum answers. It is one of the important factors to improve the reliability of the notice board and e-mail as well as the whole electric commerce. Therefore this thesis researches into methods to classify various kinds of documents automatically in electric commerce; they are possible to solve existing problems of the bulletin board and e-mail, to operate effectively and to manage systematically. Moreover, it researches what the most suitable algorithm is in the automatic classification of Q&A documents by experiment the classifying performance of Naive Bayesian, TFIDF, Neural Network, k-NN

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

Redistribution and Replenishment Policy of Empty Containers on Ocean Transportation Network (해상수송망에서 공 컨테이너의 재배치 및 보충정책 수립을 위한 시뮬레이션 모형의 개발)

  • Seo, Sun-Keun;Kwak, Jun-Ho
    • IE interfaces
    • /
    • v.14 no.3
    • /
    • pp.255-262
    • /
    • 2001
  • Containerization of cargo transportation has been norm in the word wide maritime services, but containerized trades are typically unbalanced in terms of the number of inbound and outbound containers. Therefore it is critical for shipping companies to find operating policy such as the repositioning of empty containers or replenishing of short-term leasing containers from leasing companies to satisfy the freighter's demands of containers. This paper develops a simulation model using ARENA to establish shipping company's operational policy to relocate and replenish empty containers. Furthermore, this study proposes simple and heuristic empty container repositioning rules to minimize the relevant cost in terms of leasing, repositioning, and inventory holding costs.

  • PDF

A Review on Field Constraints for Railway Conflict Detection and Resolution Problem; focusing on the Korean Regional Railway System (열차경합 검지 및 해소 문제를 위한 현실제약의 고찰: 한국철도의 사례를 중심으로)

  • Oh Seog-Moon;Kim Jae-Hee;Hong Soon-Heum;Park Bum-Hwan
    • Proceedings of the KSR Conference
    • /
    • 2004.06a
    • /
    • pp.1374-1378
    • /
    • 2004
  • Railway conflict detection and resolution problem (RCDRP) involves complicated field constraints that should be considered for practical service. In this paper, we address those constraints in brief. Particularly, following situations are addressed; (1) temporal change of network topology, (2) consideration of diverse conditions of track and train, for example, single/double tracks and passenger/freight service, (3) siding capacity limitation, (4) bidirectional sides used by both inbound and outbound trains, (5) regulation for passenger transfer service, (6) consideration of siding length, (7) Restriction on stopping before the track segment with steep slope.

  • PDF

Implementation of VPN Accelerator Board Used 10 Giga Security Processor (10Giga 급 보안 프로세서를 이용한 VPN 가속보드 구현)

  • Kim, Ki-Hyun;Yoo, Jang-Hee;Chung, Kyo-Il
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.233-236
    • /
    • 2005
  • Our country compares with advanced nations by supply of super high speed network and information communication infra construction has gone well very. Many people by extension of on-line transaction and various internet services can exchange, or get information easily in this environment. But, virus or poisonous information used to Cyber terror such as hacking was included within such a lot of information and such poisonous information are threatening national security as well as individual's private life. There were always security and speed among a lot of items to consider networks equipment from these circumstance to now when develop and install in trade-off relation. In this paper, we present a high speed VPN Acceleration Board(VPN-AB) that balances both speed and security requirements of high speed network environment. Our VPN-AB supports two VPN protocols, IPsec and SSL. The protocols have a many cryptographic algorithms, DES, 3DES, AES, MD5, and SHA-1, etc.. The acceleration board process data packets into the system with In-line mode. So it is possible that VPN-AB processes inbound and outbound packets by 10Gbps. We use Nitrox-II CN2560 security processor VPN-AB is designed using that supports many hardware security modules and two SPI-4.2 interfaces to design VPN-AB.

  • PDF