• Title/Summary/Keyword: Network Survivability

Search Result 125, Processing Time 0.027 seconds

Heterogeneous Network Gateway Architecture and Simulation for Tactical MANET (전술 에드혹 환경에서 이종망 게이트웨이 구조 및 시뮬레이션 연구)

  • Roh, Bong Soo;Han, Myoung Hun;Kwon, Dae Hoon;Ham, Jae Hyun;Yun, Seon Hui;Ha, Jae Kyoung;Kim, Ki Il
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.97-105
    • /
    • 2019
  • The tactical mobile ad-hoc network(MANET) consists of distributed autonomous networks between individual ground nodes, which is effective in terms of network survivability and flexibility. However, due to constraints such as limited power, terrain, and mobility, frequent link disconnection and shadow area may occur in communication. On the other hand, the satellite network has the advantage of providing a wide-area wireless link overcoming terrain and mobility, but has limited bandwidth and high-latency characteristic. In the future battlefield, an integrated network architecture for interworking multi-layer networks through a heterogeneous network gateway (HNG) is required to overcome the limitations of the existing individual networks and increase reliability and efficiency of communication. In this paper, we propose a new HNG architecture and detailed algorithm that integrates satellite network and the tactical MANET and enables reliable data transfer based on flow characteristics of traffic. The simulations validated the proposed architecture using Riverbed Modeler, a network-level simulator.

A Study on the Energy Efficient MAC Layer ARQ Protocol for Wireless Ubiquitous Networks (무선 유비쿼터스 네트워크를 위한 에너지 효율적인 MAC Layer ARQ 프로토콜에 대한 연구)

  • Roh, Jae-Sung;Kim, Wan-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.54-60
    • /
    • 2011
  • The development of wireless sensor networks (WSN) can be motivated by several types of applications. However, these applications demand an energy-efficient WSN that can prolong the network lifetime and can provide high throughput, low latency and delay. Designing wireless sensor networks with the capability of prolonging network lifetime catch the attention of many researchers in wireless system and network field. Contrasts with Mobile Ad Hoc Network system, Wireless Sensor Networks designs focused more on survivability of each node in the network instead of maximizing data throughput or minimizing end-to-end delay. In this paper, we will study part of data link layer in Open Systems Interconnection (OSI) model, called medium access control (MAC) layer. Since the MAC development of energy aware MAC Protocol for wireless sensor layer controls the physical radio part, it has a large impact on the overall energy consumption and the lifetime of a node. This paper proposes a analytical approach that tries to reduce idle energy consumption, and shows the increasement of network end-to-end arrival rate due to efficiency in energy consumption from time slot management.

Efficient Provisioning for Multicast Virtual Network under Single Regional Failure in Cloud-based Datacenters

  • Liao, Dan;Sun, Gang;Anand, Vishal;Yu, Hongfang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2325-2349
    • /
    • 2014
  • Network virtualization technology plays a key role in cloud computing, which serves as an effective approach for provisioning a flexible and highly adaptable shared substrate network to satisfy the demands of various applications or services. Recently, the problem of mapping a virtual network (VN) onto a substrate network has been addressed by various algorithms. However, these algorithms are typically efficient for unicast service-oriented virtual networks, and generally not applicable to multicast service-oriented virtual networks (MVNs). Furthermore, the survivable MVN mapping (SMVNM) problem that considers the survivability of MVN has not been studied and is also the focus of this work. In this research, we discuss SMVNM problem under regional failures in the substrate network and propose an efficient algorithm for solving this problem. We first propose a framework and formulate the SMVNM problem with the objective of minimizing mapping cost by using mixed integer linear programming. Then we design an efficient heuristic to solve this problem and introduce several optimizations to achieve the better mapping solutions. We validate and evaluate our framework and algorithms by conducting extensive simulations on different realistic networks under various scenarios, and by comparing with existing approaches. Our simulation experiments and results show that our approach outperforms existing solutions.

SVR model reconstruction for the reliability of FBG sensor network based on the CFRP impact monitoring

  • Zhang, Xiaoli;Liang, Dakai;Zeng, Jie;Lu, Jiyun
    • Smart Structures and Systems
    • /
    • v.14 no.2
    • /
    • pp.145-158
    • /
    • 2014
  • The objective of this study is to improve the survivability and reliability of the FBG sensor network in the structural health monitoring (SHM) system. Therefore, a model reconstruction soft computing recognition algorithm based on support vector regression (SVR) is proposed to achieve the high reliability of the FBG sensor network, and the grid search algorithm is used to optimize the parameters of SVR model. Furthermore, in order to demonstrate the effectiveness of the proposed model reconstruction algorithm, a SHM system based on an eight-point fiber Bragg grating (FBG) sensor network is designed to monitor the foreign-object low velocity impact of a CFRP composite plate. Simultaneously, some sensors data are neglected to simulate different kinds of FBG sensor network failure modes, the predicting results are compared with non-reconstruction for the same failure mode. The comparative results indicate that the performance of the model reconstruction recognition algorithm based on SVR has more excellence than that of non-reconstruction, and the model reconstruction algorithm almost keeps the consistent predicting accuracy when no sensor, one sensor and two sensors are invalid in the FBG sensor network, thus the reliability is improved when there are FBG sensors are invalid in the structural health monitoring system.

Fieldbus Communication Network Requirements for Application of Harsh Environments of Nuclear Power Plant (원전 극한 환경적용을 위한 필드버스 통신망 요건)

  • Cho, Jai-Wan;Lee, Joon-Koo;Hur, Seop;Koo, In-Soo;Hong, Seok-Boong
    • Journal of Information Technology Services
    • /
    • v.8 no.2
    • /
    • pp.147-156
    • /
    • 2009
  • As the result of the rapid development of IT technology, an on-line diagnostic system using the field bus communication network coupled with a smart sensor module will be widely used at the nuclear power plant in the near future. The smart sensor system is very useful for the prompt understanding of abnormal state of the key equipments installed in the nuclear power plant. In this paper, it is assumed that a smart sensor system based on the fieldbus communication network for the surveillance and diagnostics of safety-critical equipments will be installed in the harsh-environment of the nuclear power plant. It means that the key components of fieldbus communication system including microprocessor, FPGA, and ASIC devices, are to be installed in the RPV (reactor pressure vessel) and the RCS (reactor coolant system) area, which is the area of a high dose-rate gamma irradiation fields. Gamma radiation constraints for the DBA (design basis accident) qualification of the RTD sensor installed in the harsh environment of nuclear power plant, are typically on the order of 4 kGy/h. In order to use a field bus communication network as an ad-hoc diagnostics sensor network in the vicinity of the RCS pump area of the nuclear power plant, the robust survivability of IT-based micro-electronic components in such intense gamma-radiation fields therefore should be verified. An intelligent CCD camera system, which are composed of advanced micro-electronics devices based on IT technology, have been gamma irradiated at the dose rate of about 4.2kGy/h during an hour UP to a total dose of 4kGy. The degradation performance of the gamma irradiated CCD camera system is explained.

Dynamic Control of Random Constant Spreading Worm using Depth Distribution Characteristics

  • No, Byung-Gyu;Park, Doo-Soon;Hong, Min;Lee, Hwa-Min;Park, Yoon-Sok
    • Journal of Information Processing Systems
    • /
    • v.5 no.1
    • /
    • pp.33-40
    • /
    • 2009
  • Ever since the network-based malicious code commonly known as a 'worm' surfaced in the early part of the 1980's, its prevalence has grown more and more. The RCS (Random Constant Spreading) worm has become a dominant, malicious virus in recent computer networking circles. The worm retards the availability of an overall network by exhausting resources such as CPU capacity, network peripherals and transfer bandwidth, causing damage to an uninfected system as well as an infected system. The generation and spreading cycle of these worms progress rapidly. The existing studies to counter malicious code have studied the Microscopic Model for detecting worm generation based on some specific pattern or sign of attack, thus preventing its spread by countering the worm directly on detection. However, due to zero-day threat actualization, rapid spreading of the RCS worm and reduction of survival time, securing a security model to ensure the survivability of the network became an urgent problem that the existing solution-oriented security measures did not address. This paper analyzes the recently studied efficient dynamic network. Essentially, this paper suggests a model that dynamically controls the RCS worm using the characteristics of Power-Law and depth distribution of the delivery node, which is commonly seen in preferential growth networks. Moreover, we suggest a model that dynamically controls the spread of the worm using information about the depth distribution of delivery. We also verified via simulation that the load for each node was minimized at an optimal depth to effectively restrain the spread of the worm.

Design and Implementation of a Multi-Intelligent Agent based Platform for a Bio-Inspired System (생태계 모방 시스템을 위한 멀티 지능형 에이전트 기반의 플랫폼 설계 및 구현)

  • Moon, Joo-Sun;Nang, Jong-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.545-549
    • /
    • 2007
  • The Bio-Inspired System focuses on the creation of an effective system model for massive network applications and is being widely developed. However, the system has a problem-difficulty implementing three features in the system, which includes scalability, adaptability and survivability. To solve this problem, we designed an Ecogent as a multiple intelligence agent, and a Bio-platform to address the three features of scalability, adaptability and survivability. The Bio-Inspired System Platform consists of an ERS (Ecogent Runtime Services) Platform and a Bio-Platform. The ERS platform serves the basic functions of mobile agents, such as Registration, Life Cycle, Migration, Communication, Location and Fault Tolerance. The Bio-Platform includes the functions of Evolution Control and Stigmergy Control to address evolution and adaptation.

Intrusion-Tolerant Jini Service Architecture for Enhancing Survivability of Ubiquitous Services (유비쿼터스 서비스 생존성 제고를 위한 침입감내 Jini 서비스 구조)

  • Kim, Sung-Ki;Park, Kyung-No;Min, Byoung-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.4
    • /
    • pp.41-52
    • /
    • 2008
  • Ubiquitous service environment is poor in reliability of connection and has a high probability that the intrusion and the system failure may occur. Therefore, in the environment, the capability of a system to collectively accomplish its mission in spite of active intrusions and various failure scenarios, that is, the survivability of services are needed. In this paper, we analyze the Jgroup/ARM framework that was developed in order to help the development of fault- tolerant Jini services. More importantly, we propose an intrusion-tolerant Jini service architecture to satisfy the security availability and quality of services on the basis of the analysis. The proposed architecture is able to protect a Jini system not only from faults such as network partitioning or server crash, but also from attacks exploiting flaws. It is designed to provides performance enough to show a low response latency so as to support seamless service usage. Through the experiment on a test-bed, we have confirmed that the architecture is able to provide high security and availability at the level that degraded services quality is ignorable.

Multi-Path Virtual Network Resource Allocation with Shared Backup Bandwidth (공유 백업 대역폭을 갖는 다중 경로 지원 가상 네트워크 자원 할당 방안)

  • Kim, Hak Suh;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.17-23
    • /
    • 2016
  • With the advance of ICT, the Internet has been creating new services in various fields. However, due to the architectural problem of the Internet, it may inhibit the development of network architectures and various services. Network virtualization is being investigated as an alternative to overcome the architectural problem of the Internet and a virtual network resource allocation algorithm is a very important issue. In this paper, we propose a multiple path resource allocation algorithm with shared backup bandwidth in order to overcome single link failure. It will be improved survivability of the virtual networks. Through our experiments, we confirmed that the multi-path creation time of the proposed algorithm has about 50% performance improvement than previous works.

A Study on the Design of Survivable Communication Networks (서바이버블한 통신망 설계에 관한 연구)

  • 정재연;이종영;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.11
    • /
    • pp.1726-1734
    • /
    • 1993
  • This paper propose a survivable communication network design process using node degree that augments the usual traffic flow and cost analyses with previously ignored topological survivability and computing time considerations. At first, decide a initial topology, and then measure a throughput of network. If the throughput is smaller than the required traffic, add edge to the optimum place by using minimum node degree and link distance. Otherwise, drop useless edge by using maximum node degree, link distance and link utilization. This process is repeated until throughput equals to the required traffics. This Process designs a survivable communication network with the minimized cost and computing time and usual traffic flow. The design proceses that minimized computing time are freely select initial topology and easily design a large network. And these results of algorithm are compared with the Kris and Pramod's in order to analyses the perfmance of the designed network.

  • PDF