• Title/Summary/Keyword: Network simulation

Search Result 7,352, Processing Time 0.033 seconds

Simulation for hierarchical logic network (계층적 논리 회로의 시뮬레이션)

  • Lee, H.J.;Hur, Y.M.;Lee, J.H.;Park, H.J.;Park, D.G.;Lim, I.C.
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.579-581
    • /
    • 1988
  • This paper proposes the logic simulation for hierarchical logic network with function descriptor base data structure and algorithm on which a macro cell is considered as a logic elements. Function descriptor base data structure is useful when many logic elements of which type is same exist in a network, for it lessens the computer memory size used during the simulation. And the proposed simulation algorithm may improve the simulation speed.

  • PDF

A Study on the Development of Simulator for Performance Evaluation of Traffic Control using UPC Algorithm in ATM Network (ATM 망에서 UPC를 이용한 트래픽 제어방법의 성능평가를 위한 시뮬레이터의 개발에 관한 연구)

  • 김문선
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.2
    • /
    • pp.45-56
    • /
    • 1999
  • It is necessary that we should control the traffic to not only efficiently use the rich bandwidth of ATM network but also satisfy the users various requirements for service quality. However, it is very difficult to decide which control mechanism would be applied in real network because there are various types of ATM traffic and traffic control mechanisms. In this paper, a smart simulator is developed ot analyze the performance of a UPC(Usage Parameter Control) mechanism which is a typical traffic control mechanism. The simulator consists of a user interface that supports a menu-driven input form and a simulation program that is executed with the users input parameters. Especially, the simulator establishes more powerful and flexible simulation environment since it supports a more complex simulation applying various source traffic to several different UPC mechanisms at the same time and allows an arbitrary user-defined traffic in addition to some well-known traffic.

  • PDF

Optimization of Queueing Network by Perturbation Analysis (퍼터베이션 분석을 이용한 대기행렬 네트워크의 최적화)

  • 권치명
    • Journal of the Korea Society for Simulation
    • /
    • v.9 no.2
    • /
    • pp.89-102
    • /
    • 2000
  • In this paper, we consider an optimal allocation of constant service efforts in queueing network to maximize the system throughput. For this purpose, using the perturbation analysis, we apply a stochastic optimization algorithm to two types of queueing systems. Our simulation results indicate that the estimates obtained from a stochastic optimization algorithm for a two-tandem queuing network are very accurate, and those for closed loop manufacturing system are a little apart from the known optimal allocation. We find that as simulation time increases for obtaining a new gradient (performance measure with respect to decision variables) by perturbation algorithm, the estimates tend to be more stable. Thus, we consider that it would be more desirable to have more accurate sensitivity of performance measure by enlarging simulation time rather than more searching steps with less accurate sensitivity. We realize that more experiments on various types of systems are needed to identify such a relationship with regards to stopping rule, the size of moving step, and updating period for sensitivity.

  • PDF

Knowledge-based modeling and simulation of access control system representing security policies (보안정책을 표현하는 침입차단시스템의 지식기반 모델링 및 시뮬레이션)

  • 고종영;이미라;김형종;김홍근;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.4
    • /
    • pp.51-64
    • /
    • 2001
  • It is quite necessary that an organization's information network should be equipped with a proper security system based on its scale and importance. One of the effective methods is to use the simulation model for deciding which security policy and mechanism is appropriate for the complex network. Our goal is to build a foundation of knowledge-based modeling and simulation environment for the network security. With this environment, users can construct the abstracted model of security mechanisms, apply various security policies, and quantitatively analyze their security performance against possible attacks. In this study, we considered security domain from several points of view and implemented the models based on a systematic modeling approach. We enabled the model to include knowledge in modular fashion and provided well-defined guidelines for transforming security policy to concrete rule set.

  • PDF

Design for Distributed Simulator using Wired and Wireless Devices (유무선 단말기를 이용한 분산 시뮬레이터 설계)

  • Jo, Soo-Hyun;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.41-48
    • /
    • 2011
  • Wireless communication technology developed, portable wireless devices based on wireless network including the smartphone rapidly developed, and products with functions similar to highly efficient computer are being launched. Therefore, active studies to enable performance of works, which were previously held in computers, on portable wireless terminal are being held. Until now, simulation was undertaken using computers which satisfy high performance computing resource. Such contains a problem that it cannot break away the limit of space. Portable wireless terminal has the merit that it can break away from the limit of space by using wireless network in comparison to wired environment. In this paper, it suggests a simulator based on wireless devices for distributed simulation. For such purpose, the performance time of simulation will be compared in regards to the case of performing nodes control simulation in a single highly efficient computer and the case of performing distributed simulation in many wired and wireless network environments. Through the comparison, the possibility for utility of portable wireless terminal as the object of distributed simulation will be verified, and it will be presented that simulation can be performed in a shorter time by performing distributed simulation under various wired and wireless network environments away from the limit of space.

Component-Based Software Architecture for Biosystem Reverse Engineering

  • Lee, Do-Heon
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.10 no.5
    • /
    • pp.400-407
    • /
    • 2005
  • Reverse engineering is defined as the process where the internal structures and dynamics of a given system are inferred and analyzed from external observations and relevant knowledge. The first part of this paper surveys existing techniques for biosystem reverse engineering. Network structure inference techniques such as Correlation Matrix Construction (CMC), Boolean network and Bayesian network-based methods are explained. After the numeric and logical simulation techniques are briefly described, several representative working software tools were introduced. The second part presents our component-based software architecture for biosystem reverse engineering. After three design principles are established, a loosely coupled federation architecture consisting of 11 autonomous components is proposed along with their respective functions.

Hydrological Radar Network Simulation Model Considering Effective Flood Management and Control

  • Shin, Hyun-Suk;Yoon, Kang-Hoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2002.05a
    • /
    • pp.65-73
    • /
    • 2002
  • Weather Radar have played an important role in both precipitation observation and hydrological operations over several countries and evaluated its efficient and necessities for the developed flood management and control. This paper describe the factors influencing the design the hydrological radar network in Korea and develop Hydrological Radar Network Simulation Model (HRNSM) based on GIS and UI system. Moreover, the methodologies for geographical and hydrological feasibility analysis for radar network were provided in detail manner.

  • PDF

A Study on the Efficient Design of WDM Network and Shortest Path Routing Scheme (WDM 네트워크의 효율적인 설계와 최단경로 라우팅 방안에 관한 연구)

  • 오호일;김장복
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.349-352
    • /
    • 2001
  • In this paper, the design of WDM network using the traffic estimation modeling is implemented. Because of the lack of data of real traffic volumes, the information of statistic data is used. Using the modeling results, the WDM channels are assinged for each node, and the network is simulated using OPNET simulation tools. Here, we investigate the shortest routing scheme using OPNET simulation tools. As a result the realistic WDM network design for Korea topology is proposed.

  • PDF

Control of Nonlinear System using WAVENET (WAVENET을 이용한 비선형 시스템의 제어)

  • Park, Doo-Hwan;Kim, Kyung-Yup;Lee, Joon-Tark
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2005.06a
    • /
    • pp.257-261
    • /
    • 2005
  • The helicopter system is non-linear and complex. Futhermore, because of absence of accurate mathematical model, it is difficult accurately to control its attitude. therefore, we propose a WAVENET control technique to control efficiently its elevation angle and azimuth one. Wavelet neural network(WAVENET) can construct systematically initial neural network as applying wavelet theory to feedforward network. It is proved through computer simulation that WAVENET has more excellent approximation capability than existing neural network. The simulation results using MATLAB are introduced.

  • PDF

A Resource Management Scheme in Heterogeneous Access Network Architectures (이종 액세스 네트워크 구조에서 자원관리 방안)

  • Park, Sang-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.2
    • /
    • pp.83-92
    • /
    • 2005
  • Access networks connected in B3G networks provide its property network service. Hence, though mobile users may utilize only a network service from an access network, they can also use variety of network services from several access networks for their service satisfaction. To support heterogeneous changeable network service in access networks, the mobile terminal must implement heterogeneous system techniques so that it is able to change the network service by ISHO (Inter-System Handover) In this paper, we present the ISHO condition by the policy-based framework in B3G networks. Also, we propose an ISHO scheme to control network resources for the QoS management of a mobile session between UMTS and WLAN access networks. To support the QoS management, the proposed scheme is that it will be implemented before the resource exhaustion occurs to effect network performances.

  • PDF