• Title/Summary/Keyword: Network topology

Search Result 1,195, Processing Time 0.034 seconds

Voice Traffic Estimation using Kalman-filtering and Performance Evaluation of a Circuit Switched Network with Grid Topology (Kalman-Filter를 이용한 음성트래픽 예측 및 회선 교환 격자 구조망 성능 평가)

  • 문경덕;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.5
    • /
    • pp.452-459
    • /
    • 1992
  • In this paper, we have estimated voice traffics using Kalman-filtering for upcoming years and evaluated performance of a grid topology circuit switched network using above outcomes. Since measurement errors and modeling errors are considered in Kalman-filtering, the system is estimated more accurately than by using any other estimation methods. A grid topology circuit switched network has alternative routing paths, therefore it is more reliable than any other networks. In this paper, we have calculated the call blocking probabilities, which is the key measuremens of performance evaluation in circuit switched networks. by using estimated voice traffics for upcoming years.

  • PDF

A Ring-Mesh Topology Optimization in Designing the Optical Internet (생존성을 보장하는 링-그물 구조를 가진 광 인터넷 WDM 망 최적 설계)

  • 이영호;박보영;박노익;이순석;김영부;조기성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4B
    • /
    • pp.455-463
    • /
    • 2004
  • In this paper, we deal with a ring-mesh network design problem arising from the deployment of WDM for the optical internet. The ring-mesh network consists of ring topology and full mesh topology for satisfying traffic demand while minimizing the cost of OAOMs and OXCs. The problem seeks to find an optimal clustering of traffic demands in the network such that the total number of node assignments is minimized, while satisfying ring capacity and node cardinality constraints. We formulate the problem as a mixed-integer programming model and prescribe a tabu search heuristic procedure Promising computational results within 3% optimality gap are obtained using the proposed method.

A Distributed Algorithm to Update Spanning Tree and Strongly-Connected Components (생성트리와 강결합요소의 갱신을 위한 분산 알고리즘)

  • Park, Jeong-Ho;Park, Yun-Yong;Choe, Seong-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.299-306
    • /
    • 1999
  • Considers the problem to update the spanning tree and strongly-connected components in response to topology change of the network. This paper proposes a distributed algorithm that solves such a problem after several processors and links are added and deleted. Its message complexity and its ideal-time complexity are O(n'log n'+ (n'+s+t)) and O(n'logn') respectively where n'is the number of processors in the network after the topology change, s is the number of added links, and t is the total number of links in the strongly connected component (of the network before the topology change) including the deleted links.

  • PDF

GROUP SECRET KEY GENERATION FOR 5G Networks

  • Allam, Ali M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4041-4059
    • /
    • 2019
  • Key establishment method based on channel reciprocity for time division duplex (TDD) system has earned a vital consideration in the majority of recent research. While most of the cellular systems rely on frequency division duplex (FDD) systems, especially the 5G network, which is not characterized by the channel reciprocity feature. This paper realizes the generation of a group secret key for multi-terminals communicated through a wireless network in FDD mode, by utilizing the nature of the physical layer for the wireless links between them. I consider a new group key generation approach, which using bitwise XOR with a modified pairwise secret key generation approach not based on the channel reciprocity feature. Precisely, this multi-node secret key agreement technique designed for three wireless network topologies: 1) the triangle topology, 2) the multi-terminal star topology, and 3) the multi-node chain topology. Three multi-node secret key agreement protocols suggest for these wireless communication topologies in FDD mode, respectively. I determine the upper bound for the generation rate of the secret key shared among multi-node, for the three multi-terminals topologies, and give numerical cases to expose the achievement of my offered technique.

Underwater Multi-media Communication Network based on Star Topology and a Fragmentation Technique (성형망 기반의 수중 다중매체 통신 네트워크와 단편화 기법)

  • Lim, DongHyun;Kim, Seung-Geun;Kim, Changhwa
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.11
    • /
    • pp.1526-1537
    • /
    • 2021
  • Due to the difference between the underwater communication environment and the terrestrial communication environment, the radio communication mainly used on the ground cannot be used in underwater. For this reason, in the underwater communication environment, various communication media such as acoustic waves, infrared rays, light and so on has been studied, but there exist several difficulties in operating them individually due to their physical limitations. The concept for overcoming these difficulties is the very underwater multi-media communication, a method to select a communication medium best suitable for the current underwater environment among underwater communication multimedia whenever there occurs underwater communication failure. In this paper, we present an underwater multi-media communication network based on star topology and a fragmentation and reassembly technique to solve the problems caused by the different MTU (Maximum Transmission Unit) sizes among different underwater communication media. We also present the estimations and analysis on processing times in each of fragmentation and reassembly and the total data amount for transmitting fragments in our proposed underwater multi-media communication network.

Routing optimization algorithm for logistics virtual monitoring based on VNF dynamic deployment

  • Qiao, Qiujuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1708-1734
    • /
    • 2022
  • In the development of logistics system, the breakthrough of important technologies such as technology platform for logistics information management and control is the key content of the study. Based on Javascript and JQuery, the logistics system realizes real-time monitoring, collection of historical status data, statistical analysis and display, intelligent recommendation and other functions. In order to strengthen the cooperation of warehouse storage, enhance the utilization rate of resources, and achieve the purpose of real-time and visual supervision of transportation equipment and cargo tracking, this paper studies the VNF dynamic deployment and SFC routing problem in the network load change scenario based on the logistics system. The BIP model is used to model the VNF dynamic deployment and routing problem. The optimization objective is to minimize the total cost overhead generated by each SFCR. Furthermore, the application of the SFC mapping algorithm in the routing topology solving problem is proposed. Based on the concept of relative cost and the idea of topology transformation, the SFC-map algorithm can efficiently complete the dynamic deployment of VNF and the routing calculation of SFC by using multi-layer graph. In the simulation platform based on the logistics system, the proposed algorithm is compared with VNF-DRA algorithm and Provision Traffic algorithm in the network receiving rate, throughput, path end-to-end delay, deployment number, running time and utilization rate. According to the test results, it is verified that the test results of the optimization algorithm in this paper are obviously improved compared with the comparison method, and it has higher practical application and promotion value.

A Hierarchical Model for Mobile Ad Hoc Network Performability Assessment

  • Zhang, Shuo;Huang, Ning;Sun, Xiaolei;Zhang, Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3602-3620
    • /
    • 2016
  • Dynamic topology is one of the main influence factors on network performability. However, it was always ignored by the traditional network performability assessment methods when analyzing large-scale mobile ad hoc networks (MANETs) because of the state explosion problem. In this paper, we address this problem from the perspective of complex network. A two-layer hierarchical modeling approach is proposed for MANETs performability assessment, which can take both the dynamic topology and multi-state nodes into consideration. The lower level is described by Markov reward chains (MRC) to capture the multiple states of the nodes. The upper level is modeled as a small-world network to capture the characteristic path length based on different mobility and propagation models. The hierarchical model can promote the MRC of nodes into a state matrix of the whole network, which can avoid the state explosion in large-scale networks assessment from the perspective of complex network. Through the contrast experiments with OPNET simulation based on specific cases, the method proposed in this paper shows satisfactory performance on accuracy and efficiency.

A Design and Analysis on Network Architecture for Interactive VOD Services (대화형 VOD 서비스 구축을 위한 네트워크 구조 설계 및 분석)

  • 정승욱;정수환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1080-1087
    • /
    • 1999
  • High-speed network resources and large storage devices on video servers are necessary to Provide interactive VOD services to subscribers, therefore, building networks for VOD services requires a huge amount of cost. A number of studies on network hierarchy for distributed tree architecture, on optimized server allocation with a given network topology, and on program caching etc, are currently in progress. In this study, given specific network resources, a cost effective network architecture including the optimal number of tree levels and the optimal number of branches at a node are designed by modeling cost functions, and some restrictions on network design are discussed. The results of this study are expected to be applied to network architecture design for interactive VOD services

  • PDF

Enhancing the Robustness and Efficiency of Scale-free Network with Limited Link Addition

  • Li, Li;Jia, Qing-Shan;Guan, Xiaohong;Wang, Hengtao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1333-1353
    • /
    • 2012
  • The robustness of a network is usually measured by error tolerance and attack vulnerability. Significant research effort has been devoted to determining the network design with optimal robustness. However, little attention has been paid to the problem of how to improve the robustness of existing networks. In this paper, we investigate how to optimize attack tolerance and communication efficiency of an existing network under the limited link addition. A survival fitness metric is defined to measure both the attack tolerance and the communication efficiency of the network. We show that network topology reconfiguration optimization with limited link addition (NTRLA) problem is NP-hard. Two approximate solution methods are developed. First, we present a degree-fitness parameter to guide degree-based link addition method. Second, a preferential configuration node-protecting cycle (PCNC) method is developed to do trade-off between network robustness and efficiency. The performance of PCNC method is demonstrated by numerical experiments.

A Study on the Flow Analysis on the Software-Defined Networks through Simulation Environment Establishment (시뮬레이션 환경 구축을 통한 소프트웨어-정의 네트워크에서 흐름 분석에 관한 연구)

  • Lee, Dong-Yoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.88-93
    • /
    • 2020
  • Recently, SDN technology is applied to real communication business, users are getting bigger, and as the amount of data flowing in the network increases, interest in network data flow management is increasing. During this process, it must be ensured that the confidentiality, integrity, availability, and traceability of the data on the network being transmitted. In addition, it is necessary to develop an environment for observing the flow of data in real time on a network required in various fields and visually confirming the control. In this paper, first, Mininet is applied to construct a network topology and various environment attributes. Second, we added OpenDayLight in Mininet environment to develop a simulation environment to visually check and control network traffic flow in network topology.