• 제목/요약/키워드: Node/link Network Model

검색결과 79건 처리시간 0.028초

Cooperation Models and Cooperative Routing for Exploiting Hop-by-Hop Cooperative Diver sity in Ad Hoc Networks

  • Shin, Hee-Wook;Moh, Sang-Man;Chung, Il-Yong
    • 한국멀티미디어학회논문지
    • /
    • 제14권12호
    • /
    • pp.1559-1571
    • /
    • 2011
  • In wireless ad hoc networks, nodes communicate with each other using multihop routed transmission in which hop-by-hop cooperative diversity can be effectively employed. This paper proposes (i) two cooperation models for per-link cooperation (PLC) and per-node cooperation (PNC) for exploiting cooperative diversity in wireless ad hoc networks and (ii) a cooperative routing algorithm for the above models in which best relays are selected for cooperative transmission. First, two cooperation models for PLC and PNC are introduced and represented as an edge-weighted graph with effective link quality. Then, the proposed models are transformed into a simplified graph and a cooperative routing algorithm with O(n2) time is developed, where n is the number of nodes in the network. The effectiveness of the algorithm is confirmed for the two cooperation models using simulation.

중간재고점(中間在庫點) 최적위치선정(最適位置選定)에 관(關)한 연구(硏究) (A Study on the Optimal Location of Physical Distribution Centers)

  • 김만식
    • 대한산업공학회지
    • /
    • 제1권2호
    • /
    • pp.39-49
    • /
    • 1975
  • The problem treated is that of locating distribution centers(depot) in a network, so as to minimize the total cost which is the sum of transportation cost, (from factory to centers and from centers to demand points), construction cost, inventory cost and traffic increasing cost. This problem is mathematically an integer program and a non-linear model. This study avoids various inefficient aspects, which many studies have shown, by introducing a matrix notation, node and link function. An algorithm, for determining the optimal location of distribution center which has zone in which demand points are located at some node of a network, is presented. Finally this paper describes a numerical example and discusses its results.

  • PDF

일반가로망에서 교통정보제공을 위한 n-path 알고리듬의 개발 (Development of a n-path algorithm for providing travel information in general road network)

  • 임용택
    • 대한교통학회지
    • /
    • 제22권4호
    • /
    • pp.135-146
    • /
    • 2004
  • 교통정보에 의한 교통량분산 효과를 실질적으로 얻기 위해서는 좌회전금지, U-turn, P-turn과 같은 교차로내 회전제약이 존재하는 일반 가로망에서 적정수의 경로를 도출하여 제공해야 한다. 이를 위하여 k-path 알고리듬이 주로 이용되고 있으나 도출된 경로들간에 중복성이 문제가 되고 있다. 본 연구는 교차로내 회전제약들을 고려하면서 교통정보제공을 위한 n개의 최단경로탐색(n-path) 알고리듬을 개발하는 데 연구의 목적이 있다 여기서 n-path 알고리듬은 기존 k-path 알고리듬과는 차이가 있는데, k-path 알고리듬은 기종점간 통행비용을 기초로 첫 번째 최단경로외 2번째 최단경로, 3번째 최단경로,....식으로 k개의 최단경로를 찾는 데 비해, n-path 알고리듬은 각 경로간 일정수준 이상의 경로중첩(path overlap)이 발생하지 않도록 하면서 n개의 경로를 탐색하는 방법이다. 이를 위하여 첫 번째 탐색된 경로를 중심으로 통행비용과 경로중복수준을 판단하여 이후 경로들을 탐색하게 된다. 또한, 본 연구에서 제시하는 n-path 알고리듬은 기존 연구와는 달리 교차로상 회전제약을 반영하기 위하여 가로망을 확장할 필요가 없다는 장점이 있다. 개발된 알고리듬을 몇 개의 예제 네트워크에 적용하여 평가하였으며 평가결과 원하는 결과를 도출하고 있음을 확인할 수 있었다.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

소형자동궤도차량 시스템의 그래프 모델 기반 수송능력 추정 (Traffic Capacity Estimate of Personal Rapid Transit System based on Digraph Model)

  • 원진명
    • 제어로봇시스템학회논문지
    • /
    • 제13권3호
    • /
    • pp.263-267
    • /
    • 2007
  • This study proposes a new methodology to estimate the traffic capacity of a personal rapid transit(PRT) system. The proposed method comprises three steps. The first step models the guideway network(GN) of PRT as a digraph, where its node and link represent a station and a one-way guideway link between two stations, respectively. Given local vehicle control strategies, the second step formulates the local traffic capacities through the nodes and links of the GN model. The third step estimates the worst-case local traffic demands based on a shortest-path routing algorithm and an empty vehicle allocation algorithm. By comparing the traffic estimates to the local traffic capacities, we can determine the feasibility of the given GN in traffic capacity.

물리적 통신망의 이중연결성을 위한 확장 문제에 관한 연구

  • 이희상;안광모
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 1996년도 춘계공동학술대회논문집; 공군사관학교, 청주; 26-27 Apr. 1996
    • /
    • pp.83-86
    • /
    • 1996
  • In this paper we study the problem of augmenting a physical network to improve the topology for new survivable network architectures. We are given a graph G=(V,E,F), where V is a set of nodes that represents transmission systems which be interconnected by physical links, and E is a collection of edges that represent the possible pairs of nodes between which a direct transmission link can be placed. F, a subset of E is defined as a set of the existing direct links, and E/F is defined as a set of edges for the possible new connection. The cost of establishing network $N_{H}$=(V,H,F) is defined by the sum of the costs of the individual links contained in new link set H. We call that $N_{H}$=(V,H,F) is feasible if certain connectivity constrints can be satisfied in $N_{H}$=(V,H,F). The computational goal for the suggested model is to find a minimum cost network among the feasible solutions. For a k edge (node) connected component S .subeq. F, we charactrize some optimality conditions with respect to S. By this characterization we can find part of the network that formed by only F-edges. We do not need to augment E/F edges for these components in an optimal solution. Hence we shrink the related component into a node. We study some good primal heuristics by considering construction and exchange ideas. For the construction heuristics, we use some greedy methods and relaxation methods. For the improvement heuristics we generalize known exchange heuristics such as two-optimal cycle, three-optimal cycle, pretzel, quezel and one-optimal heuristics. Some computational experiments show that our heuristic is more efficient than some well known heuristics.stics.

  • PDF

이동 Ad Hoc 네트워크 환경에서 클러스터링 구조에 기반한 인증 메커니즘 (An Authentication Mechanism Based on Clustering Architecture in Mobile Ad Hoc Networks)

  • 이도;신용태
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.1461-1464
    • /
    • 2005
  • In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories, but those are not well-suited for securing ad hoc networks. Moreover, a fundamental issue of securing mobile ad hoc networks is to ensure mobile nodes can authenticate each other. Because of its strength and efficiency, public key and digital signature is an ideal mechanism to construct the authentication service. Although this is already mature in the internet application, providing public key based authentication is still very challenging in mobile ad hoc networks. In this paper I propose a secure public key authentication service based on clustering model and trust model to protect nodes from getting false public keys of the others efficiently when there are malicious nodes in the network.

  • PDF

통신모형의 구조적인 지식과 객체형 데이터를 이용한 망설계시스템 (A design system of telecommunication networks using structural knowledge and object data)

  • 김철수
    • 경영과학
    • /
    • 제14권1호
    • /
    • pp.205-227
    • /
    • 1997
  • Higher level representation splay an important role in model management systems. The role is to make decision makers friendly represent their problem using the representations. In this research, we address higher level representations including five distinctivenesses: Objective, Node, Link, Topological Constraint including five components, and Decision, Therefore, it is developed a system called HLRNET that implements the building procedure of network models using structural knowledge and object data The paper particularly elaborates all components included in each of distinctiveness extracted from structural characteristics of a lot of telecommunication network models. Higher level representations represented with five destinctivenesses should be converted into base level representations which are employed for semantic representations of linear and integer programming problems in a knowledge-assisted optimization modeling system. The system is illustrated with an example of the local access network model.

  • PDF

이동성을 고려한 이동 애드혹 네트워크 성능분석 (The Performance Analysis of the Mobile Ad-Hoc Network Considering the Mobility of Nodes)

  • 정석윤;허선;남진규
    • 산업경영시스템학회지
    • /
    • 제29권1호
    • /
    • pp.18-25
    • /
    • 2006
  • In mobile ad-hoc networks(MANETs), nodes are mobile and network topology changes very frequently. The mobility of nodes does affect the system performance. There has been considerable attention on the mobility models, however, most work is confined to the simulation or test-bed. In this paper, we propose an analytical method to evaluate the performances of MANETs such as the average radio range dwell time of mobile nodes, link holding time, and transmission failure probability considering the node's mobility. In the proposed model, MANETs consist of the multi-hop and multicasting routing paths. A simulation is done to validate our proposed analytical model.

A Possible Path per Link CBR Algorithm for Interference Avoidance in MPLS Networks

  • Sa-Ngiamsak, Wisitsak;Varakulsiripunth, Ruttikorn
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.772-776
    • /
    • 2004
  • This paper proposes an interference avoidance approach for Constraint-Based Routing (CBR) algorithm in the Multi-Protocol Label Switching (MPLS) network. The MPLS network itself has a capability of integrating among any layer-3 protocols and any layer-2 protocols of the OSI model. It is based on the label switching technology, which is fast and flexible switching technique using pre-defined Label Switching Paths (LSPs). The MPLS network is a solution for the Traffic Engineering(TE), Quality of Service (QoS), Virtual Private Network (VPN), and Constraint-Based Routing (CBR) issues. According to the MPLS CBR, routing performance requirements are capability for on-line routing, high network throughput, high network utilization, high network scalability, fast rerouting performance, low percentage of call-setup request blocking, and low calculation complexity. There are many previously proposed algorithms such as minimum hop (MH) algorithm, widest shortest path (WSP) algorithm, and minimum interference routing algorithm (MIRA). The MIRA algorithm is currently seemed to be the best solution for the MPLS routing problem in case of selecting a path with minimum interference level. It achieves lower call-setup request blocking, lower interference level, higher network utilization and higher network throughput. However, it suffers from routing calculation complexity which makes it difficult to real task implementation. In this paper, there are three objectives for routing algorithm design, which are minimizing interference levels with other source-destination node pairs, minimizing resource usage by selecting a minimum hop path first, and reducing calculation complexity. The proposed CBR algorithm is based on power factor calculation of total amount of possible path per link and the residual bandwidth in the network. A path with high power factor should be considered as minimum interference path and should be selected for path setup. With the proposed algorithm, all of the three objectives are attained and the approach of selection of a high power factor path could minimize interference level among all source-destination node pairs. The approach of selection of a shortest path from many equal power factor paths approach could minimize the usage of network resource. Then the network has higher resource reservation for future call-setup request. Moreover, the calculation of possible path per link (or interference level indicator) is run only whenever the network topology has been changed. Hence, this approach could reduce routing calculation complexity. The simulation results show that the proposed algorithm has good performance over high network utilization, low call-setup blocking percentage and low routing computation complexity.

  • PDF