• Title/Summary/Keyword: Node Management

Search Result 1,126, Processing Time 0.026 seconds

A Study on Developing an Integrated Model of Facility Location Problems and Safety Stock Optimization Problems in Supply Chain Management (공급사슬관리에서 생산입지선정 문제와 안전재고 최적화 문제의 통합모형 개발에 관한 연구)

  • Cho Geon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.31 no.1
    • /
    • pp.91-103
    • /
    • 2006
  • Given a bill of materials (BOM) tree T labeled by the breadth first search (BFS) order from node 0 to node n and a general network ${\Im}=(V,A)$, where V={1,2,...,m} is the set of production facilities and A is the set of arcs representing transportation links between any of two facilities, we assume that each node of T stands for not only a component. but also a production stage which is a possible stocking point and operates under a periodic review base-stock policy, We also assume that the random demand which can be achieved by a suitable service level only occurs at the root node 0 of T and has a normal distribution $N({\mu},{\sigma}^2)$. Then our integrated model of facility location problems and safety stock optimization problem (FLP&SSOP) is to identify both the facility locations at which partitioned subtrees of T are produced and the optimal assignment of safety stocks so that the sum of production cost, inventory holding cost, and transportation cost is minimized while meeting the pre-specified service level for the final product. In this paper, we first formulate (FLP&SSOP) as a nonlinear integer programming model and show that it can be reformulated as a 0-1 linear integer programming model with an exponential number of decision variables. We then show that the linear programming relaxation of the reformulated model has an integrality property which guarantees that it can be optimally solved by a column generation method.

PTP Management Node-based Time Synchronization Error Detection and Recovery System (PTP Management Node 기반 시각동기 오류 검출 및 대응 시스템)

  • Kim, Yoon Hyun;Son, Kyou Jung;Seo, Young Duk;Chang, Tae Gyu
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.248-253
    • /
    • 2020
  • This paper proposed PTP(Precision Time Protocol) management node-based time synchronization error detection and recovery system. The proposed system is to maintain the preciseness of time synchronization under time synchronization error situations on IEEE 1588-based network environment. To demonstrate the proposed time synchronization error detection and recovery system, PTP implemented EVM(Evaluation Module)-based experiments were performed. As a results of the experiments, it is shown that the proposed system effectively maintains the preciseness of time synchronization under time synchronization error situations.

An E2E Mobility Management and TCP Flow Control Scheme in Vertical Handover Environments (버티컬 핸드오버 환경에서 종단간 이동성 관리 및 TCP 흐름 제어기법)

  • Seo Ki-nam;Lim Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.387-395
    • /
    • 2005
  • In this paper, we propose an end-to-end mobility management and TCP flow control scheme which considers different link characteristics for vertical handover environments. The end-to-end mobility management is performed by using SIP protocol. When a mobile node moves to a new network, it informs its movement of the correspondent node by sending SIP INFO message containing a new IP address which will be used in the new network. And then the corresponding node encapsulates all packets with the new IP address and sends them to the mobile node. in general, RTT of WLAN is shorter than RTT of cdma2000. when the MN moves from WLAN network to cdma2000 network, TCP retransmission timeout will be occurred in spite of non congestion situations. Thus, TCP congestion window size will be decreased and TCP throughput will be also decreased. To prevent this phenomenon, we propose a method using probe packets after handover to estimate a link delay of the new network. We also propose a method using bandwidth ratio of each network to update RTT. It is shown through NS-2 simulations that the proposed schemes can have better performance than the previous works.

SNMP-based Management for Mobile Network Devices (SNMP 기반의 이동형 네트워크 장비 관리 기법)

  • Kwak, Deuk-Whee;Lee, Hyun-Yong;Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.557-566
    • /
    • 2008
  • Some types of network nodes such as mobile network node, mobile access point, and ad-hoc network node can be relocated frequently and, by the nature of its usage, are deployed over broad area. In this environment, the network topology is changed constantly since even the manager node as well as the managed nodes can leave or join the management network frequently. The many of existing network management technologies are mostly for small sized and homogeneous networks with static topologies and not proper for the mobile network devices. In this paper, employing peer-to-peer (P2P), the secure group communication techniques, and simple network management protocol (SNMP), we propose a highly secure and available management technique that can be used to manage the mobile network nodes through insecure management network such as the Internet. The proposed technique is implemented to show that it is practically usable.

Network Attacks Visualization using a Port Role in Network Sessions (트래픽 세션의 포트 역할을 이용한 네트워크 공격 시각화)

  • Chang, Beomhwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.47-60
    • /
    • 2015
  • In this paper, we propose a simple and useful method using a port role to visualize the network attacks. The port role defines the behavior of the port from the source and destination port number of network session. Based on the port role, the port provides the brief security features of each node as an attacker, a victim, a server, and a normal host. We have automatically classified and identified the type of node based on the port role and security features. We detected and visualized the network attacks using these features of the node by the port role. In addition, we are intended to solve the problems with existing visualization technologies which are the reflection problem caused an undirected network session and the problem caused decreasing of distinct appearance when occurs a large amount of the sessions. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacker, victim, server, and hosts. In addition, by providing a categorized analysis of network attacks, this method can more precisely detect and distinguish them from normal sessions.

Improving the Simulation of a Mobile Patient Monitoring System for Node Diversification and Loss Minimization (노드 다변화 및 손실률 최소화를 위한 이동환자 상시 모니터링 시스템 시뮬레이션 개선 연구)

  • Choi, Eun Jung;Kim, Myuhng Joo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.15-22
    • /
    • 2011
  • U-Healthcare service is a real-time service using the vital signs which are continuously transferred from monitoring sensors attached to mobile patients under the wireless network environments. It should monitor the health condition of mobile patients everywhere at any time. In this paper, we have improved two features of the three layered mobile patient monitoring system with load balancing ability. First, the simulation process has been improved by allowing the number of related nodes to be changed. Secondly, we have modified S node to which queue is added to reduce the loss rate of collecting data from patients during the delay of S node process. And the data from the patient with high priority can be transferred to the server immediately through the filtering function. Furthermore, we have solved the problem of redundancy in sharing information among S nodes by differentiating process time to each S node. By performing a DEVS Java-based system simulation, we have verified the efficiency of this improved system.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

A Bluetooth Scatternet Formation Algorithm based on Hardware Implementation (하드웨어 구현을 기반으로 한 블루투스 스캐터넷 형성 알고리즘)

  • 이한욱;고상근
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.314-326
    • /
    • 2004
  • Bluetooth has been reputed as a wireless ad-hoc networking technology supplying scalable and extensible networks between digital devices. For that kind of networks, scatternet is a most essential part in bluetooth. But past researches on bluetooth scatternet has proposed only possibilities of scatternet algorithm based on simulation results. And many of the researches failed in guaranteeing extensibility and flexibility and had many difficulties in real hardware implementation. In this paper, we proposed node ring scatternet(NRS) algorithm guaranteeing extensible and flexible networks. NRS algorithm is designed for hardware implementation using real commercial bluetooth module. That algorithm is divided into initial formation and reformation. For initial formation, we proposed limited SEEK/SCAN algorithm. For reformation, we proposed DIAC algorithm and Reserved Recovery Node algorithm. And we proposed SFMP(Scatternet Formation & Management Protocol) in protocol stack for real implementation. NRS algorithm is operated in SFMP. Finally, we performed real hardware experiments and evaluated the proposed algorithm. In that experiments, we succeeded in forming scatternet up to 20 nodes. In comparison with other similar algorithm, proposed algorithm have the improvement in scatternet formation delay and success rate.

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.98-106
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Autonomous Management of a Web Server Cluster Using Jini Technology (Jini를 이용한 웹 서버 클러스터의 자율 관리 기법)

  • Lee, Chul;Park, Kyu-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.65-68
    • /
    • 2003
  • In this paper, we consider issues related to the autonomous management of a server cluster Server clustering technique is widely used for high available Internet servers such as a web server, because it provides very scalable and reliable service. However, it is very burden-some to manage the cluster system. For instance, installation or configuration of a new node requires skilled administrators. Also, when a node is failed, it should be recognized and recovered by a human. The management complexity gets higher while increasing the number of machines for higher throughput. Here, we are going to alleviate the management complexity by building an autonomous cluster server with Jini $_{TM}$ technology from Sun Microsystems.

  • PDF