• Title/Summary/Keyword: Node-Link Model

Search Result 112, Processing Time 0.029 seconds

A Study on Higher Level Representations of Network Models for Optical Fiber Telecommunication Networks Design (광통신망 설계를 위한 네트워크 모형의 상위수준 표현에 관한 연구)

  • Kim, Cheol-Su
    • Asia pacific journal of information systems
    • /
    • v.6 no.2
    • /
    • pp.125-148
    • /
    • 1996
  • This paper is primarily focused on the function of model management systems such as higher level representations and buildings of optimization models using them, especially in the area of the telecommunication network models. This research attempts to provide the model builders an intuitive language-namely higher level representation-using five distinctivenesses : Objective, Node, Link, Topological Constraint including five components, and Decision. The paper elaborates all components included in each of distinctivenesses extracted from structural characteristics of typical telecommunication network models. Higher level representations represented with five distinctivenesses should be converted into base level representations which are employed for semantic representations of linear and integer programming problems in knowledge: assisted optimization modeling system(UNIK-OPT). Furthermore, for formulating the network model using higher level representations, the reasoning process is proposed. A system called UNIK-NET is developed to implement the approach proposed in this research, and the system is illustrated with an example of the network model.

  • PDF

Bond-slip effect in steel-concrete composite flexural members: Part 1 - Simplified numerical model

  • Lee, WonHo;Kwak, Hyo-Gyoung;Hwang, Ju-young
    • Steel and Composite Structures
    • /
    • v.32 no.4
    • /
    • pp.537-548
    • /
    • 2019
  • This paper introduces an improved numerical model which can consider the bond-slip effect in steel-concrete composite structures without taking double nodes to minimize the complexity in constructing a finite element model. On the basis of a linear partial interaction theory and the use of the bond link element, the slip behavior is defined and the equivalent modulus of elasticity and yield strength for steel is derived. A solution procedure to evaluate the slip behavior along the interface of the composite flexural members is also proposed. After constructing the transfer matrix relation at an element level, successive application of the constructed relation is conducted from the first element to the last element with the compatibility condition and equilibrium equations at each node. Finally, correlation studies between numerical results and experimental data are conducted with the objective of establishing the validity of the proposed numerical model.

Optimal Design of Irrigation Pipe Network with Multiple Sources

  • Lyu, Heui-Jeong;Ahn, Tae-Jin
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.39 no.2
    • /
    • pp.9-18
    • /
    • 1997
  • Abstract This paper presents a heuristic method for optimal design of water distribution system with multiple sources and potential links. In multiple source pipe network, supply rate at each source node affects the total cost of the system because supply rates are not uniquely determined. The Linear Minimum Cost Flow (LMCF) model may be used to a large scale pipe network with multiple sources to determine supply rate at each source node. In this study the heuristic method based on the LMCF is suggested to determine supply rate at each source node and then to optimize the given layout. The heuristic method in turn perturbs links in the longest path of the network to obtain the supply rates which make the optimal design of the pipe network. Once the best tree network is obtained, the frequency count of reconnecting links by considering link failure is in turn applied to form loop to enhance the reliability of the best tree network. A sample pipe network is employed to test the proposed method. The results show that the proposed method can yield a lower cost design than the LMCF alone and that the proposed method can be efficiently used to design irrigation systems or rural water distribution systems.

  • PDF

Optimization of Transportation Problem in Dynamic Logistics Network

  • Chung, Ji-Bok;Choi, Byung-Cheon
    • Journal of Distribution Science
    • /
    • v.14 no.2
    • /
    • pp.41-45
    • /
    • 2016
  • Purpose - Finding an optimal path is an essential component for the design and operation of smart transportation or logistics network. Many applications in navigation system assume that travel time of each link is fixed and same. However, in practice, the travel time of each link changes over time. In this paper, we introduce a new transportation problem to find a latest departing time and delivery path between the two nodes, while not violating the appointed time at the destination node. Research design, data, and methodology - To solve the problem, we suggest a mathematical model based on network optimization theory and a backward search method to find an optimal solution. Results - First, we introduce a dynamic transportation problem which is different with traditional shortest path or minimum cost path. Second, we propose an algorithm solution based on backward search to solve the problem in a large-sized network. Conclusions - We proposed a new transportation problem which is different with traditional shortest path or minimum cost path. We analyzed the problem under the conditions that travel time is changing, and proposed an algorithm to solve them. Extending our models for visiting two or more destinations is one of the further research topics.

Trust Based Authentication and Key Establishment for Secure Routing in WMN

  • Akilarasu, G.;Shalinie, S. Mercy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4661-4676
    • /
    • 2014
  • In Wireless Mesh Networks (WMN), an authentication technique can be compromised due to the distributed network architecture, the broadcast nature of the wireless medium and dynamic network topology. Several vulnerabilities exist in different protocols for WMNs. Hence, in this paper, we propose trust based authentication and key establishment for secure routing in WMN. Initially, a trust model is designed based on Ant Colony Optimization (ACO) to exchange the trust information among the nodes. The routing table is utilized to select the destination nodes, for which the link information is updated and the route verification is performed. Based on the trust model, mutual authentication is applied. When a node moves from one operator to another for accessing the router, inter-authentication will be performed. When a node moves within the operator for accessing the router, then intra-authentication will be performed. During authentication, keys are established using identity based cryptography technique. By simulation results, we show that the proposed technique enhances the packet delivery ratio and resilience with reduced drop and overhead.

A Study on the Performance of BITBUS Network as a Field Bus (Field Bus로서의 BITBUS Network에 대한 성능 연구)

  • 성백문;임동민;이황수;은종관
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.12
    • /
    • pp.1947-1955
    • /
    • 1989
  • With the increasing complexity of cabling at sensory level in process control and manufacturing automation, field buses were introduced to replace the traditional point to point links from each sensor or acruator to its controlling equipments by a single link on which all information is transmitted seriall and multiplexed in time. In this papr, we introduce the BITBUS network as a field bus. For the service discipline of the BITBUS network, two service strategies are proposed to obtain the performance of the network. They are the equal priority cyclic service strategy and the non-equal priority cyclic service strategy. The former assigns equal priority to each node for polling and the latter assumes non-equal priority. The BITBUS network was modeled as a cyclic queueing model and it is analyzed by two methods: the Kuehn's and the Boxma's. Computer simulation was also done for the cyclic queueing model and simulation results were compared with those. Under mathematically non-analyzable environment, only the computer simulation was done. From the simulation result, in order to meet the response time requirement of 5 msec imposed by International Electrotechnical Commission when each node has the average traffic of 5000 messages/sec in manufacturing automation the number of slave nodes should be smaller than 10 at the transmission rate of 2.5 Mbps.

  • PDF

Implementation and Experimental Evaluation of Bandwidth Allocation Scheme on PROFIBUS (PROFIBUS에서 대역폭 할당 기법 구현 및 실험적 평가)

  • Hong, Seung-Ho;Kim, Yu-Chul;Kim, Ji-Yong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.11
    • /
    • pp.943-954
    • /
    • 2000
  • Fieldbus is the lowest level industrial network in the communication hierarchy of factory automation and distributed process control systems. Data generated from field devices are largely divided into three categories : time-critical, periodic and time-available data. Because these data share one fieldbus medium, it needs a method that allocates these data to the bandwidth-limited fieldbus medium. This paper introduces an implementation method of bandwidth allocation scheme on PROFIBUS. In order to implement bandwidth allocation scheme on PROFIBUS, the following functions need to be supplemented on the FDL(Fieldbus Datalink Layer) protocol: (i) separation of medium bandwidth into periodic and non-periodic intervals, (ii) synchronization of node timers over a local link. In order to examine the validity of bandwidth allocation scheme on PROFIBUS, this paper develops an experimental model of a network system. The results obtained from the experimental model show that the bandwidth allocation scheme satisfies the performance requirement of time-critical, periodic and time-available data.

  • PDF

A Study on Network Hierarchy Model which uses a Dynamic Segmentation Technique (동적 분할 기법을 이용한 네트워크 계층 모델에 관한 연구)

  • Joo, Yong-Jin;Lee, Yong-Ik;Moon, Kyung-Ky;Park, Soo-Hong
    • Spatial Information Research
    • /
    • v.14 no.2 s.37
    • /
    • pp.245-260
    • /
    • 2006
  • A practical use of the location information and user requirement are increased in a mobile environment which supports the portability. And Various service which GIS is related with a Spatial DB have been processed. Generally, logical relation of a traffic network which organizes the Road DB uses a basic node-link structure. In this way, Designed structure can not be flexible at various model apply and are not efficient with a database retrieval in a maintenance management side. In this research, We supplement with the problem of a existing network model and the limitation of the building through the design of a network model which uses dynamic segmentation. And we tried to implement efficient hierarchy model at the retrieval of the network and presentation. Designed model supports a stage presentation of various level and a hierarchy entity relation and We are expected to supplement a network spatial modelling function which the GIS has.

  • PDF

A Route Stability-based Direction Guided Routing Protocol in Mobile Ad-hoc Wireless Networks (모바일 Ad-hoc 무선 네트워크에서 경로 안정성 기반 방향성 안내 라우팅 프로토콜)

  • Ha, Suehyung;Le, The Dung;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.257-264
    • /
    • 2012
  • In this paper, we propose a Route Stability-based Direction Guided Routing protocol(RSDGR) in mobile ad-hoc wireless networks. The main features and contributions of the proposed routing protocol are as follows. First, it can calculate link stability between two nodes as well as route stability of multi hop quantitatively by using nodes' mobility. And this protocol can establish the most stable path between a source node and a destination node. Second, according to the route stability between a source node and a destination node, it can control and optimize the direction guided region dynamically for route setup. Third, we suggest theoretical model for quantitative calculation of link stability between two nodes and route stability of multi hop path. The performance evaluation of the proposed routing protocol is performed by simulation using OPNET(Optimized Network Engineering Tool) and theoretical analysis. The results of performance evaluation show that the patterns of PDR are similar in simulation and analysis according to route stability. The faster mobile nodes' velocity and the smaller source node's direct guided reigion, the lower route stability and PDR and the higher delay and control overhead related to this.

Internet Worm Propagation Model Using Centrality Theory

  • Kwon, Su-Kyung;Choi, Yoon-Ho;Baek, Hunki
    • Kyungpook Mathematical Journal
    • /
    • v.56 no.4
    • /
    • pp.1191-1205
    • /
    • 2016
  • The emergence of various Internet worms, including the stand-alone Code Red worm that caused a distributed denial of service (DDoS), has prompted many studies on their propagation speed to minimize potential damages. Many studies, however, assume the same probabilities for initially infected nodes to infect each node during their propagation, which do not reflect accurate Internet worm propagation modelling. Thus, this paper analyzes how Internet worm propagation speed varies according to the number of vulnerable hosts directly connected to infected hosts as well as the link costs between infected and vulnerable hosts. A mathematical model based on centrality theory is proposed to analyze and simulate the effects of degree centrality values and closeness centrality values representing the connectivity of nodes in a large-scale network environment on Internet worm propagation speed.