• Title/Summary/Keyword: Non-shared node

Search Result 12, Processing Time 0.028 seconds

Effective Finite Element Modeling for a Large Mirror System Using Separated Node Connectivity (비공유 Node를 이용한 대구경 거울의 효율적인 유한요소 모델링)

  • Pyun, Jae-Won;Yang, Ho-Soon;Lee, Jong-Ung;Moon, Il Kweon
    • Korean Journal of Optics and Photonics
    • /
    • v.28 no.6
    • /
    • pp.304-313
    • /
    • 2017
  • The finite element analysis for optimizing a mirror system consisting of a large-diameter mirror and flexures requires numerous, repetitive calculations and corrections of the actual model to satisfy the given design conditions. In general, modification of this real model is conducted by reconfiguring nodes of the elements. The reconfiguration is very time-consuming work, to fix the continuity of each of the newly formed component nodes at the interfaces. But the process is a very important factor in determining the analysis time. To save time in modeling and actual computation, and to attain faster convergence, we present a new opto-mechanical analysis using non-shared node connections at each of the interfaces of the optical components. By comparing the results between the new element model and a conventional element model with shared node connections, we found that the opto-mechanical performance was almost the same, but the time to reach the given condition was drastically reduced.

Affinity-based Dynamic Transaction Routing in a Shared Disk Cluster (공유 디스크 클러스터에서 친화도 기반 동적 트랜잭션 라우팅)

  • 온경오;조행래
    • Journal of KIISE:Databases
    • /
    • v.30 no.6
    • /
    • pp.629-640
    • /
    • 2003
  • A shared disk (SD) cluster couples multiple nodes for high performance transaction processing, and all the coupled nodes share a common database at the disk level. In the SD cluster, a transaction routing corresponds to select a node for an incoming transaction to be executed. An affinity-based routing can increase local buffer hit ratio of each node by clustering transactions referencing similar data to be executed on the same node. However, the affinity-based routing is very much non-adaptive to the changes in the system load, and thus a specific node will be overloaded if transactions in some class are congested. In this paper, we propose a dynamic transaction routing scheme that can achieve an optimal balance between affinity-based routing and dynamic load balancing of all the nodes in the SD cluster. The proposed scheme is novel in the sense that it can improve the system performance by increasing the local buffer hit ratio and reducing the buffer invalidation overhead.

Minimizing Cost and Delay in Shared Multicast Trees

  • Koh, Seok-Joo;Yi, Jong-Hwa;Hahm, Jin-Ho;Chin, Byoung-Moon;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.22 no.1
    • /
    • pp.30-37
    • /
    • 2000
  • Existing tree construction mechanisms are classified into source-based trees and center-based trees. The source-based trees produce a source-rooted tree with a low delay. However, for the applications with multiple senders, the management overheads for routing tables and resource reservations are too high. The center-based trees are easy to implement and manage, but a priori configuration of candidate center nodes is required, and the optimization mature such as tree cost and delay is not considered. In this paper, we propose a new multicast tree building algorithm. The proposal algorithm basically builds a non-center based shared tree. In particular, any center node is not pre-configured. In the purposed algorithm, a multicast node among current tree nodes is suitably assigned to each incoming user: Such a node is selected in a fashion that tree cost and the maximum end-to-end delay on the tree are jointly minimized. The existing and proposed algorithms are compared by experiments. In the simulation results, it is shown that the proposed algorithm approximately provides the cost saving of 30% and the delay saving of 10%, compared to the existing approaches. In conclusion, we see that the cost and delay aspects for multicast trees can be improved at the cost of additional computations.

  • PDF

A Remote Cache Coherence Protocol for Single Shared Memory in Multiprocessor System (단일 공유 메모리를 가지는 다중 프로세서 시스템의 원격 캐시 일관성 유지 프로토콜)

  • Kim, Seong-Woon;Kim, Bo-Gwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.6
    • /
    • pp.19-28
    • /
    • 2005
  • The multiprocessor architecture is a good method to improve the computer system performance. The CC-NUMA provides a single shared space with the physically distributed memories is used widely in the multiprocessor computer system. A CC-NUMA has the full-mapped directory for the shared memory md uses a remote cache memory for tile fast memory access. In this paper, we propose a processing node architecture for a CC-NUMA system and a cache coherency protocol on the physically distributed but logically shared system. We show an implementation result of the system which is adopted the cache coherency protocol.

Misused key detection at cluster header in wireless sensor network (무선 센서 네트워크에서 클러스터 헤더를 통한 오용키 검출을 위한 검증 방법)

  • Park, Min-Woo;Kim, Jong-Myoung;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1116-1119
    • /
    • 2008
  • 무선 센서 네트워크는 주변 정보를 감지할 수 있는 다수의 센서들로 구성된 네트워크로 다양한 분야에서 활용되고 있다. 과거에는 무선 센서 네트워크 환경에서 각 센서들 간의 비밀통신이 중요한 이슈였으며, 특히 이를 위한 키 관리 기법들이 주요 연구방향이었다. 하지만 잘 분배되고 관리된 키라 할지라도, 공격자에 의해 특정한 센서 노드(node)가 수집되면, 노출된 노드(compromised node)가 가지고 있는 키가 공격자에게 들어나게 된다. 노출된 공유키(shared key)를 통해 노출되지 않은 정상 노드(non-compromised node) 사이의 대칭키(pairwise key)를 얻을 수 있으며 결국 공격자는 네트워크에 심각한 영향을 줄 수 있는 메시지 삽입 및 수정 공격을 감행할 수 있다. 본 논문에서는 이와 같은 공격을 탐지하고 오용된 키(misused key)를 폐기하기 위한 방법으로 DAC(detection at cluster header) 기법을 제안한다.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A performance study and IC implementation of high-speed distributed-multimedia shared medium access control protocol(part I:HCR protocol structure and performance) (고속 분산 멀티미디어 서비스를 위한 공유매체 접속제어 프로토콜의 성능분석 및 집적회로 구현 (I부:HCR 프로토콜 구조 및 성능 분석))

  • 강선무;이종필;송호준;김대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.10
    • /
    • pp.2272-2281
    • /
    • 1997
  • This paepr proposes a shared medium access control protocol for hgih-speed multimedia services of distributed subscriber home and small-sized business ATM networks. This protocol offers not only global fairness for the whole network at the same time, but also local fairness for different prioritytraffics on each node. Considering that the future B-ISDN service si a mixture of real and non-real time traffic data, this protocol is designed to accommodate the real time service, by controlling the priority of the real and non-real time data. The simulation results show that the proposed protocol has better performance than the other protocols.

  • PDF

The Medium Access Scheduling Scheme for Efficient Data Transmission in Wireless Body Area Network (WBAN 환경에서 효율적 데이터 전송을 위한 매체 접근 스케줄링 기법)

  • Jang, EunMee;Park, TaeShin;Kim, JinHyuk;Choi, SangBan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.2
    • /
    • pp.16-27
    • /
    • 2017
  • IEEE 802.15.6 standard, a Wireless Body Area Network, aims to transfer not only medical data but also non-medical data, such as physical activity, streaming, multimedia game, living information, and entertainment. Services which transfer those data have very various data rates, intervals and frequencies of continuous access to a medium. Therefore, an efficient anti-collision operations and medium assigning operation have to be carried out when multiple nodes with different data rates are accessing shared medium. IEEE 802.15.6 standard for CSMA/CA medium access control method distributes access to the shared medium, transmits a control packet to avoid collision and checks status of the channel. This method is energy inefficient and causes overhead. These disadvantages conflict with the low power, low cost calculation requirement of wireless body area network, shall minimize such overhead for efficient wireless body area network operations. Therefore, in this paper, we propose a medium access scheduling scheme, which adjusts the time interval for accessing to the shared transmission medium according to the amount of data for generating respective sensor node, and a priority control algorithm, which temporarily adjusts the priority of the sensor node that causes transmission concession due to the data priority until next successful transmission to ensure fairness.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

A Energy Efficient Misused Key Detection in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 오용키 탐지 방법)

  • Park, Min-Woo;Kim, Jong-Myoung;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1214-1217
    • /
    • 2009
  • 무선 센서 네트워크에서 각각의 센서 노드들은 무선 통신을 통해 서로 간에 통신을 수행한다. 과거에는 이러한 센서 노드간의 통신을 제 3 자로부터 안전하게 지키는 것이 중요한 보안 이슈였다. 특히 보안 서비스를 제공 하기 위한 키 관리 기법들이 주요 연구방향이었다. 하지만 안전하게 만들어진 확률론적 키(key)를 기반으로 하는 키 사전분배 방법은 공격받은 다른 노드로 인해 자신의 키가 노출 될 수 있다. 공격자는 노출된 공유키(shared key)를 통해 노출되지 않은 정상 노드(non-compromised node) 사이의 대칭키(pairwise key)를 얻을 수 있으며, 공격자는 네트워크에 심각한 영향을 줄 수 있는 메시지 삽입 및 수정 공격을 감행할 수 있다. 이와 같은 오용된 키를 폐기하고 메시지 삽입 및 수정 공격을 막기 위해 Liu and Dong 은 오용키 탐지 방법을 제안하였다. 하지만 이들의 방법에는 한계점이 있어 이를 보완하기 위한 에너지 효율적인 오용키 탐지 기법을 제안한다.