• 제목/요약/키워드: Ns-2

검색결과 1,725건 처리시간 0.026초

4m$\times$4m 진동대를 이용한 구조모델의 동적실험 (Dynamic Test of Structural Models Using 4m $\times$ 4m Shaking Table)

  • 이한선
    • 한국지진공학회:학술대회논문집
    • /
    • 한국지진공학회 1997년도 춘계 학술발표회 논문집 Proceedings of EESK Conference-Fall 1997
    • /
    • pp.207-214
    • /
    • 1997
  • The objective of this study is to review the current stare of earthquake simulation techniques using the shaking table and check the reliability. One degree-of-freedom(d.o.f.)and three d.o.f. aluminium shear models were used and 4m$\times$4m 6 d.o.f. shaking table was excitated in one horizontal direction to simulate 1940 El centro earthquake accelerogram (NS component). When the acceleration history of shaking table is compared to the desired one, it can be found that the overall histories are very similar, but that the lower frequency range (0~2 Hz) of the actual excitation has generally lower amplitude than that of the desired in fourier transform amplitude. Free vibration and white noise tests have shown almost the same values for natural frequencies, but shown quite different values for damping ratios, that is, 1.37% in case of r\free vibration test vs 14.76% in case of white noise test. The time histories of story shear versus story drift show the globally linear elastic behaviors. But the elliptical shape of the histories with one of the axis being the stiffness of the story implies the effect of viscous damping.

  • PDF

우리나라에서 불법 유통되는 메스암페타민의 불순물 프로화일 분석 (Impurity Profiling Analysis of Illicit Methamphetamine Seized in Korea)

  • 유영찬;정희선;김은미;김선춘;김승환
    • 약학회지
    • /
    • 제42권6호
    • /
    • pp.627-633
    • /
    • 1998
  • Impurity profiling analysis of methamphetamine seized in Korea was investigated for the evidential and intelligent purpose. Samples were extracted with ethylacetate which contai ns internal standard of dioctylsebacate under basic condition and extracts were analyzed by GC-FID. Ephedrine, chloroephedrine & 1,2-dimethyl-3-phenylaziridine were identified impurities in illicit methamphetamine by GC-MS. These impurities revealed that most of abused methamphetamine in Korea were synthesized from ephedrine as a starting material. For the classification of samples. firstly, 24 impurity peaks were selected after inspection of every peak in 50 samples as the specific markers of impurities. Secondly, corresponding peak retention time and area ratio to the internal standard were calculated and database was created with values of 24 peaks by in-house program. Finally, cluster analysis was attempted with the resultant profiles using the STAR plot, which was based on the Euclidian distance for evaluating similarity among samples. A total of 76 samples were divided into 8 different groups within 90% statistical similarity and inter-batch samples showed similar impurity patterns by this procedure. In conclusion, the analysis of impurities is a suitable index for estimation the common or different origin of methamphetamine sample.

  • PDF

Mobile IP에서의 Active Routing을 응용한 SNMP 정보기반 라우팅 (SNMP Information Based Routing Applying Active Routing in Mobile IT)

  • 박수현;장한이;백두권;이이섭
    • 한국IT서비스학회:학술대회논문집
    • /
    • 한국IT서비스학회 2003년도 춘계학술대회
    • /
    • pp.550-559
    • /
    • 2003
  • mobile IP는 단순히 이동성을 지원하는 것만을 목표로 제안되었기 때문에, 새로운 네트워크로의 연결만을 보장할 뿐, 핸드오프 후의 QoS는 보장하지 못한다. mobile IT에서 QoS는 이동 환경에서 멀티미디어 서비스나 실시간 서비스 제공 시 매우 중요시 되는 문제로, 핸드오프에 의한 지연과 밀접히 연관되어있다. 이에 따라 이동 환경에서 QoS를 보장하기 위해, 핸드오프 지연 문제는 주요 이슈로서 활발히 연구되고 있다. 본 논문에서는 이러한 문제를 해결하기 위해, 선행 연구로 액티브 네트워크에서의 정보기반 라우팅에 키워드 관리 방법을 추가한 SNMP 정보 기반 라우팅을 제시하고, 이를 이용하여 핸드오프 지연을 최소화하는 QoS 향상 기법을 제시한다. 또한 라우팅 컨버전스 시간을 설정하여 기존 핸드오프 방법과 함께 제시한 기법에서 필요한 요소를 모델링한 후 NS-2를 사용하여 시뮬레이션 하였다. 시뮬레이션 결과는 제시한 기법이 핸드오프 지연을 최소화함으로써, 결과적으로 QoS가 향상되었음을 입증한다.

  • PDF

모바일 IP 네트워크를 위한 액티브 라우팅 매커니즘 (Active Routing Mechanism for Mobile IP Network)

  • Soo-Hyun Park;Hani Jang;Lee-Sub Lee;Doo-Kwon Baik
    • 한국시뮬레이션학회논문지
    • /
    • 제12권3호
    • /
    • pp.55-68
    • /
    • 2003
  • As mobile IP has been suggested only to support mobility of mobile station(MS) by which it dose nothing but guarantee MS's new connection to the network, it is for nothing in Quality of Service(QoS) after handoff of MS. QoS is very important factor in mobile IP network to provide multimedia applications and real-time services in mobile environment, and it is closely related to handoff delay Therefore as a main issue in mobile IP research area, handoff delay problem is actively studied to guarantee and promote QoS. In this paper, in order to resolve such a problem, we suggest Simple Network Management Network(SNMP) information-based routing that adds keyword management method to information-based routing in active network, and then propose QoS controlled handoff by SNMP information-based routing. After setting up routing convergence time, modeling of suggested method and existing handoff method is followed in order to evaluate the simulations that are carried out with NS-2. The result of simulation show the improvement of handoff delay, and consequently it turns off the QoS has been improved considerably.

  • PDF

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • 제37권6호
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.

시간 지연을 고려한 TCP Vegas 네트웍의 이산 시간 모델링 및 안정성 분석 (Discrete time modeling and stability analysis of TCP Vegas network with delay)

  • 유병용;구경모;이진수
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.849-850
    • /
    • 2006
  • This thesis presents a new analysis method of Vegas network model in single link single source and a new version of Vegas for expanding asymptotically stable region. Actually since original Vegas model is difficult to analysis, we use a modified Vegas network model. Since there is a few tools to analyze nonlinear system with delay, developing other methods is very important and useful. We used state space model in discrete time. Using by Jury's criterion, we could find asymptotically stable region of Vegas network model. And it was a if and only if condition. Moreover, we proposed a new version of Vegas algorithm. To expand asymptotically stable region we modified the original Vegas model. The new analysis method and new Vegas algorithm were justified by ns-2 simulation. And as compare with other result, we could know our method has many advantages.

  • PDF

A Comparative Study of Two Diagnostic Methods Based on the Switching Voltage Pattern for IGBT Open-Circuit Faults in Voltage-Source Inverters

  • Wang, Yuxi;Li, Zhan;Xu, Minghui;Ma, Hao
    • Journal of Power Electronics
    • /
    • 제16권3호
    • /
    • pp.1087-1096
    • /
    • 2016
  • This paper reports an investigation conducted on two diagnostic methods based on the switching voltage pattern of IGBT open-circuit faults in voltage-source inverters (VSIs). One method was based on the bridge arm pole voltage, and the other was based on bridge arm line voltage. With an additional simple circuit, these two diagnostic methods detected and effectively identified single and multiple open-circuit faults of inverter IGBTs. A comparison of the times for the diagnosis and anti-interference features between these two methods is presented. The diagnostic time of both methods was less than 280ns in the best case. The diagnostic time for the method based on the bridge arm pole voltage was less than that of the method based on the bridge arm line voltage and was 1/2 of the fundamental period in the worst case. An experimental study was carried out to show the effectiveness of and the differences between these two methods.

A Simulation-Based Study of FAST TCP Compared to SCTP: Towards Multihoming Implementation Using FAST TCP

  • Arshad, Mohammad Junaid;Saleem, Mohammad
    • Journal of Communications and Networks
    • /
    • 제12권3호
    • /
    • pp.275-284
    • /
    • 2010
  • The current multihome-aware protocols (like stream control transmission protocol (SCTP) or parallel TCP for concurrent multipath data transfer (CMT) are not designed for high-capacity and large-latency networks; they often have performance problems transferring large data files over shared long-distance wide area networks. It has been shown that SCTP-CMT is more sensitive to receive buffer (rbuf) constraints, and this rbuf-blocking problem causes considerable throughput loss when multiple paths are used simultaneously. In this research paper, we demonstrate the weakness of SCTP-CMT rbuf constraints, and we then identify that rbuf-blocking problem in SCTP multihoming is mostly due to its loss-based nature for detecting network congestion. We present a simulation-based performance comparison of FAST TCP versus SCTP in high-speed networks for solving a number of throughput issues. This work proposes an end-to-end transport layer protocol (i.e., FAST TCP multihoming as a reliable, delaybased, multihome-aware, and selective ACK-based transport protocol), which can transfer data between a multihomed source and destination hosts through multiple paths simultaneously. Through extensive ns-2 simulations, we show that FAST TCP multihoming achieves the desired goals under a variety of network conditions. The experimental results and survey presented in this research also provide an insight on design decisions for the future high-speed multihomed transport layer protocols.

차등화 서비스(Diffserv)를 이용한 Web Server Content의 효율적 QoS 보장에 관한 연구 (A Study on Differentiated Service for Web Server Contents QoS)

  • 김정윤;유인태;박재성
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2002년도 추계학술발표논문집 (중)
    • /
    • pp.1591-1594
    • /
    • 2002
  • BE(Best-Effort)방식의 인터넷에서 제공되던 Text위주의 서비스 제공 방식이 Multimedia 위주의 서비스로 점차 바뀌어 감에 따라, 기존의 BE(Best-Effort)방식으로는 Multimedia QoS(Quality of Service)를 보장하기가 어려워졌다. 이에 IETF(Internet Engineering Task Force)에서는 변화하는 인터넷 환경에서 QoS 보장을 위해 Diffserv(Differentiated Service)방식을 제안하게 되었다. 본 논문에서는 Content를 제공하는 Linux Web Server에서 패킷을 클래스 분류기준(Classification Method)에 의해 분류하고 Scheduling Algorithm을 적용하여 DSCP(Differentiated Service CodePoint) 값을 Web Server 자체에서 결정하여 경계라우터(Edge Router)로 전송하는 방식을 취하였으며, 이를 토대로 하여 경계라우터의 Traffic 부하를 줄이고, 경계라우터의 코어라우터(Core Router)화를 통해 더욱더 향상된 Differentiated Service를 제공하는 것이 목적이다. 이를 본 논문에서는 ns2 를 통해 IETF에서 제안된 Diffserv방식과 본 논문에서 제안한 방식의 Diffserv 방식과 현재의 BE방식을 비교하여 어느 정도의 성능 향상이 있었는지 비교 분석하였다.

  • PDF

멀티홉 무선 센서 네트워크 환경에서 성능 향상을 위한 플러딩 레벨 클러스터 기반 계층적 라우팅 알고리즘 (Flooding Level Cluster-based Hierarchical Routing Algorithm For Improving Performance in Multi-Hop Wireless Sensor Networks)

  • 홍성화;김병국;엄두섭
    • 한국통신학회논문지
    • /
    • 제33권3B호
    • /
    • pp.123-134
    • /
    • 2008
  • 본 논문에서는 센서 노드의 에너지 소모의 효율성을 증대시키는 무선 센서 네트워크에 대한 라우팅 알고리즘을 제안한다. 각 센서 노드는 멀티 홉 센서 필드에서 최초의 플러딩 과정을 통해 싱크 노드로의 최소 홉수를 나타내는 플러딩 레벨 값을 얻는다. 이 값은 싱크 노드로의 연결을 보장하고 클러스터를 구성하는 동안 사용되며 라우팅 과정에서 효과적으로 사용되어 에너지 효율성을 증가시킨다. 이 알고리즘은 분석과 많은 실험을 통해 성능평가가 이루어진다.