• Title/Summary/Keyword: Real-time Routing

Search Result 282, Processing Time 0.027 seconds

An Efficient Addressing Scheme Using (x, y) Coordinates in Environments of Smart Grid (스마트 그리드 환경에서 (x, y) 좌표값을 이용한 효율적인 주소 할당 방법)

  • Cho, Yang-Hyun;Lim, Song-Bin;Kim, Gyung-Mok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.61-69
    • /
    • 2012
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. Smart Grid is created solution for standardization and interoperability. Smart Grid industry enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. Smart industy was ecolved actively cause Wireless communication is being considered for AMI system and wireless communication using ZigBee sensor has been applied in various industly. In this paper, we proposed efficient addressing scheme for improving the performance of the routing algorithm using ZigBee in Smart Grid environment. A distributed address allocation scheme used an existing algorithm has wasted address space. Therefore proposing x, y coordinate axes from divide address space of 16 bit to solve this problem. Each node was reduced not only bitwise but also multi hop using the coordinate axes while routing than Cskip algorithm. I compared the performance between the standard and the proposed mechanism through the numerical analysis. Simulation verify performance about decrease averaging multi hop count that compare proposing algorithm and another. The numerical analysis results show that proposed algorithm reduce multi hop than ZigBee distributed address assignment and another.

Improving QoS using Cellular-IP/PRC in Hospital Wireless Network (병원 무선망에서 Cellular-IP/PRC에 의한 QoS 개선)

  • Suk, Kyung Hyu;Kim, Sung-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.3
    • /
    • pp.188-194
    • /
    • 2008
  • In this paper, we propose for improving QoS in Hospital wireless network using Cellular-IP/PRC(Paging Route Cache) with Paging Cache and Route Cache in Cellular-IP and propose for performance of realtime and non-real time handoff service using Handoff state machine Paging Route Cache. Although the Cellular-IP/PRC technology is devised for mobile internet communication, it has its vulnerability in frequent handoff environment. This handoff state machine using differentiated handoff improves quality of services in Cellular-IP/PRC Suggested algorithm shows better performance than existing technology in wireless mobile internet communication environment. When speech quality is secured considering increment of interference to receive in case of suppose that proposed acceptance method grooves base radio station capacity of transfer node is plenty, and moat of contiguity cell transfer node was accepted at groove base radio station with a blow, groove base radio station new trench lake acceptance method based on transmission of a message electric power estimate of transfer node be. Do it so that may apply composing PC(Paging Cache) and RC(Routing Cache) that was used to manage paging and router in radio Internet network in integral management and all nodes as one PRC(Paging Router Cache), and add hand off state machine in transfer node so that can manage hand off of transfer node and Roaming state efficiently, and studies so that achieve connection function at node. Analyze benevolent person who influence on telephone traffic in system environment and forecasts each link currency rank and imbalance degree, forecast most close and important lake interception probability and lake falling off probability, GoS(Grade of Service), efficiency of cell capacity in QoS because applies algorithm proposing based on algorithm use gun send-receive electric power that judge by looking downward link whether currency book was limited and accepts or intercept lake and handles and displays QoS performance improvement.

  • PDF

Quantitative Flood Forecasting Using Remotely-Sensed Data and Neural Networks

  • Kim, Gwangseob
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2002.05a
    • /
    • pp.43-50
    • /
    • 2002
  • Accurate quantitative forecasting of rainfall for basins with a short response time is essential to predict streamflow and flash floods. Previously, neural networks were used to develop a Quantitative Precipitation Forecasting (QPF) model that highly improved forecasting skill at specific locations in Pennsylvania, using both Numerical Weather Prediction (NWP) output and rainfall and radiosonde data. The objective of this study was to improve an existing artificial neural network model and incorporate the evolving structure and frequency of intense weather systems in the mid-Atlantic region of the United States for improved flood forecasting. Besides using radiosonde and rainfall data, the model also used the satellite-derived characteristics of storm systems such as tropical cyclones, mesoscale convective complex systems and convective cloud clusters as input. The convective classification and tracking system (CCATS) was used to identify and quantify storm properties such as life time, area, eccentricity, and track. As in standard expert prediction systems, the fundamental structure of the neural network model was learned from the hydroclimatology of the relationships between weather system, rainfall production and streamflow response in the study area. The new Quantitative Flood Forecasting (QFF) model was applied to predict streamflow peaks with lead-times of 18 and 24 hours over a five year period in 4 watersheds on the leeward side of the Appalachian mountains in the mid-Atlantic region. Threat scores consistently above .6 and close to 0.8 ∼ 0.9 were obtained fur 18 hour lead-time forecasts, and skill scores of at least 4% and up to 6% were attained for the 24 hour lead-time forecasts. This work demonstrates that multisensor data cast into an expert information system such as neural networks, if built upon scientific understanding of regional hydrometeorology, can lead to significant gains in the forecast skill of extreme rainfall and associated floods. In particular, this study validates our hypothesis that accurate and extended flood forecast lead-times can be attained by taking into consideration the synoptic evolution of atmospheric conditions extracted from the analysis of large-area remotely sensed imagery While physically-based numerical weather prediction and river routing models cannot accurately depict complex natural non-linear processes, and thus have difficulty in simulating extreme events such as heavy rainfall and floods, data-driven approaches should be viewed as a strong alternative in operational hydrology. This is especially more pertinent at a time when the diversity of sensors in satellites and ground-based operational weather monitoring systems provide large volumes of data on a real-time basis.

  • PDF

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

Real Time User Location Information Protection Model Using Anonymity (익명성을 활용한 사용자의 실시간 위치정보 보호모델)

  • Mun, Hyung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2316-2322
    • /
    • 2013
  • Due to the development of ICT, with using hardwares such as WiFi, 3G and GPS and so on, smartphone could have provided a lot of applications with novel functions rapidly. Through such applications, lots of personal information such as personal location, personal images, and list of phone calls is created, saved and widely used. Because there is lots of leakage of the stored personal information due to loss of phone and application, privacy violation have been important issue nowadays. Smartphone with GPS and Internet provides location information. To protect the information, the technologies that only the authorized user can access it while inquiring the location information have been proposed. In this paper, to minimize the identification information for location information subject and information user and anonymize the identifiable information such as phone number, we proposed a model that can reduce the leakage of information and avoid the wrong usage of the stored information in the server. This technique will be used for protecting privacy when developing the application that provides routing service through location history information.

LCDs: Lane-Changing Aid System Based on Speed of Vehicles

  • Joshi, Jetendra;Deka, Manash Jyoti;Jha, Saurabh;Yadav, Dushyant;Choudhary, Devjeet Singh;Agarwal, Yash;Jain, Kritika
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.3
    • /
    • pp.193-198
    • /
    • 2016
  • Lane change is an important issue in microscopic traffic flow simulations and active safety. Overtaking and changing lanes are dangerous driving maneuvers. This approach presents a lane-changing system based on speed and a minimum gap between vehicles in a vehicular ad hoc network (VANET). This paper proposes a solution to ensure the safety of drivers while changing lanes on highways. Efficient routing protocols could play a crucial role in VANET applications, safeguarding both drivers and passengers, and thus, maintaining a safe on-road environment. This paper focuses on the development of an intelligent transportation system that provides timely, reliable information to drivers and the concerned authorities. A test bed is created for the techniques used in the proposed system, where analysis takes place in an on-board embedded system designed for vehicle navigation. The designed system was tested on a four-lane road in Neemrana, India. Successful simulations were conducted with real-time network parameters to maximize quality of service and performance using Simulation of Urban Mobility and Network Simulator 2 (NS-2). The system implementation, together with the findings, is presented in this paper. Illustrating the approach are results from simulation using NS-2.

NetFlow based IPv6 user's Flow traffic monitoring (NetFlow 기반 IPv6 사용자 Flow traffic 모니터링)

  • Kim, Sung-Su;Song, Wang-Cheol;Oh, Yong-Taek;Choi, Deok-Jai
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.42-46
    • /
    • 2006
  • As the next generation internet (NGI) is supporting High-speed in Gbps rate with the appearance of advanced network technologies, various applications that require high data rates. have been experimented and operated. By using high speed application services, many kinds of problems can be generated but we cannot easily grasp their reasons. However, if the user monitors the end-to-end one's flow data information (path and data rate in each router, state of each router) he can find them more accurately Until now, we have found out the fact that systems which can network-widely monitor end-to-end flow have not be developed yet, only simple systems which can monitor user's individual flow data at just one node are developed In this study, we suggest and materialize a system which can analyze bandwidth in real time by searching routing paths and measuring packet transfer rate between end-to-end flow data and supported flow traffic of using IPv6.

  • PDF

Design of VMS Fuzzy Feedback Controller for VMS Routing Information (대안경로 안내용 VMS 퍼지 피드백 제어기법)

  • Park, Eun-Mi;O, Hyeon-Seon;Yang, Tae-Gyu
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.6
    • /
    • pp.129-136
    • /
    • 2011
  • Variable Message Signs have been used for providing information on the current traffic conditions. However, it is considered more important to achieve optimal traffic allocation among the alternative routes by strategic VMS information provision. Fuzzy control is very effective and efficient to deal with such systems that are too complex and uncertain to build mathematical models. In this paper, a fuzzy feedback controller for VMS is proposed, whose goal is to achieve the travel time equilibrium between the two alternative routes. The performance of the suggested controller is implemented and examined using MATLAB/Simulink. More robust controller applicable to a real highway network is suggested for the further research.

A Study on The Non-Point Source Pollutant Load Routing Method (비점원 오염부하량 산정에 관한 연구)

  • Kim, Young-Seob;Lee, Gwan-Young
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.11 no.1
    • /
    • pp.11-18
    • /
    • 2008
  • After execute quantitative analysis that choose station and compose floodgate quality of water net and use floodgate data and quality of water data analysis target Sign of the cock as 1 dimension access for Non-point pollution source pollution and estimate of Gaeuncheon's at Kyongsangbukdo report to the Throne in this research, presented parameter conclusion notation model (AGNPS) in real condition of our agricultural area through comparison with spot value and result is as following in reply. With result observation and analysis result of the AGNPS model the comparison which it will pay from the hazard which it analyzes 2005, the rainfall thought which is used in the analysis to select 8 heavy rain thoughts 2005 July - is data until of September. Actual amount of rainfall 6.0~195.0 mm one time the antecedent precipitation showed API5 case 0.0~507.0mm and were observed peak flows (Qpeak) each from the P-1 $0.026m^3/sec{\sim}9.265m^3/sec$, from the P-2 $0.010m^3/sec-2.747m^3/sec$ and from the P-3c $0.064m^3/sec-13.482m^3/sec$ to show. Also amendment AMC condition it will be cool and it uses and the AGNPS model conference the result which it occurs, analysis and regression analysis of actual flow for as 0.992 very the possibility of getting the result which is good there was a decisive coefficient which is cool. But the gun is (T-P) with the total nitrogen (T-N) decisive coefficient each as 0.794 and 0.849 the presumption which is reliability generally will pay and with the fact that it will be the possibility of getting it is judged.

  • PDF

Wireless DDoS Attack Detection and Prevention Mechanism using Packet Marking and Traffic Classification on Integrated Access Device (IAD 기반 패킷 마킹과 유무선 트래픽 분류를 통한 무선 DDoS 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo;Park, Yeoung-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.54-65
    • /
    • 2008
  • When DDoS attack is achieved, malicious host discovering is more difficult on wireless network than existing wired network environment. Specially, because wireless network is weak on wireless user authentication attack and packet spoofing attack, advanced technology should be studied in reply. Integrated Access Device (IAD) that support VoIP communication facility etc with wireless routing function recently is developed and is distributed widely. IAD is alternating facility that is offered in existent AP. Therefore, advanced traffic classification function and real time attack detection function should be offered in IAD on wireless network environment. System that is presented in this research collects client information of wireless network that connect to IAD using AirSensor. And proposed mechanism also offers function that collects the wireless client's attack packet to monitoring its legality. Also the proposed mechanism classifies and detect the attack packet with W-TMS system that was received to IAD. As a result, it was possible for us to use IAD on wireless network service stably.