• Title/Summary/Keyword: Simulation Network

Search Result 7,356, Processing Time 0.034 seconds

Fast Simulation for Excessive Backlogs in Tandem Networks

  • Lee, Jiyeon
    • Communications for Statistical Applications and Methods
    • /
    • v.7 no.2
    • /
    • pp.499-511
    • /
    • 2000
  • We consider a stable tandem network which consists of two M/M/1 nodes and study the probability that the total backlog exceeds a large level N. Since the excessive backlog is a rare event, it is difficult to estimate this probability efficiently by using the crude Monte Carlo simulation. Instead we perform the ;$h$-transform proposed by McDonald(1999) to obtain the twisted network, in which the node with the larger load is overloaded. Then we use it to run the fast simulation.

  • PDF

Network Security Modeling and Simulation Using the SES/MB Framework (SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 시뮬레이션)

  • 지승도;박종서;이장세;김환국;정기찬;정정례
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.13-26
    • /
    • 2001
  • This paper presents the network security modeling methodology and simulation using the hierarchical and modular modeling and simulation framework. Recently, Howard and Amoroso developed the cause-effect model of the cyber attack, defense, and consequences, Cohen has been proposed the simplified network security simulation methodology using the cause-effect model, however, it is not clear that it can support more complex network security model and also the model-based cyber attack simulation. To deal with this problem, we have adopted the hierarchical and modular modeling and simulation environment so called the System Entity Structure/Model Base (SES/MB) framework which integrates the dynamic-based formalism of simulation with the symbolic formalism of AI. Several simulation tests performed on sample network system verify the soundness of our method.

A Study on the Performance Enhancements of Video Streaming Service in MPLS Network

  • Kwak Kyoung Hwan;Park In Kap;Kim Chung Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.549-551
    • /
    • 2004
  • This paper used OPNET to simulate video streaming service a test IP network and MPLS network with the traffic shaping that have with CQ_ LLQ algorithm, LSP of fixed bandwidth, policy of limitation users and measures parameters such as delay, throughput, packet loss. To verify the performance of video streaming service in IP network and MPLS network, two scenario that have same topology and traffic source. One is the simulation for best-effort service in pure IP network. The other is the simulation for QoS-enabled service in MPLS Network. Based on simulation result, the MPLS network with CQ_ LLQ algorithm and fixed LSP show advantage of the video streaming service QoS, specially delay and packet loss

  • PDF

Study on The Development of Basic Simulation Network for Operational Transient Analysis of The CANDU Power Plant

  • Park, Jong-Woon;Lim, Jae-cheon;Suh, Jae-seung;Chung, Ji-bum;Kim, Sung-Bae
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1995.10a
    • /
    • pp.423-428
    • /
    • 1995
  • Simulation models have been developed to predict the overall behavior of the CANDU plant systems during normal operational transients. For real time simulation purpose, simplified thermal hydraulic models are applied with appropriate system control logics, which include primary heat transport system solver with its component models and secondary side system models. The secondary side models are mainly used to provide boundary conditions for primary system calculation and to accomodate plant power control logics. Also, for the effective use of simulation package, hardware oriented basic simulation network has been established with appropriate graphic display system. Through validation with typical plant power maneuvering cases using proven plant performance analysis computer code, the present simulation package shows reasonable capability in the prediction of the dynamic behavior of plant variables during operational transients of CANDU plant, which means that this simulation tool can be utilized as a basic framework for full scope simulation network through further improvements.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Performance analysis of the data link layer of IEC/ISA fieldbus system by simulation model (시뮬레이션 모델을 이용한 IEC/ISA 필드버스 시스템의 데이터 링크 계층 성능 분석)

  • Lee, Seong-Geun;Hong, Seung-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.2 no.3
    • /
    • pp.209-219
    • /
    • 1996
  • Fieldbus provides a real-time data communication among field devices in the process control and manufacturing automation systems. In this paper, a Petri Net model of the 1993 draft of IEC/ISA fieldbus which is proposed as an international standard of fieldbus network is developed. Based on the Petri Net model, discrete-event simulation model of IEC/ISA fieldbus network is developed. This paper evaluates the network induced delay in the data link layer of IEC/ISA fieldbus using the simulation model. In addition, an integrated discrete-event/continuous-time simulation model of fieldbus system and distributed control system is developed. This paper investigates the real-time data processing capability of IEC/ISA fieldbus and the effect of network-induced delay to the performance of control system.

  • PDF

Security Simulation with Collaboration of Intrusion Detection System and Firewall (침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

On the Data Features for Neighbor Path Selection in Computer Network with Regional Failure

  • Yong-Jin Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.13-18
    • /
    • 2023
  • This paper aims to investigate data features for neighbor path selection (NPS) in computer network with regional failures. It is necessary to find an available alternate communication path in advance when regional failures due to earthquakes or forest fires occur simultaneously. We describe previous general heuristics and simulation heuristic to solve the NPS problem in the regional fault network. The data features of general heuristics using proximity and sharing factor and the data features of simulation heuristic using machine learning are explained through examples. Simulation heuristic may be better than general heuristics in terms of communication success. However, additional data features are necessary in order to apply the simulation heuristic to the real environment. We propose novel data features for NPS in computer network with regional failures and Keras modeling for computing the communication success probability of candidate neighbor path.

Simulation and Analysis of Slammer Worm Propagation With Automatic Quarantine (자동 격리를 감안한 슬래머 웜 전파과정에 대한 모의실험 및 분석)

  • Lim, Jae-Myung;Jung, Han-Gyun;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.529-538
    • /
    • 2007
  • In this paper, we have analyzed a simulation model of Slammer worm propagation process which caused serious disruptions on the Internet in the year of 2003 by using NS-2. Previously we had presented and analyzed Abstract Network to Abstract Network(AN-AN) model being modified from the Detailed Network to Abstract Network(DN-AN) of NS-2. However, packet analysis in AN-AN model had a problem of taking 240 hours to simulate the initial 300 seconds of infection. We have reduced the AN-AN model to save the simulation time and analyzed total 3.5 hours of the network congestions within 107 hours. Moreover, we have derived optimal quarantine rate of 0.0022 considering service outage of network devices caused by the heavy infected traffics, which was not taken into consideration in previous works. As the result of simulation, Although the inbound traffic at the Korean international gateway was back in normal conditions at 4,787 second, due to the revese direction saturation was maintained until 12,600 seconds, the service outage was persisted for 3.5 hours.

DEVELOPMENT OF SIMULATION PLATFORM USED FOR PERFORMANCE EVALUATION OF INFORMATION NETWORK AND ITS APPLICATION

  • Rieko, Aizawa;Yojiro, Ohta;Eiji, Miyagaki;Nakano, Kazuo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.10a
    • /
    • pp.110-115
    • /
    • 2001
  • Today, effective utilization of sophisticated networks greatly influences the activities of a business, making performance evaluations of computer network systems a necessity, We have developed a special computer network simulator capable of automatically generating a model based on data accumulated by a network analyzer to guide the user in selecting ideal parameters. The simulator was developed to provide user-friendly analysis for engineers involved in the actual network design. This paper gives an overview of the simulator and describes an example application of evaluating a network design that anticipates the future increase in traffic for a company introducing voice over frame relay (VoFR) into a wide area network (WAW).

  • PDF