• Title/Summary/Keyword: Simulation Network Model

Search Result 1,952, Processing Time 0.033 seconds

Simulator Output Knowledge Analysis Using Neural network Approach : A Broadand Network Desing Example

  • Kim, Gil-Jo;Park, Sung-Joo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1994.10a
    • /
    • pp.12-12
    • /
    • 1994
  • Simulation output knowledge analysis is one of problem-solving and/or knowledge adquistion process by investgating the system behavior under study through simulation . This paper describes an approach to simulation outputknowldege analysis using fuzzy neural network model. A fuzzy neral network model is designed with fuzzy setsand membership functions for variables of simulation model. The relationship between input parameters and output performances of simulation model is captured as system behavior knowlege in a fuzzy neural networkmodel by training examples form simulation exepreiments. Backpropagation learning algorithms is used to encode the knowledge. The knowledge is utilized to solve problem through simulation such as system performance prodiction and goal-directed analysis. For explicit knowledge acquisition, production rules are extracted from the implicit neural network knowledge. These rules may assit in explaining the simulation results and providing knowledge base for an expert system. This approach thus enablesboth symbolic and numeric reasoning to solve problem througth simulation . We applied this approach to the design problem of broadband communication network.

  • PDF

System Level Network Simulation of Adaptive Array with Dynamic Handoff and Power Control (동적 핸드오프와 전력제어를 고려한 적응배열 시스템의 네트워크 시뮬레이션)

  • Yeong-Jee Chung;Jeffrey H. Reed
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.4
    • /
    • pp.33-51
    • /
    • 1999
  • In this study, the system level network simulation is considered with adaptive array antenna in CDMA mobile communication system. A network simulation framework is implemented based on IS-95A/B system to consider dynamic handoff, system level network behavior, and deploying strategy into the overall CDMA mobile communication network under adaptive array algorithm. Its simulation model, such as vector channel model, adaptive beam forming antenna model, handoff model, and power control model, are described in detail with simulation block. In order to maximize SINR of received signal at antenna, Maximin algorithm is particularly considered, and it is computed at each simulation snap shot with SINR based power control and handoff algorithm. Graphic user interface in this system level network simulator is also implemented to define the simulation environments and to represent simulation results on real mapping system. This paper also shows some features of simulation framework and simulation results.

  • PDF

System Level Simulation of CDMA Network with Adaptive Array

  • Chung, Yeong-Jee;Lee, Jae-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.4
    • /
    • pp.755-764
    • /
    • 1999
  • In this study, the system level network simulation is considered with adaptive array antenna in CDMA mobile communication system. A network simulation framework is implemented based on IS-95A/B system to consider dynamic handoff, system level network behavior, and deploying strategy into the overall CDMA mobile communication network under adaptive array algorithm. Its simulation model, such as vector channel model, adaptive beam forming antenna model, handoff model, and power control model, are described in detail with simulation block. In order to maximize SINR of received signal at antenna, maximin algorithm is particularly considered, and it is computed at each simulation snap shot with SINR based power control and handoff algorithm. Graphic user interface in this system level network simulator is also implemented to define the simulation environments and to represent simulation results on real mapping system. This paper also shows some features of simulation framework and simulation results.

  • PDF

Object-oriented Modeling for Broadband Network Simulation (광대역 통신망 시뮬레이션을 위한 객체지향 모델링)

  • 이영옥
    • Journal of the Korea Society for Simulation
    • /
    • v.3 no.1
    • /
    • pp.151-165
    • /
    • 1994
  • Broadband network based on the Asynchronous Transfer Mode(ATM) concept are becoming the target technology for the emerging Broadband Integrated Services Digital Network(B-ISDN). Since B-ISDN is very complex and requites a great amount of investment, optimum design and performance analysis of such systems are very important. Simulation can be widely used to analyze and examine the broadband network behavior. However, for the complicated system like broadband networks it is extremely difficult and time-consuming to develop a complete model for simulation. In this paper, an object-oriented modeling approach for the broadband network simulation is presented for the effective and efficient modeling. Object-oriented approaches can provide a good structuring capability for complicated simulation models and facilitate the development of reusable and extensible simulation models. We have developed an object-oriented model which consists of object model and behavior model. In the object mode., the components of the broadband network and both constant bit rate(CBR) and variable bit rate(VBR) traffic types of call level, burst level, and cell level are modeled as object classes. In the behavior model, the dynamic features for each object class are represented using the state transition diagram. It has been shown by illustration that objectoriented modeling is an effective tool for modeling the complicated B-ISDN.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Performance analysis of the data link layer of IEC/ISA fieldbus system by simulation model (시뮬레이션 모델을 이용한 IEC/ISA 필드버스 시스템의 데이터 링크 계층 성능 분석)

  • Lee, Seong-Geun;Hong, Seung-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.2 no.3
    • /
    • pp.209-219
    • /
    • 1996
  • Fieldbus provides a real-time data communication among field devices in the process control and manufacturing automation systems. In this paper, a Petri Net model of the 1993 draft of IEC/ISA fieldbus which is proposed as an international standard of fieldbus network is developed. Based on the Petri Net model, discrete-event simulation model of IEC/ISA fieldbus network is developed. This paper evaluates the network induced delay in the data link layer of IEC/ISA fieldbus using the simulation model. In addition, an integrated discrete-event/continuous-time simulation model of fieldbus system and distributed control system is developed. This paper investigates the real-time data processing capability of IEC/ISA fieldbus and the effect of network-induced delay to the performance of control system.

  • PDF

Network Based Diffusion Model (네트워크 기반 확산모형)

  • Joo, Young-Jin
    • Korean Management Science Review
    • /
    • v.32 no.3
    • /
    • pp.29-36
    • /
    • 2015
  • In this research, we analyze the sensitivity of the network density to the estimates for the Bass model parameters with both theoretical model and a simulation. Bass model describes the process that the non-adopters in the market potential adopt a new product or an innovation by the innovation effect and imitation effect. The imitation effect shows the word of mouth effect from the previous adopters to non-adopters. But it does not divide the underlying network structure from the strength of the influence over the network. With a network based Bass model, we found that the estimate for the imitation coefficient is highly sensitive to the network density and it is decreasing while the network density is decreasing. This finding implies that the interpersonal influence can be under-looked when the network density is low. It also implies that both of the network density and the interpersonal influence are important to facilitate the diffusion of an innovation.

Simulation and performance evaluation of J1850 protocol for automotive communication (차량통신용 J1850 프로토콜의 시뮬레이션 및 성능평가)

  • Nam, Sang-Un;Yoon, Jung-A;Lee, Seok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.816-819
    • /
    • 1996
  • This paper focuses on development of simulation model for SAE J1850 and performance evaluation of a J1850 network. The simulation model has been developed by using discrete event simulation language. SAE J1850 is one of Class B network protocol for general data sharing applications. Through numerous simulation experiments, several important performance factors such as the probability of a successful transmission, average queue delay, and throughput have been evaluated.

  • PDF

Network Security Modeling and Simulation Using the SES/MB Framework (SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 시뮬레이션)

  • 지승도;박종서;이장세;김환국;정기찬;정정례
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.13-26
    • /
    • 2001
  • This paper presents the network security modeling methodology and simulation using the hierarchical and modular modeling and simulation framework. Recently, Howard and Amoroso developed the cause-effect model of the cyber attack, defense, and consequences, Cohen has been proposed the simplified network security simulation methodology using the cause-effect model, however, it is not clear that it can support more complex network security model and also the model-based cyber attack simulation. To deal with this problem, we have adopted the hierarchical and modular modeling and simulation environment so called the System Entity Structure/Model Base (SES/MB) framework which integrates the dynamic-based formalism of simulation with the symbolic formalism of AI. Several simulation tests performed on sample network system verify the soundness of our method.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF