• Title/Summary/Keyword: Tunnel networks

Search Result 105, Processing Time 0.027 seconds

Optimal Design of Water Distribution Networks using the Genetic Algorithms: (I) -Cost optimization- (Genetic Algorithm을 이용한 상수관망의 최적설계: (I) -비용 최적화를 중심으로-)

  • Shin, Hyun-Gon;Park, Hee-Kyung
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.12 no.1
    • /
    • pp.70-80
    • /
    • 1998
  • Many algorithms to find a minimum cost design of water distribution network (WDN) have been developed during the last decades. Most of them have tried to optimize cost only while satisfying other constraining conditions. For this, a certain degree of simplification is required in their calculation process which inevitably limits the real application of the algorithms, especially, to large networks. In this paper, an optimum design method using the Genetic Algorithms (GA) is developed which is designed to increase the applicability, especially for the real world large WDN. The increased to applicability is due to the inherent characteristics of GA consisting of selection, reproduction, crossover and mutation. Just for illustration, the GA method is applied to find an optimal solution of the New York City water supply tunnel. For the calculation, the parameter of population size and generation number is fixed to 100 and the probability of crossover is 0.7, the probability of mutation is 0.01. The yielded optimal design is found to be superior to the least cost design obtained from the Linear Program method by $4.276 million.

  • PDF

A Network-Based Handover Scheme in HIP-Based Mobile Networks

  • Gohar, Moneeb;Koh, Seok-Joo
    • Journal of Information Processing Systems
    • /
    • v.9 no.4
    • /
    • pp.651-659
    • /
    • 2013
  • In the Host Identity Protocol (HIP), the existing host-based handover scheme tends to induce large handover delays and packet loss rates. To deal with this problem, we are proposing a network-based handover scheme for HIP in the mobile networks, in which the access routers of the mobile node will establish a handover tunnel and will perform the route optimization for data transmission. We also discuss how to extend the HIP Update message to use the proposed handover scheme. From ns-2 simulations, we can see that the proposed handover scheme can significantly reduce the handover delay and packet losses during handover, as compared to the existing handover schemes.

State Equation Formulation of Nonlinear Time-Varying RLC Network by the Method of Element Decomposition (회전소자분해법에 의한 비선형시변 RLC 회로망의 상태방정식 구성에 대하여)

  • 양흥석;차균현
    • 전기의세계
    • /
    • v.22 no.2
    • /
    • pp.40-44
    • /
    • 1973
  • A method for obtaining state equation for nonlinear time-varying RLC networks is presented. The nonlinear time-varying RLC elements are decomposed by using Murata method to formulate nonlinear state equation. A nonlinear time-varying RLC network containing twin tunnel diode is solved as an example. In consequence of solving the examjple, simple methods are presented for revising the original network model so that the formulation of state equation is simplified.

  • PDF

Controlled Bandwidth Borrowing with Extended RSVP-TE to Maximize Bandwidth Utilization

  • Kim Chul;Kim Young-Tak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.64-72
    • /
    • 2004
  • Multiprotocol Label Switching (MPLS) has been developed as a key technology to enhance the reliability, manageability and overall quality of service of core If networks with connection-oriented tunnel LSP and traffic engineering such as constraint-based routing, explicit routing, and restoration. In this paper, we propose a control bandwidth borrowing scheme that maximizes the utilization of tunnel LSPs or physical links by an extension to the RSVP-TE label distribution protocol. MPLS-based core switching network and VPN services rely on the establishment of connection-oriented tunneled LSPs that are configured or predefined by network management systems. The mechanism of network management system varies from (i) a relatively static LSP establishment accounting, to (ii) a dynamic QoS routing mechanisms. With the use of hierarchical LSPs, the extra bandwidth that is unused by the trunk (outer) LSPs should be fully allocated to their constituent end-to-end user traffic (inner) LSPs in order to maximize their utilization. In order to find out the unused extra bandwidth in tunnel LSP or physical link and redistribute these resources to constituent LSPs, we expend the functionality of RSVP-TE and the found unused extra bandwidth is redistributed with a weight-based recursive redistribution scheme. By the extended RSVP-TE and proposed recursive redistributed scheme, we could achieve the instantaneous maximized utilization of tunnel LSP or physical link suffering from the potential under-utilization problem and guarantee the end-to-end QoS requirements. With the proposed scheme, network manager can manage more effectively the extra available bandwidth of hierarchical LSPs and maximize the instantaneous utilization of the tunneled LSP resources.

A Study on the Methodology modelling of Risk Assessment in Road Tunnels (도로터널시설 위험평가 모델링을 위한 방법론 연구)

  • Cho, Inuh;Han, Dae-yong;Kim, Seung-jin;Yoon, Jong-ku
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.59-73
    • /
    • 2016
  • The demand for subsurface transport is increasing. The users and the operators of road tunnels are exposed to risks with different causes. One main cause, however, is the traffic situation in the event of accidents. The importance of a Quantified Risk Assessment is increasing to quantify the safety of road tunnels and to balance the requirements (capacity, reliability, availability, maintainability and safety) of various stakeholders. Although there are classical methods for risk assessments, such as ETA and FTA. These methods are used for relatively simple cases because it could not relevantly reflect the diversity and relationship of the parameters. Therefore, a quantitative risk assessment based on Bayesian Probabilistic Networks considering interdependence between the parameters of a complex underground system as a double deck tunnel is provided.

(A Multicast Tree Extension Scheme in Mobile IP) (Mobile IP에서 멀티캐스트 트리 확장 방법)

  • Kim, Byung-Soon;Han, Ki-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.307-315
    • /
    • 2003
  • This paper proposes a Multicast Tree Extension (MTE) scheme for multicast in IP-based wireless networks. If a group receiver Joins a multicast group in a visited foreign network, multicast service may be disrupted when the foreign network does not have a multicast router. To avoid disruption, our scheme creates a bi-directional tunnel between the previous foreign agent (FA) and new foreign agent, if a mobile node (MN) moves from a foreign network with multicast capability to another foreign network with non-multicast capability. The MN thus continues to receive the multicast packets through the tunnel from the previous FA. Our scheme can avoid a long latency due to a long tunneling for group membership as well as multicast service disruption, even if the MN enters foreign networks with non-multicast capability. Simulation results show that our scheme offers lower costs for multicast delivery, tunneling and handoff latency than the existing scheme.

Soft Sedimentary Rock Slopes Design of Diversion Tunnel

  • Jee, Warren Wangryul
    • Proceedings of the Korean Society for Rock Mechanics Conference
    • /
    • 2007.10a
    • /
    • pp.63-79
    • /
    • 2007
  • Several remedial works were attempted to stabilize the collapsed area of the inlet slopes of diversion tunnel, but prevention of any further movement was being only carried out at beginning stage by filling the area with aggregates and rock debris, after several cracks had been initiated and developed around the area. The extra specialty developed folding zone is consisted with highly weathered Greywacke and Black shale. The suggested solution is to improve the properties of the rock mass of failed area by choosing the optimum level of reinforcement through the increment of slope rock support design so as to control the movement of slopes during the re-excavation. The Bakun hydroelectric project includes the construction of a hydroelectric power plant with an installed capacity of 2,520MW and a power transmission system connecting to the existing transmission networks in Sarawak and Western Malaysia. The power station will consist of a 210m height Concrete Faced Rockfill Dam. During the construction of the dam and the power facilities the Balui River has to be diverted of the tunnels is 12m and the tunnel width is 16m at the portal area. This paper describes the stability analysis and design methods for the open cut rock slopes in the inlet area of the diversion tunnels. The geotechnical parameters employed in stability calculations were given as a function of four defined Rock Mass Type (RMT) which were based on RMR system from Bieniawski. The stability calculations procedure of the rock slopes are divided into two stages. In the first stage, it is calculated for the stability of each "global" slope without any rock support and shotcrete system. In the second stage, it is calculated for each "local" slope stability with berms and supported with rock bolts and shotcrete. The monitoring instrumentation was performed continuously and some of the design modification was carried out in order to increase the safety of failed area based on the unforeseen geological risks during the open cut excavation.

  • PDF

The DSTM TEP for IPv4 and IPv6 Interoperability (IPv4/IPv6의 연동을 위한 DSTM TEP의 기능)

  • 진재경;최영지;민상원
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.578-587
    • /
    • 2003
  • The DSTM (Dual Stack Transition Mechanism), one of tunneling mechanism, is considered as the best solution in IPv4/IPv6 transition recently. The DSTM provides a method to assure IPv4/v6 connectivity based on 4over6 (IPv4-over-IPv6) tunneling and temporal allocation of a global IPv4 address to a host requiring such communication. A TEP (Tunnel End Point) operates as a border router between IPv6 domain and IPv4 Internet, which performs encapsulation and decapsulation of 4over6 tunneling packets to assure hi-directional forwarding between both networks. In this paper, we analyze basic standards of the IPv6 protocol. And, we design and implement a DSTM TEP daemon block. The TEP daemon analyzes a fevers tunneling packet that is forwarded by the DSTM node, establishes the TEP's 4over6 interface, and supplies communication between a DSTM and a IPv4-only node. Finally, we construct a DSTM testbed and measure performance of the DSTM TEP. Our observation results show that performance of TEP supports the DSTM service.

Detection of Steel Ribs in Tunnel GPR Images Based on YOLO Algorithm (YOLO 알고리즘을 활용한 터널 GPR 이미지 내 강지보재 탐지)

  • Bae, Byongkyu;Ahn, Jaehun;Jung, Hyunjun;Yoo, Chang Kyoon
    • Journal of the Korean Geotechnical Society
    • /
    • v.39 no.7
    • /
    • pp.31-37
    • /
    • 2023
  • Since tunnels are built underground, it is impossible to check visually the location and degree of deterioration of steel ribs. Therefore, in tunnel maintenance, GPR images are generally used to detect steel ribs. While research on GPR image analysis employing artificial neural networks has primarily focused on detecting underground pipes and road damage, there have been limited applications for analyzing tunnel GPR data, specifically for steel rib detection, both internationally and domestically. In this study, a one-step object detection algorithm called YOLO, based on a convolutional neural network, was utilized to automate the localization of steel ribs using GPR data. The performance of the algorithm is then analyzed. Two datasets were employed for the analysis. A dataset comprising 512 original images and another dataset consisting of 2,048 augmented images. The omission rate, which represents the ratio of undetected steel ribs to the total number of steel ribs, was 0.38% for the model using the augmented data, whereas the omission rate for the model using only the original data was 7.18%. Thus, from an automation standpoint, it is more practical to employ an augmented dataset.

A Proposal and Evaluation of a Novel Binding Scheme in the NEMO Support in PMIPv6 Networks (PMIPv6 망에서 NEMO 지원을 위한 Binding 방안 제안과 검증)

  • Na, Yoo-Cheol;Min, Sang-Won;Kim, Bok-Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1266-1271
    • /
    • 2010
  • In this paper, we describe overhead problems which result from the supporting NEMO in PMIPv6 networks, and propose a novel binding scheme for the network-based mobility management with new network-layer message which solves the problems of the additional tunnel. Our proposed binding scheme can reduce handover latency without mobility-related procedure by the hosts. A performance evaluation shows that the proposed scheme works more efficiently than the scheme which is proposed by the IETF NETLMM WG in terms of packet loss, handover latency and average packet throughput.