• Title/Summary/Keyword: network flow

Search Result 2,340, Processing Time 0.032 seconds

A Study on the semantic network system of the line of flow appearing on the residential space of super high-rise apartments (초고층아파트 주거공간에 나타난 동선의 의미적 네트워크 체계에 관한 연구)

  • Yoon, Jae-Eun;Kim, Joo-Hee
    • Korean Institute of Interior Design Journal
    • /
    • v.16 no.3 s.62
    • /
    • pp.58-65
    • /
    • 2007
  • The residential space of super high-rise buildings, having a form of a huge three-dimensional vertical city, affect the residents psychologically and qualitatively according to the line of flow. Because of these affects, the system of the line of flows is a very important factor. In this study, we recognize the super high-rise apartment's line of flow as a semantic network system based on case studies. And we also understand the mutual relationship by analyzing each space to recognize what effect it does on the residential environment. Furthermore, to bring up a better semantic network system for super high-rise apartment's line of flows is our goal. According to the case studies, the semantic network of the line of flow consists of 3 parts: the functional network, economical network and unit network. The functional network is composed of the 'need' and 'has', while the economical network includes variable walls that can be changed following the user's taste and eccentric positioned living rooms that protect personal privacy. Therefore the economical network started to appear while the personal value changed according to the improvement of the social condition. Finally, the unit network is a network that effects each unit that has ambiguous boundaries due to the appropriate arrangement between transitional spaces. And the unit network is based on the functional network.

A Study of Network Flow Algorithm for location problem of distribution center (물류센터 입지 선정 문제를 위한 Network Flow Algorithm 연구)

  • Park, Youl-Kee;Lee, Hong-Chul
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05b
    • /
    • pp.1177-1179
    • /
    • 2010
  • 본 연구는 생산 공장, 거점창고, 지역창고, 대리점으로 이어지는 일련의 SCM상에서의 물류센터의 최적의 입지를 선정 문제에 Network Flow Algorithm을 적용하고자 한다. 경로최소화, 전체비용최소화, 손실함수 등의 목적에 따라 문제가 다양하게 있을 수 있다. 최적화 문제에서 대표적으로 사용되는 Maximut flow의 알고리즘을 자세히 알아본다.

  • PDF

Option of Network Flow Problem Considering Uncertain Arc Capacity Constraints (불확실한 arc용량제약식들을 고려한 네트워크문제의 최적화)

  • 박주녕;송서일
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.13 no.21
    • /
    • pp.51-60
    • /
    • 1990
  • In this paper we deal with the miniaml cost network flow problem with uncertain arc capacity constraints. When the arc capacities are fuzzy with linear L-R type membership function, using parametric programming procedure, we reduced it to the deterministic minimal cost network flow problem which can be solved by various typical network flow algorithms. A modified Algorithm using the Out-of-kilter algorithm is developed.

  • PDF

A Study on Application Service Delivery through Virtual Network Topology Allocation using OpenFlow based Programmable Network (OpenFlow 기반 Programmable Network에서 Virtual Network Topology 구성을 통한 응용 서비스 제공 방안 연구)

  • Shin, Young-Rok;Biao, Song;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.590-593
    • /
    • 2012
  • 현재 인터넷은 하드웨어 종속적인 특징을 가지고 있어 급변하는 환경에 적응하기 힘들다. 이러한 제약사항은 관련 산업 발전을 더디게 하고 있다. 이와 같은 네트워크 환경에서 산업 발전을 위하여 네트워크 인프라에 유연성을 제공할 수 있는 기술의 개발이 필요하다. 그러한 문제를 해결하기 위해 오픈프로토콜인 OpenFlow의 Programmable Network의 특성을 이용하여 네트워크 가상화를 구현하였으며, 응용 서비스별 Virtual Network를 제공하는 방안에 대해 연구하였다. 이를 위하여 OpenFlow 기반의 Programmable Network를 구축하였으며, 동적으로 구성이 가능한 네트워크에서 가상화를 제공하기 위해 VNAPI를 개발하였다. 또한, VNAPI를 통하여 신뢰성 있고 효율적인 응용 서비스의 전달을 위하여 Virtual Network Topology에 대한 설계를 같이 수행하였다.

Monitoring Network Security Situation Based on Flow Visualization (플로우 시각화 기반의 네트워크 보안 상황 감시)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper we propose a new method of security visualization, VisFlow, using traffic flows to solve the problems of existing traffic flows based visualization techniques that were a loss of end-to-end semantics of communication, reflection problem by symmetrical address coordinates space, and intuitive loss problem in mass of traffic. VisFlow, a simple and effective security visualization interface, can do a real-time analysis and monitoring the situation in the managed network with visualizing a variety of network behavior not seen in the individual traffic data that can be shaped into patterns. This is a way to increase the intuitiveness and usability by identifying the role of nodes and by visualizing the highlighted or simplified information based on their importance in 2D/3D space. In addition, it monitor the network security situation as a way to increase the informational effectively using the asymmetrical connecting line based on IP addresses between pairs of nodes. Administrator can do a real-time analysis and monitoring the situation in the managed network using VisFlow, it makes to effectively investigate the massive traffic data and is easy to intuitively understand the entire network situation.

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

SECOND BEST TEMPORALLY REPEATED FLOWS

  • Eleonor, Ciurea
    • Journal of applied mathematics & informatics
    • /
    • v.9 no.1
    • /
    • pp.77-86
    • /
    • 2002
  • Ford and Fulkerson have shown that a stationary maximal dynamic flow can be obtained by solving a transhipment problem associated with the static network and thereby finding the maximal temporally repeated dynamic flow. This flow is known to be an optical dynamic flow. This paper presents an algorithm for second best temporal1y repeated flows. A numerical example is presented.

A Study on OpenFlow based Virtual Network Platform for KREONET (OpenFlow 기반 KREONET 가상 네트워크 플랫폼 연구)

  • Seok, Seung-Joon;Jeong, Hyeonuk
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.309-319
    • /
    • 2014
  • Virtual Network service is a key characteristics of future Internet which is debate internationally. There are two kinds of network virtualization technologies considered lately: network functions virtualization and virtual network approaches. Several national wide research networks including US's GENI project have experimented technologies for future Internet and in particular network virtualization is one of key issues. Representative Korean research network, KREONET, is working on deploying virtual network framework as a preliminary for future Ineternet using the virtualization model of SDN/OpenFlow which is typical network model of future Internet. This paper proposes a stepwise model to bring virtual network services in KREONET. Firstly, we requirements of KREONET users' virtual network service and network resource management and network deploying virtual network. Finally, we verify the adequacy of our virtual network model for KREONET.

Development of Flow Interpolation Model Using Neural Network and its Application in Nakdong River Basin (유량 보간 신경망 모형의 개발 및 낙동강 유역에 적용)

  • Son, Ah Long;Han, Kun Yeon;Kim, Ji Eun
    • Journal of Environmental Impact Assessment
    • /
    • v.18 no.5
    • /
    • pp.271-280
    • /
    • 2009
  • The objective of this study is to develop a reliable flow forecasting model based on neural network algorithm in order to provide flow rate at stream sections without flow measurement in Nakdong river. Stream flow rate measured at 8-days interval by Nakdong river environment research center, daily upper dam discharge and precipitation data connecting upstream stage gauge were used in this development. Back propagation neural network and multi-layer with hidden layer that exists between input and output layer are used in model learning and constructing, respectively. Model calibration and verification is conducted based on observed data from 3 station in Nakdong river.

Groundwaterflow analysis of discontinuous rock mass with probabilistic approach (통계적 접근법에 의한 불연속암반의 지하수 유동해석)

  • 장현익;장근무;이정인
    • Tunnel and Underground Space
    • /
    • v.6 no.1
    • /
    • pp.30-38
    • /
    • 1996
  • A two dimensional analysis program for groundwater flow in fractured network was developed to analyze the influence of discontinuity characteristics on groundwater flow. This program involves the generation of discontinuities and also connectivity analysis. The discontinuities were generated by the probabilistic density function(P.D.F.) reflecting the characteristics of discontinuities. And the fracture network model was completed through the connectivity analysis. This program also involves the analysis of groundwater flow through the discontinuity network. The result of numerical experiment shows that the equivalent hydraulic conductivity increased and became closer to isotropic as the density and trace length increased. And hydraulic head decreased along the fracture zone because of much water-flow. The grouting increased the groundwater head around cavern. An analysis of groundwater flow through discontinuity network was performed around underground oil storage cavern which is now under construction. The probabilistic density functions(P.D.F) were obtained from the investigation of the discontinuity trace map. When the anisotropic hydraulic conductivity is used, the flow rate into the cavern was below the acceptable value to maintain the hydraulic containment. But when the isotropic hydraulic conductivity is used, the flow rate was above the acceptable value.

  • PDF