• Title/Summary/Keyword: node-link

Search Result 623, Processing Time 0.033 seconds

A Study on Taxi Route Extraction Based on a Node-Link Model for Aircraft Movements on Airport Surface (노드링크 모델 기반 항공기 공항 지상이동 경로 추출 기법에 대한 연구)

  • Jeong, Myeongsook;Eun, Yeonju;Kim, Hyounkyoung;Jeon, Daekeun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.3
    • /
    • pp.51-60
    • /
    • 2017
  • Estimation of the taxi-out and taxi-in times of aircraft on a airport surface is one of the essential features of Departure Manager (DMAN). Especially for an airport with multiple runways and large ramp areas, estimation of the taxi-out and taxi-in times are mainly dependent on the taxi routes on airport surface. This paper described the method of automatic extraction of the the taxi routes using the ASDE track data and the Dijkstra algorithm based on the node-link model of a airport surface movements. In addition, we analyzed the ground operation status of Incheon International Airport using the extracted taxi routes.

Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.676-682
    • /
    • 2011
  • Sybil attack can disrupt proper operations of wireless sensor network by forging its sensor node to multiple identities. To protect the sensor network from such an attack, a number of countermeasure methods based on RSSI (Received Signal Strength Indicator) and LQI (Link Quality Indicator) have been proposed. However, previous works on the Sybil attack detection do not consider the fact that Sybil nodes can change their RSSI and LQI strength for their malicious purposes. In this paper, we present a Sybil attack detection method based on a transmission power range. Our proposed method initially measures range of RSSI and LQI from sensor nodes, and then set the minimum, maximum and average RSSI and LQI strength value. After initialization, monitoring nodes request that each sensor node transmits data with different transmission power strengths. If the value measured by monitoring node is out of the range in transmission power strengths, the node is considered as a malicious node.

An Extended Hypertext Data Model based on Object-Oriented Praradigm (객체지향 개념을 기반으로한 하이퍼텍스트 데이터 모델)

  • 이재무;임해철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.9
    • /
    • pp.1680-1691
    • /
    • 1994
  • We propose an extended hypertext data model based on object oriented paradigm that can easily the real world and semantics. We use the BNF notation to formalize the model. In our model, We introduce conceptional navigation by associating semantics on links and drive intelligent navigation using weights on links to alleviate user disorientation problem which is currently somewhat vague. We functionally classify the hypertext node into three types:Indexing node, Content node, Extract node and likewise classify the link into Alink type, Rlink type, Slink type. We believe that the typed node and typed link approach accommodate efficient query/search in hypertext.

  • PDF

Energy-balance node-selection algorithm for heterogeneous wireless sensor networks

  • Khan, Imran;Singh, Dhananjay
    • ETRI Journal
    • /
    • v.40 no.5
    • /
    • pp.604-612
    • /
    • 2018
  • To solve the problem of unbalanced loads and the short network lifetime of heterogeneous wireless sensor networks, this paper proposes a node-selection algorithm based on energy balance and dynamic adjustment. The spacing and energy of the nodes are calculated according to the proximity to the network nodes and the characteristics of the link structure. The direction factor and the energy-adjustment factor are introduced to optimize the node-selection probability in order to realize the dynamic selection of network nodes. On this basis, the target path is selected by the relevance of the nodes, and nodes with insufficient energy values are excluded in real time by the establishment of the node-selection mechanism, which guarantees the normal operation of the network and a balanced energy consumption. Simulation results show that this algorithm can effectively extend the network lifetime, and it has better stability, higher accuracy, and an enhanced data-receiving rate in sufficient time.

Design for Low Cost Optical Node with Wavelength Reconfiguration

  • Lee, Jong-Hyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.63-68
    • /
    • 2022
  • Two wavelength reconfigurable optical nodes are designed. One for 20km or shorter link length, and the other for up to 60km link length. While the first one requires no dispersion compensation, the latter needs dispersion compensation fiber included in the node, which requires additional optical amplifier to compensate the insertion loss of DCF. We calculate all the optical path losses in both cases using the typical value of optical components in the market to see the feasibility of the designed optical node. The minimum received power in the node is calculated to be -21.5dBm without DCF and -12.5dBm with DCF, respectively. These received powers are above the receiver sensitivity both for OC-48 and OC-192 according to the previous work.

Performance Improvement on MPLS On-line Routing Algorithm for Dynamic Unbalanced Traffic Load

  • Sa-Ngiamsak, Wisitsak;Sombatsakulkit, Ekanun;Varakulsiripunth, Ruttikorn
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1846-1850
    • /
    • 2005
  • This paper presents a constrained-based routing (CBR) algorithm called, Dynamic Possible Path per Link (D-PPL) routing algorithm, for MultiProtocol Label Switching (MPLS) networks. In MPLS on-line routing, future traffics are unknown and network resource is limited. Therefore many routing algorithms such as Minimum Hop Algorithm (MHA), Widest Shortest Path (WSP), Dynamic Link Weight (DLW), Minimum Interference Routing Algorithm (MIRA), Profiled-Based Routing (PBR), Possible Path per Link (PPL) and Residual bandwidth integrated - Possible Path per Link (R-PPL) are proposed in order to improve network throughput and reduce rejection probability. MIRA is the first algorithm that introduces interference level avoidance between source-destination node pairs by integrating topology information or address of source-destination node pairs into the routing calculation. From its results, MIRA improves lower rejection probability performance. Nevertheless, MIRA suffer from its high routing complexity which could be considered as NP-Complete problem. In PBR, complexity of on-line routing is reduced comparing to those of MIRA, because link weights are off-line calculated by statistical profile of history traffics. However, because of dynamic of traffic nature, PBR maybe unsuitable for MPLS on-line routing. Also, both PPL and R-PPL routing algorithm we formerly proposed, are algorithms that achieve reduction of interference level among source-destination node pairs, rejection probability and routing complexity. Again, those previously proposed algorithms do not take into account the dynamic nature of traffic load. In fact, future traffics are unknown, but, amount of previous traffic over link can be measured. Therefore, this is the motivation of our proposed algorithm, the D-PPL. The D-PPL algorithm is improved based on the R-PPL routing algorithm by integrating traffic-per-link parameters. The parameters are periodically updated and are dynamically changed depended on current incoming traffic. The D-PPL tries to reserve residual bandwidth to service future request by avoid routing through those high traffic-per-link parameters. We have developed extensive MATLAB simulator to evaluate performance of the D-PPL. From simulation results, the D-PPL improves performance of MPLS on-line routing in terms of rejection probability and total throughput.

  • PDF

Adaptive Link Recovery Period Determination Algorithm for Structured Peer-to-peer Networks (구조화된 Peer-to-Peer 네트워크를 위한 적응적 링크 복구 주기 결정 알고리듬)

  • Kim, Seok-Hyun;Kim, Tae-Eun
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.133-139
    • /
    • 2011
  • Structured P2P (peer-to-peer) networks have received much attention in research communities and the industry. The data stored in structured P2P networks can be located in a log-scale time without using central severs. The link-structure of structured P2P networks should be maintained for keeping log-scale search performance of it. When nodes join or leave structured P2P networks frequently, some links become unavailable and search performance is degraded by these links. To sustain search performance of structured P2P networks, periodic link recovery scheme is generally used. However, when the link recovery period is short or long compared with node join and leave rates, it is possible that sufficient number of links are not restored or excessive messages are used after the link-structure is restored. We propose the adaptive link recovery determination algorithm to maintain the link-structure of structured P2P networks when the rates of node joining and leaving are changed dynamically. The simulation results show that the proposed algorithm can maintain similar QoS under various node leaving rates.

A Study on the Design of Survivable Communication Networks (서바이버블한 통신망 설계에 관한 연구)

  • 정재연;이종영;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.11
    • /
    • pp.1726-1734
    • /
    • 1993
  • This paper propose a survivable communication network design process using node degree that augments the usual traffic flow and cost analyses with previously ignored topological survivability and computing time considerations. At first, decide a initial topology, and then measure a throughput of network. If the throughput is smaller than the required traffic, add edge to the optimum place by using minimum node degree and link distance. Otherwise, drop useless edge by using maximum node degree, link distance and link utilization. This process is repeated until throughput equals to the required traffics. This Process designs a survivable communication network with the minimized cost and computing time and usual traffic flow. The design proceses that minimized computing time are freely select initial topology and easily design a large network. And these results of algorithm are compared with the Kris and Pramod's in order to analyses the perfmance of the designed network.

  • PDF

Power Consumption Analysis of Sensor Node According to Beacon Signal Interval in IEEE 802.15.4 Wireless Star Sensor Network (IEEE 802.15.4 무선 스타 센서 네트워크에서 비콘 신호 주기에 따른 센서 노드 전력소모량 분석)

  • Yoo Young-Dae;Choi Jung-Han;Kim Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9B
    • /
    • pp.811-820
    • /
    • 2006
  • In this paper, The correlation of the power consumption of sensor node is analyzed according to the analyze parameter in IEEE 802.15.4 star sensor network. And It is studied the influence on analysis parameter. The power consumption of sensor network in transmission process and average transmission power consumption drives to numerical formula. And CSEM WiseNET system measurement value is used. As a simulation result, The power consumption of sensor node in star network consist of 10 sensor nodes is more than 20 % that in single network in average. When beacon signal interval is 0.1 second in all frequency bands, the power consumption of sensor node in up-link is more than 2.5 times that in down-link in average. When beacon signal interval is 1 second and the number of sensor nodes increases to 100 and sensing data increases to 100 byte, the power consumption of sensor node increases to 2.3 times. And The superior performance of 2.4 GHz frequency band has than 868/915 MHz frequency band up to $6{\sim}12$ times.

Multi-constrained Shortest Disjoint Paths for Reliable QoS Routing

  • Xiong, Ke;Qiu, Zheng-Ding;Guo, Yuchun;Zhang, Hongke
    • ETRI Journal
    • /
    • v.31 no.5
    • /
    • pp.534-544
    • /
    • 2009
  • Finding link-disjoint or node-disjoint paths under multiple constraints is an effective way to improve network QoS ability, reliability, and so on. However, existing algorithms for such scheme cannot ensure a feasible solution for arbitrary networks. We propose design principles of an algorithm to fill this gap, which we arrive at by analyzing the properties of optimal solutions for the multi-constrained link-disjoint path pair problem. Based on this, we propose the link-disjoint optimal multi-constrained paths algorithm (LIDOMPA), to find the shortest link-disjoint path pair for any network. Three concepts, namely, the candidate optimal solution, the contractive constraint vector, and structure-aware non-dominance, are introduced to reduce its search space without loss of exactness. Extensive simulations show that LIDOMPA outperforms existing schemes and achieves acceptable complexity. Moreover, LIDOMPA is extended to the node-disjoint optimal multi-constrained paths algorithm (NODOMPA) for the multi-constrained node-disjoint path pair problem.