• Title/Summary/Keyword: topology management

Search Result 247, Processing Time 0.025 seconds

A Design of Routing Path and Wavelength Assignment with Fairness in WDM Optical Transport Network (WDM 광전달망에서 공정성을 갖는 경로설계 및 파장할당)

  • 박구현;우재현
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.4
    • /
    • pp.17-35
    • /
    • 1997
  • This paper considers the efficient design of routing path and wavelength assignment in the single-hop WDM optical transport networks. The connection demands between node-pairs are given and a connection between a pair of nodes must be made by only one lightpath. It is assumed that no wavelength conversion is allowed and the physical topology of the network and the number of available wavelengths of a physical link are also given. This paper proposes the method to route a path and assign a wavelength to the path, which guarantees fairness to every node pair. In order to guarantee fairness and maximize connections, an optimization model is established, which successively maximizes minimum connection ratio to the demand of each node pair. A heuristic algorithm with polynomial iterations is developed for the problem since the problem is NP-hard. The heuristic algorithm is implemented and applied to the networks with real problem sizes. The results of the application are compared with GAMS/OSL.

  • PDF

Reliability Modeling and Computational Algorithm of Network Systems with Dependent Components (구성요소가 서로 종속인 네트워크시스템의 신뢰성모형과 계산알고리즘)

  • 홍정식;이창훈
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.14 no.1
    • /
    • pp.88-96
    • /
    • 1989
  • General measure in the reliability is the k-terminal reliability, which is the probability that the specified vertices are connected by the working edges. To compute the k-terminal reliability components are usually assumed to be statistically independent. In this study the modeling and analysis of the k-terminal reliability are investigated when dependency among components is considered. As the size of the network increases, the number of the joint probability parameter to represent the dependency among components is increasing exponentially. To avoid such a difficulty the structured-event-based-reliability model (SERM) is presented. This model uses the combination of the network topology (physical representation) and reliability block diagram (logical representation). This enables us to represent the dependency among components in a network form. Computational algorithms for the k-terminal reliability in SERM are based on the factoring algorithm Two features of the ractoring algorithm are the reliability preserving reduction and the privoting edge selection strategy. The pivoting edge selction strategy is modified by two different ways to tackle the replicated edges occuring in SERM. Two algorithms are presented according to each modified pivoting strategy and illustrated by numerical example.

  • PDF

An efficient Clustering Node Life Time management Technique in MANET algorithm (MANET에서 클러스터링 노드의 효율적인 수명 관리 기법)

  • Lee, Jong-Seung;Kim, Yeong-Sam;Oh, Young-Jun;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.746-748
    • /
    • 2011
  • MANET(Mobile Ad-hoc Network) is a self-configuration network or wireless multi-hop network based on inference topology. The proposed ATICC(Adaptive Time Interval Clustering Control) algorithm for hierarchical cluster based MANET. The proposed ATICC algorithm is time interval control technique for node management considering the attribute of node and network traffic. ATICC could be made low the network traffic. Also it could be improving the network life time by using timing control method.

  • PDF

A Cable Layout Plan for a CATV System

  • 차동완;윤문길
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1991.10a
    • /
    • pp.464-464
    • /
    • 1991
  • We address the problem of designing a physical CATV network with switched-star topology in which the broadband interactive service is provided. There are two types of decision variables: One is where to place conduit paths, and the other is how many cable units to be installed on each link traversed by an established conduit path. Due to the serious drawback of the conventional approach partitioning the problem into two subproblems, the unified approach handled in one setting is used here to attack the whole problem without dividing into two ones. In this paper, we present a mathematical design model and propose an efficient solution method exploiting the nice structure of it. In addition to this physical design, some results on logical network configuration have also been made. Finally, computaional experiments are conducted to illustrate the efficiency of our design approach.

  • PDF

The Study of Hierarchical Intrusion Detection Based on Rules for MANET (MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구)

  • Jung, Hye Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

A Routing Scheme for Reducing the Power Consumption of USN Nodes (USN 노드의 소비전력 절감을 위한 경로설정 기법)

  • Lee, Moon-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.2
    • /
    • pp.1-10
    • /
    • 2007
  • The ubiquitous computing system is expected to be widely utilized in digital home, logistics control, environment/disaster management, medical/health-care services and other applications. The ubiquitous sensor network (USN) is a key infra-structure of this system. Nodes in the USN are exposed to adverse environments and required to perform their missions with very limited power supply only. Also the sensor network is composed of much more nodes. In case some node consumes up its power capacity under a certain required level, the network topology should change and re-routing/ re-transmission of data is necessitated. Resultantly communication protocols studied for conventional wireless networks or ad-hoc networks are not suitable for the sensor network. Schemes should be devised to control the efficient usage of node power in the sensor network. This paper proposes a routing algorithm to enhance the efficiency of power consumption for USN node and analyzes its performance by simulation.

  • PDF

A Broadband Local Access Network Design with Double-star Topology under Uncertain Demands (불확실한 수요 하에서 이중성형 구조의 광댁역 접속망 설계에 관한 연구)

  • 윤문길
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.25 no.2
    • /
    • pp.87-100
    • /
    • 2000
  • As a result of rapid advances in communication technology, fiber optics have begun to be adopted in most telecommunication systems 3s an economic choice Due to the trend of evolution toward broadband communication network with fiber optics and electronic devices. the network design problem for broadband communication has been received a great deal of research attention recently. In this paper, we address a topological design problem for broadband local access network with uncertain demands, which has received surprisingly little attention so far. in our problem, we select a set of hubs and links for constructing network expected penalty cost for the amount of undersupplied In addition to the usual cost terms of the fixed demand problem Our problem can be approximated as a mixed 0-1 integer programming problem by using Szwarc’s linear approximation technique. Then the problem is transformed successfully into a version of classical network design model. Some computational experiments for the model and concluding remarks are described.

  • PDF

A Study On Database improvement Of The Power System Protection Program(II) (계통보호 정정 프로그램의 데이터베이스 개선에 관한 연구(II))

  • Kim, S.H.;Lee, S.J.;Choi, M.S.;Min, B.U.
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.302-304
    • /
    • 2003
  • This paper presents the methods to solve the problem about Power System Protection Program(PROSET). PROSET is a overall program system to protect power system and correct it. In the context of the PROSET, it is so difficult to edit database data when topology is changed. When the renewal of data is performed, all changed values are disappeared. Therefore, it will not be expected to know the present situation by using the information of the databases data. So it is necessary to solve this problem. Solution is copy of the user. Database of GRL,GRZ,KYP2D1,KYD2X1,L90 Relay module were developed. We made a database management system for PROSET, therefore I will show this management system briefly.

  • PDF

Design of Network Topology Map Generator for Management of Security System (보안 시스템의 관리를 위한 망 토폴러지 맵 생성기의 설계)

  • Ahn, Gae-Il;Baik, Kwang-Ho;Kim, Ki-Young;Jang, Jong-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1293-1296
    • /
    • 2002
  • 악의 있는 사용자로부터 네트워크와 시스템을 보호하기 위하여 침입 탐지 시스템이나 방화벽같은 보안 시스템들이 제안되었다. 현재 보안 영역은 사용자 망에서 ISP 망으로 확대되고 있으며, 그에 비례하여 보안 시스템의 관리가 상대적으로 중요해졌다. 또한 보안 시스템에 적용하는 정책도 단순 정적 설정에서 현재의 보안 상황을 반영하여 정책을 재 수립하는 동적 설정으로 바뀌고 있기 때문에, 이를 위하여 관리자에게 망 상태를 주기적으로 보고하는 일도 또한 매우 의미 있는 일이 되었다. 본 논문에서는 SNMP(Simple Network Management Protocol) 프로토콜을 이용하여 보안 시스템의 설치 및 운용을 용이하게 할 수 있는 망 토폴러지 맵 생성기를 설계한다. 제안하는 망 토폴러지 맵 생성기는 탐색할 네트워크 도메인이 주어지면 자동적으로 네트워크 시스템과 보안 시스템을 발견하여 망 토폴러지를 생성하며 또한 망 상태를 주기적으로 수집하는 기능도 제공한다.

  • PDF