• Title/Summary/Keyword: traffic simulation model

Search Result 729, Processing Time 0.028 seconds

Hop-by-Hop Dynamic Addressing Based Routing Protocol for Monitoring of long range Underwater Pipeline

  • Abbas, Muhammad Zahid;Bakar, Kamalrulnizam Abu;Ayaz, Muhammad;Mohamed, Mohammad Hafiz;Tariq, Moeenuddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.731-763
    • /
    • 2017
  • In Underwater Linear Sensor Networks (UW-LSN) routing process, nodes without proper address make it difficult to determine relative sensor details specially the position of the node. In addition, it effects to determine the exact leakage position with minimized delay for long range underwater pipeline monitoring. Several studies have been made to overcome the mentioned issues. However, little attention has been given to minimize communication delay using dynamic addressing schemes. This paper presents the novel solution called Hop-by-Hop Dynamic Addressing based Routing Protocol for Pipeline Monitoring (H2-DARP-PM) to deal with nodes addressing and communication delay. H2-DARP-PM assigns a dynamic hop address to every participating node in an efficient manner. Dynamic addressing mechanism employed by H2-DARP-PM differentiates the heterogeneous types of sensor nodes thereby helping to control the traffic flows between the nodes. The proposed dynamic addressing mechanism provides support in the selection of an appropriate next hop neighbour. Simulation results and analytical model illustrate that H2-DARP-PM addressing support distribution of topology into different ranges of heterogeneous sensors and sinks to mitigate the higher delay issue. One of the distinguishing characteristics of H2-DARP-PM has the capability to operate with a fewer number of sensor nodes deployed for long-range underwater pipeline monitoring.

Performance Evaluation of Trunked Land Mobile Radio System (Trunked Land Mobile Radio System의 트래픽 성능분석)

  • 이하철;김원균;이병섭
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.5
    • /
    • pp.431-441
    • /
    • 1997
  • In this paper, a performance evaluation method for the Trunked Land Mobile Radio System, so called TRS(Trunked Radio System), is presented. The proposed evaluation method employs LCD(Lost Call Delayed) system model and Erlang-C distribution. In this system, queues are used to hold call requests that are initally blocked. When a user attempts a call and a channel is not immediately available, the call request may be delayed until a channel becomes available. For evaluating system performance, therefore, the probability that any caller is delayed in the queue for a waiting time greater than t seconds is derived and simulated by using such parameters as total number of available channels, traffic load and average duration of a call. Furthermore, the performance of the message and the transmission trunked channel assignment strategies is compared. The performance simulation results show that transmission trunking is shown to be more efficient than message trunking.

  • PDF

False Data Reduction Strategy for P2P Environment (P2P 환경을 위한 허위 데이터 감축 정책)

  • Kim, Seung-Yun;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.5
    • /
    • pp.93-100
    • /
    • 2011
  • In this paper, we propose a FDR(False Data Reduction) strategy for P2P environment that reduces false data. The key idea of our strategy is that we use FDR algorithm to stop transmitting of false data and to delete that. If a user recognizes false data in downloaded-data and the user's peer requests the others to stop the transmission of the false data immediately. Also, the FDR algorithm notifies the other peers to prohibit spreading of the false data in the environment. All this procedure is possible to be executed in each peer without any lookup server. The FDR algorithm needs only a little data exchange among peers. Through simulation, we show that it is more effective to reduce the network traffic than the previous P2P strategy. We also show that the proposed strategy improves the performance of network compared to previous P2P strategy. As a result, The FDR strategy is decreased 9.78 ~ 16.84% of mean true data transmission time.

An Approach for Worm Propagation Modeling using Scanning Traffic Profiling (스캐닝 트래픽의 프로파일링을 통한 인터넷 웜 확산 모델링 기법)

  • Shon, Tae-Shik;Koo, Bon-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.67-74
    • /
    • 2010
  • Recently, the early detection and prevention of worm research is mainly studying based on the analysis of generalized worm propagation property. However, it is not easy to do Worm early detection with its attributes because the modeling method for Worm propagation is vague and not specified yet. Worm scanning method is exceedingly effect to Worm propagation process. This paper describes a modeling method and its simulations to estimate various worm growth patterns and their corresponding propagation algorithms. It also tests and varies the impact of various improvements, starting from a trivial simulation of worm propagation and the underlying network infrastructure. It attempts to determine the theoretical maximum propagation speed of worms and how it can be achieved. Moreover, we present the feasibility of the proposed model based on real testbed for verification.

An Improved Handoff and Resource Reservation Scheme Using Triggers in Wireless Network (이동망에서 트리거를 이용한 향상된 핸드오프 메커니즘 및 자원예약 방안)

  • Lee, Don-Su;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10B
    • /
    • pp.630-637
    • /
    • 2007
  • In this paper, we propose an effective handoff mechanism using events at the layer 2 and a tunnel-based mechanism that is performed by sharing information of a mobile node and anticipated-based handoff. Also, we propose a novel anticipated-reservation mechanism using the events triggered at layer 2 to make easy a resource reservation procedure. Comparing with the existing mobile IPv6 handoff mechanism, our proposed handoff mechanism can reduce an amount of handoff latency and traffic volume between access routers where handoff is performed. In the anticipated-reservation mechanism, the amount of signaling traffics between an mobile node and the correspondent nodes can be reduced and then the allocation of resource can be accomplished. We present the performance of our proposed handoff mechanism in the wireless network environment by ns-2 simulation. Although the anticipated-reservation mechanism including a proxy agent is explained without performance evaluation, we can validate the operation of our proposed model only by the procedure of message flow.

Development Status of Korea Accelerated Loading and Environment Simulator (KALES) (한국형 포장가속시험시설의 개발현황)

  • Yang, Seong-Cheol;Yu, Tae-Seok;Eom, Ju-Yong
    • International Journal of Highway Engineering
    • /
    • v.2 no.2
    • /
    • pp.139-148
    • /
    • 2000
  • Currently existing Accelerated Pavement Testing (APT) systems developed in several countries have been employed mainly to test the performance of asphalt pavement. Meanwhile, the length of concrete pavement is similar to that of asphalt pavement in expressways of Korea. and is expected to increase due to its durability and compatibility to our weather condition. To meet the society's demand of having our own APT system which can examine the long-term performance of concrete pavement, a contract study to develop Korea Accelerated Loading and Environment Simulator (KALES) for concrete pavement has been performed for 3 years from 1997 through 1999. Through the project, a detailed design was Peformed for the KALES system in which the entire structure of KALES, loading mechanism, wandering mechanism, suspension system, driving system were proposed. Also in advance to design a full-scale KALES system, a sample scale model was manufactured and tested for operating motion and force distribution. It is evident that the proposed prototype KALES system will provide higher degree of traffic simulation and durable operation, based on the satisfactory fatigue analysis.

  • PDF

Capacity Estimation Models for Work-zones Under Traffic Signal Influence and the Empirical Validation (신호영향권 하 도로공사구간에서의 용량산정모형 개발과 실증)

  • Shin, Chi-Hyun
    • Journal of Korean Society of Transportation
    • /
    • v.31 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • This paper focuses on the development of analytical models for estimating the changes in saturation flow rates (SFR) at the stop-lines of a signalized intersection due to the existence of nearby work-zones, and thereby calculating the prevailing capacity values for specific lane groups. Major changes were incorporated in the logics of previous models and significant revisions have been made to secure the accuracy and simplicity. Furthermore, much attention was paid to model validation by making comparisons to both extensive simulation results and empirical data from various sites. It was found that SFRs are highly sensitive to the location of work-zones, the distance to each work-zone from the stop-line of a concerned approach, the number of lanes open and closed, and the effective green time. Using such geometric and operating conditions that constitute work-zone environment, the proposed models successfully estimated SFR values with a miniscule margin of error.

Evaluation of SWMM Model Adjustment for Rubber-tired Tram Disaster Management System against the Snow-melt during the Winter (겨울철 융설을 대비한 바이모달 트램 재해관리 시스템의 SWMM 모형 적용성 평가)

  • Kim, Jong-Gun;Park, Young-Kon;Yoon, Hee-Taek;Park, Youn-Shik;Jang, Won-Seok;Yoo, Dong-Seon;Lim, Kyoung-Jae
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.56-60
    • /
    • 2008
  • Increasing urban sprawl and climate changes have been causing unexpected high-intensity rainfall events. Thus there are needs to enhance conventional disaster management system for comprehensive actions to secure safety. Therefore long-term and comprehensive flood management plans need to be well established. Recently torrential snowfall are occurring frequently, causing have snow traffic jams on the road. To secure safety and on-time operation of the Bi-modal tram system, well-structured disaster management system capable of analyzing the urban flash flooding and snow pack melt/freezing due to unexpected rainfall event and snowfall are needed. To secure safety of the Bi-modal tram system due to torrential snowfall, the snow melt simulation capability was investigated. The snow accumulation and snow melt were measured to validate the SWMM snow melt component. It showed that there was a good agreement between measured snow melt data and the simulated ones. Therefore, the Bi-modal tram disaster management system will be able to predict snow melt reasonably well to secure safety of the Bi-modal tram system during the winter. The Bi-modal tram disaster management system can be used to identify top priority area for snow removal within the tram route in case of torrential snowfall to secure on-time operation of the tram. Also it can be used for detour route in the tram networks based on the disaster management system predicted data.

  • PDF

A Study on the Analysis and Detection Method for Protecting Malware Spreading via E-mail (전자우편을 이용한 악성코드 유포방법 분석 및 탐지에 관한 연구)

  • Yang, Kyeong-Cheol;Lee, Su-Yeon;Park, Won-Hyung;Park, Kwang-Cheol;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.93-101
    • /
    • 2009
  • This paper proposes the detection method of spreading mails which hacker injects malicious codes to steal the information. And I developed the 'Analysis model' which is decoding traffics when hacker's encoding them to steal the information. I researched 'Methodology of intrusion detection techniques' in the computer network monitoring. As a result of this simulation, I developed more efficient rules to detect the PCs which are infected malicious codes in the hacking mail. By proposing this security policy which can be applicable in the computer network environment including every government or company, I want to be helpful to minimize the damage by hacking mail with malicious codes.

A Case Study on Near-Cloud Turbulence around the Mesoscale Convective System in the Korean Peninsula (한반도에서 발생한 중규모 대류계의 구름 주변 난류 발생 메커니즘 사례 연구)

  • Sung-Il Yang;Ju Heon Lee;Jung-Hoon Kim
    • Atmosphere
    • /
    • v.34 no.2
    • /
    • pp.153-176
    • /
    • 2024
  • At 0843 UTC 30 May 2021, a commercial aircraft encountered severe turbulence at z = 11.5 km associated with the rapid development of Mesoscale Convective System (MCS) in the Gyeonggi Bay of Korea. To investigate the generation mechanisms of Near-Cloud Turbulence (NCT) near the MCS, Weather Research and Forecasting model was used to reproduce key features at multiple-scales with four nested domains (the finest ∆x = 0.2 km) and 112 hybrid vertical layers. Simulated subgrid-scale turbulent kinetic energy (SGS TKE) was located in three different regions of the MCS. First, the simulated NCT with non-zero SGS TKE at z = 11.5 km at 0835 UTC was collocated with the reported NCT. Cloud-induced flow deformation and entrainment process on the downstream of the overshooting top triggered convective instability and subsequent SGS TKE. Second, at z = 16.5 km at 0820 UTC, the localized SGS TKE was found 4 km above the overshooting cloud top. It was attributed to breaking down of vertically propagating convectively-induced gravity wave at background critical level. Lastly, SGS TKE was simulated at z = 11.5 km at 0930 UTC during the dissipating stage of MCS. Upper-level anticyclonic outflow of MCS intensified the environmental westerlies, developing strong vertical wind shear on the northeastern quadrant of the dissipating MCS. Three different generation mechanisms suggest the avoidance guidance for the possible NCT events near the entire period of the MCS in the heavy air traffic area around Incheon International Airport in Korea.