• Title/Summary/Keyword: virtual links

Search Result 83, Processing Time 0.023 seconds

A Genetic Algorithm for Backup Virtual Path Routing in Multicast ATM Networks (멀티캐스트 ATM 망에서 대체가상결로의 설정을 위한 유전 알고리듬)

  • 김여근;송원섭;곽재승
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.25 no.2
    • /
    • pp.101-114
    • /
    • 2000
  • Multicasting is the simultaneous transmission of data to multiple destinations. In multicast ATM networks the effect of failures on transmission links or nodes can be catastrophic so that the issue of survivability is of great importance. However little attention has been paid to the problem of multicast restoration. This paper presents an efficient heuristic technique for routing backup virtual paths in ulticast networks with link failure. Genetic algorithm is employed here as a heuristic. In the application of genetic algorithm to the problem, a new genetic encoding and decoding method and genetic operators are proposed in this paper. The other several heuristics are also presented in order to assess the performance of the proposed algorithm. Experimental results demonstrate that our algorithm is a promising approach to solving the problem.

  • PDF

Production Equipment Monitoring System Based on Cloud Computing for Machine Manufacturing Tools

  • Kim, Sungun;Yu, Heung-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.197-205
    • /
    • 2022
  • The Cyber Physical System(CPS) is an important concept in achieving SMSs(Smart Manufacturing Systems). Generally, CPS consists of physical and virtual elements. The former involves manufacturing devices in the field space, whereas the latter includes the technologies such as network, data collection and analysis, security, and monitoring and control technologies in the cyber space. Currently, all these elements are being integrated for achieving SMSs in which we can control and analyze various kinds of producing and diagnostic issues in the cyber space without the need for human intervention. In this study, we focus on implementing a production equipment monitoring system related to building a SMS. First, we describe the development of a fog-based gateway system that links physical manufacturing devices with virtual elements. This system also interacts with the cloud server in a multimedia network environment. Second, we explain the proposed network infrastructure to implement a monitoring system operating on a cloud server. Then, we discuss our monitoring applications, and explain the experience of how to apply the ML(Machine Learning) method for predictive diagnostics.

The LVC Linkage for the Interoperability of the Battle Lab (Battle Lab에서의 상호운용성을 위한 LVC 연동방안)

  • Yun, Keun-Ho;Shim, Shin-Woo;Lee, Dong-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.81-88
    • /
    • 2012
  • In the M&S filed, The Battle Lab is available for acquisition, design, development tool, validation test, and training in the weapon system of development process. Recently, the Battle Lab in the military of Korea is still in an early stage, in spite of importance of battle lab construction. In the environment of network centric warfare, a practical use of the M&S which is connecting live, virtual and constructive model can be applied to all field of System Engineering process. It is necessary thar the Battle Lab is not restricted by time and space, and is possible for the technical implementation. In this paper, to guarantee the interoperability of live and virtual simulation, virtual simulators connect live simulators by using the tactical data link. To guarantee the interoperability of virtual and constructive simulation, both virtual simulators and constructive simulators use the RTI which is the standard tool of M&S. We propose the System that constructed the Air Defence Battle Lab. In case of the approach of target tracks, The Air Defence Battle Lab is the system for the engagement based on a command of an upper system in the engagement weapon system. Constructive simulators which are target track, missile, radar, and launcher simulator connect virtual simulators which are MCRC, battalion, and fire control center simulators using the RPR-FOM 1.0 that is a kind of RTI FOM. The interoperability of virtual simulators and live simulators can be guaranteed by the connection of the tactical data links which are Link-11B and ATDL-1.

Failure Detection and Resilience in HRing Overlay Network (HRing 오버레이 네트워크에서 실패 탐지 및 회복)

  • Gu, Tae-Wan;Lee, Kwang-Mo
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.21-33
    • /
    • 2007
  • An overlay network is a virtual network which is constructed on top of a physical computer network. A node in the overlay network is connected through virtual or logical links, where each link corresponds to a path of the links in the underlying physical network. Overlay networks are suitable for sharing heterogeneous resources in distributed environments, However, overlay networks are limited for achieving reliable communication that failure detection in overlay networks is a very important issue. In this paper, we review conditions of conventional failure detection and propose a new approach to failure detection and resilience which can be applied to HRing (Hierarchical Ring) overlay networks. The proposed method consists of the failure detection and the failure resilience phases. Because it utilizes the characteristics of the HRing overlay network for failure detection, it can reduce unnecessary network traffic and provide better scalability and flexibility. We also analyzed and evaluated the performance of the proposed approach through simulations.

  • PDF

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.

End-to-End Congestion Control of High-Speed Gigabit-Ethernet Networks based on Smith's Principle

  • Lee, Seung-Hyub;Cho, Kwang-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.101-104
    • /
    • 2000
  • Nowadays, the issue of congestion control in high-speed communication networks becomes critical in view of the bandwidth-delay products for efficient data flow. In particular, the fact that the congestion is often accompanied by the data flow from the high-speed link to low-speed link is important with respect to the stability of closed-loop congestion control. The Virtual-Connection Network (VCN) in Gigabit Ethernet networks is a packet-switching based network capable of implementing cell- based connection, link-by-link flow-controlled connection, and single- or multi-destination virtual connections. VCN described herein differ from the virtual channel in ATM literature in that VCN have link-by-link flow control and can be of multi-destination. VCNs support both connection-oriented and connectionless data link layer traffic. Therefore, the worst collision scenario in Ethernet CSMA/CD with virtual collision brings about end-to-end delay. Gigabit Ethernet networks based on CSMA/CD results in non-deterministic behavior because its media access rules are based on random probability. Hence, it is difficult to obtain any sound mathematical formulation for congestion control without employing random processes or fluid-flow models. In this paper, an analytical method for the design of a congestion control scheme is proposed based on Smith's principle to overcome instability accompanied with the increase of end-to-end delays as well as to avoid cell losses. To this end, mathematical analysis is provided such that the proposed control scheme guarantees the performance improvement with respect to bandwidth and latency for selected network links with different propagation delays. In addition, guaranteed bandwidth is to be implemented by allowing individual stations to burst several frames at a time without intervening round-trip idle time.

  • PDF

A Study on the Dynamic Analysis for Flexible Robotic Arms (유연 로보트팔의 동특성 해석에 관한 연구)

  • Kim, Chang-Boo;You, Young-Sun
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.10 no.3
    • /
    • pp.107-116
    • /
    • 1993
  • In the design and operation of robitic arm with flexible links, the equation of motion are required to exactly model the interaction between rigid body motion and elastic motion and to be formulated efficientlyl. In this paper, the flexible link is represented by applying the D-H rigid link representation method to measure the elestic deformation. And the equations of motion of robotic arm, which are configured by the generalized coordinates of elastic and rigid degrees of freedom, are formulated from the principle of virtual power. Dynamic characteristics due to elastic deformation of each link are obtained by using F. E. M to model complex shaped link acurately and by eliminating elastic modes of higher order that do not largely affect motion to reduce the number of elastic degrees of freedom. Also presented is the result of simulation of flexible robotic arms whose joints are controlled by direct or PD control.

  • PDF

Characteristics of Dynamic Track Tension for Three Dimensional High Mobility Tracked Vehicle (3차원 고기동 궤도차량의 동적 궤도장력 특성 연구)

  • 서문석;최진환;류한식;배대성
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.11 no.1
    • /
    • pp.112-120
    • /
    • 2003
  • In this paper, dynamic track tension fur high mobility tracked vehicle is investigated by multibody dynamic simulation techniques. This research focuses on a heavy military tracked vehicle which has sophisticated suspension and rubber bushed rack systems. In order to obtain accurate dynamic track tension of track subsystems, each track link is modeled as a body which has six degrees of freedom. A compliant bushing element is used to connect track links. Various virtual proving ground models are developed to observe dynamic changes of the track tension. Numerical studies of the dynamic track tension are validated against the experimental measurements. The effects of pre-tensions, traction forces, fuming resistances, sprocket torques, ground profiles, and vehicle speeds, for dynamic responses of track tensions are explored, respectively.

Hierarchical buffering scheme for supporting effective routing scheme in bidirectional MIN (Bidirectional MIN에서 효율적인 라우팅을 지원하기 위한 계층적 버퍼링 기법)

  • 장창수;김성천
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.10
    • /
    • pp.12-19
    • /
    • 1996
  • Many recent supercomputers employ a kind of switch-based multistage interconnection network architectrues (MINs) for constructing scalabel parallel compters. This paper proposed a new routing method, hybrid wormhole and virtual-cut through routing (HWCR) for the prevention of rapid performance degradation comming from a conflict in links usage at hot traffic situation. This HWCR through (VCT) for the fast removing temporal stagger, result in seamless flow of packet stream. When the blocked link is removed, wormhole routing is resumed. The HWCR method adopted a hierachical buffer scheme for improving the network performance and reducing the cost in BMINs. We could get optimum buffer size and communicatin latency through the computer simulation based on proposed HWCR, and the results were compared to those using wormhole and VCT.

  • PDF

A Mathematical Model and an Algorithm for Dimensioning Problem of B-ISDN Extension (B-ISDN 확장 시 링크용량 설계 모형 및 알고리듬에 관한 연구)

  • 주종혁
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.24 no.62
    • /
    • pp.11-20
    • /
    • 2001
  • At the initial deployment of B-ISDN, the heterogeneity of services and the bandwidth requirement make dimensioning of B-ISDN much more complicated than the dimensioning of homogeneous circuit or packet switched networks. Therefore B-ISDN must be extended gradually according to future telecommunication technology or service demands. In this paper, we propose a mathematical formulation for dimensioning problem of B-ISDN extension, considering the characteristics of ATM(Asynchronous Transfer Mode) such as various quality of services, the statistical multiplexing effects of VPCs(Virtual Path Connections) and the modularity of transmission links allocated when new B-ISDN nodes are given. The algorithm based on the simultaneous linear approximation technique and Lagrangian relaxation method and some numerical results are also presented.

  • PDF