• Title/Summary/Keyword: 네트워크 모델링

Search Result 1,011, Processing Time 0.026 seconds

A DEVS-based Modeling & Simulation Methodology of Enabling Node Mobility for Ad Hoc Network (노드 이동성을 고려한 애드 혹 네트워크의 이산 사건 시스템 기반 모델링 및 시뮬레이션 방법론)

  • Song, Sang-Bok;Lee, Kyou-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.127-136
    • /
    • 2009
  • Modeling and Simulation, especially in mobile ad hoc network(MANET), are the most effective way to analyze performance or optimize system parameters without establishing real network environment. Focusing mainly on overall network behaviors in MANET concerns dynamics of network transport operations, which can efficiently be characterized with event based system states rather than execution details of protocols. We thus consider the network as a discrete event system to analyze dynamics of network transport performance. Zeigler's set-theoretic DEVS(Discrete Event Systems Specification) formalism can support specification of a discrete event system in hierarchical, modular manner. The DEVSim++ simulation environment can not only provide a rigorous modeling methodology based on the DEVS formalism but also support modelers to develop discrete event models using the hierarchical composition methodology in object-orientation. This environment however hardly supports to specify connection paths of network nodes, which are continuously altered due to mobility of nodes. This paper proposes a DEVS-based modeling and simulation methodology of enabling node mobility, and develops DEVS models for the mobile ad hoc network. We also simulate developed models with the DEVSim++ engine to verify the proposal.

A Hybrid Modeling Method for RCS Worm Simulation (RCS 웜 시뮬레이션을 위한 Hybrid 모델링 방법)

  • Kim, Jung-Sik;Park, Jin-Ho;Cho, Jae-Ik;Choi, Kyoung-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.43-53
    • /
    • 2007
  • Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. With the explosion of Internet, the occurrence of cyber terrorism has grown very rapidly. Simulation is one of the most widely used method to study internet worms. But, it is quite challenging to simulate very large-scale worm attacks because of various reasons. In this paper, we propose a hybrid modeling method for RCS(Random Constant Spreading) worm simulation. The proposed hybrid model simulates worm attacks by synchronizing modeling network and packet network. So, this model will be both detailed enough to generate realistic packet traffic, and efficient enough to model a worm spreading through the Internet. Moreover, our model have the capability of dynamic updates of the modeling parameters. Finally, we simulate the hybrid model with the CodeRed worm to show validity of our proposed model for RCS worm simulation.

Coverage Modeling in Neural Machine Translation using Orthogonal Regularization (직교 정규화를 이용한 신경망 기계 번역에서의 커버리지 모델링)

  • Lee, Yo-Han;Kim, Young-Kil
    • Annual Conference on Human and Language Technology
    • /
    • 2018.10a
    • /
    • pp.561-566
    • /
    • 2018
  • 최근 신경망 번역 모델에 주의 집중 네트워크가 제안되어 기존의 기계 번역 모델인 규칙 기반 번역 모델, 통계적 번역 모델에 비해 높은 번역 성능을 보이고 있다. 그러나 주의 집중 네트워크가 잘못 모델링되는 경우 과소 번역 현상이 나타난다. 신경망 번역 모델에 커버리지 메커니즘을 추가하여 과소 번역 현상을 완화하는 연구가 진행되었으나 이는 모델의 구조를 변경해야하는 불편함이 있다. 본 논문에서는 신경망 번역 모델의 구조를 변경하지 않고 새로운 손실 함수를 정의하여 과소 번역 현상을 완화하는 방법을 제안한다. 한-영 번역 실험을 통해 제안한 주의 집중 네트워크의 정규화 방법이 커버리지 메커니즘의 목적을 효율적으로 달성함을 보인다.

  • PDF

Design of the Agent-based Network-Centric Warfare Modeling System (에이전트 기반의 NCW 전투모델링 시스템 설계)

  • Park, Se-Youn;Shin, Ha-Yong;Lee, Tae-Sik;Choi, Bong-Wan
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.271-280
    • /
    • 2010
  • While the future warfare is expected to be appeared as network-centric, effect-based, and coordinated cooperative, most current M&S systems reflect only the unit behaviors and interactions of each weapon system. There are limitations to analyze the behaviors of managing weapons cooperatively and sharing the situational awareness over the networks of distributed sensors, C2, and shooters using them. Therefore, we introduce the new design of the networkcentric warfare modeling system using the agent-based modeling and simulation approach. We have developed a system for engagement-level warfare models and tested with multi-platform battleship warfare. In this paper, we propose the method to design battle agents, environments, and networks for network centric warfare modeling.

ASIT for Efficient energy management of Sensor node In Wireless Sensor Networks (무선 센서 네트워크에서 센서 노드의 효율적 에너지 관리를 위한 ASIT)

  • Lee, Jong-Seung;Doo, Kyoung-Min;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.369-372
    • /
    • 2008
  • 무선 센서 네트워크(WSN)는 소규모, 저비용, 저전력 지능형의 센서 노드로 구성되고, 원격 환경 감시와 군사작전 및 재난 상황 등에 응용 될 수 있는 기술이다. 이러한 센서 네트워크에서 구성된 노드의 에너지 공급은 독립된 소형배터리를 통해 이루어진다. 따라서 각 노드에서의 에너지의 효율적인 관리가 무선 센서 네트워크의 최대 쟁점이 되고 있다. 본 논문에서는 이러한 노드의 제한된 배터리 자원을 보다 효율적으로 유지 관리하기 위한 방법으로 ASIT(Advanced Sensing Interval Time) 알고리즘을 제안한다. 제안된 ASIT란 입력된 센싱 값의 변화와 센서 노드의 에너지 잔여량에 따라 센싱 주기를 제어 관리하는 방법으로 이에 대한 모델링을 수립하고, 실제 노드 관리 결과와 모델링 된 결과의 오차를 관찰하여 적중율을 향상하는 기법을 제안한 것이다. 제안된 ASIT의 알고리즘으로부터 센서 노드의 수명을 향상 시켜 궁극적으로는 무선 센서 네트워크 전체의 망 접속의 신뢰성과 노드 관리 수명을 연장시키며, 망의 토폴로지 구성의 측면에서는 전체적인 영역의 커버리지를 향상시키는 동시에 제한된 배터리 자원을 효율적으로 관리 할 수 있는 걸과를 얻게 된다.

  • PDF

Load Modeling Method Based on Radial Basis Function Networks Considering of Hormonic components (고조파를 고려한 방사기저함수 네트워크 기반의 부하모델링 기법)

  • Ji, Pyeong-Shik;Lee, Dae-Jong;Lee, Jong-Pil;Lim, Jae-Yoon
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.4
    • /
    • pp.46-53
    • /
    • 2008
  • In this study, we developed RBFN(Radial Basis Function Networks) based load modeling method with harmonic components. The developed method considers harmonic information as well as fundamental frequency and voltage considered as essential factors in conventional method. Thus, the reposed method makes it possible to effectively estimate load characteristics in power lines with harmonics. RBFN has some advantage such as simple structure and rapid computation ability compared with multi-layer perceptorn which is extensively applied for load modeling. To verify the effectiveness, the proposed method has been intensively tested with various dataset acquired under the different frequency and voltage and compared it with conventional methods such as polynomial method, MLPN and RBFN with no harmonic components.

Performance Evaluation of a Switching System for Metropolitan Area Networks (메트로폴리탄 에어리어 네트워크를 위한 스위칭 시스템의 성능 분석)

  • Mun Youngsong
    • Journal of Internet Computing and Services
    • /
    • v.4 no.6
    • /
    • pp.69-73
    • /
    • 2003
  • ATM and Ethernet are desirable transport mechanisms for the realization MAN(Metropolitan Area Networks). A relatively small sized switching system for MAN based on ATM is proposed and its performance is evaluated in this paper. For the performance evaluation, traffics should be firstly modeled because they are highly bursty. By varing the ratio of VBR traffics, detrimental effect of VBR traffics may be observed. Traffic load at each input port is also varied, From the results of simulation, operation conditions of the system to meet required QoS are obtained.

  • PDF

Proposal of Network Attack/Defence Simulation Framework (네트워크 공격 및 방어 시뮬레이션 프레임워크 제안)

  • Kwon, Oh-Chul;Bae, Seong-Jae;Cho, Jae-Ik;Moon, Jong-Sub
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.17-20
    • /
    • 2008
  • 네트워크에서의 공격은 일반 사용자의 개인 정보 노출 및 국가 중요 네트워크에서의 불법 정보 노출 등 많은 위험 상황을 야기할 수 있다. 현재의 네트워크가 대규모화되고 고속화되고 있는 시점에서 기존의 저 수준의 공격이 아닌 다양한 기술이 접목된 네트워크 공격이 발생하고 있다. 이러한 공격의 영향을 실제 상황에서 분석하기에는 많은 어려움이 따르며 정확한 분석에 제약이 따르게 된다. 따라서 이러한 네트워크 공격을 모델링하고 침입탐지 및 차단을 모델링할 수 있는 시뮬레이션의 발달이 필요하다. 본 논문에서는 정상상태 모델, 공격 모델, 방어 모델로 이루어지는 네트워크 공격 및 방어 시뮬레이션 프레임워크를 제안하도록 하겠다.

  • PDF

Transport Performance Analysis of the SDR-based Interworking Networks Using DEVS Methodology (SDR을 포함하는 다종 네트워크의 전달성능 분석을 위한 DEVS 모델링 및 시뮬레이션 연구)

  • Song, Sang-Bok;Lee, Kyou-Ho;Jang, Won-Ick
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.153-158
    • /
    • 2008
  • The technology of Software Defined Radio (SDR) is a possible solution to interwork flexibly between various wireless transport protocols. Ubiquitous network, like u-health service network, includes sensor devices or nodes which do not facilitate all the same transport protocols to access network. As such this may be in such unreachable situations as poverty of all required AP (Access Point)’s, faults or contention in a path of particular protocol communication, etc. This paper presents research results of modeling and simulation to analyze transport performance of multi-protocol ubiquitous network which includes SDR-based interwork nodes and congestion-controlled AP’s. Focusing mainly on dynamics of overall transport performance rather than protocol execution procedures, this paper employs the Zeigler’s DEVS (Discrete Event Systems Specification) methodology and DEVSim++simulation environment to experiment.

  • PDF

Network Security Modeling and Simulation Using the SES/MB Framework (SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 시뮬레이션)

  • 지승도;박종서;이장세;김환국;정기찬;정정례
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.13-26
    • /
    • 2001
  • This paper presents the network security modeling methodology and simulation using the hierarchical and modular modeling and simulation framework. Recently, Howard and Amoroso developed the cause-effect model of the cyber attack, defense, and consequences, Cohen has been proposed the simplified network security simulation methodology using the cause-effect model, however, it is not clear that it can support more complex network security model and also the model-based cyber attack simulation. To deal with this problem, we have adopted the hierarchical and modular modeling and simulation environment so called the System Entity Structure/Model Base (SES/MB) framework which integrates the dynamic-based formalism of simulation with the symbolic formalism of AI. Several simulation tests performed on sample network system verify the soundness of our method.