• Title/Summary/Keyword: 토폴로지 데이터분석

Search Result 68, Processing Time 0.03 seconds

EPON Based Communication Network Architecture for Offshore Wind Power Farm (EPON을 기반으로 한 해상 풍력 단지 통신망 구조)

  • Jung, Jin-Hyo;Yang, Wonhyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.2
    • /
    • pp.130-139
    • /
    • 2013
  • In recent, the communication networks of wind power farm are becoming crucial technologies for monitoring and controlling the large-scale offshore wind power farm. In this paper, EPON based communication network architectures are proposed in order to combat the problems of conventional Ethernet based communication network such as delay, data processing overhead and the fairness of data transmission among turbines in offshore wind power farm. The proposed architecture constructs the point to multi-point network by using OLT and ONUs installed in central control center and wind turbines respectively. The EPON based communication network architecture has low cost, high reliability, and fair transmission capability. To evaluate the performance of proposed architectures, the wind power farm based on IEC 61850 is modelled by using OPNET The simulation results are analyzed and compared with conventional Ethernet based communication network in terms of the overhead, delay and fairness of data transmission.

An Improved Hierarchical Routing Protocol for Wireless Hybrid Mesh Network (무선 하이브리드 메쉬 네트워크를 위한 개선된 계층구조 라우팅 프로토콜)

  • Ki, Sang-Youl;Yoon, Won-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.5
    • /
    • pp.9-17
    • /
    • 2010
  • In this paper we propose an improved hierarchical routing protocol for wireless hybrid mesh network. The proposed method efficiently manages network topology and reduces overhead traffic for setting routing path by considering link stability. The simulation results show that the proposed method outperforms the HOLSR (hierarchical optimized link state routing) method in aggregate goodput, packet delivery ratio, and end-to-end delay.

Design of a Fault-Tolerant Routing Protocol for USN (USN을 위한 결함허용 라우팅 프로토콜의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.51-57
    • /
    • 2009
  • Ubiquitous sensor network is the communication environment where sensor nodes move freely and construct network to get the services from the system. So, it does not need fixed infrastructure and can easily be placed in unaccessible regions like war or calamity area. Wireless sensor network protocol has self-organizing capability, need to adapt topology change flexibly and also has technique that sensor nodes work cooperatively, because network disconnection is frequently occurred due to the active mobility of sensor nodes. In this paper, we design a cluster based fault-tolerant routing protocol for the efficient topology construction and to guarantee stable data transmission in USN. The performance of the proposed protocol is evaluated by an analytic model.

  • PDF

Congestion Control Algorithms Evaluation of TCP Linux Variants in Dumbbell (덤벨 네트워크에서 TCP 리눅스 변종의 혼잡 제어 알고리즘 평가)

  • Mateen, Ahamed;Zaman, Muhanmmad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.139-145
    • /
    • 2016
  • Dumbbell is the most basic topology that can be used in almost all kind of network experiment within it or just by little expansion. While Transmission Control Protocol TCP is the basic protocol that is used for the connectivity among networks and stations. TCP major and basic goal is to provide path and services to different applications for communication. For that reason TCP has to transfer a lot of data through a communication medium that cause serious congestion problem. To calculate the congestion problem, different kind of pre-cure solutions are developer which are Loss Based Variant and Delay Based Variant. While LBV keep track of the data that is going to be passed through TCP protocol, if the data packets start dropping that means congestion occurrence which notify as a symptom, TCP CUBIC use LBV for notifying the loss. Similarly the DBV work with the acknowledgment procedure that is used in when data ACK get late with respect to its set data rate time, TCP COMPOUND/VAGAS are examples of DBV. Many algorithms have been purposed to control the congestion in different TCP variants but the loss of data packets did not completely controlled. In this paper, the congestion control algorithms are implemented and corresponding results are analyzed in Dumbbell topology, it is typically used to analyze the TCP traffic flows. Fairness of throughput is evaluated for different TCP variants using network simulator (NS-2).

The Next Generation Energy Management System: Analysis and Performance Improvement of the Contingency Analysis Program (차세대 에너지 관리시스템: 상정사고 해석 프로그램 성능 개선 방안 분석)

  • Bae, Ae-Kyoung;Kang, Ho-Young;Kim, Young-In;Kim, Hong-Joo;Shin, Yong-Hark
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.134-136
    • /
    • 2014
  • 차세대 에너지 관리시스템에서 계통 해석 프로그램은 집중원격감시 시스템으로부터 취득된 데이터를 이용해 토폴로지, 상태추정, 조류계산, 상정사고, 고장해석 등의 해석 정보를 계통 운영자에게 전달한다. 지속적으로 증가하는 전력수요에 신속하게 대처하기 위해서 계통 해석 프로그램은 대규모 계통의 계획과 운영을 빠르고 정확하게 분석하여 대책을 수립할 수 있어야 한다. 본 논문에서는 계통 해석 프로그램들 중 특히 많은 시간이 소요되는 상정사고 해석 프로그램의 특성을 분석하고 성능 개선 방안을 제안한다.

A Study on Graph-Based Heterogeneous Threat Intelligence Analysis Technology (그래프 기반 이기종 위협정보 분석기술 연구)

  • Ye-eun Lee;Tae-jin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.417-430
    • /
    • 2024
  • As modern technology advances and the proliferation of the internet continues, cyber threats are also on the rise. To effectively counter these threats, the importance of utilizing Cyber Threat Intelligence (CTI) is becoming increasingly prominent. CTI provides information on new threats based on data from past cyber incidents, but the complexity of data and changing attack patterns present significant analytical challenges. To address these issues, this study aims to utilize graph data that can comprehensively represent multidimensional relationships. Specifically, the study constructs a heterogeneous graph based on malware data, and uses the metapath2vec node embedding technique to more effectively identify cyber attack groups. By analyzing the impact of incorporating topology information into traditional malware data, this research suggests new practical applications in the field of cyber security and contributes to overcoming the limitations of CTI analysis.

Performance Comparison of Brain Wave Transmission Network Protocol using Multi-Robot Communication Network of Medical Center (의료센터의 다중로봇통신망을 이용한 뇌파전송망 프로토콜의 성능비교)

  • Jo, Jun-Mo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.40-47
    • /
    • 2013
  • To verify the condition of patients moving in the medical center like hospital needs to be consider the various wireless communication network protocols and network components. Wireless communication protocols such as the 802.11a, 802.11g, and direct sequence has their specific characteristics, and the various components such as the number of mobile nodes or the distance of transmission range could affects the performance of the network. Especially, the network topologies are considered the characteristic of the brain wave(EEG) since the condition of patient is detected from it. Therefore, in this paper, various wireless communication networks are designed and simulated with Opnet simulator, then evaluated the performance to verify the wireless network that transmits the patient's EEG data efficiently. Overall, the 802.11g had the best performance for the wireless network environment that transmits the EEG data. However, there were minor difference on the performance result depends on the components of the topologies.

622M SAR Performance Analysis at ACE2000 MPLS Interface Module (ACE2000 MPLS 정합모듈에서의 622M SAR성능 분석)

  • 최창식;최병철;정연쾌
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.322-324
    • /
    • 2001
  • 초고속 국가망에 적용되는 ACE2000 ATM 교환기는 기존의 ATM 서비스외에도 IP 기반의 인터넷트래픽을 처리하기 위해서 MPLS 기능을 탑재하게 된다 이러한 MPLS 기능을 ATM 교환기에 적용하기 위해서 기존의 ATM 정함 모듈과 동일한 토폴로지를 유지하면서 IP 패킷을 저리할 수 있는 MPLS 정합 모듈과 MPLS프로토콜을 포함한 다양한 제어기능을 수행하는 MPI_S 프로세서 모듈을 추가하게 된다. 본 논문에서는 MPLS 정합 모듈의 전제적인 데이터 저리 구조와 하드웨어 기반의 IP 포워딩/머징 엔진의 구성을 살펴보았다. 특히 IP 포워딩/머징 엔진은 하드웨어 기반의 고속 패킷 처리를 위해서 622Mbps ATM SAR칩과 하드웨어 기반 룩업/포워딩 엔진으로 구성되어 있으며. 4개의 IP 포워딩/머징 엔진을 통해서 2.5G 용량의 MPLS 정합 모듈이 구성된다. 각각의 IP 포워딩/머징 엔진은 622M 트래픽을 처리하며 본 논문에서는 포워딩 엔진의 ATM 인터페이스를 담당하는 622M ATM SAR칩을 중심으로 MPLS 정합 모듈의 전체적인 패킷 처리 구조와 메모리 구조 및 성능을 분석하였다.

  • PDF

Analysis of Flooding Algorithm using FEC in Wireless Multihop Networks (멀티홉 네트워크 환경에서 FEC 를 적용한 Flooding 기법 분석)

  • Jang, Jeong-Hun;Yang, Seung-Chur;Kim, Jong-Deok
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.725-728
    • /
    • 2011
  • 멀티홉 네트워크에서 플러딩(Flooding) 기법은 토폴로지 내의 모든 노드에게 패킷을 전달하는 것이다. 대표적인 플러딩 기법인 Blind 플러딩은 패킷을 받은 모든 노드가 플러딩을 하기 때문에, 무선 네트워크의 전체적인 성능이 감소한다. 기존 연구에서는 성능 향상을 위해 중복 수신되는 패킷을 줄이는 데에만 초점이 맞춰져 있다. 하지만 실제 무선 네트워크 환경에서는 간섭에 따른 패킷 손실이 발생하고, 플러딩은 Broadcast 로 전송하기 때문에 재전송하여 손실 패킷을 복구할 수 없다. 본 논문에서는 Blind, Self-Pruning, Dominant-pruning 플러딩 기법에 재전송이 필요 없는 오류정정 기법(FEC)를 적용하여, 추가적인 잉여 데이터에 따른 전체 전송 패킷의 수와 플러딩 기법의 신뢰성을 분석 하였다.

Performance Analysis in Wireless Home Network using Bluetooth with SAW-ARQ (SAW-ARQ를 활용하여 블루투스 하에서의 무선 홈 네트워크의 성능 분석)

  • Hong, Sung-Hwa;Kang, Bong-Jik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1608-1615
    • /
    • 2010
  • In this paper, we proposed the method called "DoublePico"(Double Piconet) forovercoming low data transmission rate in a scatternet. This needs a new Ad-hoc network topology to transmit with high rate. Every node performs the function of the relay station. DoublePico has two bluetooth devices that should form two different poconets; every node can make a link between two different piconets. Two different piconets are linked in one node by the link with two bluetooth divices thereby forming the Ad-Hoc network. In this paper, we shows the method of DoublePico which supports about 457kbps of the maximum data transmission rate. This method supports a higher data transmission rate than the traditional bluetooth's Ad-Hoc topology by using analysis and comparison of existing algorithm of bluetooth specification and simulation results. Specifically, this paper focuses on the impact of intererence on the PER (Packet Error Rate), throughput performance, and the throughput improvement with SAW(Stop and Wait)-ARQ scheme in DoublePico.