• Title/Summary/Keyword: DEVS model

Search Result 156, Processing Time 0.022 seconds

PLC symbol naming rule for auto generation of Plant model in PLC simulation (PLC 시뮬레이션에서 Plant model 자동 생성을 위한 PLC Symbol 규칙)

  • Park, Hyeong-Tae;Wang, Gi-Nam;Park, Sang-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.1-9
    • /
    • 2008
  • Proposed in the paper is an automated procedure to construct a plant model for PLC simulation. Since PLC programs only contain the control logic without the information on the plant model, it is necessary to build the corresponding plant model to perform simulation. Conventionally, a plant model for PLC simulation has been constructed manually, and it requires much efforts as well as the in-depth knowledge of simulation. As a remedy for the problem, we propose an automated procedure to generate a plant model from the symbol table of a PLC program. To do so, we propose a naming rule for PLC symbols so that the symbol names include enough information on the plant model. By analyzing such symbol names, we extract a plant model automatically. The proposed methodology has been implemented, and test runs were made.

  • PDF

Design of Network Security Model using Contract Net Protocol (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계)

  • 서경진;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.11a
    • /
    • pp.23-28
    • /
    • 2002
  • 최근에 분산 시스템과 같이 이기종의 컴퓨팅 환경을 효율적으로 통합하는 방법에 관한 다양한 연구가 진행되고 있다. 네트워크 보안에서는 각 보안 시스템들이 효율적인 침입탐지와 차단을 위해서 분산화되고 있으며 분산된 보안 시스템들을 조정하고 통합하기 위해서 분산인공지능(Distributed Artificial Intelligence)의 개념을 도입하고 있다. 본 논문에서는 분산침입탐지 시스템(Distributed Intrusion Detection System)과 침입차단 시스템(firewall)이 계약망 프로토콜(Contract Net Protocol)에 의해 상호 연동하여 외부 네트워크에서 유입된 패킷의 정보를 통해 침입을 탐지하고 차단하는 네트워크 보안 모델을 설계하였다. 본 연구진이 구성하고 있는 시뮬레이션 환경에서는 네트워크에 존재하는 다양한 보안 모델들을 계층적으로 구성하기 위해 DEVS 방법론을 사용하였다. 보안 시스템의 연동은 계약망 프로토콜에 의해 이루어지는데 네트워크에 분산되어 있는 각각의 전문성을 가진 침입탐지 에이전트들이 중앙 콘솔에 비드(bid)글 제출하고 중앙 콘솔은 최상의 비드를 제출한 에이전트를 선택하여 침입을 탐지하게 된다. 그리고 탐지된 정보를 참조하여 침입차단 시스템은 능동적으로 침입을 차단하게 된다. 이와 같은 모델의 설계를 통해서 기존의 침입탐지 시스템들이 탐지하지 못한 침임을 탐지하게 되고 보안시스템에서의 오류발생빈도를 감소시키며 탐지의 속도를 향상시킬 수 있다.

  • PDF

A Study on the Measurement of Spatial Density and Structural Characteristic Evaluation using Discrete Event Simulation (이산사건 시뮬레이션을 활용한 공간밀도측정 및 구조특성평가)

  • Yoon, So Hee;Kim, Gun A;Kim, Suk Tae
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.7
    • /
    • pp.1090-1101
    • /
    • 2017
  • This study analyzes spatial density and integration of Space Syntax and Discrete Event Simulation (DEVS) of complex system theory and analyzes spatial structure by property, type and depth. The aim of this study is to secure the validity of the theoretical application. The study evaluated the correlation between spatial density and integration by setting up eight types of analysis models. In addition, analyzed the correlation of structural characteristics and approached the application of discrete event simulation of spatial syntax theory. It is confirmed that the concept of integration of spatial syntax theory and analysis using discrete event simulation are valid as new spatial analysis methodology. Also expect that realistic and concrete predictions will be possible if discrete event simulation evolves into research for space allocation and space efficiency optimization.

A simulation of production planning strategies for the improvement of a manufacturing process (제조공정 개선을 위한 생산계획 평가 시뮬레이션)

  • 고종영
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.2
    • /
    • pp.87-100
    • /
    • 1999
  • A manufacturing environment without a computerized system causes numerous problems, since many important decisions are made based on the experience of veteran staffs. Especially, when a strategy for the improvement of manufacturing efficiency is considered, it is hard to predict the effect of the strategy. A solution to the problem without large investment of the computerized system is the simulation study. This paper shows the modeling and simulation based on DEVS(Discrete Event System Specification). Two types of models are implemented, one for representing the current production strategy and the other for the new strategy. The new strategy is expressed as priority rules within the model. The process in concern is the metal grating production process in which the size of the group, for applying a specific cutting and scheduling strategies, is one of the important factors in improving the production efficiency. Some reliable criteria for the evaluation related to the production effeciency are established from the simulation study.

  • PDF

Modeling and Simulation of Efficient Load Balancing Algorithm on Distributed OCSP (분산 OCSP에서의 효율적인 로드 밸런싱 기법에 관한 모델링 및 시뮬레이션)

  • Choi Ji-Hye;Cho Tae Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.4
    • /
    • pp.43-53
    • /
    • 2004
  • The distributed OCSP (Online Certificate Status Protocol), composed of multiple responders, is a model that enhances the utilization of each responder and reduces the response time. In a multi-user distributed environment, load balancing mechanism must be developed for the improvement of the performance of the whole system. Conservative load balancing algorithms often ignore the communication cost of gathering the information of responders. As the number of request is increased, however, fail to consider the communication cost may cause serious problems since the communication time is too large to disregard. We propose an adaptive load balancing algorithm and evaluate the effectiveness by performing modeling and simulation. The principal advantage of new algorithm is in their simplicity: there is no need to maintain and process system state information. We evaluated the quality of load balancing achieved by the new algorithm by comparing the queue size of responders and analyzing the utilization of these responders. The simulation results show how efficiently load balancing is done with the new algorithm.

  • PDF

Modeling and Simulation of Policy-based Network Security

  • Lee, Won-young;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.155-162
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. Policy-based network provides a means by which the management process can be simplified and largely automated. In this paper we build a foundation of policy-based network modeling and simulation environment. The procedure and structure for the induction of policy rules from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Base) are developed. The structure also transforms the policy rules into PCIM (Policy Core Information Model). The effect on a particular policy can be tested and analyzed through the simulation with the PCIMs and SVDB.

  • PDF

Implementation of a tactic manager for the target motion analysis simulation of a submarine (잠수함의 표적기동분석 시뮬레이션을 위한 전술처리기의 구현)

  • Cho, Doo-Yeoun;Son, Myeong-Jo;Cha, Ju-Hwan;Lee, Kyu-Yeul;Kim, Tae-Wan;Ko, Yong-Seog
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.65-74
    • /
    • 2007
  • A tactic manager which can change the behavior of a simulation model according to the tactic definition file has been studied and implemented. Based on the DEVS(discrete event system specification) formalism, we generated a simulation model which is equipped with the inter ace to the tactic manager. To demonstrate the effectiveness of the tactic manager, a target motion analysis simulation of the warfare between a submarine and a surface ship is simulated.

  • PDF

High-level Discrete-event Modeling-based Business Process Simulation for the Scheduling of the Ship Hull Production Design (조선 선체 생산설계 일정 계획을 위한 상세 이산사건 모델링기반 비즈니스 프로세스 시뮬레이션)

  • Son, Myeong-Jo;Kim, Tae-Wan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.3
    • /
    • pp.224-233
    • /
    • 2013
  • For the scheduling and the job assignment of the ship hull production design which is a process-based work, we suggest the simulation-based scheduling using the discrete-event-based business process simulation. First, we analyze the ship hull production design process from the perspective of a job assignment to make it into the simulation model using DEVS (Discrete Event System Specification) which is the representative modeling method for a discrete-event simulation. Based on the APIs of the open-source discrete-event simulation engine, we implement the simulation using the Groovy script. We develop the scenario generator in which the user defines detail information of the construction drawing and its member blocks, and design engineers information, and the various setting for the simulation including the job assignment strategy. We use the XML files from this scenario generator as inputs of simulation so that we can get simulation result in forms of Gantt chart without changes of the simulation model.

Modeling and Simulation of Firewall System and Security Functions of Operating System for Network Security (네트워크 보안을 위한 침입차단 시스템과 운영체제 보안 기능 모델링 및 시뮬레이션)

  • 김태헌;이원영;김형종;김홍근;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.2
    • /
    • pp.1-16
    • /
    • 2002
  • The need for network security is being increasing due to the development of information communication and internet technology. In this paper, firewall models, operating system models and other network component models are constructed. Each model is defined by basic or compound model, referencing DEVS formalism. These models and the simulation environment are implemented with MODSIM III, a general purpose, modular, block-structured high-level programming language which provides direct support for object-oriented programming and discrete-event simulation. In this simulation environment with representative attacks, the following three attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service, Mail bomb attack as an attack type of e-mail. The simulation is performed with the models that exploited various security policies against these attacks. The results of this study show that the modeling method of packet filtering system, proxy system, unix and windows NT operating system. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF

A Digital Twin Simulation Model for Reducing Congestion of Urban Railways in Busan (부산광역시 도시철도 혼잡도 완화를 위한 디지털 트윈 시뮬레이션 모델 개발)

  • Choi, Seon Han;Choi, Piljoo;Chang, Won-Du;Lee, Jihwan
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.10
    • /
    • pp.1270-1285
    • /
    • 2020
  • As a representative concept of the fourth industrial revolution era where everything is digitized, digital twin means analyzing and optimizing a complex system using a simulation model synchronized with the system. In this paper, we propose a digital twin simulation model for the efficient operation of urban railways in Busan. Due to the geopolitical nature of Busan, where there are many mountains and narrow roads, the railways are more useful than other public transportation. However, this inversely results in a high level of congestion, which is an inconvenience to citizens and may be fatal to the spread of the virus, such as COVID19. Considering these characteristics, the proposed model analyzes the congestion level of the railways in Busan. The model is developed based on a mathematical formalism called discrete-event system specification and deduces the congestion level and the average waiting time of passengers depending on the train schedule. In addition, a new schedule to reduce the congestion level is derived through particle swarm optimization, which helps the efficient operation of the railways. Although the model is developed for the railways in Busan, it can also be used for railways in other cities where a high level of congestion is a problem.