• Title/Summary/Keyword: Hierarchical Networks

Search Result 545, Processing Time 0.021 seconds

A Cost-Effective IP Paging Scheme for Hierarchical Mobile IP Networks (계층적 이동 IP 네트워크에서의 비용 효율적인 IP 페이징 기법)

  • Kong, Ki-Sik
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.84-90
    • /
    • 2011
  • Handling paging mechanism at the IP layer (i.e., IP paging) makes it possible to support heterogeneous wireless access technologies, providing energy-saving and reduced location registration signaling overhead over IP-based mobile networks. However, IP paging may rather cause adverse effects under active communication environments because of significant paging signaling overhead and frequent paging delay. Therefore, in order to solve these problems, a cost-effective IP paging scheme is proposed in this paper, which enables a mobile node to perform selective registration and paging based on its profile information. Numerical results indicate that the proposed scheme has apparent potential to mitigate considerable paging signaling overhead and frequent paging delay in IP-based hierarchical mobile networks.

Torus Ring : Improving Performance of Interconnection Networks by Modifying Hierarchical Ring (Torus Ring : 계층 링 구조의 변형을 통한 상호 연결망의 성능 개선)

  • Kwak, Jong-Wook;Ban, Hyong-Jin;Jhon, Chu-Shik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.5
    • /
    • pp.196-208
    • /
    • 2005
  • In multiprocessor systems, interconnection network design is critical for overall system performance. Popular interconnection networks, which are generally considered, are meshes, rings, and hierarchical rings. In this paper, we propose (')Torus Ring('), which is a modified version of hierarchical ring. Torus Ring has the same complexity as the hierarchical rings, but the only difference is the way it connects the local rings. It has an advantage over the hierarchical rings when the destination of a packet is the neighbor local ring in the reverse direction. Though the average number of hops in Torus Ring is equal to that of the hierarchical rings when assuming the uniform distribution of each transaction, the benefits of the number of hops are expected to be larger because of the spatial locality in the real environment of parallel programming. In the simulation results, latencies in the interconnection network are reduced by up to 19$\%$, and the execution times are reduced by up to 10$\%$.

Improving Performance of Internet by Using Hierarchical Proxy Cache (계층적 프록시 캐쉬를 이용한 인터넷 성능 향상 기법)

  • 이효일;김종현
    • Journal of the Korea Society for Simulation
    • /
    • v.9 no.2
    • /
    • pp.1-14
    • /
    • 2000
  • Recently, as construction of information infra including high-speed communication networks remarkably expands, more various information services have been provided. Thus the number of internet users rapidly increases, and it results in heavy load on Web server and higher traffics on networks. The phenomena cause longer response time that means worse quality of service. To solve such problems, much effort has been attempted to loosen bottleneck on Web server, reduce traffic on networks and shorten response times by caching informations being accessed more frequently at the proxy server that is located near to clients. And it is also possible to improve internet performance further by allowing clients to share informations stored in proxy caches. In this paper, we perform simulations of hierarchical proxy caches with the 3-level 4-ary tree structure by using real web traces, and analyze cache hit ratio for various cache replacement policies and cache sizes when the delayed-store scheme is applied. According to simulation results, the delayed-store scheme increases the remote cache hit ratio, that improves quality of service by shortening the service response time.

  • PDF

Wavelength and Waveband Assignment for Ring Networks Based on Parallel Multi-granularity Hierarchical OADMs

  • Qi, Yongmin;Su, Yikai;Jin, Yaohui;Hu, Weisheng;Zhu, Yi;Zhang, Yi
    • ETRI Journal
    • /
    • v.28 no.5
    • /
    • pp.631-637
    • /
    • 2006
  • In this paper we study the optimization issues of ring networks employing novel parallel multi-granularity hierarchical optical add-drop multiplexers (OADMs). In particular, we attempt to minimize the number of control elements for the off-line case. We present an integer linear programming formulation to obtain the lower bound in optimization, and propose an efficient heuristic algorithm called global bandwidth resource assignment that is suitable for the design of large-scale OADM networks.

  • PDF

Hierarchical Constraint Network Representation of Concurrent Engineering Models (동시성공학 모형의 계층적 제약식 네트워크 표현 방법론)

  • Kim, Yeong-Ho
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.22 no.3
    • /
    • pp.427-440
    • /
    • 1996
  • Constraint networks are a major approach to knowledge representation in Concurrent Engineering (CE) systems. The networks model various factors in CE as constraints linked by shared variables. Many systems have been developed to assist constraint network processing. While these systems can be useful, their underlying assumption that a solution must simultaneously satisfy all the constraints is often unrealistic and hard to achieve. Proposed in this paper is a hierarchical representation of constraint networks using priorities, namely Prioritized Constraint Network (PCN). A mechanism to propagate priorities is developed, and a new satisfiability definition taking into account the priorities is described. Strength of constraint supporters can be derived from the propagated priorities. Several properties useful for investigating PCN's and finding effective solving strategies ore developed.

  • PDF

System Capacity and Coverage Analysis of Hierarchical Femtocell Networks (펨토셀 기반 계층셀 구조 시스템 용량 및 서비스 반경 분석)

  • O, Nam-Geol;Kim, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6A
    • /
    • pp.476-483
    • /
    • 2009
  • Recently much attention has been devoted to femtocell's potential to improve indoor cellular coverage and high speed wireless communications. Femtocell based commercial services have been already launched in some countries and standardization activities are actively on-going, there has been concern however over potential issues of interference between femtocells and the micro/macro networks. With universal frequency reuse, the ensuing cross-tier interference causes unacceptable data rate and outage probability, so an analysis of effect of interference in femtocell embedded networks would be necessary for a stable system design. This paper investigates the effect of interference on system performances of femtocell embedded hierarchical cell structure (HCS) networks considering the characteristics of propagation environments. Various channel parameters are specially considered for indoor environments where most of femtocells are deployed to investigate the effect of interference of femtocell embedded RCS networks. System capacity and coverage are provided with variant distance between macrocell and femtocell, location of the user in femtocell coverage, and characteristic of building structures.

A Method to Support Mobile Sink Node in a Hierarchical Routing Protocol of Wireless Sensor Networks (무선 센서 네트워크를 위한 계층적 라우팅 프로토콜에서의 이동 싱크 노드 지원 방안)

  • Kim, Dae-Young;Cho, Jin-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1B
    • /
    • pp.48-57
    • /
    • 2008
  • Wireless sensor networks are composed of a lot of sensor nodes and they are used to monitor environments. Since many studies on wireless sensor networks have considered a stationary sink node, they cannot provide fully ubiquitous applications based on a mobile sink node. In those applications, routing paths for a mobile sink node should be updated while a sink node moves in order to deliver sensor data without data loss. In this paper, we propose a method to continuously update routing paths for a mobile sink node which can be extended on hierarchical multi-hop routing protocols in wireless sensor networks. The efficiency of the proposed scheme has been validated through comparing existing method using a location based routing protocol by extensive computer simulation.

On the Design of Delay based Admission Control in Hierarchical Networks

  • Shin, Seungjae;Kim, Namgi;Lee, Byoung-Dai;Choi, Yoon-Ho;Yoon, Hyunsoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.997-1010
    • /
    • 2014
  • Today, as the hierarchical cellular system is getting more attention than before, some recent studies introduce delay based admission control (AC) scheme which delays the admission to the macro-embedded small cell for a relatively short time to prevent unnecessary handover caused by the short-term visitors of the small cell area. In such delay based ACs, when we use improper delay parameter, the system frequently makes incorrect handover decisions such as where unnecessary handover is allowed due to too short delaying, or where necessary handover is denied due to too long delaying. In order to avoid these undesirable situations as much as possible, we develop a new delay parameter decision method based on probabilistic cell residence time approximations. By the extensive numerical and analytical evaluations, we determine the proper delay parameter which prevents the incorrect handover decision as much as possible. We expect our delay parameter decision method can be useful system administration tips in hierarchical cellular system where delay based AC is adopted.

Performance Improvement of Object Recognition System in Broadcast Media Using Hierarchical CNN (계층적 CNN을 이용한 방송 매체 내의 객체 인식 시스템 성능향상 방안)

  • Kwon, Myung-Kyu;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.201-209
    • /
    • 2017
  • This paper is a smartphone object recognition system using hierarchical convolutional neural network. The overall configuration is a method of communicating object information to the smartphone by matching the collected data by connecting the smartphone and the server and recognizing the object to the convergence neural network in the server. It is also compared to a hierarchical convolutional neural network and a fractional convolutional neural network. Hierarchical convolutional neural networks have 88% accuracy, fractional convolutional neural networks have 73% accuracy and 15%p performance improvement. Based on this, it shows possibility of expansion of T-Commerce market connected with smartphone and broadcasting media.

A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction

  • Katiravan, Jeevaa;N, Duraipandian;N, Dharini
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4644-4661
    • /
    • 2015
  • Wireless sensor networks are often organized in the form of clusters leading to the new framework of WSN called cluster or hierarchical WSN where each cluster head is responsible for its own cluster and its members. These hierarchical WSN are prone to various routing layer attacks such as Black hole, Gray hole, Sybil, Wormhole, Flooding etc. These routing layer attacks try to spoof, falsify or drop the packets during the packet routing process. They may even flood the network with unwanted data packets. If one cluster head is captured and made malicious, the entire cluster member nodes beneath the cluster get affected. On the other hand if the cluster member nodes are malicious, due to the broadcast wireless communication between all the source nodes it can disrupt the entire cluster functions. Thereby a scheme which can detect both the malicious cluster member and cluster head is the current need. Abnormal energy consumption of nodes is used to identify the malicious activity. To serve this purpose a learning based energy prediction algorithm is proposed. Thus a two level energy prediction based intrusion detection scheme to detect the malicious cluster head and cluster member is proposed and simulations were carried out using NS2-Mannasim framework. Simulation results achieved good detection ratio and less false positive.