• Title/Summary/Keyword: Logical Private Network

Search Result 12, Processing Time 0.022 seconds

A Layered Network Flow Algorithm for the Tunnel Design Problem in Virtual Private Networks with QoS Guarantee

  • Song, Sang-Hwa;Sung, Chang-Sup
    • Management Science and Financial Engineering
    • /
    • v.12 no.2
    • /
    • pp.37-62
    • /
    • 2006
  • This paper considers the problem of designing logical tunnels in virtual private networks considering QoS guarantee which restricts the number of tunnel hops for each traffic routing. The previous researches focused on the design of logical tunnel itself and Steiner-tree based solution algorithms were proposed. However, we show that for some objective settings it is not sufficient and is necessary to consider both physical and logical connectivity at the same time. Thereupon, the concept of the layered network is applied to the logical tunnel design problem in virtual private networks. The layered network approach considers the design of logical tunnel as well as its physical routing and we propose a modified branch-and-price algorithm which is known to solve layered network design problems effectively. To show the performance of the proposed algorithm, computational experiments have been done and the results show that the proposed algorithm solves the given problem efficiently and effectively.

A Study of Logical Network Monitoring System Architecture for Research Group (응용연구 그룹별 논리 네트워크 모니터링 시스템 구조 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.75-83
    • /
    • 2012
  • Recent science technology research network moves to establish logical private network among specific research groups such as high energy physics and climate, requiring to implement private network by group for each purpose. Up to now, national research networks such as KREONET service high capacity logical private networks. Therefore standardized configuration and management scheme is essential for the deployment of logical private network. In this study, we propose the core service element and protocols for the logical networks over Layer 2 networks. We also propose system architecture that make monitoring and management easier. After that we design and implement monitoring map for logical network based on scheme. For this purpose, we also propose the description system for logical research network to provide data such as operation information, formation information, performance information and failure information of network infrastructure resource.

A Logical Hierarchy Architecture of Location Registers for Supporting Mobility in Wireless ATM Networks (무선 ATM 망에서 이동성 지원을 위한 위치 등록기의 논리적 계층 구조)

  • 김도현;조유제
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6A
    • /
    • pp.361-370
    • /
    • 2003
  • This paper attempts to improve the existing architecture of location register for location management in Private Network to Network Interface(PNNI)-based wireless ATM networks. Our approach enhances the hierarchical architecture of location registers based on a PNNI hierarchical architecture, which is referred to as the logical hierarchy architecture of location registers. This paper introduces a logical hierarchy architecture for location registers to reduce the cost of their location management. This logical hierarchy architecture of location registers begins with the lowest level physical location registers that are organized into clusters called logical groups. These logical groups are then represented in higher layers by logical nodes. These logical nodes are again grouped into clusters that are treated as single nodes by the next higher layer. In this way, all location registers are included in this tree-type logical hierarchy architecture. Compared with the existing physical hierarchy architecture of location registers, the analysis results show that the proposed logical hierarchy architecture can reduce the number of databases and thereby the average total location management cost.

Bitmap Intersection Lookup (BIL);A Packet Classification's Algorithm with Rules Updating

  • Khunkitti, Akharin;Promrit, Nuttachot
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.767-772
    • /
    • 2005
  • The Internet is a packet switched network which offers best-effort service, but current IP network provide enhanced services such Quality of Services, Virtual Private Network (VPN) services, Distribute Firewall and IP Security Gateways. All such services need packet classification for determining the flow. The problem is performing scalable packet classification at wire speeds even as rule databases increase in size. Therefore, this research offer packet classification algorithm that increase classifier performance when working with enlarge rules database by rearrange rule structure into Bitmap Intersection Lookup (BIL) tables. It will use packet's header field for looking up BIL tables and take the result with intersection operation by logical AND. This approach will use simple algorithm and rule structure, it make classifier have high search speed and fast updates.

  • PDF

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.

Classes in Object-Oriented Modeling (UML): Further Understanding and Abstraction

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.139-150
    • /
    • 2021
  • Object orientation has become the predominant paradigm for conceptual modeling (e.g., UML), where the notions of class and object form the primitive building blocks of thought. Classes act as templates for objects that have attributes and methods (actions). The modeled systems are not even necessarily software systems: They can be human and artificial systems of many different kinds (e.g., teaching and learning systems). The UML class diagram is described as a central component of model-driven software development. It is the most common diagram in object-oriented models and used to model the static design view of a system. Objects both carry data and execute actions. According to some authorities in modeling, a certain degree of difficulty exists in understanding the semantics of these notions in UML class diagrams. Some researchers claim class diagrams have limited use for conceptual analysis and that they are best used for logical design. Performing conceptual analysis should not concern the ways facts are grouped into structures. Whether a fact will end up in the design as an attribute is not a conceptual issue. UML leads to drilling down into physical design details (e.g., private/public attributes, encapsulated operations, and navigating direction of an association). This paper is a venture to further the understanding of object-orientated concepts as exemplified in UML with the aim of developing a broad comprehension of conceptual modeling fundamentals. Thinging machine (TM) modeling is a new modeling language employed in such an undertaking. TM modeling interlaces structure (components) and actionality where actions infiltrate the attributes as much as the classes. Although space limitations affect some aspects of the class diagram, the concluding assessment of this study reveals the class description is a kind of shorthand for a richer sematic TM construct.

Modelling and Factor Analysis of Pricing Determinants in the State-Regulated Competitive Market: The Case of Ukrainian Flour Market

  • Dragan, Olena;Berher, Alina;Plets, Ivan;Biloshkurska, Nataliia;Lysenko, Nataliia;Bovkun, Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.211-220
    • /
    • 2021
  • The aim of the study is to implement a factor analysis of the determinants of pricing in a state-regulated competitive market using economic and mathematical modelling methods and to develop ways to improve the pricing environment of the market under study. The purpose of the work defines the main objectives: (i) to investigate the features of the competitive model of the Ukrainian flour market; (ii) to analyse the current price conjuncture of the flour market and the dynamics of the main determinants of pricing; (iii)to develop ways of improving the price situation on the flour market on the basis of the factor analysis on the results of economic and mathematical modelling. In order to ensure the reliability and validity of the research results, the following methods were applied: the logical-dialectical method of scientific knowledge in the study of the main theoretical aspects of flour market functioning, the method of logical generalisation and synthesis, comparison, factor analysis, correlation and regression analysis, the graphical method, etc. It has been shown that pricing in a state-regulated competitive market has its own characteristics. For example, in the flour market the price of goods cannot be influenced by producers (sellers) by any methods, therefore determinants of pricing by indirect influence have been taken into account. The five-factor power model of wheat flour price has been constructed. It was substantiated that the price of wheat flour in Ukraine is mostly influenced by consumer price index (0.92 %). The received complex model of wheat flour price may be used also for medium-term forecasting and working out the ways of price formation optimization in the flour market.

A Study on Logical Hierarchy Architecture of Location Registers for PNNI-Based Wireless ATM (PNNI 기반의 무선 ATM 망에서 위치 등록기의 논리적 계층 구조 연구)

  • Kim, Do-Hyeon;Park, Hee-Dong;Cho, You-Ze
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1133-1136
    • /
    • 2001
  • ATM 포럼에 제시된 LR 기법에서는 위치 등록기를 각 계층별로 물리적으로 배치하고 있어 다수의 데이터베이스가 필요하고, 데이터베이스 액세스 회수가 증가하며 위치 관리를 위한 신호 트래픽이 많고 호 설정 지연이 증가하는 문제점이 있다. 본 논문에서는 PNNI(Private Network to Network Interface) 기반의 무선 ATM 망에서 기존 LR 기법에서 사용하는 물리적인 계층 구조에서 각 계층마다 위치 등록기를 둠으로 인한 문제점을 보완하기 위해 PNNI 계층을 적용하여 논리적 계층에 의한 위치 등록기 구조를 제시한다. 논리적 계층 구조에서는 위치 등록기를 논리적인 그룹으로 묶고, 이 그룹들을 다시 그룹으로 묶어서 위치 등록기의 논리적인 트리 헝태로 만들어 상위 레벨의 위치 등록기의 역할을 하위 레벨의 위치 등록기 중 하나가 수행할 수 있도록 한다. 그리고, 위치 관리 비용 측면에서 성능을 비교 평가하여 제안된 논리적 계층 구조가 기존의 물리적 계층 구조에 비해 데이터베이스 수가 줄어들고, 위치 관리 비용을 줄이는 효과를 얻을 수 있다.

  • PDF

Modelling of Public Financial Security and Budget Policy Effects

  • Zaichko, Iryna;Vysotska, Maryna;Miakyshevska, Olena;Kosmidailo, Inna;Osadchuk, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.239-246
    • /
    • 2021
  • This article substantiates the scientific provisions for modelling the level of Ukraine's public financial security taking into account the impact of budget policy, in the process of which identified indicators of budget policy that significantly affect the public financial security and the factors of budget policy based on regression analysis do not interact closely with each other. A seven-factor regression equation is constructed, which is statistically significant, reliable, economically logical, and devoid of autocorrelation. The objective function of maximizing the level of public financial security is constructed and strategic guidelines of budget policy in the context of Ukraine's public financial security are developed, in particular: optimization of the structure of budget revenues through the expansion of the resource base; reduction of the budget deficit while ensuring faster growth rates of state and local budget revenues compared to their expenditures; optimization of debt serviced from the budget through raising funds from the sale of domestic government bonds, mainly on a long-term basis; minimization of budgetary risks and existing threats to the public financial security by ensuring long-term stability of budgets etc.

A Study on TMN Test System Architecture (TMN 시험 시스템 구조)

  • 최영한;김장경;진병문;이준원
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.409-416
    • /
    • 1998
  • TMN(Telecommunication Management Network) provides underlying structure to transfer, store and processing management information which are necessary for Telecommunication network and service management. The application of TMN is widely applicable to Analogue telecommunication network Public and private network switching system, Transmission system, Telecommunication related software and logical telecommunication network resource management and others. This paper consider TMN as one System Under Test(SW), and propose a new TMN test architecture, besides existing simulation based test method, which is able to test, on the basis of standardized testing procedure and testing method, directly with test system. There are several fields in protocol testing and one of them is protocol conformance testing which is defined in ISO/IEC 9646 series and it has twin document as ITU X.290 series. To apply this standardized procedure on TMN testing it is prerequisite to devise a new TMN testing architecture and set up testing procedures according to the new architecture.

  • PDF