• Title/Summary/Keyword: Network Routing Problem

Search Result 518, Processing Time 0.028 seconds

Region-based Tree Multicasting Protocol in Wireless Ad-Hoc Networks (무선 에드혹 네트워크에서 지역 기반 트리를 이용한 멀티캐스팅 프로토콜)

  • Lim Jung-Eun;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.772-783
    • /
    • 2005
  • In this paper, we propose an effective multicasting protocol in wireless ad-hoc networks. Conventional wired and wireless network multicast protocols do not perform well in wireless ad hoc networks because they were designed without consideration of ad hoc environments such as node mobility, limited bandwidth, high error probability. To solve this problem, some multicasting protocols for ad hoc network have been proposed in the literature. However, these protocols can not provide high packet delivery ratio, low control packet overhead and low expended bandwidth at the same time. Therefore, in this paper, we propose RTMA that improves multicasting performance in wireless ad hoc networks. RTMA calculates its current region from its position information by using GPS in order to make tree among the multicast group nodes in the same region. The proposed region-based tree method is for high packet delivery ratio, low control packet overhead when many senders send data packets. RTMA makes a reliable tree by using speed information to fill a gap of the weak points of the tree structure. When searching the routing path, RTMA selects the reliable path excluding high speed nodes.

An Energy-Efficient Routing Protocol for Data Collection in Wireless Sensor Network (WSN 환경에서 데이터 수집을 위한 에너지 효율적인 전송경로 설정 프로토콜)

  • Kim, Bo-Seung;Jung, Ki-Won;Shin, Yong-Tae;Son, Young-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2A
    • /
    • pp.160-171
    • /
    • 2011
  • The one of the core technologies for ubiquitous computing is WSN. WSN detects the information from the environment around them based on the information perceived from the human and all things and manages the information by connecting to the network in realtime. In this environment, the existing research provides the mechanism that most of sensor nodes in the target area can set the transmission path using RGF. However, unrelated to the target area will be responsible for the energy consumption of nodes that are the problem. In this paper, we propose EEDCP protocol. It is designed to collect data from the specific region on sinks in WSN. EEDCP is the protocol that sets the transmission path for collection data inside the target area in WSN. And this paper is shown that the proposed scheme is more efficient in the energy efficiency and the occurrence rate of isolated nodes by comparison with the previous studies through simulation.

The Method of Localization using Radical Line among Sensor Nodes under the Internet Of Things (사물 인터넷 환경에서 Radical Line을 이용한 센서 노드간의 지역화방법)

  • Shin, Bong-Hi;Jeon, Hye-Kyoung
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.207-212
    • /
    • 2015
  • The sensor network that is component of the Internet of Things require a lot of research to select the best route to send information to the anchor node, to collect a number of environment and cost efficient for communication between the sensor life. On the sensor network in one of the components of IOT's environment, sensor nodes are an extension device with low power low capacity. For routing method for data transmission between the sensor nodes, the connection between the anchor and the node must be accurate with in adjacent areas relatively. Localization CA (Centroid Algorithm) is often used although an error frequently occurs. In this paper, we propose a range-free localization method between sensor nodes based on the Radical Line in order to solve this problem.

Automatic Categorization of Islamic Jurisprudential Legal Questions using Hierarchical Deep Learning Text Classifier

  • AlSabban, Wesam H.;Alotaibi, Saud S.;Farag, Abdullah Tarek;Rakha, Omar Essam;Al Sallab, Ahmad A.;Alotaibi, Majid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.281-291
    • /
    • 2021
  • The Islamic jurisprudential legal system represents an essential component of the Islamic religion, that governs many aspects of Muslims' daily lives. This creates many questions that require interpretations by qualified specialists, or Muftis according to the main sources of legislation in Islam. The Islamic jurisprudence is usually classified into branches, according to which the questions can be categorized and classified. Such categorization has many applications in automated question-answering systems, and in manual systems in routing the questions to a specialized Mufti to answer specific topics. In this work we tackle the problem of automatic categorisation of Islamic jurisprudential legal questions using deep learning techniques. In this paper, we build a hierarchical deep learning model that first extracts the question text features at two levels: word and sentence representation, followed by a text classifier that acts upon the question representation. To evaluate our model, we build and release the largest publicly available dataset of Islamic questions and answers, along with their topics, for 52 topic categories. We evaluate different state-of-the art deep learning models, both for word and sentence embeddings, comparing recurrent and transformer-based techniques, and performing extensive ablation studies to show the effect of each model choice. Our hierarchical model is based on pre-trained models, taking advantage of the recent advancement of transfer learning techniques, focused on Arabic language.

Solution Algorithm of Unsteady Flow in a Dendritic Channel System (수지형 하천에서의 부정류 흐름의 해석 알고리즘)

  • Choi, Gye Woon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.839-846
    • /
    • 1994
  • This paper presents a simultaneous solution algorithm for one-dimensional unsteady flow routing through a dendritic channel system. This simulations solution algorithm is based on the double-sweep method and utilizes separate recursion equations for continuity, momentum and energy equations for each of the individual components of a dendritic channel system. Through separate recursion equations for each of the components. the new algorithm converts a dendritic channel network problem into a single-channel problem. The new algorithm is utilized in conjunction with a linearized unsteady flow model using full dynamic flow equations. The required computer storage for the coefficient matrix of the whole system is reduced significantly from the $2N{\times}2N$ matrix to a $2N{\times}4$ matrix, where N is the number of cross sections used in the computation of flow variables in a dendritic channel system. The algorithm presented in this paper provides an efficient and accurate modeling of unsteady flow events through a dendritic channel system.

  • PDF

A Study on Algorithm for the Wavelength and Routing Assignment Problem on All-optical Tree Networks (전광 트리 네트워크에서 파장 및 경로설정 문제를 해결하는 알고리즘에 관한 연구)

  • Kim, Soon-Seok;Yeo, Sang-Su;Kim, Sung-Kwon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3952-3963
    • /
    • 2000
  • This paper considers the WRA(Wavelength and Houting Assignment) problem on all-optical tree networks using WDM(Wavelength Division Multiplexing). Each link between a pair of request nodes on all optical networks is assigned different wavelengths because of technical constraint. On the basis of this, we give an polynomial time algorithm to assign wavelengths to the all patbs of a arbitrary tree network using divide and conquer method. The time complexity of this algorithm is O(Q. R), in which Q is the request nodes for all to'all communication in a tree topology and U is the maximum number of wavelength. Also we implemented our algorithm using C in Pentium II 233MHz and analyzed performance results.

  • PDF

A Development of a Path-Based Traffic Assignment Algorithm using Conjugate Gradient Method (Conjugate Gradient 법을 이용한 경로기반 통행배정 알고리즘의 구축)

  • 강승모;권용석;박창호
    • Journal of Korean Society of Transportation
    • /
    • v.18 no.5
    • /
    • pp.99-107
    • /
    • 2000
  • Path-based assignment(PBA) is valuable to dynamic traffic control and routing in integrated ITS framework. As one of widely studied PBA a1gorithms, Gradient Projection(GP) a1gorithm typically fields rapid convergence to a neighborhood of an optimal solution. But once it comes near a solution, it tends to slow down. To overcome this problem, we develop more efficient path-based assignment algorithm by combining Conjugate Gradient method with GP algorithm. It determines more accurate moving direction near a solution in order to gain a significant advantage in speed of convergence. Also this algorithm is applied to the Sioux-Falls network and verified its efficiency. Then we demonstrate that this type of method is very useful in improving speed of convergence in the case of user equilibrium problem.

  • PDF

8.1 Gbps High-Throughput and Multi-Mode QC-LDPC Decoder based on Fully Parallel Structure (전 병렬구조 기반 8.1 Gbps 고속 및 다중 모드 QC-LDPC 복호기)

  • Jung, Yongmin;Jung, Yunho;Lee, Seongjoo;Kim, Jaeseok
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.78-89
    • /
    • 2013
  • This paper proposes a high-throughput and multi-mode quasi-cyclic (QC) low-density parity-check (LDPC) decoder based on a fully parallel structure. The proposed QC-LDPC decoder employs the fully parallel structure to provide very high throughput. The high interconnection complexity, which is the general problem in the fully parallel structure, is solved by using a broadcasting-based sum-product algorithm and proposing a low-complexity cyclic shift network. The high complexity problem, which is caused by using a large amount of check node processors and variable node processors, is solved by proposing a combined check and variable node processor (CCVP). The proposed QC-LDPC decoder can support the multi-mode decoding by proposing a routing-based interconnection network, the flexible CCVP and the flexible cyclic shift network. The proposed QC-LDPC decoder is operated at 100 MHz clock frequency. The proposed QC-LDPC decoder supports multi-mode decoding and provides 8.1 Gbps throughput for a (1944, 1620) QC-LDPC code.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

A Study on Hierarchical Overlay Multicast Architecture in Mobile Ad Hoc Networks (Mobile Ad Hoc 네트워크를 위한 계층적 오버레이 멀티캐스트 구조 연구)

  • Kim, Kap-Dong;Park, Jun-Hee;Lee, Kwang-Il;Kim, Hag-Young;Kim, Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.627-634
    • /
    • 2006
  • Overlay network eliminates the need to change the application-layer tree when the underlying network changes and enables the overlay network to survive in environments where nonmember nodes do not support multicast functionality. An overlay protocol monitors group dynamics, while underlying unicast protocols track network dynamics, resulting in more stable protocol operation and low control overhead even in a highly dynamic environment. But, if overlay multicast protocols does not know the location information of node, this makes it very difficult to build an efficient multicasting tree. So, we propose a Hierarchical Overlay Multicast Architecture (HOMA) with the location information. Because proposed architecture makes static region-based dynamic group by multicast members, it is 2-tired overlay multicasts of application layer that higher layer forms overlay multicast network between members that represent group, and support multicast between multicast members belonging to region at lower layer. This use GPS, take advantage of geographical region, and realizes a region-sensitive higher layer overlay multicast tree which is impervious to the movements of nodes. The simulation results show that our approach solves the efficiency problem effectively.