• 제목/요약/키워드: Node Management

검색결과 1,132건 처리시간 0.021초

Ordinary B-tree vs NTFS B-tree: A Digital Forensics Perspectives

  • Cho, Gyu-Sang
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권8호
    • /
    • pp.73-83
    • /
    • 2017
  • In this paper, we discuss the differences between an ordinary B-tree and B-tree implemented by NTFS. There are lots of distinctions between the two B-tree, if not understand the distinctions fully, it is difficult to utilize and analyze artifacts of NTFS. Not much, actually, is known about the implementation of NTFS, especially B-tree index for directory management. Several items of B-tree features are performed that includes a node size, minimum number of children, root node without children, type of key, key sorting, type of pointer to child node, expansion and reduction of node, return of node. Furthermore, it is emphasized the fact that NTFS use B-tree structure not B+structure clearly.

Efficient Mobile Sink Location Management Scheme Using Multi-Ring in Solar-Powered Wireless Sensor Networks

  • Kim, Hyeok;Kang, Minjae;Yoon, Ikjune;Noh, Dong Kun
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권10호
    • /
    • pp.55-62
    • /
    • 2017
  • In this paper, we proposes a multi-ring based mobile sink location scheme for solar-powered wireless sensor network (WSN). The proposed scheme maintains the multi-rings in which nodes keep the current location of sink node. With the help of nodes in multi-rings, each node can locate the sink node efficiently with low-overhead. Moreover, because our scheme utilizes only surplus energy of a node, it can maintain multiple rings without degrading any performance of each node. Experimental results show that the proposed scheme shows much better latency and scalability with lower energy-consumption than the existing single-ring based scheme.

SDN 기반의 Inter PMIPv6 도메인 핸드오버 (SDN based Inter Proxy Mobile IPv6 Domain Handover)

  • ;염상길;김동수;추현승
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.210-211
    • /
    • 2015
  • Proxy Mobile IPv6 (PMIPv6) is a network based IP mobility management protocol. PMIPv6 make sure that the IP address of the mobile node remains the same as long as the mobile node roams with in the PMIPv6 domain. A mobile node roams with in a PMIPv6 domain. PMIPv6 protocol doesn't provide the mobility support once the mobile node moves from one PMIPv6 domain to another PMIPv6 domain. This paper proposes a Software Defined Networking (SDN) based PMIPv6 scheme which provides the mobility support for inter PMIPv6 domain movement of mobile node. In the proposed architecture each PMIPv6 domain has a SDN controller and SDN controllers from different domains communicate with each other to share the mobility information.

Enhanced ANTSEC Framework with Cluster based Cooperative Caching in Mobile Ad Hoc Networks

  • Umamaheswari, Subbian;Radhamani, Govindaraju
    • Journal of Communications and Networks
    • /
    • 제17권1호
    • /
    • pp.40-46
    • /
    • 2015
  • In a mobile ad hoc network (MANET), communication between mobile nodes occurs without centralized control. In this environment the mobility of a node is unpredictable; this is considered as a characteristic of wireless networks. Because of faulty or malicious nodes, the network is vulnerable to routing misbehavior. The resource constrained characteristics of MANETs leads to increased query delay at the time of data access. In this paper, AntHocNet+ Security (ANTSEC) framework is proposed that includes an enhanced cooperative caching scheme embedded with artificial immune system. This framework improves security by injecting immunity into the data packets, improves the packet delivery ratio and reduces end-to-end delay using cross layer design. The issues of node failure and node malfunction are addressed in the cache management.

(Max, +)-대수를 이용한 3-노드 유한 버퍼 일렬대기행렬에서의 대기시간 분석 (Application of (Max, +)-algebra to the Waiting Times in Deterministic 3-node Tandem Queues with Blocking)

  • 서동원
    • 한국경영과학회지
    • /
    • 제30권2호
    • /
    • pp.73-80
    • /
    • 2005
  • In this paper, we consider characteristics of waiting times in s1n91e-server 3-node tandem queues with finite buffers, a Poisson arrival process and deterministic service times at all nodes. There are three buffers : one at the first node is infinite and the others are finite. We obtain the fact that sojourn time or departure process is independent of the capacities of the finite buffers and does not depend on the order of service times, which are the same results in the literature. Moreover, the explicit expressions of stationary waiting times in all areas of the systems can be derived as functions of the finite buffer capacities. We also disclose a relationship of waiting times in subareas of the systems between two blocking policies communication and manufacturing. Some numerical examples are also provided.

3-노(盧)드 유한 버퍼 일렬대기행렬에서의 최적 버퍼 크기에 대한 분석 (Analysis of Optimal Buffer Capacities in 3-node Tandem Queues with Blocking)

  • 서동원
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회/대한산업공학회 2005년도 춘계공동학술대회 발표논문
    • /
    • pp.881-889
    • /
    • 2005
  • In this study, we consider characteristics of waiting times in single-server 3-node tandem queues with a Poisson arrival process, finite buffers and deterministic or non-overlapping service times at each queue. There are three buffers: one at the first node is infinite and the others are finite. The explicit expressions of waiting times in all areas of the systems, which are driven as functions of finite buffer capacities, show that the sojourn time does not depend on the finite buffer capacities and also allow one to compute and compare characteristics of waiting times at all areas of the system under two blocking policies: communication and manufacturing blocking. As an application of these results, moreover, an optimization problem which determines the smallest buffer capacities satisfying predetermined probabilistic constraints on waiting times is considered. Some numerical examples are also provided.

  • PDF

A Sinkhole Detection Method based on Incremental Learning in Wireless Ad Hoc Networks

  • Kim, Ki-Sung;Kim, Se-Hun
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2007년도 추계학술대회 및 정기총회
    • /
    • pp.377-382
    • /
    • 2007
  • Mobile ad hoc network(MANET) is a kind of wireless network which has no infrastructure. Each component node of MANET can move freely and communicate based on wireless peer to peer mode. Because of its vulnerable routing protocols, MANET is exposed to many kinds of attacks. A sinkhole attack is one of the representative attacks in MANET caused by attempts to draw all network traffic to a sinkhole node. This paper focuses on the sinkhole problem on Dynamic Source Routing(DSR) protocol in MANET. To detect the sinkhole node, we extract several useful sinkhole indicators through analyzing the sinkhole problem, then propose an efficient detection method based on an incremental learning algorithm. The simulation results show that the proposed method is effective and reliable for detecting sinkhole intrusion.

  • PDF

UMTS 이동통신망의 액세스망 설계 문제의 해법에 관한 연구 (Heuristics for the Access Network Design Problem in UMTS Mobile Communication Networks)

  • 김후곤;정용주;백천현
    • 경영과학
    • /
    • 제27권3호
    • /
    • pp.1-14
    • /
    • 2010
  • In this paper we study the access network design problem in Universal Mobile Telecommunication Systems (UMTS) networks. Given the location of radio base stations (node-Bs), their traffic demands, and the candidate facility centers for locating radio network controllers (RNCs), the problem is to determine the configuration of access network, including the number and location of facility centers, the number of RNCs in each facility center, and the links between RNCs and node-Bs, with the objective being to design such a network at the minimum cost. We provide a mathematical formulation of the problem with constraints on RNC and node-B capacities, along with a lower bounding method. We develop a heuristic algorithm with two different initial solution methods designed to strengthen the solution quality. The computational efficacy of their procedures is then demonstrated on a number of test problems.

노드채색문제에 대한 기존 해법의 분석 및 분류 (Analysis and Classfication of Heuristic Algorithms for Node Coloring Problem)

  • 최택진;명영수;차동완
    • 한국경영과학회지
    • /
    • 제18권3호
    • /
    • pp.35-49
    • /
    • 1993
  • The node coloring problem is a problem to color the nodes of a graph using the minimum number of colors possible so that any two adjacent nodes are colored differently. This problem, along with the edge coloring problem, has a variety of practical applications particularly in item loading, resource allocation, exam timetabling, and channel assignment. The node coloring problem is an NP-hard problem, and thus many researchers develop a number of heuristic algorithms. In this paper, we survey and classify those heuristics with the emphasis on how an algorithm orders the nodes and colors the nodes using a determined ordering.

  • PDF

WDM 광전달망에서 공정성을 갖는 경로설계 및 파장할당 (A Design of Routing Path and Wavelength Assignment with Fairness in WDM Optical Transport Network)

  • 박구현;우재현
    • 한국경영과학회지
    • /
    • 제22권4호
    • /
    • pp.17-35
    • /
    • 1997
  • This paper considers the efficient design of routing path and wavelength assignment in the single-hop WDM optical transport networks. The connection demands between node-pairs are given and a connection between a pair of nodes must be made by only one lightpath. It is assumed that no wavelength conversion is allowed and the physical topology of the network and the number of available wavelengths of a physical link are also given. This paper proposes the method to route a path and assign a wavelength to the path, which guarantees fairness to every node pair. In order to guarantee fairness and maximize connections, an optimization model is established, which successively maximizes minimum connection ratio to the demand of each node pair. A heuristic algorithm with polynomial iterations is developed for the problem since the problem is NP-hard. The heuristic algorithm is implemented and applied to the networks with real problem sizes. The results of the application are compared with GAMS/OSL.

  • PDF