• Title/Summary/Keyword: Node Network Modeling

Search Result 89, Processing Time 0.024 seconds

A Study on Higher Level Representations of Network Models for Optical Fiber Telecommunication Networks Design (광통신망 설계를 위한 네트워크 모형의 상위수준 표현에 관한 연구)

  • Kim, Cheol-Su
    • Asia pacific journal of information systems
    • /
    • v.6 no.2
    • /
    • pp.125-148
    • /
    • 1996
  • This paper is primarily focused on the function of model management systems such as higher level representations and buildings of optimization models using them, especially in the area of the telecommunication network models. This research attempts to provide the model builders an intuitive language-namely higher level representation-using five distinctivenesses : Objective, Node, Link, Topological Constraint including five components, and Decision. The paper elaborates all components included in each of distinctivenesses extracted from structural characteristics of typical telecommunication network models. Higher level representations represented with five distinctivenesses should be converted into base level representations which are employed for semantic representations of linear and integer programming problems in knowledge: assisted optimization modeling system(UNIK-OPT). Furthermore, for formulating the network model using higher level representations, the reasoning process is proposed. A system called UNIK-NET is developed to implement the approach proposed in this research, and the system is illustrated with an example of the network model.

  • PDF

A Plasma-Etching Process Modeling Via a Polynomial Neural Network

  • Kim, Dong-Won;Kim, Byung-Whan;Park, Gwi-Tae
    • ETRI Journal
    • /
    • v.26 no.4
    • /
    • pp.297-306
    • /
    • 2004
  • A plasma is a collection of charged particles and on average is electrically neutral. In fabricating integrated circuits, plasma etching is a key means to transfer a photoresist pattern into an underlayer material. To construct a predictive model of plasma-etching processes, a polynomial neural network (PNN) is applied. This process was characterized by a full factorial experiment, and two attributes modeled are its etch rate and DC bias. According to the number of input variables and type of polynomials to each node, the prediction performance of the PNN was optimized. The various performances of the PNN in diverse environments were compared to three types of statistical regression models and the adaptive network fuzzy inference system (ANFIS). As the demonstrated high-prediction ability in the simulation results shows, the PNN is efficient and much more accurate from the point of view of approximation and prediction abilities.

  • PDF

Active Node and Active Network Modeling For Network Traffic Progress (네트워크 트래픽 성능 향상을 위한 액티브 노드 및 액티브 네트워크 설계)

  • Choi Byung-Sun;Hwang Young-Chul;Lee Seong-Hyun;Lee Won-Goo;Lee Jae-Kwang
    • 한국컴퓨터산업교육학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.119-126
    • /
    • 2003
  • Computer simulation has used to a area of military training from about several years ago. War game model(or computer simulation) endow a military man with field training such as combat experience without operating combat strength or capabilities. To samely construct simulation environment against actual combat environment is to well construct DB to operate war game model, associate among federates on network. Thus, we construct virtual combat environment enabling to efficiently manage network traffic among federates(or active nodes) on active network that construct virtual military training space such as urgent combat field needed to rapidly transfer combat information including image and video.

  • PDF

SNMP Based Routing Process for Hand Handoff (Fast Handoff를 위한 SNMP 기반의 라우팅 프로세스)

  • 유상훈;박수현;백두권
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.139-144
    • /
    • 2003
  • Mobile Node has to maintain communication as they move form place to place, so it doesn't guarantee Quality of Service(QoS). Fast Handoff is important to provide multimedia and real-time applications services in mobile, and it is closely related to handoff delay. Therefore, handoff delay problem is actively studied to quarantee QoS as a main issue in mobile IP research area. Next generation Mobile IPv6 resolve this problem somewhat, triangle problem for first packet and handoff delay still remain. In this paper, we suggest SNMP Information-based routing that adds keyword management method to Information-based routing in active network in order to resolve such a problem, and then suggest QoS controlled handoff based on SNMP Information-Based routing. After modeling of suggested method and existing handoff method, simulations are carried out with NS-2 for performance evaluation. The results of simulations show the some improvement on handoff delay, and therefore on QoS improvement.

  • PDF

Modeling of Nonlinear SBR Process for Nitrogen Removal via GA-based Polynomial Neural Network (유전자 알고리즘 기반 다항식 뉴럴네트워크를 이용한 비선형 질소제거 SBR 공정의 모델링)

  • 김동원;박장현;이호식;박영환;박귀태
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.3
    • /
    • pp.280-285
    • /
    • 2004
  • This paper is concerned with the modeling and identification of sequencing batch reactor (SBR) via genetic algorithm based polynomial neural network (GA-based PNN). The model describes a biological SBR used in the wastewater treatment process fur nitrogen removal. A conventional polynomial neural network (PNN) is applied to construct a predictive model of SBR process fur nitrogen removal before. But the performances of PNN depend strongly on the number of input variables available to the model, the number of input variables and type (order) of the polynomials to each node. They must be fixed by the designer in advance before the architecture is constructed. So the trial and error method must go with heavy computation burden and low efficiency. To alleviate these problems, we propose GA-based PNN. The order of the polynomial, the number of input variables, and the optimum input variables are encoded as a chromosome and fitness of each chromosome is computed. Simulation results have shown that the complex SBR process can be modeled reasonably well by the present scheme with a much simpler structure compared with the conventional PNN model.

Analysis of Performance and IKEv2 Authentication Exchange model in Mobile IPv6 Network (MIPv6망에서 IKEv2 인증 교환 모텔 및 성능 분석)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Kim, Dong-Kook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1085-1091
    • /
    • 2006
  • For an experiment in this paper, designed test bed to secure confidentiality of data and safe transmission that Mobile node exchanges in Mobile network. And, For IPsec use that support basically in MIPv6, modeling and experimented IKEv2 protocol that is used for reliable authentication key management and distribution between End Point. When Mobile node handoff in Mobile network, analyzed effect that authentication key re-exchange and limited bandwidth that happen often get in key exchange. And studied about Performance and latency about authentication setting and exchange process that use multi interface. To conclusion, when Mobile node transmits using IPSec, re-authentication of key confirmed that re-setting by limit of bandwidth that existent Mobile network has can be impossible. According to other result, proposed MN's multi interface is expected to minimise key exchange latency by hand-off when transmit IPSec.

Multi-layer restoration strategy to restore the multi-link and node failures in DCS mesh networks (DCS mesh 네트워크에서 다중 선로 장애와 노드 장애를 복구하기 위한 다중 계층 복구 전략)

  • 김호진;조규섭;이원문
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2744-2754
    • /
    • 1997
  • Recently, the Multi-Layer Restoration(MLR) algorithm was proposed by British Telecom(BT) to restore the network failures in Digital Cross-connect System(DCS) mesh survival network[1, 2]. This algorithm has multi restoration stage which is composed of the pre-planned and dynamic restoration. This algorithm is effective its ability in link or node failures. This reason is that it does not restore in the pre-planned rstoration stage but in dynamic restoration stage. In this paper, we propose the MLR with pre-planned Multi-Chooser(PMC) and successive restoration ratio algorithm. This proposed algorithm has a excellent performance for restortion time and ratio, spare channel availability and fast restoration from multiple link failure or node failure. This paper proposed the modeling and restoration algorithm, and analyzed the performance of the algorithm by simulation using OPNET(OPtimized Network Engineering Tools).

  • PDF

Modeling and Stimulating Node Cooperation in Wireless Ad Hoc Networks

  • Arghavani, Abbas;Arghavani, Mahdi;Sargazi, Abolfazl;Ahmadi, Mahmood
    • ETRI Journal
    • /
    • v.37 no.1
    • /
    • pp.77-87
    • /
    • 2015
  • In wireless networks, cooperation is necessary for many protocols, such as routing, clock synchronization, and security. It is known that cooperator nodes suffer greatly from problems such as increasing energy consumption. Therefore, rational nodes have no incentive to cooperatively forward traffic for others. A rational node is different from a malicious node. It is a node that makes the best decision in each state (cooperate or non-cooperate). In this paper, game theory is used to analyze the cooperation between nodes. An evolutionary game has been investigated using two nodes, and their strategies have been compared to find the best one. Subsequently, two approaches, one based on a genetic algorithm (GA) and the other on learning automata (LA), are presented to incite nodes for cooperating in a noisy environment. As you will see later, the GA strategy is able to disable the effect of noise by using a big enough chromosome; however, it cannot persuade nodes to cooperate in a noisefree environment. Unlike the GA strategy, the LA strategy shows good results in a noise-free environment because it has good agreement in cooperation-based strategies in both types of environment (noise-free and noisy).

Performance Analysis of an Address Auto-configuration Method Applying to Mobile Ad hoc Network Using NS-2 (NS-2를 이용한 MANET의 주소 자동설정 기법의 성능분석 연구)

  • Kim, Sun-Hwa;Go, Bin;Lee, Kyou-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2010
  • Simulation analysis may be the essential means to either evaluate performance of systems or optimize system parameters for new design. Including many variations for design and implementation, MANET (Mobile Ad-hoc NETwork) is one target area of such an analysis. Since every node, however, included in the network has mobility, one MANET could be overlapped or merged with another one which use a different transport protocol. In order to communicate among nodes in this case, the new merged network should configure paths and addresses in advance. Configuring paths and addresses generates much overheads which ultimately cause delay in communicating data. Performance analysis is required to improve the data transport performance by minimizing overheads. This paper proposes a sound address auto-configuration method which is based on an on-demand manner and then presents modeling and performance analysis of the method. NS-2 simulation results verify that the proposed method can not only alleviate overheads, which are inevitably generated for address auto-configuration processes, and but also decentralize them in time.

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.