• Title/Summary/Keyword: Node reliability

Search Result 373, Processing Time 0.029 seconds

Development and Application of Reliability Index based on Hydraulic Uniformity in Water Distribution Networks (상수관망의 수리학적 균등성을 이용한 신뢰도 지표의 개발 및 적용)

  • Jeong, Gimoon;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.6-6
    • /
    • 2019
  • 상수관망시스템은 공급원으로부터 수요처까지의 용수공급을 위해 구축된 관수로 기반의 사회기반시설물로서, 주로 생활 및 산업 용수를 공급하므로 대규모 사회 경제적 피해를 방지하기 위해서는 안정적인 용수공급 능력이 요구된다. 네트워크의 다양한 특성에 의해 표현되는 상수관망시스템의 신뢰도(reliability)는 크게 시스템 내 구성요소의 안정성(mechanical reliability)과 용수공급의 기능적 안정성(hydraulic reliability)으로 구분할 수 있다. 특히, 시스템의 용수공급 안정성에 주목한 수리학적 신뢰도 연구는 많은 연구자들에 의해 지속적으로 수행된 바 있으며, 다양한 평가방법 및 지표들이 제시되어 활용 중에 있다. 기존의 수리학적 신뢰도 지표들은 주로 수요절점(demand node)에서의 공급가능 수량 및 수압을 바탕으로 산정되었다. 그러나, 절점(node)에서의 공급 상태는 결과에 해당하며, 원인 분석을 위해서는 관로(pipe)의 배치 및 규격을 분석해야 하는 번거로움이 존재한다. 이러한 단점을 보완하기 위해, 본 연구에서는 직접 관로(pipe)의 공급 특성을 분석하여 네트워크의 신뢰도를 평가함으로써, 신뢰도 저하의 원인 분석 및 시스템 개선에 효율적으로 활용할 수 있는 신뢰도 지표를 산정하고자 하였다. 본 연구에서는 상수관로 내 수리학적 기울기가 전반적으로 균등할수록 설계 비용대비 공급 신뢰도, 즉 용수공급 효율이 개선되는 특징을 바탕으로, 네트워크 내 총 에너지 손실로부터 각 관로의 길이, 유량 등의 특성을 고려한 등가 수리경사(Equivalent hydraulic gradient)를 유도하여 모든 관로의 적정 수리경사로 제안하였다. 따라서 각 관로의 실제 수리경사를 대상으로 관로별 수리학적 균등성 지수(pipe hydraulic uniformity index)를 산정하였으며, 더 나아가 전체 시스템의 균등성 지수(system hydraulic uniformity index)를 산정하였다. 제안된 신뢰도 지표는 가상의 네트워크에서 지역 내 용수 사용량이 증가하는 등 용수공급 안정성을 저해하는 몇 가지 시나리오를 바탕으로 검증하였으며, 또한 기존 지표들의 신뢰도 평가 결과와 비교, 분석하였다. 본 연구는 향후 네트워크 최적 설계의 목적함수로 활용하거나, 네트워크의 보강계획 수립에 기여할 것으로 기대된다.

  • PDF

Estimation of the Reliability of Water Distribution Systems using HSPDA Model and ADF Index (HSPDA 모형 및 ADF index를 이용한 상수관망의 신뢰도 산정)

  • Baek, Chun-Woo;Jun, Hwan-Don;Kim, Joong-Hoon
    • Journal of Korea Water Resources Association
    • /
    • v.43 no.2
    • /
    • pp.201-210
    • /
    • 2010
  • In this study, new methodology to estimate the reliability of a water distribution system using HSPDA model is suggested. In general, the reliability of a water distribution system can be determined by estimating either the ratio of the required demand to the available demand or the ratio of the number of nodes with sufficient pressure head to the number of nodes with insufficient pressure head when the abnormal operating condition occurs. To perform this approach, hydraulic analysis under the abnormal operating condition is essential. However, if the Demand-Driven Analysis (DDA) which is dependant on the assumption that the required demand at a demand node is always satisfied regardless of actual nodal pressure head is used to estimate the reliability of a water distribution system, the reliability may be underestimated due to the defect of the DDA. Therefore, it is necessary to apply the Pressure-Driven Analysis (PDA) having a different assumption to the DDA's which is that available nodal demand is proportion to nodal pressure head. However, because previous study used a semi-PDA model and the PDA model which had limited applicability depending on the characteristics of a network, proper estimation of the reliability of a water distribution system was impossible. Thus, in this study, a new methodology is suggested by using HSPDA model which can overcome weak points of existing PDA model and Available Demand Fraction (ADF) index to estimate the reliability. The HSPDA can simulate the hydraulic condition of a water distribution system under abnormal operating condition and based on the hydraulic condition simulated, ADF index at each node is calculated to quantify the reliability of a water distribution system. The suggested model is applied to sample networks and the results are compared with those of existing method to demonstrate its applicability.

Prediction method of node movement using Markov Chain in DTN (DTN에서 Markov Chain을 이용한 노드의 이동 예측 기법)

  • Jeon, Il-kyu;Lee, Kang-whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.1013-1019
    • /
    • 2016
  • This paper describes a novel Context-awareness Markov Chain Prediction (CMCP) algorithm based on movement prediction using Markov chain in Delay Tolerant Network (DTN). The existing prediction models require additional information such as a node's schedule and delivery predictability. However, network reliability is lowered when additional information is unknown. To solve this problem, we propose a CMCP model based on node behaviour movement that can predict the mobility without requiring additional information such as a node's schedule or connectivity between nodes in periodic interval node behavior. The main contribution of this paper is the definition of approximate speed and direction for prediction scheme. The prediction of node movement forwarding path is made by manipulating the transition probability matrix based on Markov chain models including buffer availability and given interval time. We present simulation results indicating that such a scheme can be beneficial effects that increased the delivery ratio and decreased the transmission delay time of predicting movement path of the node in DTN.

Performance Analysis of Hybrid ARQ-II Protocol for Cooperative Communication in Wireless Channel (무선 채널의 협업 통신을 위한 Hybrid ARQ-II 프로토콜 성능 분석)

  • Park, In-Hye;Lee, Sung-Hun;Lee, Hyung-Keun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.6
    • /
    • pp.73-81
    • /
    • 2009
  • Wireless media communication has lower robustness and stability than wired communication because of narrow bandwidth and unstable channel state. To make up for the deficient points of wireless communication, we used the diversity effect of cooperation communication and the error correction effect of channel coding schemes. In this paper, the cooperative communication system with RCPC codes and Hybrid ARQ transmission scheme is proposed for improving reliability on wireless communication, and we executed these simulations. From the simulation results, proposed system is showed lower BER performance than legacy system. In addition, we confirm the fact that the channel state of Relay-node and source-node is more important than the channel state of Relay-node and destination-node.

  • PDF

Research on anti-seismic property of new end plate bolt connections - Wave web girder-column joint

  • Jiang, Haotian;Li, Qingning;Yan, Lei;Han, Chun;Lu, Wei;Jiang, Weishan
    • Steel and Composite Structures
    • /
    • v.22 no.1
    • /
    • pp.45-61
    • /
    • 2016
  • The domestic and foreign scholars conducted many studies on mechanical properties of wave web steel beam and high-strength spiral stirrups confined concrete columns. Based on the previous research work, studies were conducted on the anti-seismic property of the end plate bolt connected wave web steel beam and high-strength spiral stirrups confined concrete column nodes applied with pre-tightening force. Four full-size node test models in two groups were designed for low-cycle repeated loading quasi-static test. Through observation of the stress, distortion, failure process and failure mode of node models, analysis was made on its load-carrying capacity, deformation performance and energy dissipation capacity, and the reliability of the new node was verified. The results showed that: under action of the beam-end stiffener, the plastic hinges on the end of wave web steel beam are displaced outward and played its role of energy dissipation capacity. The study results provided reliable theoretical basis for the engineering application of the new types of nodes.

FI-Based Local Group Key Generation/Distribution for Mobile Multicast in a Hierarchical Mobile IPv6Network

  • Baek, Jin-Suk;Fisher, Paul S.;Kwak, Ming-Yung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.1
    • /
    • pp.5-21
    • /
    • 2008
  • In order to securely transmit multicast data packets in a mobile environment where frequent join/leave events are a characteristic of the environment, there is a need for a new secure and efficient group key management solution. We propose a secure group key generation/distribution solution providing scalability and reliability. Using this solution, when a mobile node, which is in a multicast session, enters a new domain, the agent of the domain joins the multicast session and coordinates its data packets with the mobile node. The agent encrypts and transmits subsequent data packets to the mobile node, using a local one-time pad key. This key is generated with FI sequences, enabling the mobile node to regenerate the same data packet, based on the information sent by the agent. Our performance analysis demonstrates that the proposed solution can significantly reduce the number of key generations and distributions, when it is applied to the hierarchical mobile IPv6 network.

A Routing Protocol for Improving Node Survivability in Tactical Ad-hoc Network (전술 Ad-hoc 네트워크에서 노드 생존성 향상을 위한 프로토콜 설계)

  • Kim, Young-An;Park, Gun-Woo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.1
    • /
    • pp.56-64
    • /
    • 2013
  • TICN, a next-generation tactical communication network based on a wireless network, acts as the backbone of the whole network. TICN requires the routing which takes both survivability of passage, reliability, and safety of wireless link into consideration. A tactical network like TICN may maintain the passage for just a short period of time due to topology's frequent changes; In this process all nodes, dependent on batteries for their necessary energy, are restricted by batteries' durability in due course. To overcome this shortcoming, the up-to-date protocols consider only either of diminishing or balancing out energy consumptions. Thus there was a limitation to enhancing both throughput and energy efficiency. The thesis proposes a protocol which regards both throughput and energy efficiency, and enhances node survivability by means of minimizing and balancing energy consumption of the whole network. The protocol brings out an improvement in throughput and makes each node's energy usage more effective.

A Prediction Method using property information change in DTN (DTN에서 속성 정보 변화에 따른 노드의 이동 예측 기법)

  • Jeon, Il-Kyu;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.425-426
    • /
    • 2016
  • In this paper, we proposed an algorithm based on movement prediction using Markov chain in delay tolerant networks(DTNs). The existing prediction algorithms require additional information such as a node's schedule and connectivity between nodes. However, network reliability is lowered when additional information is unknown. To solve this problem, we proposed an algorithm for predicting a movement path of the node by using Markov chain. The proposed algorithm maps speed and direction for a node into state, and predict movement path of the node using transition probability matrix generated by Markov chain. As the result, proposed algorithm show that the proposed algorithms has competitive delivery ratio but with less average latency.

  • PDF

Privacy Information Protection Applying Digital Holography to Blockchain

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.6 no.5
    • /
    • pp.453-462
    • /
    • 2022
  • Blockchain technology provides a decentralized and peer-to-peer network, which has the advantages of transparency and immutability. In this paper, a novel secure authentication scheme applying digital holography to blockchain technology is proposed to protect privacy information in network nodes. The transactional information of the node is chained permanently and immutably in the blockchain to ensure network security. By designing a novel two-dimensional (2D) array data structure of the block, a proof of work (PoW) in the blockchain is executed through digital holography technology to verify true authentication and legal block linkage. A hash generated from the proposed algorithm reveals a random number of 2D array data. The real identity of each node in the network cannot be forged by a hacker's tampering because the privacy information of the node is encrypted using digital holography and stored in the blockchain. The reliability and feasibility of the proposed scheme are analyzed with the help of the research results, which evaluate the effectiveness of the proposed method. Forgery by a malicious node is impossible with the proposed method by rejecting a tampered transaction. The principal application is a secure anonymity system guaranteeing privacy information protection for handling of large information.

A Study on Dual-IDS Technique for Improving Safety and Reliability in Internet of Things (사물인터넷 환경에서 안전성과 신뢰성 향상을 위한 Dual-IDS 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.49-57
    • /
    • 2017
  • IoT can be connected through a single network not only objects which can be connected to existing internet but also objects which has communication capability. This IoT environment will be a huge change to the existing communication paradigm. However, the big security problem must be solved in order to develop further IoT. Security mechanisms reflecting these characteristics should be applied because devices participating in the IoT have low processing ability and low power. In addition, devices which perform abnormal behaviors between objects should be also detected. Therefore, in this paper, we proposed D-IDS technique for efficient detection of malicious attack nodes between devices participating in the IoT. The proposed technique performs the central detection and distribution detection to improve the performance of attack detection. The central detection monitors the entire network traffic at the boundary router using SVM technique and detects abnormal behavior. And the distribution detection combines RSSI value and reliability of node and detects Sybil attack node. The performance of attack detection against malicious nodes is improved through the attack detection process. The superiority of the proposed technique can be verified by experiments.