• Title/Summary/Keyword: virtual nodes

Search Result 221, Processing Time 0.023 seconds

Virtual Topology Design of Passive Star Networks using Genetic Algorithms (유전자 알고리즘을 이용한 Passive Star 네트워크의 가상위상설계)

  • Jeong, Hye-Jin;Wi, Gyu-Beom;Ye, Hong-Jin;Hong, Man-Pyo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.788-798
    • /
    • 2000
  • We can consider the interconnection structure suing WDM from two different levels, physical and virtual topologies. In the virtual topology, various channels on physical links can be established between transmitters and the receivers of the nodes. It is important to design efficient virtual topologies, because they have a benefit of performance improvement in interconnection networks depending on traffic matrices without changing physical topologies. In this paper we suggest a way to design virtual topologies that minimize average packet delays for given traffic matrices using genetic algorithms.

  • PDF

Virtual path design in ATM network (ATM 망에서의 가상경로 설계)

  • 박구현;신용식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.4
    • /
    • pp.939-951
    • /
    • 1996
  • The previous study of virtual path design for one traffic class with ATM DCS only should be generalized to that for the multiple traffic class cases of being given neither virtual path candidate set nor end nodes o each virtual path. In this paper, a design model of virtual paths for the general case with multiple traffic classes is suggested. The model is represented as an optimization rpoblem with a special structure. It is solved by SQA algorithm, which is developed by authors in [3, 4]. The model and the algorithm are applied to a numerical example, and results are shown.

  • PDF

ID-based group key exchange mechanism for virtual group with microservice

  • Kim, Hyun-Jin;Park, Pyung-Koo;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.932-940
    • /
    • 2021
  • Currently, research on network functions virtualization focuses on using microservices in cloud environments. Previous studies primarily focused on communication between nodes in physical infrastructure. Until now, there is no sufficient research on group key management in virtual environments. The service is composed of microservices that change dynamically according to the virtual service. There are dependencies for microservices on changing the group membership of the service. There is also a high possibility that various security threats, such as data leakage, communication surveillance, and privacy exposure, may occur in interactive communication with microservices. In this study, we propose an ID-based group key exchange (idGKE) mechanism between microservices as one group. idGKE defines the microservices' schemes: group key gen, join group, leave group, and multiple group join. We experiment in a real environment to evaluate the performance of the proposed mechanism. The proposed mechanism ensures an essential requirement for group key management such as secrecy, sustainability, and performance, improving virtual environment security.

Shalt-Term Hydrological forecasting using Recurrent Neural Networks Model

  • Kim, Sungwon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2004.05b
    • /
    • pp.1285-1289
    • /
    • 2004
  • Elman Discrete Recurrent Neural Networks Model(EDRNNM) was used to be a suitable short-term hydrological forecasting tool yielding a very high degree of flood stage forecasting accuracy at Musung station of Wi-stream one of IHP representative basins in South Korea. A relative new approach method has recurrent feedback nodes and virtual small memory in the structure. EDRNNM was trained by using two algorithms, namely, LMBP and RBP The model parameters, optimal connection weights and biases, were estimated during training procedure. They were applied to evaluate model validation. Sensitivity analysis test was also performed to account for the uncertainty of input nodes information. The sensitivity analysis approach could suggest a reduction of one from five initially chosen input nodes. Because the uncertainty of input nodes information always result in uncertainty in model results, it can help to reduce the uncertainty of EDRNNM application and management in small catchment.

  • PDF

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Availability Analysis of Computer Network using Petri-Nets

  • Ro, Cheul Woo;Pak, Artem
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.699-705
    • /
    • 2009
  • This paper reviews methods used to perform reliability and availability analysis of the network system composed by nodes and links. The combination of nodes and links forms virtual connections (VC). The failure of several VCs cause failure of whole network system. Petri Net models are used to analyze the reliability and availability. Stochastic reward nets (SRN) is an extension of stochastic Petri nets provides modelling facilities for network system analysis.

  • PDF

A Study on Share Group Configuration Technique for Improving Data Transmission Performance (데이터 전달 성능 향상을 위한 공유 그룹 구성 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.89-96
    • /
    • 2015
  • The various services applied internet have been provided by the rapid development of wireless networks and providing multimedia contents are also increasing. It is caused a number of problems such as increasing of network traffic rapidly. P2P technique is gaining popularity for solving these problems. In particular, P2P technique in a wireless network environment has gained much popularity. Among them, MANET-based P2P techniques has been studied actively. It is not easy to be applied the existing technique as it is due to the dynamic topology and low bandwidth by moving nodes in MANET that is consisted of only mobile nodes. In this paper, we proposed sharing group construction technique for providing a stable connection between mobile nodes and reducing the load of network traffic and overhead of sharing group reconfiguration in order to improve data transmission performance between mobile nodes. The sharing group member nodes applied virtual sharing group generation technique with neighboring nodes of 1-hop distance in order to reduce traffic for file sharing. We performed comparative experiments with DHT technique to evaluate the performance of the proposed technique in this paper and the excellent performance is confirmed through experiments.

Topology-aware Virtual Network Embedding Using Multiple Characteristics

  • Liao, Jianxin;Feng, Min;Li, Tonghong;Wang, Jingyu;Qing, Sude
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.145-164
    • /
    • 2014
  • Network virtualization provides a promising tool to allow multiple heterogeneous virtual networks to run on a shared substrate network simultaneously. A long-standing challenge in network virtualization is the Virtual Network Embedding (VNE) problem: how to embed virtual networks onto specific physical nodes and links in the substrate network effectively. Recent research presents several heuristic algorithms that only consider single topological attribute of networks, which may lead to decreased utilization of resources. In this paper, we introduce six complementary characteristics that reflect different topological attributes, and propose three topology-aware VNE algorithms by leveraging the respective advantages of different characteristics. In addition, a new KS-core decomposition algorithm based on two characteristics is devised to better disentangle the hierarchical topological structure of virtual networks. Due to the overall consideration of topological attributes of substrate and virtual networks by using multiple characteristics, our study better coordinates node and link embedding. Extensive simulations demonstrate that our proposed algorithms improve the long-term average revenue, acceptance ratio, and revenue/cost ratio compared to previous algorithms.

A Memory Configuration Method for Virtual Machine Based on User Preference in Distributed Cloud

  • Liu, Shukun;Jia, Weijia;Pan, Xianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5234-5251
    • /
    • 2018
  • It is well-known that virtualization technology can bring many benefits not only to users but also to service providers. From the view of system security and resource utility, higher resource sharing degree and higher system reliability can be obtained by the introduction of virtualization technology in distributed cloud. The small size time-sharing multiplexing technology which is based on virtual machine in distributed cloud platform can enhance the resource utilization effectively by server consolidation. In this paper, the concept of memory block and user satisfaction is redefined combined with user requirements. According to the unbalanced memory resource states and user preference requirements in multi-virtual machine environments, a model of proper memory resource allocation is proposed combined with memory block and user satisfaction, and at the same time a memory optimization allocation algorithm is proposed which is based on virtual memory block, makespan and user satisfaction under the premise of an orderly physical nodes states also. In the algorithm, a memory optimal problem can be transformed into a resource workload balance problem. All the virtual machine tasks are simulated in Cloudsim platform. And the experimental results show that the problem of virtual machine memory resource allocation can be solved flexibly and efficiently.

An Algorithm for Virtual Topology Design in WDM optical Networks under Physical constraints. (파장분할다중화방식 전광통신망에서 물리적 제약을 고려한 가상망 설계 알고리즘)

  • 유지연;김상완;서승우;장문종;우희곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3A
    • /
    • pp.443-450
    • /
    • 2000
  • Although designing a virtual topology for all-optical WDM wide-area networks has been extensively studied and several algorithms have been proposed, these algorithms assumed error-free communication between two nodes. However, noises from optical amplifiers and optical cross-connects can degraded the signal, resulting in a nonzero bit-error rate. In this paper, we investigate the effect of physical limitations on the virtual topology design. We show that for side-area all-optical networks where transmission distance is fairly long, virtual topology design algorithm that can determine the locations of opto-electronic(OE) and electro-optic(EO) conversions to set up a connection request with a high BER in a multihop manner.

  • PDF