• Title/Summary/Keyword: 네트워크 운용

Search Result 994, Processing Time 0.027 seconds

Cooperative Video Streaming and Active Node Buffer Management Technique in Hybrid CDN/P2P Architecture

  • Lee, Jun Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.11-19
    • /
    • 2019
  • Recently, hybrid CDN/P2P video streaming architecture is specially designed and deployed to achieve the scalability of P2P networks and the desired low delay and high throughput of CDNs. In this paper, we propose a cooperative video streaming and active node buffer management technique in hybrid CDN/P2P architecture. The key idea of this streaming strategy is to minimize network latency such as jitter and packet loss and to maximize the QoS(quality of service) by effectively and efficiently utilizing the information sharing of file location in CDN's proxy server which is an end node located close to a user and P2P network. Through simulation, we show that the proposed cooperative video streaming and active node buffer management technique based on CDN and P2P network improves the performance of realtime video streaming compared to previous methods.

A Basic Study on the Development of Network Security Equipment to Support MASS Operation in Digital Maritime-Communication System Environment (디지털 해상통신시스템 환경에서 자율운항선박 운용 지원을 위한 네트워크 보안장비 개발 기초연구)

  • Yunja Yoo;Sang-Won Park;Jin-Hyuk Jung;David Kwak
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2021.11a
    • /
    • pp.72-73
    • /
    • 2021
  • As discussions of the International Maritime Organization for the introduction of the Marine Autonomous Surface Ship (MASS) began in earnest, discussions were conducted to prioritize cybersecurity (Cyber Risk Management) when developing a system to support MASS operation at the 27th ENAV Committee Working Group (WG2). Korea launched a technology development project for autonomous ships in 2020, and has been promoting detailed tasks for cybersecurity technology development since 2021. MASS operation in a digital maritime communication system environment requires network security of various digital equipment that was not considered in the existing maritime communication environment. This study introduces the basic concept of network security equipment to support MASS operation in the detailed task of cybersecurity technology development, and defines the network security equipment interface for MASS ship application in the basic stage.

  • PDF

Design of Digital Item Management Model for Interactive Video based on SOA (SOA 기반의 양방향 동영상을 위한 디지털 아이템 운용 모델 설계)

  • Oh, Jung-Min;Kim, Kyung-Rok;Choi, Wan;Moon, Nam-Mee
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.11a
    • /
    • pp.274-275
    • /
    • 2010
  • 디지털 기술의 발달로 콘텐츠 서비스 방식에 대한 융복합화 현상이 두드러진다. 플랫폼, 네트워크, 디바이스 등의 발달과 함께 이루어지는 서비스 방식의 다양화는 콘텐츠 제작 및 소비에 있어 사용자의 참여를 가속화시킨다. 최근 들어 동영상 콘텐츠에 양방향성의 특징을 반영하는 서비스가 주목받고 있으며, 이에 따라 양방향 동영상의 확장된 비즈니스 모델을 고려한 신규 서비스 운용 모델이 요구된다. 이에 본 논문은 전자상거래를 지원하기 위한 기본 비즈니스 모델인 Imprimatur Business Model을 기반으로 양방향성이 반영된 동영상 비즈니스 모델을 재정의하고 그 운용에 필요한 구성 요소를 도출하였다. 서비스 운용 모델은 생성, 처리, 소비의 단계를 갖는다. 각 단계별로 세부 운용 요소를 설계하여 운용 시스템과의 연결성을 고려하였다. 이는 XML 다이어그램으로 표현되었으며 디지털 아이템의 생성, 처리, 소비에 필요한 기능을 제어하고 처리할 수 있도록 하기 위해 각 단계별 생성자(creator)와 핸들러(handler)를 정의하였다.

  • PDF

A Framework for OAM in OBS Networks (OBS 네트워크의 OAM 기본 체제)

  • Shin Jong-Dug
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.41-51
    • /
    • 2004
  • Operation and maintenance (OAM) in optical burst switching (OBS) networks has not yet been addressed even though OBS has been gaining research interest in recent years. In this paper, we defined five OBS functions such as Burst Termination (BT), Burst Transmission (BTX), Burst Switching (BSW), Routing and Switching Control (RSC), and Protection and Restoration (PAR). A functional model for OBS networks and an OAM architecture are designed to meet the operational requirements. We present the first framework to realize OAM in OBS networks, including OAM activities, OAM-capable OBS nodes such as ingress edge, core, and egress edge nodes, OAM information and communication models and protocols. A number of examples of possible network failures are pointed out and the corresponding reactions to these using the proposed OAM architecture are presented.

Aspects of Warfare in the Information Age - NCW Concerning (정보화 시대의 전쟁양상 - Network Centric Warfare(네트워크 중심 전쟁)을 중심으로)

  • Woo, Hee-Choul
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.45-50
    • /
    • 2016
  • This research suggests a method to contribute to the perfect execution of duty in prospective information warfare by inspecting network-based warfare, in which its basic concepts and efficient management plans are provided; it is especially important, due to growing focus on information warfare caused by sudden improvements on information technology which affects not only civil matters but international military affairs as well. For this purpose, this research scrutinizes on the chronological organization of warfare traits during the information age, and information-warfare execution, as well as its effects, thereby providing proper management plans for network-based warfare.

Design and Evaluation of Information Broker Architecture for Network-Centric Operational Environment (네트워크 중심 작전 환경을 위한 정보 브로커 아키텍처 설계 및 평가)

  • Park, Jejun;Kang, Dongsu
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.668-677
    • /
    • 2016
  • The information superiority through effective networking is a core element that accelerates command decision for mission completion. Our military wants to acquire capabilities of effective information sharing with Network-Centric Operational Environment(NCOE) for Network-Centric Warfare (NCW). In this paper, we suggested an information broker for overcoming current limits and maximizing future expandability and possibility of information sharing capacities. The information broker, which is an intermediate layer between users and information providers, provides the functions for mediating and managing information and for ensuring security of the system. We evaluated the consistency of proposed architecture and the implementation of the operational architecture design concept using existing design frameworks.

Teleoperation of an Internet-Based Mobile Robot with Network Latency (데이터 전송 지연을 고려한 인터넷 기반 이동 로봇의 원격 운용)

  • Shin, Jik-Su;Joo, Moon-Gab;Kang, Geun-Taek;Lee, Won-Chang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.4
    • /
    • pp.412-417
    • /
    • 2005
  • The Internet has been widely applied to the remote control system. The network-based control system, however, has a random time delay and an inherent weak point of the network, when the data ate transmitted. The network delay may result in performance degradation or even system instability in teleoperation. In this paper a prediction model of network delay using TSK (Takagi-Sugeno-Kang) fuzzy model is presented. An adaptive scheme is developed to update the prediction model according to the current network status. The prediction model is applied to the control of an Internet-based mobile robot to show its usefulness. In the computer simulation the TSK Prediction model of network delay is proven superior to the conventional algorithms.

Mobile Sink Routing Scheme for Sensor Networks (센서 네트워크에서 이동 싱크 라우팅 기법)

  • Hwang, Mi-Young;Park, Sang-Joon;Khil, A-Ra;Kim, Byung-Gi
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.107-117
    • /
    • 2006
  • Wireless Sensor Network consists of sensor nodes and sink. A sink receives and processes signals created from sensor nodes. Many studies have been performed, since sensor network allows multiple nodes to run using a limited amount of energy, Most researches have focused on using fixed sink. However, in many cases, the sink has mobility effected by man, cars, and etc. This research proposes three methods for reducing the node's energy consumption which is applied the Grid method based on mobile sink. Most routing processes handled by the mobile sink and wireless sensor area is separated and operated respectively. So, this research allows decreasing the power costs. In addition, it also proposes methods using simulation to test the quality of the performance.

  • PDF

Development of a Command and Control System Based on Network Emulator (네트워크 에뮬레이터기반 지휘통제시스템의 개발)

  • Kim, Donghyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.125-130
    • /
    • 2015
  • In this paper, a command and control (C2) system development using a network emulator is treated. Due to the development of information and communication technologies enabling reinforcement of information exchange and computational capability, an operational concept network centric warfare (NCW) was introduced. In here, it summarizes a developmental test environment build based on dummynet, one of the software based network emulator, and an operational concept of target command and control system. Moreover, I explain command and control system developmental test cases and results, and suggest an operational concept to overcome limitations of target communication system. I expect this concept will reduce data traffic of proposed C2 system especially plot messages which is distributed same data with short interval.

Genetic Algorithm based Methodology for Network Performance Optimization (유전자 알고리즘을 이용한 WDM 네트워크 최적화 방법)

  • Yang, Hyo-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.1
    • /
    • pp.39-45
    • /
    • 2008
  • This paper considers the multi-objective optimization of a multi-service arrayed waveguide grating-based single-hop WDM network with the two conflicting objectives of maximizing throughput while minimizing delay. This paper presents a genetic algorithm based methodology for finding the optimal throughput-delay tradeoff curve, the so-called Pareto-optimal frontier. Genetic algorithm based methodology provides the network architecture parameters and the Medium Access Control protocol parameters that achieve the Pareto-optima in a computationally efficient manner. The numerical results obtained with this methodology provide the Pareto-optimal network planning and operation solution for a wide range of traffic scenarios. The presented methodology is applicable to other networks with a similar throughput-delay tradeoff.

  • PDF