• Title/Summary/Keyword: 시나리오 계층

Search Result 138, Processing Time 0.028 seconds

Key Techniques and Performance Comparison of 5G New Waveform Technologies (5G 새로운 파형 핵심 기술 및 성능 비교 분석)

  • Kang, Hyeon Su;Song, Young Bae;Kwon, Doyle;Kim, Duk Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.142-155
    • /
    • 2016
  • In order to satisfy 5th generation mobile system's requirements, recently many works have been done in various layers. Especially in physical layer, new waveforms like Filter bank Multi-Carrier(FBMC), Universal Filtered Multi-Carrier(UFMC), Generalized Frequency Division Multiplexing(GFDM) have been proposed and their performance have been evaluated. But most previous researches have provided limited information by comparing couple new waveforms each other with different assumptions and simulation parameters. In this paper, we investigate the key technique of each 5G new waveform, and compare them in various aspects and the same simulation environment, and finally provide what waveform is appropriate in different application scenarios.

Network Management for the GSMP Open Interface in the MPLS (MPLS의 GSMP 개방형 인터페이스를 위한 망 관리)

  • Cha, Yeong-Uk;Kim, Jin-Nyeon;Kim, Chun-Hui
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.227-234
    • /
    • 2002
  • MPLS which integrates routing of layer 3 and switching of layer 2, enables support for fast forwarding, traffic engineering and virtual private network services. GSMP is open interface protocol between a label switch and a controller, and it provides connection, configuration, event, performance management and synchronization. In the GSMP open interface, the functions of network management can be located either in the controller or in the label switch. To simplify the label switch and enhance the efficiency of resources, we adopt the network management model, in which the SNMP agent is located in the controller and is interworked with the GSMP. We presented the interworking scenrios between the GSMP and the network management of MPLS. We implemented the controller to verify the realization of our adopted network management model, and measured the connection setup delay of the provisioned connection.

An Energy-Efficient Self-organizing Hierarchical Sensor Network Model for Vehicle Approach Warning Systems (VAWS) (차량 접근 경고 시스템을 위한 에너지 효율적 자가 구성 센서 네트워크 모델)

  • Shin, Hong-Hyul;Lee, Hyuk-Joon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.118-129
    • /
    • 2008
  • This paper describes an IEEE 802.15.4-based hierarchical sensor network model for a VAWS(Vehicle Approach Warning System) which provides the drivers of vehicles approaching a sharp turn with the information about vehicles approaching the same turn from the opposite end. In the proposed network model, a tree-structured topology, that can prolong the lifetime of network is formed in a self-organizing manner by a topology control protocol. A simple but efficient routing protocol, that creates and maintains routing tables based on the network topology organized by the topology control protocol, transports data packets generated from the sensor nodes to the base station which then forwards it to a display processor. These protocols are designed as a network layer extension to the IEEE 802.15.4 MAC. In the simulation, which models a scenario with a sharp turn, it is shown that the proposed network model achieves a high-level performance in terms of both energy efficiency and throughput simultaneously.

  • PDF

Network Security Modeling and Simulation Using the SES/MB Framework (SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 시뮬레이션)

  • 지승도;박종서;이장세;김환국;정기찬;정정례
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.13-26
    • /
    • 2001
  • This paper presents the network security modeling methodology and simulation using the hierarchical and modular modeling and simulation framework. Recently, Howard and Amoroso developed the cause-effect model of the cyber attack, defense, and consequences, Cohen has been proposed the simplified network security simulation methodology using the cause-effect model, however, it is not clear that it can support more complex network security model and also the model-based cyber attack simulation. To deal with this problem, we have adopted the hierarchical and modular modeling and simulation environment so called the System Entity Structure/Model Base (SES/MB) framework which integrates the dynamic-based formalism of simulation with the symbolic formalism of AI. Several simulation tests performed on sample network system verify the soundness of our method.

Analysis of PM2.5 Impact and Human Exposure from Worst-Case of Mt. Baekdu Volcanic Eruption (백두산 분화 Worst-case로 인한 우리나라 초미세먼지(PM2.5) 영향분석 및 노출평가)

  • Park, Jae Eun;Kim, Hyerim;Sunwoo, Young
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_4
    • /
    • pp.1267-1276
    • /
    • 2020
  • To quantitatively predict the impacts of large-scale volcanic eruptions of Mt. Baekdu on air quality and damage around the Korean Peninsula, a three-dimensional chemistry-transport modeling system (Weather Research & Forecasting - Sparse Matrix Operation Kernel Emission - Comunity Multi-scale Air Quality) was adopted. A worst-case meteorology scenario was selected to estimate the direct impact on Korea. This study applied the typical worst-case scenarios that are likely to cause significant damage to Korea among worst-case volcanic eruptions of Mt. Baekdu in the past decade (2005~2014) and assumed a massive VEI 4 volcanic eruption on May 16, 2012, to analyze the concentration of PM2.5 caused by the volcanic eruption. The effects of air quality in each region-cities, counties, boroughs-were estimated, and vulnerable areas were derived by conducting an exposure assessment reflecting vulnerable groups. Moreover, the effects of cities, counties, and boroughs were analyzed with a high-resolution scale (9 km × 9 km) to derive vulnerable areas within the regions. As a result of analyzing the typical worst-case volcanic eruptions of Mt. Baekdu, a discrepancy was shown in areas between high PM2.5 concentration, high population density, and where vulnerable groups are concentrated. From the result, PM2.5 peak concentration was about 24,547 ㎍/㎥, which is estimated to be a more serious situation than the eruption of Mt. St. Helensin 1980, which is known for 540 million tons of volcanic ash. Paju, Gimpo, Goyang, Ganghwa, Sancheong, Hadong showed to have a high PM2.5 concentration. Paju appeared to be the most vulnerable area from the exposure assessment. While areas estimated with a high concentration of air pollutants are important, it is also necessary to develop plans and measures considering densely populated areas or areas with high concentrations of susceptible population or vulnerable groups. Also, establishing measures for each vulnerable area by selecting high concentration areas within cities, counties, and boroughs rather than establishing uniform measures for all regions is needed. This study will provide the foundation for developing the standards for disaster declaration and preemptive response systems for volcanic eruptions.

A Study on the Improvement Direction of Selection Evaluation Indicators for the Land Transport Technology Commercialization Support Project: Focusing on the Follow-up Project Linkage Plan (국토교통기술사업화지원사업 선정평가 지표 개선방안 연구: 후속사업 연계 방안을 중심으로)

  • Hyung-Wook Shim;Seok-Ki Cha;Seung-Hee Back
    • Journal of Industrial Convergence
    • /
    • v.20 no.12
    • /
    • pp.87-96
    • /
    • 2022
  • The Ministry of Land, Infrastructure and Transport has also been promoting the commercialization of land transport technology to commercialize the technologies owned by small and medium-sized venture companies, and to support the transfer and commercialization of public technologies. At this point, in order to improve the investment effect of subsequent new projects and to select excellent research institutes, it is necessary to establish a valid evaluation index system suitable for the purpose of the project. The evaluation index system for subsequent new projects should be linked to the project objectives and goals of the preceding project, and should be selected in consideration of existing evaluation indicators to prevent interruption of research results. Therefore, this thesis sets the evaluation index system into multiple scenarios through hierarchical cluster analysis using the evaluation result data for each evaluation committee for small and medium venture companies participating in the land transportation technology commercialization support project, and then analyzes the structural equation model. As a result of scenario analysis, considering the measurement effect of each path representing the causal relationship between evaluation indicators and the effect of each evaluation index on evaluation items, the scenario with the highest impact on the evaluation result was selected as an improvement plan.

Performance Evaluation of WCDMA with Multiple Access Interference in Mixed Service Environments (다중접속 간섭과 혼합서비스 환경에서 WCDMA 시스템의 성능분석)

  • 정연호
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.2 no.3
    • /
    • pp.45-49
    • /
    • 2001
  • Wideband code division multiple access (WCDMA) is the most widely adopted third generation air interface. The physical layer of the air interface is the main discussion topic during standardization processes. This paper aims to investigate the performance of uplink WCDMA over many conceivable transmission scenarios in realistic operating conditions. The focus of the study is placed on the performance under frequency selective fading channel conditions with multiple access interference (MAI) in mixed services environments. For the investigation, a simulator has been developed and it encompasses a variety of WCDMA air interface features. The results show that the performance is greatly affected by MAI and is further aggravated with the presence of frequency selective fading, thereby necessitating a suitable compensation measure.

  • PDF

Implementation of Mission Service Model and Development Tool for Effective Mission Operation in Military Environment (전장공간의 효율적 임무수행을 위한 임무서비스 모델 및 개발도구 구현)

  • Song, Seheon;Byun, Kohun;Lee, Sangil;Park, JaeHyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.6
    • /
    • pp.285-292
    • /
    • 2017
  • There are technological, operational and environmental constraints at tactical edge, which are disconnected operation, intermittent connectivity, and limited bandwidth (DIL), size, weight and power (SWaP) limitations, ad-hoc and mobile network, and so on. To overcome these limitations and constraints, we use service-oriented architecture (SOA) based technologies. In our research, we propose a hierarchical mission service model that supports service-oriented mission planning and execution in order for a commander to operate various SW required for mission in battlefield environment. We will also implement development tools that utilize the workflow technology and semantic capability-based recommendation and apply them to combat mission scenarios to demonstrate effectiveness.

A Solution of Binary Jamming Message to Source-Wiretapping and Disadvantage of Sharing the Jamming Signal in Physical-Layer Security (물리 계층에서 보안 재밍 신호 공유의 한계점과 이진 재밍 메시지 도청의 해결책)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.63-67
    • /
    • 2014
  • A distributed zero-beamforming based cooperative jamming technique is useless when an eavesdropper detects the sharing seed. In addition, the currently alternatives are very limited when the eavesdropper is located nearby a source for wiretapping. This letter presents a solution to this extreme case. Relay randomly generates and transmits a binary jamming message to both source and destination in the first phase. When these two receivers securely and correctly decode the message, the source creates and transmits another message based on the use of exclusive-or for its information message and the decoded message. Consequently, the next transmission can avoid the eavesdropping.

Message Complexity Analysis of MANET Address Autoconfiguration-Single Node Joining Case (단일 노드 결합시 MANET 자동 네트워킹 프로토콜의 메시지 복잡도 분석)

  • Kim, Sang-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5B
    • /
    • pp.257-269
    • /
    • 2007
  • This paper proposes a novel method to perform a quantitative analysis of message complexity and applies this method in comparing the message complexity among the mobile ad hoc network (MANET) address autoconfiguration protocols (AAPs). To obtain the upper bound of the message complexity of the protocols, the O-notation of a MANET group of N nodes has been applied. The message complexity of the single node joining case in Strong DAD, Weak DAD with proactive routing protocols (WDP), Weak DAD with on-demand routing protocols (WDO), and MANETconf has been derived as n(mO(N)+O(t)), n(O(N)+O(t)), n(O(N)+2O(t)), and nO((t+1)N)+O(N)+O(2) respectively. In order to verify the bounds, analytical simulations that quantify the message complexity of the address autoconfiguration process based on the different coflict probabilities are conducted.