• Title/Summary/Keyword: Data Center Network

Search Result 1,415, Processing Time 0.025 seconds

MIMO-aided Efficient Communication Resource Scheduling Scheme in VDES

  • Sung, Juhyoung;Cho, Sungyoon;Jeon, Wongi;Park, Kyungwon;Ahn, Sang Jung;Kwon, Kiwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2736-2750
    • /
    • 2022
  • As demands for the maritime communications increase, a variety of functions and information are required to exchange via elements of maritime systems, which leads communication traffic increases in maritime frequency bands, especially in VHF (Very High Frequency) band. Thus, effective resource management is crucial to the future maritime communication systems not only to the typical terrestrial communication systems. VHF data exchange system (VDES) enables to utilize more flexible configuration according to the communication condition. This paper focuses on the VDES communication system among VDES terminals such as shore stations, ship stations and aids to navigation (AtoN) to address efficient resource allocation. We propose a resource management method considering a MIMO (Multiple Input Multiple Output) technique in VDES, which has been widely used for modern terrestrial wireless networks but not for marine environments by scheduling the essential communication resources. We introduce the general channel model in marine environment and give two metrics, spectral and the energy efficiencies to examine our resource scheduling algorithm. Based on the simulation results and analysis, the proposed method provides a possibility to enhance spectral and energy efficiencies. Additionally, we present a trade-off relationship between spectral and energy efficiencies. Furthermore, we examine the resource efficiencies related to the imperfect channel estimation.

A Visualization System for Multiple Heterogeneous Network Security Data and Fusion Analysis

  • Zhang, Sheng;Shi, Ronghua;Zhao, Jue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2801-2816
    • /
    • 2016
  • Owing to their low scalability, weak support on big data, insufficient data collaborative analysis and inadequate situational awareness, the traditional methods fail to meet the needs of the security data analysis. This paper proposes visualization methods to fuse the multi-source security data and grasp the network situation. Firstly, data sources are classified at their collection positions, with the objects of security data taken from three different layers. Secondly, the Heatmap is adopted to show host status; the Treemap is used to visualize Netflow logs; and the radial Node-link diagram is employed to express IPS logs. Finally, the Labeled Treemap is invented to make a fusion at data-level and the Time-series features are extracted to fuse data at feature-level. The comparative analyses with the prize-winning works prove this method enjoying substantial advantages for network analysts to facilitate data feature fusion, better understand network security situation with a unified, convenient and accurate mode.

Implementation of Wireless Network Design Tool for TD-SCDMA (TD-SCDMA 무선망 설계 Tool 의 구현 방법론)

  • Jeon, Hyun-Cheol;Ryu, Jae-Hyun;Park, Sang-Jin;Kim, Jung-Chul;Ihm, Jong-Tae
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.247-250
    • /
    • 2007
  • There are three main kinds of service standards for 3G(Third-Generation) wireless communication as WCDMA, CDMA2000 and TD-SCDMA(Time Division-Synchronous Code Division Multiple Access). Compare with WCDMA and CDMA2000, TD-SCDMA system has distinguished technical characters. It is a TDD(Time Division Duplexing) based technology and deploys several advanced but in some respects complex technologies such as smart antenna, joint-detection and baton-handoff, etc. Therefore to analyze and design TD-SCDMA wireless network, it needs more efficient and systematic simulation tool. General simulation tool has so many analysis functions including path loss prediction, capacity and coverage analysis. For more suitable for TD-SCDMA, new additional technologies have to be implemented in simulation tool. Especially as the wireless network highly advancing focused on data service, it more needs to research and develop on the reliability of the simulation tool. In this paper, to give the concrete process and skill about how to implement TD-SCDMA simulation tool, we define the kinds of simulation tool and list basic analysis functions available for TD-SCDMA network design at first. And then we explain how to consider the effects of new technologies of TD-SCDMA and give the solutions about theses considerations.

  • PDF

Embedment of structural monitoring algorithms in a wireless sensing unit

  • Lynch, Jerome Peter;Sundararajan, Arvind;Law, Kincho H.;Kiremidjian, Anne S.;Kenny, Thomas;Carryer, Ed
    • Structural Engineering and Mechanics
    • /
    • v.15 no.3
    • /
    • pp.285-297
    • /
    • 2003
  • Complementing recent advances made in the field of structural health monitoring and damage detection, the concept of a wireless sensing network with distributed computational power is proposed. The fundamental building block of the proposed sensing network is a wireless sensing unit capable of acquiring measurement data, interrogating the data and transmitting the data in real time. The computational core of a prototype wireless sensing unit can potentially be utilized for execution of embedded engineering analyses such as damage detection and system identification. To illustrate the computational capabilities of the proposed wireless sensing unit, the fast Fourier transform and auto-regressive time-series modeling are locally executed by the unit. Fast Fourier transforms and auto-regressive models are two important techniques that have been previously used for the identification of damage in structural systems. Their embedment illustrates the computational capabilities of the prototype wireless sensing unit and suggests strong potential for unit installation in automated structural health monitoring systems.

Efficient Load Balancing Technique Considering Data Generation Form and Server Response Time in SDN (SDN 환경에서의 데이터 생성 형태와 서버 응답시간을 고려한 효율적인 부하분산 기법)

  • Kim, Jong-Geon;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.679-686
    • /
    • 2020
  • With global data totals expected to grow to 175 ZB by 2025, data processing capabilities in the network area are becoming more important. In particular, data centers are becoming more stubborn as data usage increases, and the load generated by incoming data should be appropriately distributed to reduce costs and efficiently operate. The SDN technology, which emerged to overcome the limitations of the existing network system, removes rigidity of the Legacy system by separating H/W and S/W from the network equipment, and can be effectively applied to load balancing in the data center using S/W-based flexibility. In this paper, we propose ways to increase efficiency by classifying data received from users by type by utilizing SDN technology, and transmitting and processing classified data in order of response speed of servers in the data center.

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model

  • Xie, Dong;Peng, HaiPeng;Li, Lixiang;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2427-2445
    • /
    • 2016
  • In contrast to traditional "store-and-forward" routing mechanisms, network coding offers an elegant solution for achieving maximum network throughput. The core idea is that intermediate network nodes linearly combine received data packets so that the destination nodes can decode original files from some authenticated packets. Although network coding has many advantages, especially in wireless sensor network and peer-to-peer network, the encoding mechanism of intermediate nodes also results in some additional security issues. For a powerful adversary who can control arbitrary number of malicious network nodes and can eavesdrop on the entire network, cryptographic signature schemes provide undeniable authentication mechanisms for network nodes. However, with the development of quantum technologies, some existing network coding signature schemes based on some traditional number-theoretic primitives vulnerable to quantum cryptanalysis. In this paper we first present an efficient network coding signature scheme in the standard model using lattice theory, which can be viewed as the most promising tool for designing post-quantum cryptographic protocols. In the security proof, we propose a new method for generating a random lattice and the corresponding trapdoor, which may be used in other cryptographic protocols. Our scheme has many advantages, such as supporting multi-source networks, low computational complexity and low communication overhead.

The Study of Building Security-Established Enterprise Mobile-VPN on WiBro Network (WiBro망에서 보안성이 확립된 기업용 Mobile-VPN 구축 방안 연구)

  • Cho, Do-Hyeoun;Kang, Dae-Seok;Han, Kyu-Jeong;Ji, Yung-Ha;Han, Wan-Ok
    • 전자공학회논문지 IE
    • /
    • v.47 no.4
    • /
    • pp.48-52
    • /
    • 2010
  • Recently, WiBro service as a mobile internet has been being extended. The market of wireless data communication has been being extended rapidly due to the increase of mobile data communication service supply such as smart-phone, WiBro service and so on. As the result, security is also emphasized in the mobile Internet In this paper, we propose the methods that tighten up security in the upcoming Enterprise Mobile-VPN service on WiBro network.

The Status of Configuration on the e-VLBI Network for the Transfer of Mass VLBI Data (대용량 VLBI 데이터 전송을 위한 e-VLBI 네트워크 구축 현황)

  • Song, Min-Gyu;Kim, Hyun-Goo;Byun, Do-Young;Roh, Duk-Gyoo;Oh, Se-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.560-562
    • /
    • 2005
  • The electronic transmission of VLBI data(dubbed e-VLBI) presents a special challenge to the use of high-speed global network. with long-term requirements for simultaneous or near-simultaneous Gbps data streams from antennas worldwide converging in a single processing center, e-VLBI is both a useful and highly synergetic application for global high-speed networksAs broband access to high speed research and education networks has become increasingly available to radio telescopes around the world the use of e-VLBI has also increased. High bandwidth e-VLBI experiments have been achieved across wide areas e-VLBI has also been used for the transfer of data from "production"exoeriments

  • PDF

A Study on Ring Buffer for Efficiency of Mass Data Transmission in Unstable Network Environment (불안정한 네트워크 환경에서 대용량 데이터의 전송 효율화를 위한 링 버퍼에 관한 연구)

  • Song, Min-Gyu;Kim, Hyo-Ryoung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1045-1054
    • /
    • 2020
  • In this paper, we designed a TCP/IP based ring buffer system that can stably transfer bulk data streams in the unstable network environments. In the scheme we proposed, The observation data stream generated and output by each radio observatory's backend system as a UDP frame is stored as a UDP packet in a large capacity ring buffer via a socket buffer in the client system. Thereafter, for stable transmission to the remote destination, the packets are processed in TCP and transmitted to the socket buffer of server system in the correlation center, which packets are stored in a large capacity ring buffer if there is no problem with the packets. In case of errors such as loss, duplication, and out of order delivery, the packets are retransmitted through TCP flow control, and we guaranteed that the reliability of data arriving at the correlation center. When congestion avoidance occurs due to network performance instability, we also suggest that performance degradation can be minimized by applying parallel streams.

Development of Extraction Technique for Irrigated Area and Canal Network Using High Resolution Images (고해상도 영상을 이용한 농업용수 수혜면적 및 용배수로 추출 기법 개발)

  • Yoon, Dong-Hyun;Nam, Won-Ho;Lee, Hee-Jin;Jeon, Min-Gi;Lee, Sang-Il;Kim, Han-Joong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.63 no.4
    • /
    • pp.23-32
    • /
    • 2021
  • For agricultural water management, it is essential to establish the digital infrastructure data such as agricultural watershed, irrigated area and canal network in rural areas. Approximately 70,000 irrigation facilities in agricultural watershed, including reservoirs, pumping and draining stations, weirs, and tube wells have been installed in South Korea to enable the efficient management of agricultural water. The total length of irrigation and drainage canal network, important components of agricultural water supply, is 184,000 km. Major problem faced by irrigation facilities management is that these facilities are spread over an irrigated area at a low density and are difficult to access. In addition, the management of irrigation facilities suffers from missing or errors of spatial information and acquisition of limited range of data through direct survey. Therefore, it is necessary to establish and redefine accurate identification of irrigated areas and canal network using up-to-date high resolution images. In this study, previous existing data such as RIMS (Rural Infrastructure Management System), smart farm map, and land cover map were used to redefine irrigated area and canal network based on appropriate image data using satellite imagery, aerial imagery, and drone imagery. The results of the building the digital infrastructure in rural areas are expected to be utilized for efficient water allocation and planning, such as identifying areas of water shortage and monitoring spatiotemporal distribution of water supply by irrigated areas and irrigation canal network.