• Title/Summary/Keyword: Edge Network

Search Result 802, Processing Time 0.024 seconds

5G 망에서의 Network Slicing 요구사항 및 제공 구조

  • Kim, Sang-Hun
    • Information and Communications Magazine
    • /
    • v.33 no.6
    • /
    • pp.9-17
    • /
    • 2016
  • 본고에서는 5G 망에서의 서비스 요구사항을 만족하기 위한 구조로서 Network Slicing 구조를 제안하고 세부 적용방안을 기술한다. 이를 위해 5G 서비스를 우선 정의하고 그에 따른 서비스 요구사항을 도출한 후, 이러한 요구사항과 관련해 현재 망의 문제점에 대해 기술하고 망 개선을 위한 기술 요구사항을 정립한다. 특히, 5G에서의 중요성이 높아질 것으로 전망되고 있는 'Network Slicing'의 필요성 및 개념에 대해 서술한다. Network Slicing에 대한 제조사들의 솔루션 동향, 3GPP 등 단체의 표준화 동향, APN 방식의 P-LTE/DECOR/RAN Slicing 등 관련 기술의 발전 동향을 포함한 5G Network Slicing 주요 기술 동향에 대해서 알아본다. 또한, Slice의 관리 및 BSS/OSS등과의 연계를 위한 통신사업자 입장에서의 플랫폼 요구사항을 정리한다. 5G Network Slicing을 충족하기 위한 주요 기술로 C/U plane 분리구조, 범용 서버를 활용한 NFV/SDN, Edge 기반의 분산된 수평적 네트워크, 데이터 오프로딩 및 지연시간 절감을 위한 Edge Computing 등을 들 수 있고 효율적인 자원 관리를 위한 Orchestration 등에 대해서도 알아본다. 이를 기반으로 하여 사업자 입장에서 5G Core Network 기술을 선도함은 물론이고 향후, 조기 상용화를 위한 진화 방향을 제시하고자 한다.

Exploring reward efficacy in traffic management using deep reinforcement learning in intelligent transportation system

  • Paul, Ananya;Mitra, Sulata
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.194-207
    • /
    • 2022
  • In the last decade, substantial progress has been achieved in intelligent traffic control technologies to overcome consistent difficulties of traffic congestion and its adverse effect on smart cities. Edge computing is one such advanced progress facilitating real-time data transmission among vehicles and roadside units to mitigate congestion. An edge computing-based deep reinforcement learning system is demonstrated in this study that appropriately designs a multiobjective reward function for optimizing different objectives. The system seeks to overcome the challenge of evaluating actions with a simple numerical reward. The selection of reward functions has a significant impact on agents' ability to acquire the ideal behavior for managing multiple traffic signals in a large-scale road network. To ascertain effective reward functions, the agent is trained withusing the proximal policy optimization method in several deep neural network models, including the state-of-the-art transformer network. The system is verified using both hypothetical scenarios and real-world traffic maps. The comprehensive simulation outcomes demonstrate the potency of the suggested reward functions.

An Overview of Mobile Edge Computing: Architecture, Technology and Direction

  • Rasheed, Arslan;Chong, Peter Han Joo;Ho, Ivan Wang-Hei;Li, Xue Jun;Liu, William
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4849-4864
    • /
    • 2019
  • Modern applications such as augmented reality, connected vehicles, video streaming and gaming have stringent requirements on latency, bandwidth and computation resources. The explosion in data generation by mobile devices has further exacerbated the situation. Mobile Edge Computing (MEC) is a recent addition to the edge computing paradigm that amalgamates the cloud computing capabilities with cellular communications. The concept of MEC is to relocate the cloud capabilities to the edge of the network for yielding ultra-low latency, high computation, high bandwidth, low burden on the core network, enhanced quality of experience (QoE), and efficient resource utilization. In this paper, we provide a comprehensive overview on different traits of MEC including its use cases, architecture, computation offloading, security, economic aspects, research challenges, and potential future directions.

Opto-electronic Implementation of an Edge Detection System Using Diffusion Neural Network (확산신경회로망을 이용한 윤곽선 검출 시스템의 광전자적 구현)

  • Cho, Cheol-Soo;Kim, Jae-Chang;Yoon, Tae-Hoon;Nam, Ki-Gon;Park, Ui-Yul
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.11
    • /
    • pp.136-141
    • /
    • 1994
  • In this paper, we implemented an opto-electronical signal processing system for the edge detection using the diffusion neural network. The diffusion neural network performs a Gaussian and DOG operation efficiently by the diffusion process. The diffusion neural network is more efficient than the LOG masking method in hardware implementation because it has a few connections and the connection weights are fixed-valued. We implemented a diffusion neural network using the characteristics of the light intensity distribution function which is similar to the Gaussian function. We have shown that the system can detect the edge of an image exactly through the experimental results.

  • PDF

Quantitative Annotation of Edges, in Bayesian Networks with Condition-Specific Data (베이지안 망 연결 구조에 대한 데이터 군집별 기여도의 정량화 방법에 대한 연구)

  • Jung, Sung-Won;Lee, Do-Heon;Lee, Kwang-H.
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.3
    • /
    • pp.316-321
    • /
    • 2007
  • We propose a quatitative annotation method for edges in Bayesian networks using given sets of condition-specific data. Bayesian network model has been used widely in various fields to infer probabilistic dependency relationships between entities in target systems. Besides the need for identifying dependency relationships, the annotation of edges in Bayesian networks is required to analyze the meaning of learned Bayesian networks. We assume the training data is composed of several condition-specific data sets. The contribution of each condition-specific data set to each edge in the learned Bayesian network is measured using the ratio of likelihoods between network structures of including and missing the specific edge. The proposed method can be a good approach to make quantitative annotation for learned Bayesian network structures while previous annotation approaches only give qualitative one.

A Performance Enhancement Scheme for Heterogeneous Network Systems Utilizing Remote Radio Heads (원격송신국을 활용하는 이종 네트워크 시스템의 성능 개선 방안)

  • Yoo, Hyung-Gil;Sung, Won-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1B
    • /
    • pp.31-38
    • /
    • 2012
  • In this paper, we propose a method to improve cell edge users' performance in HetNet (heterogeneous network) systems by cooperatively transmitting signals using remote radio heads (RRHs) located near coverage boundaries, referred to as edge RRHs. The proposed method locates the edge RRHs in specific locations of the cell boundary and provides an efficient operational strategy by adjusting the duty cycle of the edge RRHs and base stations. The effectiveness of the method is demonstrated by experimental performance based on the system model parameters of the CoMP (coordinated multi-point transmission and reception) scenario, which is discussed in LTE-Advanced (Long Term Evolution - Advanced) standard contributions. When compared with conventional methods, utilization of edge RRHs is especially advantageous for the performance improvement of lower percentile users in terms of average throughput and effectively improves the fairness among users.

A VPN controlled by CE Routers on MPLS Networks (CE 라우터 기반의 MPLS VPN)

  • Lee, Young-Seok;Han, Min-Ho;Chun, Woo-Jik;Choi, Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.31-39
    • /
    • 2002
  • The VPN(Virtual Private Network) is a private network constructed logically on a public network infrastructure. There have been numerous studies to support the VPN services by using different technologies such as IP in IP, GRE, L2TP, MPLS and so on. Among these technologies, MPLS has shown many merits in aspects of QoS, security, and management, compared with other technologies. As an enhancement of the VPN that is controlled by MPLS PE(Provider Edge) routers, this paper presents the VPN controlled by MPLS CE(Customer Edge) routers. The functional architecture of the CE based VPN and operations of the CE routers are described along with the performance comparison of CE based MPLS VPN. It has been shown that the CE based VPN has more advantages than PE based VPN with respect to independency, scalability, security, and complexity.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

A weigth-based algorithm for network stability measurement (네트워크 안정성 측정을 위한 가중치 기반의 계산알고리즘 연구)

  • Lee, Wonhyuk;Noh, Minki;Cho, Buseung;Kim, TaeYeon;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.37-43
    • /
    • 2014
  • Today, group research efforts are increasing for cutting edge technologies related to climate, radio astronomy, co-utilization of high performance computing resources and more. Accordingly, networks for cutting-edge researches a re also regarded as means for cutting-edge researches nowadays. Therefore, it is necessary for administrating cutti ng-edge network to be considered, reflecting such a current trend. In this sense, 'Research which can help to admin istrate the networks which are usually used as means for a lot researches' was set as a goal of this paper.

Transmission Line Model for an Edge-Coupled Patch Antenna

  • Saksiri, Wiset;Chongcheawchamnan, Mitchai;Krairiksh, Monai
    • ETRI Journal
    • /
    • v.30 no.5
    • /
    • pp.723-728
    • /
    • 2008
  • In this paper, a simple transmission line model for an edge-coupled patch antenna is presented. The coupled section is modeled with a lump network which represents the mutual admittance between patches and from patch to ground. Theoretical analysis of two edge-coupled patch antenna models are compared by simulation and experiment in antennas designed to operate at the 2 GHz band. The proposed model predicts the return loss of the antenna accurately.

  • PDF