• Title/Summary/Keyword: Information Survivability

Search Result 166, Processing Time 0.027 seconds

A Novel Heuristic Mechanism for Highly Utilizable Survivability on WDM Mesh Networks

  • Jeong Hong-Kyu;Kim Byung-Jae;Kang Min-Ho;Lee Yong-Gi
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2003.08a
    • /
    • pp.159-162
    • /
    • 2003
  • This paper presents a novel heuristic mechanism, Dynamic-network Adapted Cost selection (DAC-selection), which has higher backup path sharing rate, lower number of blocked channel requests and number of used wavelengths fer reservation of working path and backup path by using unique cost function than that of widely used random selection (R-selection) mechanism and Combined Min-cost selection (CMC-selection) mechanism proposed by Lo, while maintaining 100% restoration capability.

  • PDF

Datacenter-Oriented Elastic Optical Networks: Architecture, Operation, and Solutions

  • Peng, Limei;Sun, Yantao;Chen, Min;Park, Kiejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3955-3966
    • /
    • 2014
  • With the exponentially increasing Internet traffic and emergence of more versatile and heterogeneous applications, the design of datacenter networks (DCNs) is subject to unprecedented requirements for larger capacity and more flexible switching granularities. Envisioning Optical-Orthogonal Frequency Division Multiplexing (O-OFDM) as a promising candidate for such a scenario, we motivate the use of O-OFDM as the underlying switching technology in order to provide sufficient switching capacity and elastic bandwidth allocation. For this purpose, this article reviews the recent progresses of DCN deployment and assesses the scenario where the O-OFDM transmission and switching technology is employed in the underlying transport plane. We discuss the key issues of the datacenter-oriented O-OFDM optical networks, and in particular, elaborate on a number of open issues and solutions including system interconnection architecture, routing and resource assignment, survivability, and energy-efficiency.

Algorithm for Threat Data Integration of Multiple Sensor and selection of CounterMeasures (이기종 다중센서 위협데이터 통합 및 대응책 선정 알고리즘)

  • Go, Eun-Kyoung;Woo, Sang-Min;Jeong, Un-Seob
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.474-481
    • /
    • 2011
  • The Electronic Warfare Computer for the Aircraft Survivability Equipment will improve the ability for countermeasures by analysis about threat information. This paper suggests method that threat data integration of multiple sensors(Radar Warning Receiver, Laser Warning Receiver, Missile Warning Receiver). The algorithm of threat data integration is based on detected threat sequence and azimuth information. The threat sequence information is analyzed in advance and the azimuth data is received from sensors. The suggested method is evaluated through simulation under the environment like real helicopter.

Automatic Protection Switching Schemesfor Network Survivability in ATM-PON Networks (ATM-PON망에서 망 생존성을 위한 자동보호절체)

  • 김영구
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1441-1451
    • /
    • 2000
  • There are two types of protection switching : a) automatic switching and b) forced switching. The switching mechanism is generally realised by OAM functions, therefore, the required OAM information field should be reserved in the PLOAM cells. This paper proposes an unidirectional and a bidirectional protection switching method and potential advantages. The unidirectional protection switching method can be faster than the bidirectional method because the unidirectional method does not require an APS protocol for protection switching. The bidirectional protection switching method uses APS K1 byte and K2 byte, which is included in octets of a PST message through downstream or upstream PLOAM cells, for protection switching. As making comparisons between the unidirectional and the bidirectional protection. switching method, this paper proposes an effective constructing method for ATM-PON network.

  • PDF

Semantic Analysis of Information Assurance Concept : A Literature Review (문헌 연구를 통한 정보보증 개념의 구문 분석)

  • Kang, Ji-Won;Choi, Heon-jun;Lee, Hanhee
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.31-40
    • /
    • 2019
  • Today, information security (INFOSEC) as a discipline is gaining more and more importance according to the emergence and extension of the cyberspace. Originated from Joint Doctrine for Information Operation (Joint Pub 3-13) by the U.S. Department of Defense, 'information assurance (IA)' is the concept widely used in the relevant field. Grown from the practice of information security, it encompasses broader and more proactive protection that includes countermeasures and repair, security management throughout an information system (IS)'s life-cycle, and trustworthiness of an IS in the process of risk analysis. In Korea, many industry professionals tend to misunderstand IA, remaining unaware of the conceptual differences between IA and INFOSEC. On this account, the current study attempted to provide a combined definition of IA by reviewing relevant literature. This study showed the validity of the wordings used in the proposed definition phrase by phrase.

Operational Concept and Procedure for Land Navigation of Distributed Missile System (분산유도무기체계의 지상항법 운용 개념 및 절차 연구)

  • Ryu, Moo-Yong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.66-72
    • /
    • 2008
  • A distributed missile system is composed of command control center, radar and launcher which exchange information each other to use wire or wireless network. The distributed missile system is required mobility for operational convenience and survivability. Also missile system requests land navigation system to provide relatively accurate attitude. For reason of these requirements, each subsystem needs land navigation which provides information of position and attitude. This paper represents operational concept for land navigation to consider operational environment and concrete operational procedure to apply the operational concept. In state that there is no operation for land navigation of distributed missile system internally so for, this paper could be helped to establish operational concept and procedure of this kind of system.

Survivable Network Design with Hop Limit Using Longest Shortcut Method (Longest Shortcut을 이용한 홉 제한이 있는 생존 가능망 설계)

  • Kwack, Sun-Jung;Han, Chi-Geun
    • IE interfaces
    • /
    • v.15 no.3
    • /
    • pp.247-255
    • /
    • 2002
  • For the recent multimedia service, the network should be fast, stable, and reliable. In order to provide reliability of the network, certain survivability of the network, which guarantees it's functions even though there is some failure on the network, should be satisfied. Also, for a pair of nodes on the network, there must be paths of which numbers of hops are within a certain limit for realtime service between them. In this paper, we propose a longest shortcut method for solving the survivable network design problems with hop limit. Through the computational results, we compare the efficiency of the method with an existing shortest shortcut method and find that the proposed method is more efficient than the shortest shortcut method.

Design and Performance Analysis of BLSR/4 WDM/SHR in All-Optical Transport Network (완전 광전달망에서 BLSR/4 WMD/SHR의 설계 및 성능 분석)

  • 강안구;최한규;김지홍;김광현;김호건;조규섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10B
    • /
    • pp.1832-1840
    • /
    • 1999
  • This paper proposed a network to implement all optical bidirectional BLSR/4 WDM/SHR allowing restoration in the event of a failure. The proposed network can provide a high degree of transparency using all-optical components with no electric implementation and effective failure restoration due to BLSR/4 WDM/SHR architecture. This paper also presented a genetic simulation model for the survivability analysis of the proposed BLSR/4 WDM/SHR under failure scenarios, the restoration performance of the proposed network is analyzed in terms of performance parameters such as propagation time, processing time, optical switch time.

  • PDF

Fusion of Hierarchical Behavior-based Actions in Mobile Robot Using Fuzzy Logic

  • Ye, Gan Zhen;Kang, Dae-Ki
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.149-155
    • /
    • 2012
  • This paper presents mobile robot control architecture of hierarchical behaviors, inspired by biological life. The system is reactive, highly parallel, and does not rely on representation of the environment. The behaviors of the system are designed hierarchically from the bottom-up with priority given to primitive behaviors to ensure the survivability of the robot and provide robustness to failures in higher-level behaviors. Fuzzy logic is used to perform command fusion on each behavior's output. Simulations of the proposed methodology are shown and discussed. The simulation results indicate that complex tasks can be performed by a combination of a few simple behaviors and a set of fuzzy inference rules.

Flood Search Algorithm with MFDL Path in Circuit-Switched Networks (회선 교환망에서 MFDL 경로를 이용한 Flood Search 알고리즘)

  • 박영철;이상철;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.3
    • /
    • pp.360-371
    • /
    • 1993
  • Flood search algorithm is known to be an effective routing mechanism for tactical application, since it provides high degree of survivability and robustness. But it is known that it has significant drawbacks with respect to the network efficiency [1]. We consider a tactical circuit-switched grid network with a maximum of four links and two priority classes of voice traffic, Using the minimum first-derivative length (MFDL) path, we improve the blocking probability performance of the circuit-switched network without increasing the call set-up time and processor loading of the algorithm.

  • PDF