• Title/Summary/Keyword: Network Configuration Management

Search Result 247, Processing Time 0.037 seconds

BOX-AND-ELLIPSE-BASED NEURO-FUZZY APPROACH FOR BRIDGE COATING ASSESSMENT

  • Po-Han Chen;Ya-Ching Yang;Luh-Maan Chang
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.257-262
    • /
    • 2009
  • Image processing has been utilized for assessment of infrastructure surface coating conditions for years. However, there is no robust method to overcome the non-uniform illumination problem to date. Therefore, this paper aims to deal with non-uniform illumination problems for bridge coating assessment and to achieve automated rust intensity recognition. This paper starts with selection of the best color configuration for non-uniformly illuminated rust image segmentation. The adaptive-network-based fuzzy inference system (ANFIS) is adopted as the framework to develop the new model, the box-and-ellipse-based neuro-fuzzy approach (BENFA). Finally, the performance of BENFA is compared to the Fuzzy C-Means (FCM) method, which is often used in image recognition, to show the advantage and robustness of BENFA.

  • PDF

Ship Safety Management System based on IoT(Internet of Things) (IoT(Internet of Things)시대의 선박 안전관리시스템 구축 연구)

  • Lim, Sung-Hun;Ko, Young-Kyu;Park, Jin-Soo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.144-145
    • /
    • 2014
  • IoT (Internet of Things) is connected to all things Internet-based people and things, things and objects that communicate information between said intelligent technologies and services. Shipping each of a variety of devices that act independently from each other, but, it is actively interlock with each other is not easy practically days. Ship it within the means of communication, the communication between the ship, the communication between ship and shore configuration, SAN (Ship Area Network), RFID/USN, broadband communications, satellite communications and IT technology to a variety of marine environments for the safe navigation the ship's safety management system for the configuration you want to discuss the plan.

  • PDF

Introduction of IPv6 Autoconfiguration technology and Standardization trends (IPv6 자동네트워킹 기술 및 표준화 동향)

  • 홍용근;인민교;박정수;김용진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.97-100
    • /
    • 2001
  • For the auto-configuration of diverse hosts and automation of network management as many electronic machines and industrial components are becoming connected to Internet, it is possible to use autoconfiguration using DHCP and network management protocol such as SNMP, CMIP. But these technologies are not developed maturely and lack various standardizations yet because these are designed for restrictive purposes in the past. The new working group "Zeroconf" is made in IETF at March, 2000, it is aimed for making standards of autoconfiguration which is applied to impromptu ad-hoc networks in automobiles, trains, planes and home network or mobile networks. In this paper, we introduce the IPv6 based autoconfiguration technologies such as IP interface configuration, translation between host name and IP address, IP multicast address allocation and service discovery. Finally, trends of standardization in Zeroconf working group will be shown. be shown.

  • PDF

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

A Study on Environment Management System in Tunnel using Wireless Sensor Networks (무선 센서 네트워크를 이용한 터널 내 환경 관리 시스템에 관한 연구)

  • Joo, Yang-Ick;Kim, Jae-Wan
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.10
    • /
    • pp.1196-1203
    • /
    • 2013
  • In general, the cost of transceiver for wireless network configuration is more expensive than that for wired network. However, in case of environmental management system in a tunnel, the cost can be minimized by adopting low rate tranceiver because the amount of the exchanged data for tunnel monitoring is very small. When the obtained data from sensor node is sent directly to the corresponding command node, there is no need to consider routing problem of the data transfer. However in this case, sensor nodes are required to be implemented with high power transmitter and experience high energy consumption. To tackle this problem, relay nodes can be used to transfer the data of tunnel monitoring, and suitable routing protocols for selecting optimum path are needed. Therefore, in this paper, we propose a routing algorithm and a self-configuration protocol for environment management system in tunnel.

Management of Neighbor Cell Lists and Physical Cell Identifiers in Self-Organizing Heterogeneous Networks

  • Lim, Jae-Chan;Hong, Dae-Hyoung
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.367-376
    • /
    • 2011
  • In this paper, we propose self-organizing schemes for the initial configuration of the neighbor cell list (NCL), maintenance of the NCL, and physical cell identifier (PCI) allocation in heterogeneous networks such as long term evolution systems where lower transmission power nodes are additionally deployed in macrocell networks. Accurate NCL maintenance is required for efficient PCI allocation and for avoiding handover delay and redundantly increased system overhead. Proposed self-organizing schemes for the initial NCL configuration and PCI allocation are based on evolved universal terrestrial radio access network NodeB (eNB) scanning that measures reference signal to interference and noise ratio and reference symbol received power, respectively, transmitted from adjacent eNBs. On the other hand, the maintenance of the NCL is managed by adding or removing cells based on periodic user equipment measurements. We provide performance analysis of the proposed schemes under various scenarios in the respects of NCL detection probability, NCL false alarm rate, handover delay area ratio, PCI conflict ratio, etc.

A Stabilized Queue Management Algorithm for Internet Congestion Control (인터넷 혼잡제어를 위한 안정적인 큐 관리 알고리즘)

  • 구자헌;정광수
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.70-80
    • /
    • 2004
  • In order to reduce the increasing packet loss rates caused by an exponential increase in network traffic, the IETF(Internet Engineering Task Force) is considering the deployment of active queue management techniques such as RED(Random Early Detection). But, RED configuration has been a problem since its first proposal. This problem is that proposed configuration is only good for the particular traffic conditions studied, but may have detrimental effects if used in other conditions. While active queue management in routers and gateways can potentially reduce packet loss rates in the Internet, this paper has demonstrated the inherent weakness of current techniques and shows that they are unstable for tile various traffic conditions. The inherent problem with these queue management algorithms is that they all use static parameter setting. In this paper, in order to solve this problem, a new active queue management algorithm called SQM(Stabilized Queue Management) is proposed. This paper shows that it is easy to parameterize SQM algorithm to perform well under different congestion scenarios. This algorithm can effectively reduce packet loss while maintaining high link utilizations and is good for the various traffic conditions.

A Study of Logical Network Monitoring System Architecture for Research Group (응용연구 그룹별 논리 네트워크 모니터링 시스템 구조 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.75-83
    • /
    • 2012
  • Recent science technology research network moves to establish logical private network among specific research groups such as high energy physics and climate, requiring to implement private network by group for each purpose. Up to now, national research networks such as KREONET service high capacity logical private networks. Therefore standardized configuration and management scheme is essential for the deployment of logical private network. In this study, we propose the core service element and protocols for the logical networks over Layer 2 networks. We also propose system architecture that make monitoring and management easier. After that we design and implement monitoring map for logical network based on scheme. For this purpose, we also propose the description system for logical research network to provide data such as operation information, formation information, performance information and failure information of network infrastructure resource.

Biogeography Based Optimization for Mobile Station Reporting Cell System Design (생물지리학적 최적화를 적용한 이동체 리포팅 셀 시스템 설계)

  • Kim, Sung-Soo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.1
    • /
    • pp.1-6
    • /
    • 2020
  • Fast service access involves keeping track of the location of mobile users, while they are moving around the mobile network for a satisfactory level of QoS (Quality of Service) in a cost-effective manner. The location databases are used to keep track of Mobile Terminals (MT) so that incoming calls can be directed to requested mobile terminals at all times. MT reporting cell system used in location management is to designate each cell in the network as a reporting cell or a non-reporting cell. Determination of an optimal number of reporting cells (or reporting cell configuration) for a given network is reporting cell planning (RCP) problem. This is a difficult combinatorial optimization problem which has an exponential complexity. We can see that a cell in a network is either a reporting cell or a non-reporting cell. Hence, for a given network with N cells, the number of possible solutions is 2N. We propose a biogeography based optimization (BBO) for design of mobile station location management system in wireless communication network. The number and locations of reporting cells should be determined to balance the registration for location update and paging operations for search the mobile stations to minimize the cost of system. Experimental results show that our proposed BBO is a fairly effective and competitive approach with respect to solution quality for optimally designing location management system because BBO is suitable for combinatorial optimization and multi-functional problems.

A Qualitative Research on the Structure and Determinants of Personal Device Network in the Ubiquitous Computing Context (유비쿼터스 컴퓨팅 환경에서 PDN의 구조와 결정 요인에 대한 정성적 연구)

  • Jeon Seok-Won;Jang Youn-Sun;Kim Jin-Woo
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.3
    • /
    • pp.1-28
    • /
    • 2006
  • In the ubiquitous computing environments. people usually carry multiple information technology devices with them. Personal device network (PDN) refers to the way how people connect multiple IT devices for their personal as well as professional purposes. Even though it has been Quite popular to construct the PDN in ubiquitous computing context, not much research has been conducted on how people actually connected multiple devices and what influences their methods of connection. In this paper we conducted a content analysis on community bulletin boards of IT devices and a contextual inquiry with expert users of PDN for investigating the configurations with which users connect multiple IT devices. Base on the results of two related studies, we identified three major types of PDN configurations, and key factors that influence the configurations of PDN. We conclude this research with guidelines to design a set of devices for each of the three configuration types.

  • PDF