• Title/Summary/Keyword: Network Evolution

Search Result 643, Processing Time 0.022 seconds

Evolution of Industrial IoT Network Technology: Past, Present, and Future Trends (산업용 IoT 네트워크 기술의 진화: 과거, 현재, 미래 동향)

  • T.J. Park;E.H. Kim;J.S. Cha;K.S. Lee
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.3
    • /
    • pp.20-28
    • /
    • 2023
  • Wireless communication technology has mainly been used to fulfill the demands of industrial sites at which performance is not a critical concern. However, ongoing discussions and efforts are now focused on securing core wireless communication technologies to enable the transformation or expansion of wired industrial IoT (Internet of Things) network technology into a flexible and dynamic smart manufacturing system. This paper provides an overview of current wireless industrial IoT network technology and the recent wireless time-sensitive networking technology. It outlines the challenging level of reliability required for wireless communication technology to coexist with or replace its wired counterpart in future smart manufacturing systems. Additionally, we introduce ultra-reliable time deterministic network as the core technology of wireless industrial communications and focus on its reliability and delay characteristics.

Comparison of Honeypot System, Types, and Tools

  • Muhammad Junaid Iqbal;Muhammad Usman Ahmed;Muhammad Asaf
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.169-177
    • /
    • 2023
  • Network security is now more crucial than ever for consumers, companies, and military clients. Security has elevated to the top of the priority list since the Internet's creation. The evolution of security technology is now better understood. The area of community protection as a whole is broad and dynamic. News from the days before the internet and more recent advancements in community protection are both included in the topic of observation. Recognize current research techniques, previous Defence strategies that were significant, and network attack techniques that have been used before. The security of various domain names is the subject of this article's description of bibliographic research.

Simulation of Sustainable Co-evolving Predator-Prey System Controlled by Neural Network

  • Lee, Taewoo;Kim, Sookyun;Shim, Yoonsik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.27-35
    • /
    • 2021
  • Artificial life is used in various fields of applied science by evaluating natural life-related systems, their processes, and evolution. Research has been actively conducted to evolve physical body design and behavioral control strategies for the dynamic activities of these artificial life forms. However, since co-evolution of shapes and neural networks is difficult, artificial life with optimized movements has only one movement in one form and most do not consider the environmental conditions around it. In this paper, artificial life that co-evolve bodies and neural networks using predator-prey models have environmental adaptive movements. The predator-prey hierarchy is then extended to the top-level predator, medium predator, prey three stages to determine the stability of the simulation according to initial population density and correlate between body evolution and population dynamics.

Hydraulic-Mechanical Modeling on Fracture Transmissivity Evolution Around a Borehole (시추공 주변 단열 투수도 진화에 대한 수리-역학 연동 모델링 평가)

  • Choi, Chae-Soon;Park, Kyung-Woo;Park, Byeong-Hak;Ko, Nak-Youl;Ji, Sung-Hoon
    • The Journal of Engineering Geology
    • /
    • v.31 no.1
    • /
    • pp.55-66
    • /
    • 2021
  • Hydraulic-mechanical (H-M) coupled numerical modeling was used to evaluate the evolution of hydrogeological properties in response to the installation and expansion of a borehole. A domain with a discrete fracture network was adopted for discontinuum modeling to simulate changes in fracture apertures. Comparison with real hydraulic test data shows that the effects of principal stress direction and expansion of borehole diameter were reasonably simulated by H-M coupled numerical modeling. The modeling confirmed that aperture changes depended on the principal stress direction, with an increase in aperture size due to vertical displacement being the dominant effect. A concentration of shear dilation around the borehole had an additional, subsidiary, effect on the hydrogeological evolution. These results show that the permeability of fractured rock can be increased by changing the hydraulic properties of a fracture through stress redistribution caused by the installation and expansion of a borehole.

A Study on Complexity Theory of e-Business Domain - A Focused on Strategic Alliance Modeling Using Social Network - (e비즈니스 분야에서의 복잡계론 접목에 관한 연구 -사회연결망을 활용한 전략적 제휴모형을 중심으로-)

  • Park, Ki-Nam;Lee, Moon-Noh
    • The Journal of Information Systems
    • /
    • v.18 no.3
    • /
    • pp.47-70
    • /
    • 2009
  • Social network is one of the representative analytical method of the complexity theory and this research analyzed various and unique strategic alliance model of e-business domain using social network technique. A lot of small and medium firms of e-business field had developed many useful type of strategic alliances for the firms tried to maximize the effect of advertisement, marketing and to make up for their weak points and to compete with huge company with capital strength long before. But it is too rare to analyze the structure of the firm networks and to study the evolution and extension of business model considered the role of each company in the network. Social network analysis helps each firm's network easily visualized and completely modelized. Additionally, this paper cries to analyze the relationship between the role of hub and broke in the firm networks for strategic alliance, and financial performance. We demonstrate the firm with finer business model to the business environment can make higher financial performance. This implies that the firm that can create new finer business model, will lead the network of e-business firms and evolve the industry of e-business.

A Study on Service Quality Diagnosis Techniques for LTE/5G Network Backhaul (LTE/5G 네트워크 백홀(Backhaul)의 서비스 품질진단 기법에 관한 연구)

  • Ji-Hyun Yoo
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.617-623
    • /
    • 2023
  • With the evolution of communication networks, there is a growing demand for stable high-speed data connections to support services relying on large-capacity data. The increasing volume of packet data aggregated from user devices underscores the significance of quality diagnostics for the backhaul network, an intermediate link transmitting data to the core network. This paper conducts empirical research on techniques to diagnose issues within the backhaul network through practical case studies, through diagnosing various factors such as circuit bandwidth, speed disparities within switches, network segment-specific buffer sizes, routing policies, among other factors that could potentially cause RTT (Round Trip Time) delays and performance degradation.

A Study of Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network (내부 네트워크의 성능저하요인에 따른 이산화탄소 배출에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1315-1322
    • /
    • 2011
  • Recently, The Problem of Global Warming around the world, is emerging as a very serious environmental problems, and as a way to fix it 'Green IT' is becoming an Issue. In these situations the evolution of network technologies with a various attacks, it appears, add the different security devices and systems are deployed. But, Deployment methods such a network, the performance and security of the internal network will affect on the greater and it will be increase Carbon Dioxide emissions. Therefore, In this paper, it will be to analyze Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network. and In a future, This paper is expected to serve as a valuable Information for the Network Performance and Security improvements and to reduce Carbon Emissions in the Field of IT.

The Sensor Network based Home Control System: Supporting the Next Generation Home Gateway System for a Ubiquitous Home Environments

  • Park, Young-Choong;Ahn, Yang-Keun;Choi, Kwang-Soon;Jung, Kwang-Mo;Kim, Seong-Dong
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.1 no.1
    • /
    • pp.23-27
    • /
    • 2007
  • Fruition for a diverse uIT(Ubiquitous Information Technology) service is currently required through the convergence of what is known as ubiquitous computing technology. In recent years, with the rapid growth of the need for information services, heavier demands have been made upon the supply of high-quality multimedia services that require a high bandwidth. Today, various home network solutions have been proposed to manage these service smoothly and a system able to deal with various types of network traffic without delays. In addition, in established home network environments that mix wired and wireless networks, along with the steady evolution of wireless network technology and the earnest development of ubiquitous computing technology, sensor-based wireless networks have emerged as a core solution for home networks. In this paper, a sensor network-based home control system supporting the next generation home gateway system for ubiquitous home environments is designed and implemented.

  • PDF

Fabrication of Three-Dimensional Network Structures by an Electrochemical Method (전기화학적 방법을 통한 3차원 금속 다공성 막의 제조)

  • Kang, Dae-Keun;Heo, Jung-Ho;Shin, Heon-Cheol
    • Korean Journal of Materials Research
    • /
    • v.18 no.3
    • /
    • pp.163-168
    • /
    • 2008
  • The morphology of three-dimensional (3D) cross-linked electrodeposits of copper and tin was investigated as a function of the content of metal sulfate and acetic acid in a deposition bath. The composition of copper sulfate had little effect on the overall copper network structure, whereas that of tin sulfate produced significant differences in the tin network structure. The effect of the metal sulfate content on the copper and tin network is discussed in terms of whether or not hydrogen evolution occurs on electrodeposits. In addition, the hydrophobic additive, i.e., acetic acid, which suppresses the coalescence of evolved hydrogen bubbles and thereby makes the pore size controllable, proved to be detrimental to the formation of a well-defined network structure. This led to a non-uniform or discontinuous copper network. This implies that acetic acid critically retards the electrodeposition of copper.

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.