• Title/Summary/Keyword: Network Operation

Search Result 3,330, Processing Time 0.032 seconds

Prototype for the Weather Monitoring System with Web - Based Data Management - Construction and Operation

  • Kim, Jinwoo;Kim, Jin-Young;Oh, Jai-Ho;Kim, Do-Yong
    • Atmosphere
    • /
    • v.20 no.2
    • /
    • pp.153-160
    • /
    • 2010
  • In this paper, an attempt has been made to build and test self-configuring weather sensor networks and internet based observation system to gather atmospheric data. The aim is to provide integrated or real-time weather information in standard form using network data access protocol. This system was successfully developed to record weather information both digital as well as visual using sensor network and web-enabled surveillance cameras. These data were transformed by network based data access protocol to access and utilize for public domain. The competed system has been successfully utilized to monitor different types of weather. The results show that this is one of the most useful weather monitoring system.

A Methodology for the construction of ATM Network to support the Power Utility Services (전력 통신서비스를 위한 ATM 통신망 구축방법)

  • Yoon, Il-Hwan;Yoo, Jae-Tack;Kim, Il-Dong
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.961-963
    • /
    • 1998
  • Power telecommunication networks, being used to support the operation and management of power utility services, exhibits different characteristics from those of public domain networks. KEPCO is planning to evolve its own power network infrastructure to exploit ATM (Asynchronous Transfer Mode) technology. The ATM network to be developed needs to effectively utilize existing network of KEPCO and to fully support new and emerging power-utility-services. This paper summarizes the features of power communication services and the characteristics of Power telecommunication networks, and reports our evolution methodology for KEPCO network.

  • PDF

An on-line non-invasive network monitor for the SPAX parallel computer (SPAX 병렬 컴퓨터에서의 온라인 무간섭 네트워크 성능 감시기)

  • 이승구
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.6
    • /
    • pp.44-50
    • /
    • 1997
  • This paper describes the design and test of an on-line non-invasive network performance monitor (hardware portion) for the SPAX parallel computer. The SPAX parallel computer supports up to 256 intel P6 processors with 4 P6 processors constituting a processign node. The nodes are interconnected with a dual two-level crossbar network calle dXcent-net. Since the performance of the SPAX parallel computer is highly dependent on the proper and efficient operation of the network, an on-line non-invasive network performance monitor (with hardware components) has been developed to aid in the monitoring and tunign of the Xcent-net. Successful testing of a prototype node monitor board and PC interface system shows that our monitor design provides a low-cost practical solution to this problem.

  • PDF

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

Discrimination of insulation defects using a neural network (신경회로망을 이용한 절연 결함의 판별)

  • 최재관;김재환;김성홍;윤헌주;박재준
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 1997.11a
    • /
    • pp.381-384
    • /
    • 1997
  • This paper describes the method of diagnosing the degradation by void defects of insulator inside in operation. Needle-shape void specimens, made from LDPE, were used to generate an electrical tree under ac voltage. The method uses a neural network system with input signal of AE patterns. AE pattern consists of the pulse count and average amplitude according to the phase angle. After the learning process was over, unknown emission patterns were put into the network. It was shown that the network discriminates the void deflects well. The effectiveness of the neural network system for partial discharge recognition was shown.

  • PDF

A Genetic Algorithm Approach to the Frequency Assignment Problem on VHF Network of SPIDER System

  • Kwon, O-Jeong
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.1
    • /
    • pp.56-69
    • /
    • 2000
  • A frequency assignment problem on time division duplex system is considered. Republic of Korea Army (ROKA) has been establishing an infrastructure of tactical communication (SPIDER) system for next generation and it will be a core network structure of system. VHF system is the backbone network of SPIDER, that performs transmission of data such as voice, text and images. So, it is a significant problem finding the frequency assignment with no interference under very restricted resource environment. With a given arbitrary configuration of communications network, we find a feasible solution that guarantees communication without interference between sites and relay stations. We formulate a frequency assignment problem as an Integer Programming model, which has NP-hard complexity. To find the assignment results within a reasonable time, we take a genetic algorithm approach which represents the solution structure with available frequency order, and develop a genetic operation strategies. Computational result shows that the network configuration of SPIDER can be solved efficiently within a very short time.

  • PDF

A New Lightweight Mutual Authentication Protocol for Home Network (홈네트워크를 위한 새로운 경량화된 상호인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2384-2389
    • /
    • 2009
  • In this paper, we propose a lightweight mutual authentication protocol for secure and efficient home network service. Lee et al. recently proposed an attribute-base authentication key agreement protocol using public key in home network. Its protocol provided forward secrecy but don't diminish conspicious overhead of operation using ticket. Therefore the proposed protocol provided the security and efficiency using hash function and counter. Also it can provide secure home network service by check consumer electronics control level of users after created session key.

Protocol Implementation for Ethernet-Based Real-Time Communication Network (이더넷 기반 실시간 통신 네트워크 프로토콜 구현)

  • Kwon, Young-Woo;Nguyen, Dung Huy;Choi, Joon-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.247-251
    • /
    • 2021
  • We propose a protocol for Ethernet-based industrial real-time communication networks. In the protocol, the master periodically transmits control frames to all slaves, and the ring-type network topology is selected to achieve high-speed transmission speed. The proposed protocol is implemented in the form of both firmware and Linux kernel modules. To improve the transmission speed, the MAC address table is disabled in the firmware implementation, and the NAPI function of the Ethernet driver is removed in the Linux kernel module implementation. A network experiment environment is built with four ARM processor-based embedded systems and network operation experiments are performed for various frame sizes. From the experimental results, it is verified that the proposed protocol normally operates, and the firmware implementation shows better transmission speed than the Linux kernel module implementation.

Efficient Slice Allocation Method using Cluster Technology in Fifth-Generation Core Networks

  • Park, Sang-Myeon;Mun, Young-Song
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.3
    • /
    • pp.185-190
    • /
    • 2019
  • The explosive growth of data traffic and services has created cost challenges for networks. Studies have attempted to effectively apply network slicing in fifth generation networks to provide high speed, low latency, and various compatible services. However, in network slicing using mixed-integer linear programming, the operation count increases exponentially with the number of physical servers and virtual network functions (VNFs) to be allocated. Therefore, we propose an efficient slice allocation method based on cluster technology, comprising the following three steps: i) clustering physical servers; ii) selecting an appropriate cluster to allocate a VNF; iii) selecting an appropriate physical server for VNF allocation. Solver runtimes of the existing and proposed methods are compared, under similar settings, with respect to intra-slice isolation. The results show that solver runtime decreases, by approximately 30% on average, with an increase in the number of physical servers within the cluster in the presence of intra-slice isolation.

Improving Overall WMN Performance in Peak Times Using Load-sharing Aware Gateways

  • Vo, Hung Quoc;Dai, Tran Thanh;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.855-857
    • /
    • 2007
  • In recent years, Wireless Mesh Network (WMN) is a compelling topic to many network researchers due to its low cost in deployment, ease and simplicity in installation and scalability and robustness in operation. In WMN, Gateway nodes (Access Point-AP) are in charge of steering the traffic from the external network (e.g. Internet...) to client devices or mesh clients. The limited bandwidth of wireless links between Gateways and intermediate mesh routers makes the Gateways becomes the bottleneck of the mesh network in both uplink stream and downlink stream. In this paper, we propose a mechanism to permit Gateways collaboratively work to manipulate the traffic to fit our network. They will move the traffic from congested links to the unused capacity on other links.