• Title/Summary/Keyword: Network Virtual Environment

Search Result 414, Processing Time 0.028 seconds

A Virtual Address Mapping Method for Interconnection between Terrestrial Communication Network and Underwater Acoustic Communication Network (지상 통신 네트워크와 수중음파 통신 네트워크의 상호연결을 위한 가상 주소 매핑 방법)

  • Kim, Changhwa
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.27-45
    • /
    • 2018
  • The terrestrial communication network and the underwater acoustic communication network have very different communication characteristics each other in operational environments, communication media, propagation delay, frequency bandwidth, transmission speed, bit error rate, and so on. These different characteristics cause some different address schemes and different maximum transmission units and, as a result, these differences must form certainly obstacles to the intercommunication between a terrestrial communication network and an underwater acoustic communication network. In this paper, we presents a method to use the virtual addresses to resolve the interconnection problem caused by different address schemes between a terrestrial communication network and an underwater acoustic communication network, and, through a mathematical modeling, we analyze the performance on the message transceiving delay time in the underwater environment.

Performance Analysis of Operation Strategy of Dual Virtual Cell-based System under The Overlay Convergent Networks of Cognitive Networking (인지 네트워킹 기반 중첩 융합 네트워크에서 이중 가상 셀 운영방안의 성능분석)

  • Choi, Yu-Mi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.483-488
    • /
    • 2012
  • With the fast growing data traffic, the performance of the convergent overlay network environment under the cognitive networking environment is crucial for the implementation of the efficient network structure. In order to achieve high capacity and reliable link quality in wireless communication of the overlay convergent networks with the cognitive networking based on the advanced capability of the mobile terminal, a Distributed Wireless Communication System (DWCS) can provide the capability of ambient-aware dual cell system's operation. This paper has considered virtual cell: the Dual Virtual Cell (DVC), and also proposes DVC employment strategy based on DWCS network. One is the Active Virtual Cell which exists for user's actual data traffic and the other is the Candidate Virtual Cell which contains a set of candidate antennas to protect user's link quality from performance degradation or interruption. The considered system constructs DVC by using cognitive ability of finding useful virtual signals. Also, for multi-user high-rate data transmission, the DWCS system exploits Space-Time Trellis Codes. The effects of changing environments on the system performance has been investigated thereafter.

A Study on ATM Network Management System Supporting M4 Interface (M4 Interface를 지원하는 ATM 네트워크 관리 시스템에 관한 연구)

  • Lee, Beom;Choi, Young-Su;Chung, Jin-Wook
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3367-3378
    • /
    • 1999
  • ATM technology, which acts as a representative high-speed bandwidth technology, plays an important role in Internet environment. ATM network, supporting QoS(Quality of Service) and various traffic characters in high speed, configures many VPC(Virtual Path Connection)/VCC(Virtual Channel Connection). It is important to guarantee the QoS of each connection and it is necessary for the network manager to search element affecting the QoS of VPC/VCC and to control ATM network correctly. In the paper, the management information of VPC/VCC, that ATM network manager Using the fault notification for ATM switch, we can manage the configuration, fault and performance of ATM network. Thus, we extracted the configuration, fault and performance monitoring item from the ATM-MIB and SNMP M4 Network Element View MIB. And we designed the ATM network configuration, fault and performance management system based on the extracted item.

  • PDF

Design and Implementation of Database Broker system for Integrated Data Environment of Virtual Enterprises (가상 기업의 통합 데이터 환경을 위한 데이터베이스 브로커 시스템의 설계 및 구현)

  • Yun, Seon-Hui;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.425-438
    • /
    • 1999
  • In recent days network computing technologies have bee developed rapidly and the extended use of Internet applications for enterprises such as internet/extarnet in and between enterprises has been increased enormously. Therefore the business in the future will be executed by virtual enterprise. Virtual enterprises which is based on information sharing between enterprises are composed of work processes related to information exchange between virtual enterprises, the team members who are representatives of the organizations that are participated in the actual business of virtual enterprises, and members who are representatives of the organizations that are participated in the actual business of virtual enterprises, and environment that are provided by supporting CALS(continuous Acquisition and Life cycle Support or commerce At light Speed). Supporting system of IDE(Integrated Data Environment)for CALS implementation that is provided as an environment of virtual enterprises has to ensure the autonomies of local data and to provide the accessibility of heterogeneous database of enterprises on network transparently for giving user a single global view of data. This paper introduce the design and implementation of the database broker system that can be accessed data transparently by the suers of participated enterprises in the integrated data environment supporting virtual enterprises. The system uses java/CORBA technology in Web environment and Object Query language (OQL) to process the queries of relational database system, object-oriented database system, and file information.

  • PDF

An Extented Vorocast Mechanism based on VON (VON을 기반으로 확장된 Vorocast 기법)

  • Lim, Chae-Gyun;Kang, Jeong-Jin;Rho, Kyung-Taeg
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.69-73
    • /
    • 2009
  • Network Virtual Environments (NVEs) is a virtual world where users exchanges messages via network connection. A limited visibility sphere called area of interest (AOI) is used to reduce the load created by the interactions between users. VON-Forwarding model is proposed as an effective methods to reduce network bandwidth in P2P network environment. Vorocast and Fibocast originated from Von-forwarding resolves the problems to receive the same messages repeatly. In this paper, We proposed an Extended Volocast scheme to improve the problem not to get consistency except a limited area near to the center of AOI. The proposed scheme maintains the consistency about the broad area into AOI by adjusting geometrical series $2^X$. We perform simulation experiments to show that the proposed scheme provide better performance compared to the other schemes.

  • PDF

Machine monitoring for implementing a virtual machine (가상기계 구현을 위한 공작기계 모니터링)

  • 배완준;강무진
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.311-315
    • /
    • 2000
  • In thls paper, a remote machine monitoring system for a vimal machine is proposed. The monltonng system is one of the core functmns of a vimd machne that provides a modeling and simulation environment for machining processes and management of the machine life cycle. The proposed system contains the modules for investigating tool wear using neural network and web-based real time process monitoring. An example implementation for tool wear and machining status monitoring is illustrated

  • PDF

Trends and Prospects for the Development of Virtual Reality and Digital Property

  • Kirillova, Elena Anatolyevna;Blinkov, Oleg Evgenyevich;Blinkova, Elena Victorovna;Vrazhnov, Aleksey Sergeevich;Magomedov, Firdousi Bilyamudinovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.284-290
    • /
    • 2022
  • The study considers trends and prospects for developing virtual (augmented) reality and civil transactions in relation to digital property. In jurisprudence, there is a need to determine the legal status of virtual and augmented reality to regulate legal relations in the digital environment. Legal relations using new digital technologies require the creation of new legislative approaches and rules of their legal regulation. The article dwells on the legal status of virtual (augmented) reality and determines the methods of regulating legal relations in the sphere of digital property. The study utilized methods for collecting single and multiple facts in order to identify the main trends in the civil circulation of digital assets, as well as private law methods. The methods of generalization, concreteness, induction and deduction reveal the legal nature and main features of virtual (augmented) reality and digital property. The paper highlights the specifics of virtual reality and civil transactions in relation to digital assets. The research has concluded that the sale, exchange and other actions with digital objects in virtual reality have distinctive features, while digital property has also unique characteristics since it is involved in civil circulation and legal relations.

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF

Network Control for Virtual Robot in MSRS Simulation Environment (MSRS 시뮬레이션 환경에서 가상 로봇의 네트웍제어)

  • Shin, Dong-Gwan;Lee, Sung-Hun;Yi, Soo-Yeong;Choi, Byoung-Wook
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.3
    • /
    • pp.242-248
    • /
    • 2007
  • Robot system development consists of several sub-tasks such as layout design, motion planing, and sensor programming etc. In general, on-line programming and debugging for such tasks demands burdensome time and labor costs, which motivates an off-line graphic simulation system. MSRS(Microsoft Robotics Studio) released in recent years is an appropriate tool for the graphic simulation system since it supports CCR(Concurrency and Coordination Runtime), DSS(Decentralized System Services), and dynamics simulation based on PhysX and graphic animation as well. In this paper, we developed an MSRS based network simulation system for quadruped walking robots, which controls virtual 3D graphic robots existing in remote side through internet.

  • PDF

The Network Architecture and Protocol for Avatar Interaction in Distributed Virtual Environment (분산 가상공간내 분신간 상호작용을 위한 네트웍 구조 및 프로토콜 설계)

  • SUNG, ManKyu;PARK, ChanJong;KIM, DongHyun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.4 no.1
    • /
    • pp.47-54
    • /
    • 1998
  • The multi-user VR system can more enhance the sense of reality than existing single user VR system, but it also cause a significant problem about network structure and protocol, since the current Internet using TCP/IP can not afford to deliver such a massive information required to the real-time constraint of multi-user VR system. In this paper, we introduce new network structure and protocol for multiple user's virtual world navigation and interaction through their avatars. The virtual worlds are based on virtual building and managed by distributed servers. The avatars have 9 behaviors and recognize the state of each other by pre-defined network protocol.

  • PDF