• Title/Summary/Keyword: Network level

Search Result 4,667, Processing Time 0.035 seconds

Design of a Communication Protocol for the Physical Layer of the Digital Control System (디지털제어시스템의 물리계층 통신 프로토콜 설계)

  • Lee, S.W.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2419-2422
    • /
    • 2000
  • A distributed real-time system that is being used now is usually divided into three level : higher level, middle level, and lower level. The higher level network is usually called an information network, the middle level is called a control network, and the lower level is called a field network or a divice network. This dissertation suggests and implements a middle level network which is called PICNET-NP (Plant Implementation and Control Network for Nuclear Power Plant). PICNET-NP is based partly on IEEE 802.4 token-passing bus access methed and partly on IEEE 802.3 physical layer. For this purpose a new interface, a physical layer service translater, is introduced. A control network using this method is implemented and applied to a distributed real-time system.

  • PDF

Design of a Communication Protocol for the Distributed Control System of the Nuclear Power Plants (원자력 발전소 분산제어시스템의 통신 프로토콜 설계)

  • 이성우;윤명현;문홍주;이병윤
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 1999.11a
    • /
    • pp.143-148
    • /
    • 1999
  • A distributed real-time system that is being wed now is usually divided into three level : higher level, middle level, and lower level. The higher level network is usually called an information network, the middle level is called a control network, and the lower level is called a field network or a divice network. This dissertation suggests and implements a middle level network which is called PICNET-NP (Plant Implementation and Control Network for Nuclear Power Plant). PICNET-NP is based partly on IEEE 802.4 token-passing bus access method and partly on IEEE 802.3 physical layer. For this purpose a new interface, a physical layer service translator, is introduced. A control network using this method is implemented and applied to a distributed real-time system.

  • PDF

Adjustment of 1st order Level Network of Korea in 2006 (우리나라 1등 수준망 조정(2006년))

  • Lee, Chang-Kyung;Suh, Young-Cheol;Song, Chang-Hyun;Jeon, Bu-Nam
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2007.04a
    • /
    • pp.7-10
    • /
    • 2007
  • The 1st order vertical network of Korea was adjusted in 1987 at first time. This is the second adjustment of the 1st order vertical network of Korea by National Geographic Information Institute. All the levelling data were acquired by digital level with invar staff. The number of 1st order level lines are 36, and 34 level lines comprise 11 circles of level network. Backward and forward error of a few level lines are larger than the regulations of NGII, Korea. Also, 3 circles of vertical network has circuit closure error that is exceed the regulation. As the result of 1st order vertical network adjustment, the reference standard error of the vertical network was $1.8mm/{\surd}km$.

  • PDF

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

Intranet을 위한 방화벽 시스템구현에 관한 연구

  • 최석윤;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.2 no.1
    • /
    • pp.103-123
    • /
    • 1997
  • This dissertation provides a theoretic study on the network security in general , the firewall in particular. In fact the firewall has been recognized as a very promising option to obtain the security inthe real work network environment . The dissertation provides a throuth theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procddure to make analysis and plans of the firewall configuration . Based on the above investigation and analysis, this dissertation provides two approaches to network security , which address anumber of issuesboth at the network and at applicatino level. At the network level, a new method is proposed which uses packet filtering based on the analysis of the counter plot about the screen router.On the other hand, at the application level, a novel method is explored which employs secureity software. Firewall-1 , on Bastion host. To demonstrate the feasibililty and the effectiveness of the proposed methodologties , a prototype implementation is made The experiment result shows that the screen router employing the proposed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegal packets entering form external hackers. Meanwhile , at the application level, the proposed software approach employing Firewall-1 is proved to be robust enugh to prevent hackings from the outer point the point protocal connnection . Theoretically, it is not possible to provide complete security to the network system, because the network security involve a number of issues raised form low level network equipments form high level network protocol. The result inthis dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Multiple Fault Diagnosis Method by Modular Artificial Neural Network (모듈신경망을 이용한 다중고장 진단기법)

  • 배용환;이석희
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.15 no.2
    • /
    • pp.35-44
    • /
    • 1998
  • This paper describes multiple fault diagnosis method in complex system with hierarchical structure. Complex system is divided into subsystem, item and component. For diagnosing this hierarchical complex system, it is necessary to implement special neural network. We introduced Modular Artificial Neural Network(MANN) for this purpose. MANN consists of four level neural network, first level for symptom classification, second level for item fault diagnosis, third level for component symptom classification, forth level for component fault diagnosis. Each network is multi layer perceptron with 7 inputs, 30 hidden node and 7 outputs trained by backpropagation. UNIX IPC(Inter Process Communication) is used for implementing MANN with multitasking and message transfer between processes in SUN workstation. We tested MANN in reactor system.

  • PDF

Dynamic Model for Open Innovation Network (개방형 혁신 네트워크의 동태적 모형)

  • Park, Chulsoon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.40 no.1
    • /
    • pp.5-19
    • /
    • 2015
  • Literatures on open innovation have two major limitations. First, either on a firm level or on an industry level did they analyze the open innovation issues. The results of a firm's innovation can be diffused through the whole network and the firm can learn back from the network knowledge. Prior literatures did not consider the feedback loop among firms and network in which the firms are involved. Second, most open innovation research had a static perspective on firm's innovation performance. Since the diffusion, spill-over and learning among network members are involved over time, the open innovation is intrinsically dynamic. From the dynamic perspective, we can appreciate the fundamental attributes of the open innovation network which involves diverse firms, research institutes, and universities. In order to overcome the limitations, we suggest a dynamic model for open innovation network. We build an agent-based model which consists of heterogeneous firms. The firms are connected through a scale-free network which is formed by preferential attachment. Through the diverse scenario of simulation, we collect massive data on the firm level and analyze them both on firm and industry level. From the analysis, we found that, on industry level, the overall performance of open innovation increases as the internal research capability, absorptive capacity, and learning curve coefficient increase. Noticeably, as the deprecation rate of knowledge increases, the variability of knowledge increases. From the firm level analysis, we found that the industry-level variables had a significant effect on the firm's innovation performance lasting through all the time, whereas the firm-level variables had only on the early phase of innovation.

A Study on the Types of Social Networks of Housewives in Urban Nuclear Families (가족의 사회관계망 유형화 연구 - 도시 핵가족 주부를 중심으로 -)

  • 원효종;옥선화
    • Journal of Families and Better Life
    • /
    • v.20 no.4
    • /
    • pp.149-164
    • /
    • 2002
  • The purpose of this study was to identify the types of social networks of urban housewives according to different network composition patterns and to analyze the structural and functional characteristics of identified types. The data used in this study were collected from 589 full-time housewives residing in Taejeon city. The major findings are as follows: 1) The social networks of housewives in urban nuclear families were classified into eight types: the kin network, the non-kin network, the kin-centered network, the friend-centered network, the neighbor-centered network, the associate-centered network, the parallel network, and the decentralized network. 2) The structual characteristics (size, density, homogeneity, duration, proximity, frequency, closeness, direction) varied according to the type. The kin network type and the non-kin network type showed extreme degrees in network characteristics. The parallel network type and the decentralized network type showed an average level of network characteristics. The kin-, friend-, neighbor-, and the associate-centered types showed network characteristics of an intermediate level between the single-category types and the decentralized type. 3) The average levels of function of social network types were different in only two(service support, interference) of the six function areas(emotional support, service support, material support, information support, social companionship support, interference). The average level of service support by the non-kin network type was higher than other types. The average level of interference by the kin-centered network type was higher than other types, and that of the neighbor-centered network type was lower than other types. On the other hand, the total amount of function performance of social network types was different in all function areas. The total amount of social support given by the decentralized network type was greater than the other types. The total amount of interference given by the non-kin network type was smaller than the other types.

A Study on Higher Level Representations of Network Models for Optical Fiber Telecommunication Networks Design (광통신망 설계를 위한 네트워크 모형의 상위수준 표현에 관한 연구)

  • Kim, Cheol-Su
    • Asia pacific journal of information systems
    • /
    • v.6 no.2
    • /
    • pp.125-148
    • /
    • 1996
  • This paper is primarily focused on the function of model management systems such as higher level representations and buildings of optimization models using them, especially in the area of the telecommunication network models. This research attempts to provide the model builders an intuitive language-namely higher level representation-using five distinctivenesses : Objective, Node, Link, Topological Constraint including five components, and Decision. The paper elaborates all components included in each of distinctivenesses extracted from structural characteristics of typical telecommunication network models. Higher level representations represented with five distinctivenesses should be converted into base level representations which are employed for semantic representations of linear and integer programming problems in knowledge: assisted optimization modeling system(UNIK-OPT). Furthermore, for formulating the network model using higher level representations, the reasoning process is proposed. A system called UNIK-NET is developed to implement the approach proposed in this research, and the system is illustrated with an example of the network model.

  • PDF