• Title/Summary/Keyword: Network level

Search Result 4,705, Processing Time 0.031 seconds

Adjustment of 1st order Level Network of Korea in 2006 (2006년 우리나라 1등 수준망 조정)

  • Lee, Chang-Kyung;Suh, Young-Cheol;Jeon, Bu-Nam;Song, Chang-Hyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.1
    • /
    • pp.17-26
    • /
    • 2008
  • The 1st order level network of Korea was adjusted simultaneously in 1987. After that, the 1 st order level network of Korea was adjusted simultaneously by National Geographic Information Institute in 2006. The levelling data were acquired by digital level with invar staff from 2001 through 2006. The 1st order level network consists of 36 level lines. Among them, 34 level lines comprise 11 level loops. Among 36 level lines, 4 level lines have fore & back error larger than the regulations for the 1st order levelling of NGII, Korea. Also, the closing error of 3 loops of level network exceed the regulation for the 1st order levelling of NGII. The standard error of fore and back leveling between bench marks(${\eta}_1$) are distributed between 0.2 $mm/{\surd}km$ and 1.7 $mm/{\surd}km$. The standard error of loop closing(${\eta}_2$) is 2.0 $mm/{\surd}km$. This result means that the 1st order level network of Korea qualifies for the high precision leveling defined by International Geodetic Association in 1948. As the result of the 1st order level network adjustment, the reference standard error($\hat{{\sigma}_0}$) of the level network was 1.8 $mm/{\surd}km$, which is twice as good as that of the 1st adjustment of level networks in 1987.

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.

Relationships between Social Support & Social Network and Health Behavior (사회적 지지, 사회 조직망과 건강행태의 관련성)

  • Park, Jun;Kang, Gil-Won;Tak, Yang-Ju;Chang, Soung-Hoon;Lee, Kun-Sei;Kim, Hyeong-Su
    • Health Policy and Management
    • /
    • v.21 no.4
    • /
    • pp.493-510
    • /
    • 2011
  • Objectives : This study aims to explore how social support and social network are related with health behavior. Methods : The target population was 12,449 people in Chungcheongbuk-do. The sample was accrued for the period of 3 months in 2008 by face to face interview of direct visiting from systematic sampling method. The instruments used in this study were social support, social network and health behavior. Results : There was significant difference in the level of social support and social network by sex, age, educational level, occupation, and monthly income(p<0.05). There was significant difference in the level of social support by alcohol drinking, physical exercise. There was significant difference in the level of social network by smoking, alcohol drinking, physical exercise, obesity(p<0.05). Multivarite analysis shows significant difference in the level of social instrumental support by smoking, physical exercise. It shows significant difference in the level of social emotional support by smoking. It also shows significant difference in the level of social network by smoking, physical exercise. Conclusion : These results suggest that social support and social network may be associated with health behavior. Because this study was cross sectional research, the order was not found between social support, social network and health behavior. Through a study on monitoring, we will obtain more information for relationship.

Development of a Packet-Switched Public computer Communication Network -PART 1: KORNET Overview and Development of Network Management Center (Packet Switching에 의한 공중 Computer 통신망 개발 연구 -제1부: Kornet 개요 및 NMC 개발)

  • 은종관;이경근
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.22 no.6
    • /
    • pp.103-113
    • /
    • 1985
  • This is the first part of the four-part paper describing the development of a packet-switched computer network named the KORNET In this paper, we present the overview of the KORNET, and discuss various aspects on the development of the netwo management center (NMC). The NMC acts as a nerve center of the network, performing such functions as network monitoring, subscriber and network management and routing manage-ment using operator dialogues. In the implementation of the NMC, we have developed various application softwares that include operator interface, primary/srcondary pan, session layer and packet level adaptor. As for packet, link and physical level protocols, we have modified the XODIAC X.25 originally developed by Data General, Inc. All the net-work protocols we have developed comply completely with the CCITT recommendations.

  • PDF

The Study on the Distortion Estimate of Video Quality at the Real Time HD Level Video Multicasting Transmission (실시간 HD급 동영상의 멀티캐스트 전송에서 영상품질의 왜곡평가에 관한 연구)

  • Cho, Tae-Kyung;Lee, Jea-Hee;Lee, Sang-Ha
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.60 no.3
    • /
    • pp.161-166
    • /
    • 2011
  • In this paper, for analysing the major factors giving the effect to the quality of HD level video on the multicasting service, we tried this test experiment on the College school network similar to the real service network environment. We measure the video quality distortion on the multicasting HD level video according to generating and increasing the broadcasting traffic on the situation that apply the QoS technique to the test network and not apply the QoS technique and then find out the threshold value of network factors giving the effect to the video quality distortion on the multicasting HD level video service. This paper can be used for guaranteeing the constant video quality and reducing the video quality distortion on the multicasting HD level video service.

Transmission Network Expansion Planning Using Risk Level Improvement Index (위험도 개선 지수를 이용한 송전계통 계획 수립에 관한 연구)

  • Kim, Sung-Yul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.6
    • /
    • pp.752-757
    • /
    • 2014
  • This paper attempts to evaluate the impact of power plant penetration on constraints of a transmission network and proposes a methodology based on risk level, which can evaluate the condition of the network and facilities intuitionally. Furthermore, based on this methodology, RLII(Risk Level Improvement Index) is proposed in order to establish comprehensive TNEP(Transmission Network Expansion Planning) from a viewpoint of ISO(Independent System Operator). In order to verify the proposed methods in this paper, real power systems in Incheon and Shiheung areas, south Korea are applied to the case study.

Node-Level Trust Evaluation Model Based on Blockchain in Ad Hoc Network

  • Yan, Shuai-ling;Chung, Yeongjee
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.169-178
    • /
    • 2019
  • Due to the characteristics of an ad hoc network without a control center, self-organization, and flexible topology, the trust evaluation of the nodes in the network is extremely difficult. Based on the analysis of ad hoc networks and the blockchain technology, a blockchain-based node-level trust evaluation model is proposed. The concepts of the node trust degree of the HASH list on the blockchain and the perfect reward and punishment mechanism are adopted to construct the node trust evaluation model of the ad hoc network. According to the needs of different applications the network security level can be dynamically adjusted through changes in the trust threshold. The simulation experiments demonstrate that ad-hoc on-demand distance vector(AODV) Routing protocol based on this model of multicast-AODV(MAODV) routing protocol shows a significant improvement in security compared with the traditional AODV and on-demand multipath distance vector(AOMDV) routing protocols.

System Level Simulation of CDMA Network with Adaptive Array

  • Chung, Yeong-Jee;Lee, Jae-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.4
    • /
    • pp.755-764
    • /
    • 1999
  • In this study, the system level network simulation is considered with adaptive array antenna in CDMA mobile communication system. A network simulation framework is implemented based on IS-95A/B system to consider dynamic handoff, system level network behavior, and deploying strategy into the overall CDMA mobile communication network under adaptive array algorithm. Its simulation model, such as vector channel model, adaptive beam forming antenna model, handoff model, and power control model, are described in detail with simulation block. In order to maximize SINR of received signal at antenna, maximin algorithm is particularly considered, and it is computed at each simulation snap shot with SINR based power control and handoff algorithm. Graphic user interface in this system level network simulator is also implemented to define the simulation environments and to represent simulation results on real mapping system. This paper also shows some features of simulation framework and simulation results.

  • PDF

System Level Network Simulation of Adaptive Array with Dynamic Handoff and Power Control (동적 핸드오프와 전력제어를 고려한 적응배열 시스템의 네트워크 시뮬레이션)

  • Yeong-Jee Chung;Jeffrey H. Reed
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.4
    • /
    • pp.33-51
    • /
    • 1999
  • In this study, the system level network simulation is considered with adaptive array antenna in CDMA mobile communication system. A network simulation framework is implemented based on IS-95A/B system to consider dynamic handoff, system level network behavior, and deploying strategy into the overall CDMA mobile communication network under adaptive array algorithm. Its simulation model, such as vector channel model, adaptive beam forming antenna model, handoff model, and power control model, are described in detail with simulation block. In order to maximize SINR of received signal at antenna, Maximin algorithm is particularly considered, and it is computed at each simulation snap shot with SINR based power control and handoff algorithm. Graphic user interface in this system level network simulator is also implemented to define the simulation environments and to represent simulation results on real mapping system. This paper also shows some features of simulation framework and simulation results.

  • PDF

A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture (Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구)

  • Na, Sang Yeob;Noh, Si Choon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.