• Title/Summary/Keyword: Physical Network

Search Result 1,876, Processing Time 0.029 seconds

Adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles

  • Surzhik, Dmitry I.;Kuzichkin, Oleg R.;Vasilyev, Gleb S.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.23-28
    • /
    • 2021
  • The article discusses the features of adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles operating in the conditions of "smart cities". The concept of cities of this type is defined, the historical path of formation, the current state and prospects for further development in the aspect of transition to "smart cities" of the third generation are shown. Cities of this type are aimed at providing more comfortable and safe living conditions for citizens and autonomous automated work of all components of the urban economy. The perspective of the development of urban mobile automated technical means of infocommunications is shown, one of the leading directions of which is the creation and active use of wireless self-organizing networks based on unmanned aerial vehicles. The advantages of using small-sized unmanned aerial vehicles for organizing networks of this type are considered, as well as the range of tasks to be solved in the conditions of modern "smart cities". It is shown that for the transition to self-organizing networks in the conditions of "smart cities" of the third generation, it is necessary to ensure the adaptation of various levels of OSI network models to dynamically changing operating conditions, which is especially important for the physical layer. To maintain an acceptable level of the value of the bit error probability when transmitting command and telemetry data, it is proposed to adaptively change the coding rate depending on the signal-to-noise ratio at the receiver input (or on the number of channel decoder errors), and when transmitting payload data, it is also proposed to adaptively change the coding rate together with the choice of modulation methods that differ in energy and spectral efficiency. As options for the practical implementation of these solutions, it is proposed to use an approach based on the principles of neuro-fuzzy control, for which examples of determining the boundaries of theoretically achievable efficiency are given.

Failure Detection and Resilience in HRing Overlay Network (HRing 오버레이 네트워크에서 실패 탐지 및 회복)

  • Gu, Tae-Wan;Lee, Kwang-Mo
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.21-33
    • /
    • 2007
  • An overlay network is a virtual network which is constructed on top of a physical computer network. A node in the overlay network is connected through virtual or logical links, where each link corresponds to a path of the links in the underlying physical network. Overlay networks are suitable for sharing heterogeneous resources in distributed environments, However, overlay networks are limited for achieving reliable communication that failure detection in overlay networks is a very important issue. In this paper, we review conditions of conventional failure detection and propose a new approach to failure detection and resilience which can be applied to HRing (Hierarchical Ring) overlay networks. The proposed method consists of the failure detection and the failure resilience phases. Because it utilizes the characteristics of the HRing overlay network for failure detection, it can reduce unnecessary network traffic and provide better scalability and flexibility. We also analyzed and evaluated the performance of the proposed approach through simulations.

  • PDF

A Markov Approximation-Based Approach for Network Service Chain Embedding (Markov Approximation 프레임워크 기반 네트워크 서비스 체인 임베딩 기법 연구)

  • Chuan, Pham;Nguyen, Minh N.H.;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.719-725
    • /
    • 2017
  • To reduce management costs and improve performance, the European Telecommunication Standards Institute (ETSI) introduced the concept of network function virtualization (NFV), which can implement network functions (NFs) on cloud/datacenters. Within the NFV architecture, NFs can share physical resources by hosting NFs on physical nodes (commodity servers). For network service providers who support NFV architectures, an efficient resource allocation method finds utility in being able to reduce operating expenses (OPEX) and capital expenses (CAPEX). Thus, in this paper, we analyzed the network service chain embedding problem via an optimization formulation and found a close-optimal solution based on the Markov approximation framework. Our simulation results show that our approach could increases on average CPU utilization by up to 73% and link utilization up to 53%.

A Policy-based Network Control Methodology for Large-scale IP Network (대규모 IP 네트워크에서 정책기반의 네트워크 제어방법 연구)

  • Oh, Jun-Suk;Son, Choon-Ho;Kim, Ki-Eung;Lee, Jae-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.364-367
    • /
    • 2008
  • Many different types of network equipments are deployed in a large-scale IP network. In this operating environment, network service providers suffer from difficulty in controlling various equipments simultaneously in case network faults happen in their overall or regional network due to physical link failure or abnormal traffic. This paper presents a policy-based methodology to control many different types of network equipments at the same time in abnormal cases. The key idea is that NMS(Network Management System) keeps vendor-neutral control policies in normal times and that when an abnormal case occurs in network, NMS transforms the selected policy into vendor-specific control commands and enforces them to various equipments simultaneously.

  • PDF

Measuring the Perceived Mental Image of Practical Courses among Students using Electronic Questionnaire

  • Khaled Hussein Mohamed Aly
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.1-9
    • /
    • 2023
  • The practical courses are considered as a model for the courses taught by the student of the Department of Physical Education at different levels of study, during which he employs his mental, physical and skill abilities to understand and master the motor skills and develop his physical abilities to be able to master them and later teach and train them, so this study was conducted with the aim of identifying the perceived mental image For the practical courses of the students of the Department of Physical Education at Umm Al-Qura University, by designing a scale for the perceived mental image of the practical courses, and identifying the percentages and the extent of their prevalence for each of the positive mental image, the nonperceived mental image, and the negative mental image of the practical courses among the students of the Department of Physical Education at Umm Al-Qura University, The researcher used the descriptive approach from the survey studies by designing a measure of the perceived mental image on a sample of (175) students, and they were chosen by the intentional method from the fourth level students who studied all the practical courses in the department, whether for the first or second semester of the academic year 2021 /2022. Data using frequencies, percentages and the test of significance of the ratio, and one of the most important results was the validity of the scale used in measuring the mental image perceived by students of the Department of Physical Education about practical courses. Realizing a positive mental image that is statistically significant about the practical courses of (53.20%) of the students of the Department of Physical Education, the sample of this study. And realizing a positive mental image that is statistically significant for students about the axes of the nature of studying practical courses, their abilities in practical performance, the method of implementing lectures, the lecturer, and their evaluation methods. The mental image of the student, and taking appropriate measures to develop the practical courses and academic programs, applying similar studies to measure the mental image of the department's graduates on the specialized tracks in the Department of Physical Education, reviewing the number of hours for some practical courses so that they are not less than two hours for all practical courses.

Numerical Study for The Critical-Flow-Characteristics of The Pressure Regulator and Considerations as a Pipe Network Element (I);Influence of the Inlet-Outlet Pressure Ratio (정압기 임계유동특성 및 배관망해석 요소로서의 고려에 관한 수치해석적 연구 (I);입출구 압력비 변화 영향)

  • Shin, C.H.;Ha, J.M.;Lee, C.G.;Her, J.Y.;Im, J.H.;Joo, W.G.
    • Proceedings of the KSME Conference
    • /
    • 2004.11a
    • /
    • pp.1448-1453
    • /
    • 2004
  • The major parameters governing the fluid dynamical and thermo-dynamical behavior in the large pipeline network system are friction loss and the pipeline length. But in local pipeline networks and relatively short distance pipeline system, secondary loss and the considerations of the moving states of the fluid machine are also important. One of the major element in local pressure control system is pressure regulator. It causes the variations of the physical properties in that pipeline system. Especially, as there is not enough information to obtain reliable physical property values such as density, temperature etc. at the downstream of the pressure regulator, It is hard to calculate accurate solution in the pipeline network analysis. In this study, some numerical approaches to investigate the critical-flow-characteristics of the pressure regulator have been done and the detail examinations and considerations of the pressure regulator as a pipeline network elements according to the variations of the inlet-outlet pressure ratio have been carried. Finally the flow-flied distributions, relations and critical-flow-characteristics have been studied. in detail and the 1D analytic method to analyze critical pipe flow have been investigated

  • PDF

A Systems Engineering Approach to Implementing Hardware Cybersecurity Controls for Non-Safety Data Network

  • Ibrahim, Ahmad Salah;Jung, Jaecheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.12 no.2
    • /
    • pp.101-114
    • /
    • 2016
  • A model-based systems engineering (MBSE) approach to implementing hardware-based network cybersecurity controls for APR1400 non-safety data network is presented in this work. The proposed design was developed by implementing packet filtering and deep packet inspection functions to control the unauthorized traffic and malicious contents. Denial-of-Service (DoS) attack was considered as a potential cybersecurity issue that may threaten the data availability and integrity of DCS gateway servers. Logical design architecture was developed to simulate the behavior of functions flow. HDL-based physical architecture was modelled and simulated using Xilinx ISE software to verify the design functionality. For effective modelling process, enhanced function flow block diagrams (EFFBDs) and schematic design based on FPGA technology were together developed and simulated to verify the performance and functional requirements of network security controls. Both logical and physical design architectures verified that hardware-based cybersecurity controls are capable to maintain the data availability and integrity. Further works focus on implementing the schematic design to an FPGA platform to accomplish the design verification and validation processes.

Cross-layer Design of Private MAC with TH-BPPM and TH-BPAM in UWB Ad-hoc Networks

  • Parvez, A.Al;Khan, M.A.;Hoque, M.E.;An, Xizhi;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12A
    • /
    • pp.1189-1197
    • /
    • 2006
  • Ultra-wideband(UWB) is a killer technology for short-range wireless communications. In the past, most of the UWB research focused on physical layer but the unique characteristics of UWB make it different to design the upper layer protocols than conventional narrow band systems. Cross-layer protocols have received high attention for UWB networks. In this paper, we investigate the performance of two physical layer schemes: Time Hopping Binary Pulse Position Modulation(TH-BPPM) and Time Hopping Binary Pulse Amplitude Modulation (TH-BPAM) with proposed private MAC protocol for UWB ad-hoc networks. From pulse level to packet level simulation is done in network simulator ns-2 with realistic network environments for varying traffic load, mobility and network density. Our simulation result shows TH-BPAM outperforms TH-BPPM in high traffic load, mobility and dense network cases but in a low traffic load case identical performance is achieved.

Scalable Search based on Fuzzy Clustering for Interest-based P2P Networks

  • Mateo, Romeo Mark A.;Lee, Jae-Wan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.157-176
    • /
    • 2011
  • An interest-based P2P constructs the peer connections based on similarities for efficient search of resources. A clustering technique using peer similarities as data is an effective approach to group the most relevant peers. However, the separation of groups produced from clustering lowers the scalability of a P2P network. Moreover, the interest-based approach is only concerned with user-level grouping where topology-awareness on the physical network is not considered. This paper proposes an efficient scalable search for the interest-based P2P system. A scalable multi-ring (SMR) based on fuzzy clustering handles the grouping of relevant peers and the proposed scalable search utilizes the SMR for scalability of peer queries. In forming the multi-ring, a minimized route function is used to determine the shortest route to connect peers on the physical network. Performance evaluation showed that the SMR acquired an accurate peer grouping and improved the connectivity rate of the P2P network. Also, the proposed scalable search was efficient in finding more replicated files throughout the peer network compared to other traditional P2P approaches.

A Study on the Virtual Switch Implementation and Comparison for Smart Node Platform (가상 스위치 구현 및 비교에 관한 연구)

  • Jeong, Gab Joong;Choi, Kang-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2911-2918
    • /
    • 2014
  • Nowadays, most Internet servers run on virtual a network which connects each virtual machine, to process large amounts of data on single physical computer. The virtual machines for their own purposes are interconnected to other virtual server systems with various types of operating systems. Each virtual server may share one physical computer resources and operates at a service seamlessly to each other. Sometimes even the virtual machines are implemented using a method that lease the physical IT resources without purchasing physical server. Therefore, a virtual switch is needed to improve the performance when a large number of virtual machines operate on physical server. In this study, the implementation and investigation was performed for the virtual switches, OpenvSwitch and DPDKvSwitch, in order to provide the necessary high-performance cloud services to creative business.