• Title/Summary/Keyword: Physical Network

Search Result 1,876, Processing Time 0.027 seconds

Performance Analysis of Active Optical Ring Network System for the Efficient Transmission (효율적인 전송을 위한 액티브 광 링네트워크 시스템의 성능 분석)

  • Lee Sang-Wha
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.7
    • /
    • pp.69-78
    • /
    • 2006
  • In this paper, we presents the efficiency and a transmission quality of the system which is composed of the optical elements from physical layer of the active optical ring network. For a simulation it will use the Transmissionmaker WDM and it will be able to observation a optical transmission quality of the optical transmission system. The active optical network is composed of two rings(main ring and sub-ring). It measures the BER(Bit Error Rate) quality which it follows node number from the sub ring and physical distance of the node. Performance analysis from the physical layer becomes the standard of the plan for the efficiency optimization of the active optical ring network. Consequently it will be able to compose the efficient optical transmission system which reflects the physical distance, a traffic demand quantity of each node and a number of users from actual network.

  • PDF

Reply-Type based Agent Generation of Legacy Service on One-way data transfer system (일방향 자료전달 시스템의 레거시 서비스 지원을 위한 응답구조 기반 에이전트 자동 생성)

  • Kim, Kyoung-Ho;Chang, Yeop;Kim, Hee-Min;Yun, Jeong-Han;Kim, Woo-Nyon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.299-305
    • /
    • 2013
  • Physical One-way Transfer, one of network Separating Network Technologies, shut off intrusion possibilities by removing data transfer line from external network to internal network. Physical One-way Transfer technology can not support legacy services based duplex transmission. Legacy services operating need agent for extra service with the support. But, Agent development have problems with adding cost and open internal protocols. In this papers, We analyzed legacy services between Control network and OA network in working SCADA systems, and based on the results obtained from the analysis, categorized the legacy services into three forms. We propose an agent generation method of the three service categories for Physical One-Way Transfer System. In addition, we design an automatic generation tool using the proposed method.

Development of a Packet-Switched Public computer Communication Network -PART 1: KORNET Overview and Development of Network Management Center (Packet Switching에 의한 공중 Computer 통신망 개발 연구 -제1부: Kornet 개요 및 NMC 개발)

  • 은종관;이경근
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.22 no.6
    • /
    • pp.103-113
    • /
    • 1985
  • This is the first part of the four-part paper describing the development of a packet-switched computer network named the KORNET In this paper, we present the overview of the KORNET, and discuss various aspects on the development of the netwo management center (NMC). The NMC acts as a nerve center of the network, performing such functions as network monitoring, subscriber and network management and routing manage-ment using operator dialogues. In the implementation of the NMC, we have developed various application softwares that include operator interface, primary/srcondary pan, session layer and packet level adaptor. As for packet, link and physical level protocols, we have modified the XODIAC X.25 originally developed by Data General, Inc. All the net-work protocols we have developed comply completely with the CCITT recommendations.

  • PDF

A Keyword Network Analysis on Obesity Research Trends in Korea: Focusing on keywords co-occured of 'Obesity' and 'Physical Education'

  • Kim, Woo-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.151-158
    • /
    • 2019
  • This study aimed to analyze the research trend related on obesity in physical education in Korea through the keyword network analysis and to establish a basic database for effective design of prospective studies. To achieve it the study crawled co-occured keywords with 'obesity' and 'physical education' from RISS and analyzed the list from 1990 to 2018. They include 25 journal papers and 38 dissertations. The results are as follows. First, recent 30 years 63 papers published in Korea with 'Obesity' and 'Physical Education', and there were 144 related keywords. Second, analyzing journals which have 'Obesity' and 'Physical Education', co-occured keywords in 4 centrality were 24 keywords(student, Korea, prevention, effect, level, body, activation, actual condition, lesson, child, investigation, participation, book, cause, activity, normal, degree, nutrition, physical strength, weight, elementary, light, inquiry, health), and 37 keyword occurred in top 30. Lastly, by CONCOR analysis the result could be divided into 2 clusters. One consists of the object of obesity and its invervention, and the other consists of negative keywords of obesity and its preliminery dimenstion. Through the result, this study showed the research trend which involves the concept of obesity in physical education in Korea. Through the result, prospective obesity research in physical education in Korea would be promoted.

A Study on Stabilizing a Network Security Zone Based on the Application of Logical Area to Communication Bandwidth (통신 대역폭 논리영역 적용 기반의 네트워크 보안구간 안정화 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3462-3468
    • /
    • 2015
  • Regarding countless network disorders or invasions happening nowadays from 2014 until 2015, illegal access intended to attack through the communication line provided by ISP (Internet Service Provider) appears to be the source of the problem. As a defensive way to prevent such network-based attacks, not only stabilization structures for network communication but various policies as well as physical security devices and solutions corresponding to those have been realized and established. Therefore, now is the time to gain foundational research data to secure network security sections by producing logical area on communication bandwidth or such, suggest tasks to expand the communication line which is another research topic in the network security market, and recognize the fact that the active communication bandwidth linkage paradigm using network communication bandwidth is needed as one of the areas that can realize physical security. Additionally, it is necessary to limit the data in the forms of organizing visible security structures into a certain range of physical information by re-dividing communication capacity being currently provided by telecommunicators into subdivided organizational areas and applying the logical virtualization of communication capacity in each of the areas divided. By proposing a network security section based on a logical field application in place of the existing physical structure, basic data that designs a stable physical network communication structure will be provided.

Survey on Physical Layer Security in Downlink Networks

  • Abbas, Mohammed Adil;Hong, Jun-Pyo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.1
    • /
    • pp.14-20
    • /
    • 2017
  • In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

A Study on the Analysis of NCW(Network Centric Warfare) Combat Effectiveness Using Cellular Automata Simulation (세포 자동차(Cellular Automata) 시뮬레이션을 이용한 네트워크 중심전 전투효과도 평가 연구)

  • Jeong, Seong-Jin;Jo, Seong-Jin;Hong, Seong-Pil
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.3-9
    • /
    • 2005
  • The recent notion of Network Centric Warfare (NCW) emphasizes the ability to distribute right information at the right time to maximize the combat effectiveness. Accordingly, in the modern combat system the importance of non-physical element, such as communication system is increasing. However, an NCW-support communication network system is expensive. Therefore, it is essential to develop a proper combat system evaluation method to establish an efficient NCW-support combat system. Traditionally, combat system effectiveness is measured in terms of physical elements such as men and fire power. Obviously, such method is hardly applicable to a modern combat system To overcome this difficulty, we propose an evaluation model based on CA (Cellular Automata) simulation. A set of preliminary combat simulations show that CA simulation may be promising in evaluating non-physical element of a modem combat system.

  • PDF

A Study on the Analysis of NCW (Network Centric Warfare) Combat Effectiveness Using Cellular Automata Simulation (세포 자동차 시뮬레이션을 이용한 네트워크 중심전 전투효과도 평가 연구)

  • Chung Sung-jin;Cho Sung-jin;Hong Sung-Pil
    • Korean Management Science Review
    • /
    • v.22 no.2
    • /
    • pp.135-145
    • /
    • 2005
  • The recent notion of Network Centric Warfare (NCW) emphasizes the ability to distribute the right information at the right time to maximize the combat effectiveness. Accordingly, in the modern combat system, the importance of non-physical elements, such as a communication system, is increasing. However, an NCW-support communication network system is expensive. Therefore, it is essential to develop a proper combat system evaluation method to establish an efficient NCW-support combat system. Traditionally, combat system effectiveness is measured in terms of physical elements such as men and fire power, Obviously, such method is hardly applicable to a modern combat system. To overcome this difficulty, we propose an evaluation model based on CA (Cellular Automata) simulation. A set of preliminary combat simulations show that CA simulation may be promising in evaluating non-physical element of a modern combat system.

Limited Feedback Designs for Two-Way Relaying Systems with Physical Network Coding

  • Kim, Young-Tae;Lee, Kwangwon;Jeon, Youngil;Lee, Inkyu
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.463-472
    • /
    • 2015
  • This paper considers a limited feedback system for two-way wireless relaying channels with physical network coding (PNC). For full feedback systems, the optimal structure with the PNC has already been studied where a modulo operation is employed. In this case, phase and power of two end node channels are adjusted to maximize the minimum distance. Based on this result, we design new quantization methods for the phase and the power in the limited feedback system. By investigating the minimum distance of the received constellation, we present a code-book design to maximize the worst minimum distance. Especially, for quantization of the power for 16-QAM, a new power quantization scheme is proposed to maximize the performance. Also, utilizing the characteristics of the minimum distance observed in our codebook design, we present a power allocation method which does not require any feedback information. Simulation results confirm that our proposed scheme outperforms conventional systems with reduced complexity.

SER-Based Relay Selection for Two-Way Relaying with Physical Layer Network Coding

  • Li, Dandan;Xiong, Ke;Qiu, Zhengding;Du, Guanyao
    • ETRI Journal
    • /
    • v.35 no.2
    • /
    • pp.336-339
    • /
    • 2013
  • To enhance the symbol error rate (SER) performance of the two-way relay channels with physical layer network coding, this letter proposes a relay selection scheme, in which the relay with the maximal minimum distance between different points in its constellation among all relays is selected to assist two-way transmissions. We give the closed-form expression of minimum distance for binary phase-shift keying and quadrature phase-shift keying. Additionally, we design a low-complexity method for higher-order modulations based on look-up tables. Simulation results show that the proposed scheme improves the SER performance for two-way relay networks.