• Title/Summary/Keyword: Physical Network

Search Result 1,876, Processing Time 0.025 seconds

Production Equipment Monitoring System Based on Cloud Computing for Machine Manufacturing Tools

  • Kim, Sungun;Yu, Heung-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.197-205
    • /
    • 2022
  • The Cyber Physical System(CPS) is an important concept in achieving SMSs(Smart Manufacturing Systems). Generally, CPS consists of physical and virtual elements. The former involves manufacturing devices in the field space, whereas the latter includes the technologies such as network, data collection and analysis, security, and monitoring and control technologies in the cyber space. Currently, all these elements are being integrated for achieving SMSs in which we can control and analyze various kinds of producing and diagnostic issues in the cyber space without the need for human intervention. In this study, we focus on implementing a production equipment monitoring system related to building a SMS. First, we describe the development of a fog-based gateway system that links physical manufacturing devices with virtual elements. This system also interacts with the cloud server in a multimedia network environment. Second, we explain the proposed network infrastructure to implement a monitoring system operating on a cloud server. Then, we discuss our monitoring applications, and explain the experience of how to apply the ML(Machine Learning) method for predictive diagnostics.

The Activation Plan of Chain Information Network And Efficent NDB Design (효율적인 NDB 설계 및 유통 정보 NETWORK 활성화 방안)

  • 남태희
    • KSCI Review
    • /
    • v.1 no.2
    • /
    • pp.73-94
    • /
    • 1995
  • In this paper, design of efficient NDB(Network Data Base) for the activation plan of chain information network. The DB structure build up, logical structure, store structure, physical structure, the data express for one's record, and the express using linked in the releation of data. Also express as hierarchical model on the DSD(Data Structure Diagram) from the database with logical structure. Each node has express on record type, the linked in course of connective this type, the infuence have efficent of access or search of data, in the design for connection mutually a device of physical, design for database, and construction a form of store for logical. Also activation of chain information network of efficent, using POS(Point Of Sale) system in OSI(Open Systems Interconnection) environment for network standardization, and build up network a design for system.

  • PDF

The Development of Motor Controller based on Network using Optic-EtherCAT (광 EtherCAT을 이용한 네트워크 기반 모터 제어기 개발)

  • Moon, Yong-Seon;Lee, Gwang-Seok;Seo, Dong-Jin;Bae, Young-Chul
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.5
    • /
    • pp.467-472
    • /
    • 2008
  • In this paper, we design, implement and apply network physical layer to 100 BaseFx optical cable interface module based on industrial ethernet protocol which is physical layer of EtherCAT that has ensure its open standard ethernet compatibility which having been provided with real time of control in network of intelligent service robot, can be process numerous data to sensor and motor control system. Through BLDC motor control performance tests, we try to propose suitability as internal network of intelligent service robot and automation system.

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.

An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN (SDWSN 환경의 PUF 기반 그룹 키 분배 방법 개선)

  • Oh, Jeong Min;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.29-43
    • /
    • 2019
  • In recent years, as the network traffic in the WSN(Wireless Sensor Network) has been increased by the growing number of IoT wireless devices, SDWSN(Software-Defined Wireless Sensor Network) and its security that aims a secure SDN(Software-Defined Networking) for efficiently managing network resources in WSN have received much attention. In this paper, we study on how to efficiently and securely design a PUF(Physical Unclonable Function)-assisted group key distribution scheme for the SDWSN environment. Recently, Huang et al. have designed a group key distribution scheme using the strengths of SDN and the physical security features of PUF. However, we observe that Huang et al.'s scheme has weak points that it does not only lack of authentication for the auxiliary controller but also it maintains the redundant synchronization information. In this paper, we securely design an authentication process of the auxiliary controller and improve the vulnerabilities of Huang et al.'s scheme by adding counter strings and random information but deleting the redundant synchronization information.

Present and Future Technologies of Satellite Communication Network Security (위성 통신망 보안 기술 당면 과제 및 향후 발전 방향 분석)

  • Choi, Jihwan;Joo, Changhee
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.3
    • /
    • pp.50-53
    • /
    • 2017
  • Satellite communications are vulnerable to malicious eavesdroppers and interceptors due to wide coverage and broadcasting applications. However, technologies for securing satellite networks have yet to be more articulated beyond high-layer packet encryption. As attempts for jamming and spoofing attacks spread out, it is extremely critical to invest on the development of physical layer security solutions. In this paper, we review current technologies for satellite communication network security both in high and physical layers. We also present recent research results on physical layer security in the fields of information theory and wireless networks. We suggest a future direction for satellite communication security, including a cross-layer approach.

Implementation of Medical Care System based on Home Network (홈 네트워크 방식의 헬스 케어 시스템 구현)

  • Kim, Jeong-Lae;Lee, Woo-Chul;Ko, Yun-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.987-991
    • /
    • 2011
  • In this paper, a health care system is implemented which can identify the parameter for moving body after exercising based on home network. This system has catched a signal for physical condition of body data using data acquisition mechanism such as a data acquisition module, a data signal processing module and a feedback module. The composition has a functions of displacement point for a BMI and WDI, that the basic parameter measure to base on the heart rate, temperature. There are checked physical condition of body exercising to compounded a physical condition of sensory organ. There are to keep the lookout for the body condition that to estimate a health care with a physical organ through a exercise.

Optimal Energy-Efficient Power Allocation and Outage Performance Analysis for Cognitive Multi-Antenna Relay Network Using Physical-Layer Network Coding

  • Liu, Jia;Zhu, Ying;Kang, GuiXia;Zhang, YiFan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3018-3036
    • /
    • 2013
  • In this paper, we investigate power allocation scheme and outage performance for a physical-layer network coding (PNC) relay based secondary user (SU) communication in cognitive multi-antenna relay networks (CMRNs), in which two secondary transceivers exchange their information via a multi-antenna relay using PNC protocol. We propose an optimal energy-efficient power allocation (OE-PA) scheme to minimize total energy consumption per bit under the sum rate constraint and interference power threshold (IPT) constraints. A closed-form solution for optimal allocation of transmit power among the SU nodes, as well as the outage probability of the cognitive relay system, are then derived analytically and confirmed by numerical results. Numerical simulations demonstrate the PNC protocol has superiority in energy efficiency performance over conventional direct transmission protocol and Four-Time-Slot (4TS) Decode-and-Forward (DF) relay protocol, and the proposed system has the optimal outage performance when the relay is located at the center of two secondary transceivers.

A Machine Learning-based Method for Virtual Network Function Resource Demand Prediction (기계학습 기반의 가상 네트워크 기능 자원 수요 예측 방법)

  • Kim, Hee-Gon;Lee, Do-Young;Yoo, Jae-Hyung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.1-9
    • /
    • 2018
  • Network virtualization refers to a technology creating independent virtual network environment on a physical network. Network virtualization technology can share the physical network resources to reduce the cost of establishing the network for each user and enables the network administrator to dynamically change the network configuration according to the purpose. Although the network management can be handled dynamically, the management is manual, and it does not maximize the profit of network virtualization. In this paper, we propose Machine-Learning technology to allow the network to learn by itself and manage its management dynamically. The proposed approach is to dynamically allocate appropriate resources by predicting resource demand of VNF in service function chaining, which is a core and essential problem in virtual network management. Our goal is to predict the resource demand of the VNF and dynamically allocate the appropriate resources to reduce the cost of network operation while preventing service interruption.

Channel Coding Based Physical Layer Security for Wireless Networks (채널 부호화를 통한 물리계층 무선네트워크 보안기술)

  • Asaduzzaman, Asaduzzaman;Kong, Hyung Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.57-70
    • /
    • 2008
  • This paper introduces a new paradigm of physical layer security through channel coding for wireless networks. The well known spread spectrum based physical layer security in wireless network is applicable when code division multiple access (CDMA) is used as wireless air link interface. In our proposal, we incorporate the proposed security protocol within channel coding as channel coding is an essential part of all kind of wireless communications. Channel coding has a built-in security in the sense of encoding and decoding algorithm. Decoding of a particular codeword is possible only when the encoding procedure is exactly known. This point is the key of our proposed security protocol. The common parameter that required for both encoder and decoder is generally a generator matrix. We proposed a random selection of generators according to a security key to ensure the secrecy of the networks against unauthorized access. Therefore, the conventional channel coding technique is used as a security controller of the network along with its error correcting purpose.

  • PDF