• Title/Summary/Keyword: Routing control system

Search Result 165, Processing Time 0.026 seconds

Inter-loop Stocker Automated Material Handling Systems (Inter-loop Stocker 자동 물류시스템)

  • Jo, Min-Ho
    • IE interfaces
    • /
    • v.10 no.1
    • /
    • pp.57-65
    • /
    • 1997
  • Less researches on AGV(Automated Guided Vehicle) path configurations have been conducted so far while more studies have been placed in determining AGV guide path directions and pick-up/drop-off station locations, and routing/dispatching/scheduling strategies. In practice plenty of concerns fall in preventing deadlock and simplifying AGV system control through an appropriate AGV path configuration. In order to meet those requirements, a new AGV path configuration, inter-loop stocker type is introduced here. The stocker serves as relaying material between loops as well as stocking material. Automated material handling systems using AGVs play an important role in semiconductor industry including TFT LCD and memory/non-memory chip. A practical example of implementing the inter-loop stocker concept successfully in the TFT LCD fab is presented in this paper.

  • PDF

The Smart Management of Applications Using Fuzzy Logic in Wireless Sensor Networks (무선 네트워크 환경에서 퍼지 로직을 이용한 어플리케이션의 지능적 관리 방안 연구)

  • Lim, Jae-Hoon;Lee, Min-Woo;Kim, Min-Ki;Park, Gwi-Tae
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.276-278
    • /
    • 2009
  • In this paper, we propose the smart management technique of applications using fuzzy logic in wireless sensor networks. We consider the intelligent action compared to the classical action that can only be controlled by on and off. The vagueness depends on the places of the sensor nodes, human's character and emotion. In order to control them with the smartness, the proposed technique considers the better performance of applications in wireless sensor networks. We performed the simulations and implementations on sensor nodes and checked out our ideas. The simulation results show that the proposed technique is more reasonable than the classical approach.

  • PDF

AP-SDN: Action Program enabled Software-Defined Networking Architecture

  • Zheng Zhao;Xiaoya Fan;Xin Xie;Qian Mao;Qi Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1894-1915
    • /
    • 2023
  • Software-Defined Networking (SDN) offers several advantages in dynamic routing, flexible programmable control and custom application-driven network management. However, the programmability of the data plane in traditional SDN is limited. A network operator cannot change the ability of the data plane and perform complex packet processing on the data plane, which limits the flexibility and extendibility of SDN. In the paper, AP-SDN (Action Program enabled Software-Defined Networking) architecture is proposed, which extends the action set of SDN data plane. In the proposed architecture, a modified Open vSwitch is utilized in the data plane allowing the execution of action programs at runtime, thus enabling complex packet processing. An example action program is also implemented which transparently encrypts traffic for terminals. At last, a prototype system of AP-SDN is developed and experiments show its effectiveness and performance.

An Efficient Network Management System using The Smart Router (스마트 라우터를 사용한 효율적인 네트워크 관리 시스템)

  • Park Moon-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.253-260
    • /
    • 2005
  • Active networks not only allows the network nodes, switches or routers. to perform routing and forwarding but so allows their users inject customized programs into the nodes of the network or the packets. that may modify, store or redirect the user data flowing through the network. In this paper, we proposed a new network management system built using active network technology, that can solve problems inherent in most of existing legacy centralized network management systems. The main contribution is to present the Smart Router model that can reduce traffics due to managing networks by way of making control packets into simplified patterns. The disadvantages of the centralized network management are presented and the current solution for distributed network management are discussed. The performance improvements that our architecture offers are showed through a service example experiment.

  • PDF

Real-time Network Middleware Supporting Fault-Tolerant Operations for Personal Robot System

  • Choo, Seong-Ho;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.756-760
    • /
    • 2005
  • By development of a robot technology, personal robot is being developed very actively. Various infra-technologies are accumulated in hardware and software how by internal a lot of research and development efforts, and it is circumstance that actual commodity is announced. But, personal robot is applied to be acting near human, and takes charge of safety and connected directly a lot of works of home security, gas-leakage, fire-warning facilities, or/and etc. So personal robot must do safe and stable action even if any unexpected accidents are happened, important functions are always operated. In this paper, we are wished to show design structures for supporting fault-tolerant operation from our real-time robot middleware viewpoint. Personal robot, in being developed, was designed by module structure to do to interconnect and to interoperate among each module that is mutually implemented by each research facilities or company. Also, each modules can use appreciate network system that is fit for handling and communicating its data. To guarantee this, we have being developed a real-time network middleware, for especially personal robot. Recent our working is to add and to adjust some functions like connection management, distributed routing mechanism, remote object management, and making platform independent robot application execution environment with self-moving of robot application, for fault-tolerant personal robot.

  • PDF

Development of Flood Analysis Module for the Implementation of a Web-Based Flood Management System (웹기반 홍수관리시스템 구현을 위한 홍수분석모듈개발)

  • Jung, In Kyun;Park, Jong Yoon;Kim, Seong Joon;Jang, Cheol Hee
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.56 no.6
    • /
    • pp.103-111
    • /
    • 2014
  • This study was to develop the flood analysis module (FAM) for implementation of a web-based real-time agricultural flood management system. The FAM was developed to apply for an individual watershed, including agricultural reservoir. This module calculates the flood inflow hydrograph to the reservoir using effective rainfall by NRCS-CN method and unit hydrograph calculated by Clark, SCS, and Nakayasu synthetic unit hydrograph methods, and then perform the reservoir routing by modified Puls method. It was programmed to consider the automatic reservoir operation method (AutoROM) based on flood control water level of reservoir. For a $15.7km^2$ Gyeryong watershed including $472{\times}10^4m^3$ agricultural reservoir, rainfall loss, rainfall excess, peak inflow, total inflow, maximum discharge, and maximum water level for each duration time were compared between the FAM and HEC-HMS (applied SCS and Clark unit hydrograph methods). The FAM results showed entirely consistent for all components with simulated results by HEC-HMS. It means that the applied methods to the FAM were implemented properly.

A Simulation-based Analysis and Verification Method for Network Vulnerability (시뮬레이션 기반 네트워크 보안 취약점 분석 및 검증 방안)

  • Lee, Hyun-Jin;Kim, Kwang-hee;Lee, Haeng-Ho
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.659-666
    • /
    • 2019
  • MANET can be applied to various applications as it can autonomously configure the network with only mobile nodes. However, the network can be vulnerable to cyber attacks because it is organized in a distributed environment without central control or management. In this paper, we propose a simulation-based network security vulnerability analysis and verification method. Using this method, we simulated the routing message modification attack, Sybil node attack, and TLV message modification attack that may frequently occur in MANET, and confirmed that similar vulnerabilities can be occurred in the real system. Therefore, the proposed method can be used to improve the accuracy of the protocol design by verifying possible security vulnerabilities through simulation during the protocol design procedure.

Optimal LEACH Protocol with Improved Bat Algorithm in Wireless Sensor Networks

  • Cai, Xingjuan;Sun, Youqiang;Cui, Zhihua;Zhang, Wensheng;Chen, Jinjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2469-2490
    • /
    • 2019
  • A low-energy adaptive clustering hierarchy (LEACH) protocol is a low-power adaptive cluster routing protocol which was proposed by MIT's Chandrakasan for sensor networks. In the LEACH protocol, the selection mode of cluster-head nodes is a random selection of cycles, which may result in uneven distribution of nodal energy and reduce the lifetime of the entire network. Hence, we propose a new selection method to enhance the lifetime of network, in this selection function, the energy consumed between nodes in the clusters and the power consumed by the transfer between the cluster head and the base station are considered at the same time. Meanwhile, the improved FTBA algorithm integrating the curve strategy is proposed to enhance local and global search capabilities. Then we combine the improved BA with LEACH, and use the intelligent algorithm to select the cluster head. Experiment results show that the improved BA has stronger optimization ability than other optimization algorithms, which the method we proposed (FTBA-TC-LEACH) is superior than the LEACH and LEACH with standard BA (SBA-LEACH). The FTBA-TC-LEACH can obviously reduce network energy consumption and enhance the lifetime of wireless sensor networks (WSNs).

The network performance management model using path-reconfiguration and bandwidth-control (가상 경로 재구성과 대역폭 제어를 이용한 망 성능 관리 모델)

  • 김규호;조국현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.12
    • /
    • pp.3086-3097
    • /
    • 1996
  • Generally, the performance of the computer network may differ according to various parameters like routing, bandwidth and timers. Since the network system requirements may widely very according to specific application, computer network must be tailored at tailored at the design starge by selection of appropriate protocols and assignment of degfault parameter. However, since the condition under which a network actually operates may change from that considered at the design stage, control and managment action are required to adjust the network parameter so that the perforance of network is satisfied.

  • PDF

A Study on the Design of Switch for High Speed Internet Communication Network (고속 인터넷 통신망을 위한 스위치 설계에 관한 연구)

  • 조삼호
    • Journal of Internet Computing and Services
    • /
    • v.3 no.3
    • /
    • pp.87-93
    • /
    • 2002
  • A complex network and a parallel computer are made up of interconnected switching units. The role of a switching unit is to set up a connection between an input port and an output port, according to the routing information. We proposed our switching network with a remodeled architecture is a newly modified Banyan network with eight input and output ports. We have analysed the maximum throughput of the revised switch. Our analyses have shown that under the uniform random traffic load, the FIFO discipline is limited to 70%, The switching system consists of an input control unit, a switch unit and an output control unit. Therefore the result of the analyses shows that the results of the networking simulation with the new switch are feasible and if we adopt the new architecture of the revised model of the Banyan switch, the hardware complexity can be reduced. The FIFO discipline has increased by about 11% when we compare the switching system with the input buffer system. We have designed and verified the switching system in VHDL using Max+plusII. We also designed our test environment including micro computers, the base station, and the proposed architecture. We proposed a new architecture of the Banyan switch for BISDN networks and parallel computers.

  • PDF