• Title/Summary/Keyword: SPS network

Search Result 23, Processing Time 0.027 seconds

A Study on Architecture of Event Driven Service System (EDS(Event Driven Service) 시스템 구조에 관한 연구)

  • Song, Kwang-Bin;Cho, Sok-Pal
    • The Journal of Information Technology
    • /
    • v.10 no.4
    • /
    • pp.11-26
    • /
    • 2007
  • EDS is a typical convergence service performing convergence between functions owned by multiple SPs. EDS provides users with the relevant information and the communication by the various personal conditional environment. An alternative terminology for events for net- work related applications is 'triggers'-these are assumed to be included in the present description. Events could be defined as any activities which occur within a service avail ability, signals. Events can be managed, for example, as part of a context-aware application. EDS carry out a procedure for processing user's requested information about mobil network-based entities, such as the combination with various applications, such as a LBS (Location Based Service) and area information. In AS (Application Service) network environments, the user has his customized EDS in the network, the EDS automatically connects the appropriate Terminals consistent with a user profile. EDS can also send the collected information to other requesting users by way of event information and using the procedures of combination with other services. The user can record/retrieve the user-related information to from the information base through EDS.

  • PDF

Performance Evaluation of Semi-Persistent Scheduling in a Narrowband LTE System for Internet of Things (사물인터넷을 위한 협대역 LTE 시스템에서의 준지속적 스케줄링의 성능 평가)

  • Kim, Sunkyung;Cha, Wonjung;So, Jaewoo;Na, Minsoo;Choi, Changsoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1001-1009
    • /
    • 2016
  • In LTE networks, the base station transmits control information over the physical downlink control channel (PDCCH) including scheduling grants, which are used to indicate the resources that the user equipment uses to send data to the base station. Because the size of the PDCCH message and the number of the PDCCH transmissions increase in proportion to the number of user equipments, the overhead of the PDCCH may cause serious network congestion problems in the narrowband LTE (NB-LTE) system. This paper proposes the compact PDCCH information bit allocation to reduce the size of the PDCCH message and evaluates the performance of the semi-persistent scheduling (SPS) in the NB-LTE system. The simulation results show that the SPS can significantly reduce the signaling overhead of the PDCCH and therefore increase the system utilization.

Towards a hierarchical global naming framework in network virtualization

  • Che, Yanzhe;Yang, Qiang;Wu, Chunming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1198-1212
    • /
    • 2013
  • Network virtualization enables autonomous and heterogeneous Virtual Networks (VNs) to co-exist on a shared physical substrate. In a Network Virtualization Environment (NVE), the fact that individual VNs are underpinned by diverse naming mechanisms brings about an obvious challenge for transparent communication across multiple VN domains due to the complexity of uniquely identifying users. Existing solutions were mainly proposed compatible to Internet paradigm with little consideration of their applications in a virtualized environment. This calls for a scalable and efficient naming framework to enable consistent communication across a large user population (fixed or mobile) hosted by multiple VNs. This paper highlights the underlying technical requirements and presents a scalable Global Naming Framework (GNF), which (1) enables transparent communication across multiple VNs owned by the same or different SPs; (2) supports communication in the presence of dynamics induced from both VN and end users; and (3) greatly reduces the network operational complexity (space and time). The suggested approach is assessed through extensive simulation experiments for a range of network scenarios. The numerical result clearly verifies its effectiveness and scalability which enables its application in a large-scale NVE without significant deployment and management hurdles.

Security Policy Negotiation Model Design Using Mobile Agent System (이동 에이전트 시스템을 이용한 보안정책 협상모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.37-46
    • /
    • 2004
  • This paper presents the design of a certain highly efficient security policy negotiation of SPS(Security Policy System) using mobile agent system. The conventional IP security systems have some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through the same path by both directions and is protected by the same policy due to the topology of the network. Unlike conventional systems, the model developed herein can be resolved by using a mobile agent technology. If each domain needs a negotiation of security policy, a mobile agent manages the result of the negotiation in the form of a passport and guarantees the authentication and reliability each other by using the passport.

  • PDF

Design of SPS Model using Mobile Agent System (이동 에이전트 시스템을 이용한 SPS 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.19-24
    • /
    • 2003
  • This research presents the development of a certain highly efficient model for group security policy negotiation using mobile agents in the IPSec environment. The conventional IP security systems has some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through the same path by both directions and is protected by the same policy due to the topology of the network. Unlike conventional systems, the model developed herein can be resolved by using a mobile agent technology. If each domain needs a negotiation of security policy, a mobile agent manages the result of the negotiation in the form of a passport and guarantees the authentication and reliability each other by using the passport.

  • PDF

Adaline-Based Control of Capacitor Supported DVR for Distribution System

  • Singh, Bhim;Jayaprakash, P.;Kothari, D.P.
    • Journal of Power Electronics
    • /
    • v.9 no.3
    • /
    • pp.386-395
    • /
    • 2009
  • In this paper, a new control algorithm for the dynamic voltage restorer (DVR) is proposed to regulate the load terminal voltage during various power quality problems that include sag, swell, harmonics and unbalance in the voltage at the point of common coupling (PCC). The proposed control strategy is an Adaline (Adaptive linear element) Artificial Neural Network (ANN) and is used to control a capacitor supported DVR for power quality improvement. A capacitor supported DVR does not need any active power during steady state because the voltage injected is in quadrature with the feeder current. The control of the DVR is implemented through derived reference load terminal voltages. The proposed control strategy is validated through extensive simulation studies using the MATLAB software with its Simulink and SimPower System (SPS) toolboxes. The DVR is found suitable to support its dc bus voltage through the control under various disturbances.

Security Policy Negotiation Model Design for Secure Network Management (안전한 망 관리를 위한 보안정책 협상모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.171-176
    • /
    • 2004
  • This paper presents the design of a certain highly efficient security policy negotiation of SPS(Security Policy System) for secure network management using mobile agent system. The conventional IP security systems for secure network management have some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through the same path by both directions and is protected by the same policy due to the topology of the network. Unlike conventional systems, the model developed herein can be resolved by using a mobile agent technology. If each domain needs a negotiation of security policy, a mobile agent manages the result of the negotiation in the form of a passport and guarantees the authentication and reliability each other by using the passport.

Large-scale AC/DC EMT Level System Simulations by a Real Time Digital Simulator (RTDS) in KEPRI-KEPCO

  • Park, In Kwon;Lee, Jaegul;Song, Jiyoung;Kim, Yonghak;Kim, Taekyun
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.3 no.1
    • /
    • pp.17-21
    • /
    • 2017
  • Recently, the Korea Enhanced Power system Simulator (KEPS) was upgraded with new processor cards and various peripheral devices. The purpose of the upgrade is for the large-scale AC/DC simulation studies for different purposes such as FACTS, PMU applications, and SPS. The need for such study is now growing in KEPCO network. Frequently, traditional ways of performing the necessary study had been found to be less adequate for guiding the key decisions in the company. Therefore, the growing needs, as well as the revealed inadequacy of the traditional system studies, had been attributing to the momentum for the upgrade project. This paper explains the details of the upgrade project. As an example of presenting the effectiveness of the upgraded RTDS system in KEPRI-KEPCO, a large-scale AC/DC real time simulation case which includes the entire Korean network and a planned MMC-HVDC system is introduced.

Conflicts in Overlay Environments: Inefficient Equilibrium and Incentive Mechanism

  • Liao, Jianxin;Gong, Jun;Jiang, Shan;Li, Tonghong;Wang, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2286-2309
    • /
    • 2016
  • Overlay networks have been widely deployed upon the Internet by Service Providers (SPs) to provide improved network services. However, the interaction between each overlay and traffic engineering (TE) as well as the interaction among co-existing overlays may occur. In this paper, we adopt both non-cooperative and cooperative game theory to analyze these interactions, which are collectively called hybrid interaction. Firstly, we model a situation of the hybrid interaction as an n+1-player non-cooperative game, in which overlays and TE are of equal status, and prove the existence of Nash equilibrium (NE) for this game. Secondly, we model another situation of the hybrid interaction as a 1-leader-n-follower Stackelberg-Nash game, in which TE is the leader and co-existing overlays are followers, and prove that the cost at Stackelberg-Nash equilibrium (SNE) is at least as good as that at NE for TE. Thirdly, we propose a cooperative coalition mechanism based on Shapley value to overcome the inherent inefficiency of NE and SNE, in which players can improve their performance and form stable coalitions. Finally, we apply distinct genetic algorithms (GA) to calculate the values for NE, SNE and the assigned cost for each player in each coalition, respectively. Analytical results are confirmed by the simulation on complex network topologies.

An Analysis of Arts Management-Related Studies' Trend in Korea using Topic Modeling and Semantic Network Analysis (토픽모델링과 의미연결망분석을 활용한 한국 예술경영 연구의 동향 변화 - 1988년부터 2017년까지 국내 학술논문 분석을 중심으로 -)

  • Hwang, SeoI;Park, Yang Woo
    • Korean Association of Arts Management
    • /
    • no.50
    • /
    • pp.5-31
    • /
    • 2019
  • The main purpose of this study was to use Deep Learning based Topic Modeling and Semantic Network Analysis to examine research trend of arts management-related papers in korea. For this purpose, research subjects such as 'The Journal of Cultural Policy', 'The Journal of Cultural Economics', 'The Journal of Culture Industry', 'The Journal of Arts Management', and 'The Journal of Human Content', which are the registered journal of the National Research Foundation of Korea directly or indirectly related to arts management field. From 1988 to 2017, a total of 2,110 domestic journals' signature, abstract, and keyword were analyzed. We tried Big Data analysis such as Topic Modeling and Semantic Network Analysis to examine changes in trends in arts management. The analysis program used open software R and standard statistical software SPSS. Based on the results of the analysis, the implications and limitations of the study and suggestions for future research were discussed. And the potential for development of convergent research such as Arts & Artificial Intelligence and Arts & Big Data.