• Title/Summary/Keyword: Separate Network

Search Result 400, Processing Time 0.024 seconds

The Coming Cyber Society - Types of Multimedia Applications & Services in Japan -

  • Ichinose, Susumu
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1998.06b
    • /
    • pp.1-3
    • /
    • 1998
  • The 21st century will see the formation of a“Cyber society”that, while separate form the real world, will cooperate with it, leading to the further expansion and development of world society. Cyber society allows the formation of virtual space through the connection of multiple computers in a network. In this virtual space, multiple users can communicate with each other and can collect and exchange information while moving about freely and engaging in activities. Three main technologies are vital to the construction of the Cyber society: platform technology for converting multimedia information to optical signals and performing digital processing and communication processing on such signals; communications network technology for transferring these signals from one point to another; and application technology for configuring the Cyber society that will be formed on this network. This paper describes platform technology and network technology with an emphasis on their relationship to application technology for configuring the Cyber society, and will also discuss InterSpace, one of the cyber society platform system of the Cyber society.

  • PDF

A Two-Step Scheduling Algorithm to Support Dual Bandwidth Allocation Policies in an Ethernet Passive Optical Network

  • Lee, Ho-Sook;Yoo, Tae-Whan;Moon, Ji-Hyun;Lee, Hyeong-Ho
    • ETRI Journal
    • /
    • v.26 no.2
    • /
    • pp.185-188
    • /
    • 2004
  • In this paper, we design a two-step scheduling algorithm to support multiple bandwidth allocation policies for upstream channel access in an Ethernet passive optical network. The proposed scheduling algorithm allows us a simultaneous approach for multiple access control policies: static bandwidth allocation for guaranteed bandwidth service and dynamic bandwidth allocation for on-demand, dynamic traffic services. In order to reduce the scheduling complexity, we separate the process of the transmission start- time decision from the process of grant generation. This technique does not require the timing information of other bandwidth allocation modules, so respective modules are free from a heavy amount of timing information or complex processing.

  • PDF

Performance Evaluation of Network Protocol for Protocol for Crane System (자동화 크레인을 위한 네트워크 프로토콜의 성능 평가)

  • Nam Kyoung-Nam;Kim Man-Ho;Lee Kyung Chang;Lee Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.8
    • /
    • pp.709-716
    • /
    • 2005
  • As a way to build more efficient and intelligent container cranes for todays hub ports, communication networks are used to interconnect numerous sensors, actuators, controllers, and operator switches and consoles that are spatially distributed over a crane. Various signals such as sensor values and operator's commands are digitized and broadcast on the network instead of using separate wiring cables. This not only makes the design and manufacturing of a crane more efficient, but also easier implementation of intelligent control algorithms. This paper presents the performance evaluation of CAN(Controller Area Network), TTP(Time Triggered Protocol) and Byteflight that can be used for cranes. Through discrete event simulation, several important quantitative performance factors such as the probability of a transmission failure, average system delay (data latency) and maximum system delay have been evaluated.

Multiple Constraint Routing Protocol for Frequency Diversity Multi-channel Mesh Networks using Interference-based Channel Allocation

  • Torregoza, John Paul;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1632-1644
    • /
    • 2007
  • Wireless Mesh Networks aim to attain large connectivity with minimum performance degradation, as network size is increase. As such, scalability is one of the main characteristics of Wireless Mesh Networks that differentiates it from other wireless networks. This characteristic creates the need for bandwidth efficiency strategies to ensure that network performance does not degrade as the size of the network increase. Several researches have been done to realize mesh networks. However, the researches conducted were mostly focused on a per TCP/IP layer basis. Also, the studies on bandwidth efficiency and bandwidth improvement are usually dealt with as separate issues. This paper aims to simultaneously study bandwidth efficiency and improvement. Aside from optimizing the bandwidth given a fixed capacity, the capacity is also increased using results of physical layer studies. In this paper, the capacity is improved by using the concept of non-overlapping channels for wireless communication. A channel allocation scheme is conceptualized to choose the transmission channel that would optimize the network performance parameters with consideration of chosen Quality of Service (QoS) parameters. Network utility maximization is used to optimize the bandwidth after channel selection. Furthermore, a routing scheme is proposed using the results of the network utilization method and the channel allocation scheme to find the optimal path that would maximize the network gain.

  • PDF

The Construction of Logical, Physical Network Separation by Virtualization (가상화를 이용한 논리적, 물리적 망분리 구축)

  • Lee, YongHui;Yoo, SeungJae
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • With the development of information and communication, public institutions and enterprises utilize the business continuity using the Internet and Intranet. In this environment, public institutions and enterprises is to be introduced the number of solutions and appliances equipment to protect the risk of leakage of inside information. However, this is also the perfect external network connection is not enough to prevent leakage of information. To overcome these separate internal and external networks are needed. In this paper, we constructed the physical and logical network separation is applied to the network using the virtualization and thus the network configuration and network technical review of the various schemes were proposed for the separation.

Migration and Energy Aware Network Traffic Prediction Method Based on LSTM in NFV Environment

  • Ying Hu;Liang Zhu;Jianwei Zhang;Zengyu Cai;Jihui Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.896-915
    • /
    • 2023
  • The network function virtualization (NFV) uses virtualization technology to separate software from hardware. One of the most important challenges of NFV is the resource management of virtual network functions (VNFs). According to the dynamic nature of NFV, the resource allocation of VNFs must be changed to adapt to the variations of incoming network traffic. However, the significant delay may be happened because of the reallocation of resources. In order to balance the performance between delay and quality of service, this paper firstly made a compromise between VNF migration and energy consumption. Then, the long short-term memory (LSTM) was utilized to forecast network traffic. Also, the asymmetric loss function for LSTM (LO-LSTM) was proposed to increase the predicted value to a certain extent. Finally, an experiment was conducted to evaluate the performance of LO-LSTM. The results demonstrated that the proposed LO-LSTM can not only reduce migration times, but also make the energy consumption increment within an acceptable range.

Multiple Mixed Modes: Single-Channel Blind Image Separation

  • Tiantian Yin;Yina Guo;Ningning Zhang
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.858-869
    • /
    • 2023
  • As one of the pivotal techniques of image restoration, single-channel blind source separation (SCBSS) is capable of converting a visual-only image into multi-source images. However, image degradation often results from multiple mixing methods. Therefore, this paper introduces an innovative SCBSS algorithm to effectively separate source images from a composite image in various mixed modes. The cornerstone of this approach is a novel triple generative adversarial network (TriGAN), designed based on dual learning principles. The TriGAN redefines the discriminator's function to optimize the separation process. Extensive experiments have demonstrated the algorithm's capability to distinctly separate source images from a composite image in diverse mixed modes and to facilitate effective image restoration. The effectiveness of the proposed method is quantitatively supported by achieving an average peak signal-to-noise ratio exceeding 30 dB, and the average structural similarity index surpassing 0.95 across multiple datasets.

Network Simulation and Design Guideline for VoIPv6 Network of U-Army (U-Army의 VoIPv6 망 성능 시뮬레이션을 이용한 망 설계 방안)

  • Lee, Hyun-Duck;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.904-910
    • /
    • 2008
  • In this paper, we consider the military requirement, study the military network services and their related traffic parameters, evaluate the performance the experimental army network and then suggest the design guideline of applying VoIP to the whole military. We evaluate the performance of the delay and loss in the viewpoint of packet and call levels for the several scenarios. First, the performances of separate network service were considered and the satisfaction of the requirement was obtained. Secondly, the delays and losses of the integrated network services were calculated as the amount of the background traffic increases. Finally, based on the simulation results, we presented the design guideline which classified network configurations for applying VoIP equipment and helped estimate the number of VoIP terminals in the existing link.

Implementation of Ultrasonic Anemometer & Anemoscope Data-Logger System (초음파 풍향 풍속계 데이터 로거 시스템의 구현)

  • Lee, Woo-Jin;Yim, Jae-Hong;Kang, Young-Gwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.184-190
    • /
    • 2014
  • Until now ship communication micro serial network communication method is designed for the communication between the controller and the RS-422 communication on the international standard ISO 1993, but gradually progresses NMEA 2000 standardized fast Ethernet-based communications environments expected to be replaced. In addition, the ship's main instrumentation equipment versatility with ease gradually to control devices by monitoring and controlling are. Wind anemometer, ship mast end, where the highest wind farms typically install a separate console boxes, data loggers, indicators was required in order to manage them, to maintain them, to go through the procedures and cumbersome data update firmware were Therefore, in this paper, using the PC network, ultrasonic wind speed data processing system for implementing functional was expressed as a function of the technology elements, NMEA 2000 standard certified in separate operating console without the features of the data loggers, indicators, implementation by ultrasonic wind data processing system was implemented to minimize the maintenance cost of the operating system.

LTE Femtocell Network Configuration and an Off-Load Scheme According to Traffic Type within Smart Shipyard Area (스마트 조선소내 LTE 펨토셀 네트워크 구성과 트래픽 종류에 따른 오프로드 방식)

  • Kim, Su-Hyun;Jung, Min-A;Lee, Seong Ro;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.667-673
    • /
    • 2014
  • In a smart shipyard area, it is possible to integrate a variety of ship modules from separate sites into a final ship construction by using mobile applications. In this paper, we proposed the LTE femtocell network configuration which is applicable to sub shipyard, the traffic exchange method with shipyard headquarter and offload method to separate the general traffic. We defined the mode change in a femtocell gateway for supporting offload for general traffic between the main server in shipyard headquarter and sub shipyard, the offload data managements and message definition. We check the transmitted/received message flow in the wireless link, and consider the performance of the proposed method using state the transition diagram. It is expected that our results can improve the productivity within a smart shipyard by mobile communications and LTE femtocell network.