• Title/Summary/Keyword: Virtual network

Search Result 1,540, Processing Time 0.035 seconds

Modeling of Virtual Switch in Cloud System (클라우드 시스템의 가상 스위치 모델링)

  • Ro, Cheul-Woo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.479-485
    • /
    • 2013
  • Virtualization is a promising approach to consolidating multiple online services onto a smaller number of computing resources. A virtualized server environment allows computing resources to be shared among multiple performance isolated platforms called virtual machines. Through server virtualization software, applications servers are encapsulated into VMs, and deployed with APIs on top generalized pools of CPU and memory resources. Networking and security have been moved to a software abstraction layer that transformed computing, network virtualization. And it paves the way for enterprise to rapidly deploy networking and security for any application by creating the virtual network. Stochastic reward net (SRN) is an extension of stochastic Petri nets which provides compact modeling facilities for system analysis. In this paper, we develop SRN model of network virtualization based on virtual switch. Measures of interest such as switching delay and throughput are considered. These measures are expressed in terms of the expected values of reward rate functions for SRNs. Numerical results are obtained according to the virtual switch capacity and number of active VMs.

An Effective Shared-Slate Management using Network Delay Estimation in Client-Sewer-Based Networked Virtual Environment (클라이언트-서버기반 분산가상환경에서의 지연예측을 통한 효율적 공유상태관리)

  • 심광현;최병태;김종성;오원근
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.189-192
    • /
    • 2000
  • This paper presents a new DR(Dead Reckoning) algorithm in client-server-based networked virtual environment using network delay estimation. In the algorithm, a new update packet is sent to server (or client) whenever the difference of current real value and tracking value after network delay is larger than threshold. To confirm the proposed algorithm, a test network game was implemented. Through iterative field tests, we knew that this algorithm provides fair service and stability.

  • PDF

Virtual Prototyping Simulation for a Passenger Vehicle

  • Kwon Son;Park, Kyung-Hyun;Eom, Sung-Sook
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.4
    • /
    • pp.448-458
    • /
    • 2001
  • The primary goal of virtual prototyping is to eliminate the need for fabricating physical prototypes, and to reduce cost and time for developing new products. A virtual prototyping seeks to create a virtual environment where the development of a new model can be flexible as well as rapid, and experiments can be carried out effectively concerning kinematics, dynamics, and control aspects of the model. This paper addresses the virtual environment used for virtual prototyping of a passenger vehicle. It has been developed using the dVISE environment that provides such useful features as actions, events, sounds, and light features. A vehicle model including features, and behaviors is constructed by employing an object-oriented paradigm and contains detailed information about a real-size vehicle. The human model is also implemented not only for visual and reach evaluations of the developed vehicle model, but also for behavioral visualization during a crash test. For the real time driving simulation, a neural network model is incorporated into the virtual environment. The cases of passing bumps with a vehicle are discussed in order to demonstrate the applicability of a set of developed models.

  • PDF

High Availability and Load Balancing for Virtual Private Networks by Multiple Links (링크 다중화를 통한 가상 사설망의 고가용성 및 부하 분산 기법)

  • Kwon, Jin-Baek
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.51-56
    • /
    • 2008
  • A combination of VPNs and dial-up access, such as DSL and Cable, usually provides the cost-effective solution as the substitution of private networks on high-cost leased line. The business demand for high availability has increased with VPN spreading. This paper presents the schemes for a high availability of network access and a load balancing of network traffic in VPN gateways by using multiple links or multihoming capability based on active-active approach. The high availability and load balancing of network links can be achieved by duplicating external network access into multiple independent links. This can provide a continuous network connection to internal users even if one of the links is failed. Moreover, it can provide twice network bandwidth by distributing the traffic into the links. Static and dynamic algorithms are proposed as the load balancing algorithms.

  • PDF

A Virtual Address Mapping Method for Interconnection between Terrestrial Communication Network and Underwater Acoustic Communication Network (지상 통신 네트워크와 수중음파 통신 네트워크의 상호연결을 위한 가상 주소 매핑 방법)

  • Kim, Changhwa
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.27-45
    • /
    • 2018
  • The terrestrial communication network and the underwater acoustic communication network have very different communication characteristics each other in operational environments, communication media, propagation delay, frequency bandwidth, transmission speed, bit error rate, and so on. These different characteristics cause some different address schemes and different maximum transmission units and, as a result, these differences must form certainly obstacles to the intercommunication between a terrestrial communication network and an underwater acoustic communication network. In this paper, we presents a method to use the virtual addresses to resolve the interconnection problem caused by different address schemes between a terrestrial communication network and an underwater acoustic communication network, and, through a mathematical modeling, we analyze the performance on the message transceiving delay time in the underwater environment.

Hierarchical QoS Architecture for Virtual Dancing Environment (분산 가상현실을 위한 계층적 QoS 지원 기법)

  • 김진용;원유집;김범은;박종일;박용진
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.11
    • /
    • pp.675-690
    • /
    • 2003
  • In this paper, we present the virtual dancing studio for distributed virtual environment. In this system, geographically distributed user shares the virtual dancing hall and interacts with each other. The participating object can be a graphical avatar or a live video stream. It allows the coexistence of graphic objects and real images in the shared virtual space. One of the main technical challenges in developing the distributed virtual environment is to handle excessive network traffic. In an effort to effectively reduce the network traffic, we propose a scheme to adjust the QoS of each object with respect to the distance from the observer in the virtual space. The server maintains the QoS vector for each client's shared space and controls the packet traffic to individual clients based on its QoS vectors. We develop a proto-type virtual dancing environment. Java based development enables the client to be platform independent. The result of experiment shows that the adoption of hierarchical QoS management significantly reduces the overall network traffic.

Evolution of the Behavioral Knowledge for a Virtual Robot

  • Hwang Su-Chul;Cho Kyung-Dal
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.4
    • /
    • pp.302-309
    • /
    • 2005
  • We have studied a model and application that evolves the behavioral knowledge of a virtual robot. The knowledge is represented in classification rules and a neural network, and is learned by a genetic algorithm. The model consists of a virtual robot with behavior knowledge, an environment that it moves in, and an evolution performer that includes a genetic algorithm. We have also applied our model to an environment where the robots gather food into a nest. When comparing our model with the conventional method on various test cases, our model showed superior overall learning.

The Viability of the Malaysian Penal Code in Handling Physical Damage Caused by Malware

  • Rahman, Rizal;Zakaria, Mohd Sophian
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.52-56
    • /
    • 2021
  • There is no assurance that malware could only cause virtual damage to computer programs and data as its potential is endless. However, legal provisions were earlier developed to cater to either a physical damage caused by a physical action or a virtual damage caused by a virtual action. When crossovers occur, it becomes quite uncertain as to how viable the current laws are in handling this matter. The author seeks to address the issue from the perspective of the laws of Malaysia.

The Influence of Virtuality on Social Network: A Multi-level Approach

  • Suh, A-Young;Shin, Kyung-Shik;Kim, Min-Soo
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.52-63
    • /
    • 2008
  • Virtuality is a product of the information age, and as it plays a larger role in the activities of individuals, groups and organizations, the issue of how human behavior varies between virtual and physical space has become one of the most important questions facing the management environment of today. The purpose of this article is to examine how virtuality shapes individuals' social relationships within and outside their work groups. We developed a conceptual framework that explores the links between virtuality and social network based on computer-mediated communication theory and social network theory. Using data from 172 individuals of 42 project teams in 5 global business consulting firms, we tested cross-level hypotheses. The results of hierarchical linear modeling (HLM) indicate that virtuality significantly influences individual's internal tie strength as well as external bridging ties. The results also show the effects of virtual process via CMC vary along with the virtual context.

  • PDF

Network Security Design for Information Security based on Virtual Private Network Environments (가설사설망 환경에서의 네트워크 보안 설계)

  • Kim, Jung-Tae;Ryu, Dae-hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.725-728
    • /
    • 2003
  • This paper describes an architecture how QoS-enabled virtual private network networks over the internet can be built and managed. The basic technologies for secure VPNs and for QoS support the introduced. Vision of a QoS-enabled VPN service over internet is described. We also presented the simplified implementation scenario and some implementation details in order to achieve secure and QoS-enable VPNs.

  • PDF