• Title/Summary/Keyword: link cost function

Search Result 91, Processing Time 0.03 seconds

A Study on Design and Implementation of a VC-Merge Capable LSR on MPLS over ATM (ATM기반 MPLS망에서 확장성을 고려한 VC-Merge 가능한 LSR 설계에 관한 연구)

  • Kim, Young-Chul;Lee, Tae-Won;Lee, Dong-Won;Choi, Deok-Jae;Lee, Guee-Sang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.12
    • /
    • pp.29-38
    • /
    • 2001
  • Recently, as Internet and its services grow rapidly, IETF(Internet Engineering Task Force) introduced a new switching mechanism, MPLS(Multi-Protocol Label Switching), to solve the problem of the scalability in Internet backbone. In this paper, we implemented the LSR loaded with VC-merging function, which causes LSR's management cost to be significantly reduced. We propose a new VC-merge function which supports differentiated services. In case of network congestion in the output buffer of each core LSR, appling link polices to the output modules of the LSR using the EPD algorithm can prevent the buffer from being overflowed. Simulation was performed for Diffserv by using multiple traffic models and investigated the impact of VC-merge method compared to non VC-merge method. The proposed switch is modeled in VHDL and fabricated using the SAMSUNG $0.5{\mu}m$ SOG process.

  • PDF

Development of Customer Satisfaction VE Process during Design Phase using Axiomatic Design Theory (공리적 설계를 활용한 고객만족형 설계VE 프로세스 개발)

  • Park, In-Woo;Cho, Kyu-Man;Hyun, Chang-Taek;Hong, Tae-Hoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.3
    • /
    • pp.111-121
    • /
    • 2009
  • Value Engineering(VE) at design phase(so-called Design-VE) becomes quite a compulsory solution for better customer satisfaction, cost reduction, higher product performance, and, eventually, insured predominance in the competition. Unlike intended, however, the customer requirement on Design-VE has not been fully reflected in reality. Furthermore, the Design-VE occasionally does not progress in regular sequence; Preparation for measuring customer requirement - Function analysis - Idea creation. Therefore, this study suggests Axiomatic Design Theory to be adopted in Design-VE process expecting that the functions required by the customer could systematically reflected in VE process. Post-occupancy Evaluation(POE) is also represented as a method to measure and arrange the customer requirements. The customer satisfaction Design-VE process creates ideas defining functions in more detailed, to reflect the concrete user requirement. This approach helps function analysis and idea creation linked closely because function and idea are developed zigzag (i.e. function - idea - function...) in being decomposed into level down. The application of the process proposed by this study will be helpful to improve the customer requirement measurement and clarify a link between functions and ideas.

Development and Tank Test of an Autonomous Underwater Vehicle 'ISiMI' (자율무인잠수정 테스트베드 이심이의 개발과 수조시험)

  • Jun, Bong-Huan;Park, Jin-Yeong;Lee, Pan-Mook;Lee, Fill-Youb;Oh, Jun-Ho
    • Journal of Ocean Engineering and Technology
    • /
    • v.21 no.2 s.75
    • /
    • pp.67-74
    • /
    • 2007
  • Maritime and Ocean Engineering Research Institute (MOERI), a branch of KORDI, has designed and manufactured a model of an autonomous underwater vehicle (AUV) named ISiMI (Integrated Submergible for Intelligent Mission Implementation). ISiMI is an AUV platform to satisfy the various needs of experimental test required for development of challenging technologies newly investigated in the field of underwater robot; control and navigational algorithms and software architectures. The main design goal of ISiMI AUV is downsizing which will reduce substantially the operating cost compared to other vehicles previously developed in KORDI such as VORAM or DUSAUV. As a result of design and manufacturing process, ISiMI is implemented to be 1.2 m in length, 0.17 m in diameter and weigh 20 kg in air. A series of tank test is conducted to verify the basic functions of ISiMI in the Ocean Engineering Basin of MOERI, which includes manual control with R/F link, auto depth, auto heading control and a final approach control for underwater docking. This paper describes the implementation of ISiMI system and the experimental results to verify the function of ISiMI as a test-bed AUV platform.

Development of Low Latency Secure Communication Device for Legacy SCADA (저지연 Legacy SCADA 보안 통신장치 개발)

  • Choi, Moon-Suk;Kim, Chung-Hyo;Lim, You-Seok;Ju, Seong-Ho;Lim, Yong-Hun;Jeon, Kyung-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.339-346
    • /
    • 2013
  • As the need for security of SCADA systems is increasing, significant progress has been made in research on security of control protocol. However, very few security solutions were adapted to legacy SCADA system. The reasons for non-adoption are latency, cost and key management problem. We propose a low latency, economic security Solution to solve these issues. The proposed solution performs security function in data link layer and has minimum overhead to minimize latency. Furthermore, we try to solve the key management problem by providing systematic security keys and key distribution method.

Implementation of counterfeit banknote detection counter using RTOS (RTOS를 이용한 위폐검출 계수기의 구현)

  • 정원근;신태민;이건기
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.364-370
    • /
    • 2002
  • A banknote counter is a machine that automates counting the money in some agencies to treat much banknotes as well as general banking agencies. The banknote counter materialized in this paper is the machine that adds the function of banknote sorting, detecting plural banknote and detecting counterfeit banknote to an existing banknote counter. The technique of sensor signal processing are used for banknote sorting. The technique of sensor application and data processing are used for detecting counterfeit banknote. The technique of precision equipment design and microprocessor application are used for high speed count. Software improved in debugging and difficulties to link with additional hardware. It was materialized through effective control algorithm and real-time signal processing with C-language on the basis of RTOS(real-time operating system) Photodiode, its applications and a magnetic resistance sensor are used as a sensor device with regard to hardware cost -cutting and process velocity. PCF80C552-24 of Philips using Intel I8051 core is used as a control microprocessor. As the results so far achieved, counterfeit banknotes made by the use of a color duplicator and a color Printer, are distinguished from real banknotes through mixing an optical with a magnetic sensor. and, in case that there are some different banknotes while counting, it is prevented for them to be counted without discriminating from the same kind of banknotes in addition to the fu notion of banknote sorting.

Cell Selection Method using Multi-Criteria Decision Making in Heterogeneous Networks (이종 망에서 퍼지 다기준 의사 결정을 이용한 셀 선정 방법)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • It is essential to maintain constant QoS despite of cell overload or erroneous wireless link during transmission because QoS of a multimedia service may be severely degraded by small delay or packet loss. This paper deals with a cell selection method for supporting the QoS of multimedia services over heterogeneous networks. The proposed scheme is based on Fuzzy Multi-Criteria Decision Making (FMCDM), in which uncertain parameters such as user system preference, the communication cost and cell load, and the transmission delay are used in the decision process using the aggregation function in fuzzy set theory. In this scheme, errors in the evaluation parameters impose milder changes on the total evaluation value than in binary logics. Simulation is focused on the average delay and packet loss rate, and the simulation results show that our proposed method provides mobile terminals the optimal performance.

  • PDF

Development and Trials of an Small Autonomous Underwater Vehicle 'ISiMI' (소형무인잠수정(AUV) 이심이의 개발 및 시험)

  • Jun, Bong-Huan;Park, Jin-Yeong;Lee, Pan-Mook;Lee, Fill-Youb;Lee, Jong-Moo;Oh, Jun-Ho
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2006.11a
    • /
    • pp.347-350
    • /
    • 2006
  • Maritime and Ocean Engineering Research Institute (MOERI), a branch of KORDI, has designed and manufactured a model of an autonomous underwater vehicle (AUV) named ISiMI(Integrated Submergible for Intelligent Mission Implementation). ISiMI is an AUV platform to satisfy the various needs of experimental test required for development of challenging technologies newly investigated in the field of underwater robot; control and navigational algorithms and software architectures. The main design goal of ISiMI AUV is downsizing which will reduce substantially the operating cost compared to other vehicles previously developed in KORDI such as VORAM or DUSAUV. As a result of design and manufacturing process, ISiMI is implemented to be 1.2m in length, 0.17m in diameter and weigh 20 kg in air. A series of tank test is conducted to verify the basic functions of ISiMI in the Ocean Engineering Basin of MOERI, which includes manual control with R/F link, auto depth, auto heading control and a final approach control for underwater docking. This paper describes the implementation of ISiMI system and the experimental results to verify the function of ISiMi as a test-bed AUV platform.

  • PDF

Study on the New Type of Industrial Complex in Response to Changes in Industrial Environment: Network-type Industrial Complex (산업환경 변화에 대응한 새로운 산업단지 유형 개발 연구: 네트워크형 산업단지)

  • Lee, Hyeon-joo;Kim, Tae-gyun;Choi, Dae-sik;Lee, Eun-Yeob;Song, Youngil
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.20 no.4
    • /
    • pp.522-535
    • /
    • 2017
  • It is necessary to develop a new location model to support the application of smart technology and confluence in the 4th industrial revolution era. In this study, we propose 'network-type industrial complex' as a method to link several industrial integrated spaces which are dispersed in an area. As a result of conducting a survey of companies in order to develop a new location model, about 89% of companies recognized the necessity of network-type industrial complex. As a condition for activation of the industrial complex, 'complementary function formation', and 'convenience of nodular transportation' were selected. It is expected that it will be possible to supply low-cost, high-efficiency industrial complexes through opening and linking with urban space and infrastructure sharing.

On the Needs of Vertical and Horizontal Transportation Machines for Freight Transportation Standard Containers to Derive Design Requirements Optimized for the Urban Railway Platform Environment

  • Lee, Sang Min;Park, Jae Min;Kim, Young Min;Kim, Joo Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.112-120
    • /
    • 2021
  • Recently, the number of consumers using digital online distribution platforms is increasing. This caused the rapid growth of the e-commerce market and increased delivery volume in urban areas. The logistics system, designed ar006Fund the city center to handle the delivery volume, operates a delivery system from the outskirts of the city to the urban area using cargo trucks. This maintains an ecosystem of high-cost and inefficient structures that increase social costs such as road traffic congestion and environmental problems. To solve this problem, research is being conducted worldwide to establish a high-efficiency urban joint logistics system using urban railway facilities and underground space infrastructure existing in existing cities. The joint logistics system begins with linking unmanned delivery automation services that link terminal delivery such as cargo classification and stacking, infrastructure construction that performs cargo transfer function by separating from passengers such as using cargo platform. To this end, it is necessary to apply the device to the vertical and horizontal transportation machine supporting the vertical transfer in the flat space of the joint logistics terminal, which is the base technology for transporting cargo using the transfer robot to the destination designated as a freight-only urban railway vehicle. Therefore, this paper aims to derive holistic viewpoints needs for design requirements for vertical and vertical transportation machines and freight transportation standard containers, which are underground railway logistics transport devices to be constructed by urban logistics ecosystem changes.

A Study on the Performance Improvement in SEcure Neighbor Discovery (SEND) Protocol (보안 이웃 탐색 프로토콜 성능 향상 기법에 관한 연구)

  • Park, Jin-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.85-96
    • /
    • 2008
  • Neighbor Discovery(ND) protocol is used to exchange an information of the neighboring nodes on the same link in the IPv6 protocol environment. For protecting the ND protocol, firstly utilizing Authentication Header(AH) of the IPsec protocol was proposed. But the method has some problems-uses of key exchange protocol is not available and it is hard to distribute manual keys. And then secondly the SEcure Neighbor Discovery(SEND) protocol which protects all of the ND message with digital signature was proposed. However, the digital signature technology on the basis of public key cryptography system is commonly known as requiring high cost, therefore it is expected that there is performance degradation in terms of the availability. In the paper, to improve performance of the SEND protocol, we proposed a modified CGA(Cryptographically Generated Address) which is made by additionally adding MAC(Media Access Control) address to the input of the hash function. Also, we proposed cache mechanism. We compared performance of the methods by experimentation.