• Title/Summary/Keyword: network base control

Search Result 355, Processing Time 0.026 seconds

A Study on the Development of Signal Matching Module for Heterogeneous Network in WCDMA (WCDMA 이동통신망에서 이종간 네트워크 신호 정합 모듈 개발에 관한 연구)

  • Yoo, DongJoo;Kim, Keunsik
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.85-91
    • /
    • 2017
  • This paper concerns the design of a matching module system enabling the RF signal to be harmonized between the new base stations (RRH) and the repeater in the same frequency band of the asynchronous transfer network. This matching system controls the RF Gain Control of the module while monitoring the quality of the quality. Additionally, the RF environment has been adapted accordingly to adjust the RF Gain Control to match the receiver characteristics of the relay. As a result of this study, we improved the quality of the interface between the new base stations and existing relays.

A Study on Computer Application Program to an Efficient Supervisory Control of the Power Distribution System (효율적인 배전관리를 위한 컴퓨터 응용 프로그램 연구)

  • Lee, B.C.;Seo, Y.R.;Lee, J.H.;Chung, C.H.
    • Proceedings of the KIEE Conference
    • /
    • 1993.07a
    • /
    • pp.96-98
    • /
    • 1993
  • In accordance with increase of electrical power demanded, more efficient supervisory control of distribution system is required. This study contains development of MMI(man-machine-interface) system with GUI(graphic-user-interface), for the automatic power distribution system. The main function of MMI system are to edit network of power distribution, to view network, to warnning a breakdown and to management of data base for network. The GUI function of MMI system enables more efficient management of power distribution system.

  • PDF

The Efficiency Design & MAC Function of the Composition Optical Network (광통신망 구축의 효과적인 설계 및 MAC고려 요소)

  • 하창국
    • Journal of the Korean Professional Engineers Association
    • /
    • v.34 no.4
    • /
    • pp.41-47
    • /
    • 2001
  • The paper describes SR3 (Synchronous Round Robin with Reservations), a collision-free medium access control protocol for all-optical slotted packet networks based on WDM multi-channel ring topologies where nodes are equipped with one fixed-wavelength receiver and one wavelength-tunable transmitter SR3 is derived from the SRR and MMR protocols previously proposed by the same authors for the same class of all-optical networks. SRR and MMR already achieve an efficient exploitation of the available bandwidth, while guaranteeing a throughput-fair access to each node. SR3, In addition, allows nodes to reserve slots. thereby achieving a stronger control on access delays; it is thus well suited to meet tight delay requirements, as it is the case for multimedia applications. Simulation results show that SR3 provides very good performance to guaranteed qualify traffic, but also brings signigicant performance improvements for best-effort traffic. Energy effciency is an important issue for optical network since they must rely on their batteries. We present a novel MAC protocol that achieves a good energy efficiency of optical interface of the network and provides support for diverse traffic types and QoS. The scheduler of the base station is responsible to provide the required QoS to connections on the optical link and to minimise the amount of energy spend by the High speed Network. The main principles of the MaC protocol are to avoid unsuccessful actions, minimise the number of transitions , and synchronise the mobile and the base-station. We will show that considerable amounts of energy can be saved using these principles.

  • PDF

Network Intrusion Detection Based on Directed Acyclic Graph and Belief Rule Base

  • Zhang, Bang-Cheng;Hu, Guan-Yu;Zhou, Zhi-Jie;Zhang, You-Min;Qiao, Pei-Li;Chang, Lei-Lei
    • ETRI Journal
    • /
    • v.39 no.4
    • /
    • pp.592-604
    • /
    • 2017
  • Intrusion detection is very important for network situation awareness. While a few methods have been proposed to detect network intrusion, they cannot directly and effectively utilize semi-quantitative information consisting of expert knowledge and quantitative data. Hence, this paper proposes a new detection model based on a directed acyclic graph (DAG) and a belief rule base (BRB). In the proposed model, called DAG-BRB, the DAG is employed to construct a multi-layered BRB model that can avoid explosion of combinations of rule number because of a large number of types of intrusion. To obtain the optimal parameters of the DAG-BRB model, an improved constraint covariance matrix adaption evolution strategy (CMA-ES) is developed that can effectively solve the constraint problem in the BRB. A case study was used to test the efficiency of the proposed DAG-BRB. The results showed that compared with other detection models, the DAG-BRB model has a higher detection rate and can be used in real networks.

System Performance and Traffic Control for the AAL Type 2 Traffic in IMT-2000 Networks (IMT-2000 망에서 AAL-2 구조의 트래픽 제어 및 시스템 성능)

  • Ryu, Byung-Han;Ahn, Jee-Hwan;Baek, Jang-Hyun
    • IE interfaces
    • /
    • v.13 no.2
    • /
    • pp.178-187
    • /
    • 2000
  • In this paper, we investigate the system performance when the voice traffic is constructed as the ATM Adaptation Layer type 2(AAL-2) and then it is transmitted to the Base Station Controller(BSC) from the Base Station Transceiver Subsystem(BTS) through El link in International Mobile Telecommunication-2000 (IMT-2000) network. For this purpose, we first briefly describe the architecture of the BTS and the BSC, and then model it as a queueing network. By simulation study, we present the required processing time at traffic control blocks and the timeout time which should be set for multiplexing the user packets in the LIU(Line Interface Unit). Further, we evaluate the performance of physical links and the timeout probability that user packets can not be multiplexed within the established timeout time, and the multiplexing gain. Finally, we present the number of voice users who can be simultaneously admitted on one El link and 99.9% value of the transmission delay from the Radio Channel Element(RCE) to the Selector & Transcoder Subsystem(STS).

  • PDF

The Implementation of Communication Emulate Based on Component For Automation System (자동화시스템을 위한 컴포넌트 기반의 통신 Emulate 구현)

  • Jeong Hwa-Young
    • Journal of Digital Contents Society
    • /
    • v.3 no.2
    • /
    • pp.245-254
    • /
    • 2002
  • Currently, communication field for automation system can be divided by simple serial communication for communication between each internal devices and network base remote control system that is based on TCP/IP. In spite of great development of network, communication part for internal control is using simple RS232 base until present. Also, development techniques of system developed by object oriented program in modular programming techniques of each function unit. Currently, it developed by component base development technique that is parts unit of software. This is presented by the new alternative of software development techniques as techniques to composition independent operation unit including business logic and is connected to development of new system. Therefore, this research implemented internal communication Emulate in RS232C based on GUI that apply development techniques of component base. that is, I maked component to commnication control part between receiving and sending and, as composite it, Control part did to handling between send and receive data.

  • PDF

The Design and Implementation of Mobile base on Access Control System Using ZigBee Method (지그비 기술을 이용한 무선기반의 출입 통제 시스템 설계 및 구현)

  • Joo, Heon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.211-220
    • /
    • 2008
  • The home network technology which used USN is developing quickly. Use yet line to a lot of part as home network technology. Recently be leap into prominence to technology core of home network as wireless technology a ZigBee. ZigBee Perceive with cognition from tag and sensor as use USN, and processing, save, integration, and provide information. Implement the access control system which used technology BigBee with design at these papers. The wireless-based construction that used ZigBee. The influence that can let you implement early a Ubiquitous society is technology there being. Also, show by a large spinoff in an allied industry field, and improve the quality of life, and invention calls value added of leading edge IT service and product. The implementation of mobile base on access control system using zigbee method is expected to be helpful for the convenience in home network use.

  • PDF

A study on the computer application for efficient management of the power distribution system (효율적인 배전관리를 위한 컴퓨터 응용연구)

  • 이병철;서영노;정진현;고윤석;김호용
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10a
    • /
    • pp.975-980
    • /
    • 1993
  • In accordance with increase, if electronic power demanded, more efficient supervisory control of distribution system will be required. This study contains development of MMI(man-machine-interface) system with GUI(graphic-user-interface), for the automatic power distribution system. The main function of MMI system is to edit network of power distribution and to management of data base for network. The GUI function of MMI system enables more efficient management of power distribution system.

  • PDF

Extended Role Based Access Control Model with Multilevel Security Control (다단계 보안통제가 가능한 확장된 역할기반 접근통제 모델)

  • Kim, Hak-Beom;Hong, Gi-Yung;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1886-1902
    • /
    • 2000
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandator Access Control). In this paper, e newly propose ERBAC\ulcorner(Extended RBAC\ulcorner) model by considering subject's and object's roles and security levels for roles additionally to RBAC\ulcorner model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC\ulcorner model provides finer grained access control with multilevel security on he base of subject and object level than RBAC\ulcorner model.

  • PDF

A Study on the Diagnosis of Appendicitis using Fuzzy Neural Network (퍼지 신경망을 이용한 맹장염진단에 관한 연구)

  • 박인규;신승중;정광호
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2000.04a
    • /
    • pp.253-257
    • /
    • 2000
  • the objective of this study is to design and evaluate a methodology for diagnosing the appendicitis in a fuzzy neural network that integrates the partition of input space by fuzzy entropy and the generation of fuzzy control rules and learning algorithm. In particular the diagnosis of appendicitis depends on the rule of thumb of the experts such that it associates with the region, the characteristics, the degree of the ache and the potential symptoms. In this scheme the basic idea is to realize the fuzzy rle base and the process of reasoning by neural network and to make the corresponding parameters of the fuzzy control rules be adapted by back propagation learning rule. To eliminate the number of the parameters of the rules, the output of the consequences of the control rules is expressed by the network's connection weights. As a result we obtain a method for reducing the system's complexities. Through computer simulations the effectiveness of the proposed strategy is verified for the diagnosis of appendicitis.

  • PDF