• Title/Summary/Keyword: network management architecture

Search Result 755, Processing Time 0.037 seconds

VIMS: Design and Implementation of Virtual Network Integrated Control and Management Framework over National Research Network (연구망에서 가상네트워크 통합제어플랫폼 구현 및 실험)

  • Cho, Ilkwon;Kang, Sun-Moo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.10
    • /
    • pp.877-888
    • /
    • 2012
  • Network virtualization technology is a crucial research issue of Future Internet which pursues a service-oriented architecture so-called NaaS (Network as a Service) or SDN (Software Defined Network). Network virtualization is expected to play an important role in Future Internet researches as a network testbed technology which enables innovative protocols to be experimented independently on a common testbed environment. We propose a control framework in order to provide user defined topology and bandwidth services with network virtualization and to separate and manage multiple-user traffics in a small and medium scale - single domain research network. The proposed framework (VIMS; Virtual network Integrated control and Management System) supports testbed expansions without any changes of heterogeneous virtual network support equipments through accommodation of each equipment's control plane. The framework shows a feasibility through applied to KOREN and we describe the differences and further study directions for improvement the framework comparing with GENI control framework.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

A Gigabit Rate Packet Header Collector using Network Processor (네트워크 프로세서를 이용한 기가비트 패킷 헤데 수집기)

  • Choi Pan-an;Choi Kyung-hee;Jung Gi-hyun;Sim Jae-hong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.11-18
    • /
    • 2005
  • This paper proposes a packet header collector, based on a network processor with multi-processor and multi-threads, that shows a high throughput on gigabit network. The proposed collector has an architecture to separate packets coming from gigabit network into headers and payloads, and distribute them to multiple 100Mbit MAC ports. The architecture hiring a unique buffer management method and load distribution strategy among multiple processors is evaluated empirically in depth.

A Survey of Employees' Perception on the Service Network of Concentrated Arrangement of the Health, Medical and Welfare Facilities for Elderly in Japan - Focused on Miyagi-ken Nango-cho and Yamagata-ken Nishigawa-cho in Tohoku area of Japan - (농촌지역 고령자 보건∙의료∙복지 집약시설내 서비스연계에 대한 직원의 의식조사 - 일본 동북지방의 궁성현(宮城県) 남향정(南鄕町)과 산형현(山形県) 서천정(西川町)을 대상으로 -)

  • Nam, Yun-Cheol
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.10 no.4
    • /
    • pp.41-48
    • /
    • 2008
  • Recently, Rural village of japan are enlarging and enriching the service of health, medical and welfare facilities for the elderly. Concentrated arrangement of the three types of facilities is one of the effective ways especially for the small-scale local governments. This paper focus on a questionnaire survey of employees who work in the facilities to evaluate service network. Using this survey data, it is used to make a plan of intensive arrangement. As a result, their satisfaction with concentrated arrangement was considerable high. In particular, they expressed satisfaction with service network between Medical and Welfare. Due to increasing outpatients, the concentrated arrangement has contributed to hospital funds and given emotional security to the aged in welfare facilities. In order to promote service network effect, there are many opinions that management of health facilities(local governments) is needed.

  • PDF

Real-time automated detection of construction noise sources based on convolutional neural networks

  • Jung, Seunghoon;Kang, Hyuna;Hong, Juwon;Hong, Taehoon;Lee, Minhyun;Kim, Jimin
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.455-462
    • /
    • 2020
  • Noise which is unwanted sound is a serious pollutant that can affect human health, as well as the working and living environment if exposed to humans. However, current noise management on the construction project is generally conducted after the noise exceeds the regulation standard, which increases the conflicts with inhabitants near the construction site and threats to the safety and productivity of construction workers. To overcome the limitations of the current noise management methods, the activities of construction equipment which is the main source of construction noise need to be managed throughout the construction period in real-time. Therefore, this paper proposed a framework for automatically detecting noise sources in construction sites in real-time based on convolutional neural networks (CNNs) according to the following four steps: (i) Step 1: Definition of the noise sources; (ii) Step 2: Data preparation; (iii) Step 3: Noise source classification using the audio CNN; and (iv) Step 4: Noise source detection using the visual CNN. The short-time Fourier transform (STFT) and temporal image processing are used to contain temporal features of the audio and visual data. In addition, the AlexNet and You Only Look Once v3 (YOLOv3) algorithms have been adopted to classify and detect the noise sources in real-time. As a result, the proposed framework is expected to immediately find construction activities as current noise sources on the video of the construction site. The proposed framework could be helpful for environmental construction managers to efficiently identify and control the noise by automatically detecting the noise sources among many activities carried out by various types of construction equipment. Thereby, not only conflicts between inhabitants and construction companies caused by construction noise can be prevented, but also the noise-related health risks and productivity degradation for construction workers and inhabitants near the construction site can be minimized.

  • PDF

Architecture Description Model for Common IT Resource Identification in e-Government Systems (공동활용자원식별을 위한 전자정부 시스템 아키텍처 서술 방안)

  • Shin, Soo-Jeong;Choi, Young-Jin;Jung, Suk-Chun;Seo, Yong-Won
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.631-642
    • /
    • 2009
  • Although the Korean government is making great effort to prevent the redundancy in IT investment and efficiently allocate the IT budget, actual achievements are quite limited because of the variety of IT resources and different architecture description among organizations and projects. Thus, a standardized description model of the system architecture is strongly needed to identify the common resources and improve the efficiency of IT investment. Therefore, in this paper, we have developed the function-network matrix model which can be used as the basic template for a standard for architecture description of e-Government systems. The function-network matrix model integrates the function tiers and the network areas into a single unified framework, which enables the functionality of each component and the flow of information clearly visible. Moreover, we described the architectures of Korean e-government’s citizen service systems using our model, resulting in clear demonstration of the similarities and differences between different systems, and easy identification of the common resources. Using the architecture description model developed in this research, the consolidation of national IT resources can be promoted, and non-expert IT users can easily recognize the architecture of their systems. In addition, more efficient and systematic IT resource management can be achieved using our model.

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

Streaming Media and Multimedia Conferencing Traffic Analysis Using Payload Examination

  • Kang, Hun-Jeong;Kim, Myung-Sup;Hong, James W.
    • ETRI Journal
    • /
    • v.26 no.3
    • /
    • pp.203-217
    • /
    • 2004
  • This paper presents a method and architecture to analyze streaming media and multimedia conferencing traffic. Our method is based on detecting the transport protocol and port numbers that are dynamically assigned during the setup between communicating parties. We then apply such information to analyze traffic generated by the most popular streaming media and multimedia conferencing applications, namely, Windows Media, Real Networks, QuickTime, SIP and H.323. We also describe a prototype implementation of a traffic monitoring and analysis system that uses our method and architecture.

  • PDF

Framework of MANPro-based control for intelligent manufacturing systems (지능형 생산시스템의 MANPro기반 제어 기초구조)

  • Sin, Mun-Su;Jeong, Mu-Yeong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.467-470
    • /
    • 2004
  • MANPro-based control is a novel control paradigm aimed at intelligent manufacturing systems on the basis of mobile agent-based negotiation process (MANPro). MANPro is a negotiation mechanism based on the agent-based control architecture and, especially, it adapts a mobile agent system called N-agent for the negotiation process. N-agent travels around the network of distributed manufacturing systems to acquire information, and it makes a decision for system control according to the obtained information. MANPro includes communication architecture and information architecture for intelligent shop floor control. MANPro also considers the following issues: (1) negotiation mechanism, (2) single-agent internal strategic policies, and (3) information model. Communication architecture concerns the first issue of the negotiation mechanism. It provides information exchanging mechanism with functional modules. In specific, N-agent is equipped with an intelligent reasoning engine with a built-in knowledge base. This reasoning engine is closely related to the single-agent internal strategic policies of the second issue. Finally, ontology-based information architecture addresses information models and provides a framework for information modeling on negotiation. In this paper, these three issues are addressed in detail and a framework of MANPro-based control is also proposed.

  • PDF

Potential of an Interactive Metaverse Platform for Safety Education in Construction

  • Yoo, Taehan;Lee, Dongmin;Yang, Jaehoon;Kim, Dohyung;Lee, Doyeop;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.516-524
    • /
    • 2022
  • The construction industry is considered the most hazardous industry globally. Therefore, safety education is crucial for raising the safety awareness of construction workers working at construction sites and creating a safe working environment. However, the current safety education method and tools cannot provide trainees with realistic and practical experiences that might help better safety awareness in practice. A metaverse, a real-time network of 3D virtual worlds focused on social connection, was created for more interactive communication, collaboration, and coordination between users. Several previous studies have noted that the metaverse has excellent potential for improved safety education performance, but its required functions and practical applications have not been thoroughly researched. In order to fill the research gap, this paper reviewed the potential benefits of a metaverse based on the current research and suggested its application for safety education purposes. This paper scrutinized the metaverse's key functions, particularly its information and knowledge sharing function and reality capture function. Then, the authors created a metaverse prototype based on the two key functions described above. The main contribution of this paper is reviewing the potential benefits of a metaverse for safety education. A realistic and feasible metaverse platform should be developed in future studies, and its impact on safety education should be quantitatively verified.

  • PDF