• Title/Summary/Keyword: user relay

Search Result 205, Processing Time 0.023 seconds

An Optimal Capacity Allocation Problem in Designing advanced Information Communication Processing System (대용량 통신처리시스템에서 사용자 이용성향과 ISDN를 고려한 망정합장치의 회선용량 분배에 관한 연구)

  • 김영일;김찬규;이영호;김영휘;류근호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5B
    • /
    • pp.809-819
    • /
    • 2000
  • This paper deals with an optimal capacity allocation problem and performance analysis in Advanced Information Communication Processing System(AICPS). AICPS is a gateway system interconnection PSTN(Public Switched Telephone Network), ISDN(Intergrated Services Digital Network), PSDN(Packet Switched Data Network), internet, Frame Relay and ATM together. This study considers not only ISDN and Internet but also user behavior of On-line service which is analyzed by Markov process. A call blocking probability of TNAS and INAS is computed by Erlang's formula. Then, PNAS and WNAS's call blocking probability are computed by Stochastic knapsack modeling. The result is compared with result of simulation. Finally, we allocate an optimal capacity minimizing total call blocking probability.

  • PDF

Frequency Resource Obtaining Method Based on D2D Device Discovery in Public Safety Communication Networks (재난 무선통신을 위한 D2D 단말탐색 기반 주파수 자원 확보 기술)

  • Wu, Shanai;Shin, Oh-Soon;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1440-1442
    • /
    • 2016
  • As long term evolution (LTE) is the most widely deployed broadband communication technology so far, efforts are being made to develop LTE-based mission critical public safety (PS) communication systems. In this paper, we propose a device-to-device (D2D) discovery-based radio resource acquisition scheme to support the LTE D2D communication to PS systems and the realization of resource forwarding for user equipments in emergency area.

A Development of Web-based Safety Evaluation System of Motor-Operated-Valve in Nuclear Power Plant (웹기반 원전 동력구동밸브 안정성 평가 시스템 개발)

  • Bae, J.H.;Lee, K.N.;Kim, W.M.;Park, S.K.;Lee, D.H.;Kim, J.C.;Hong, J.S.
    • Proceedings of the KSME Conference
    • /
    • 2001.06d
    • /
    • pp.903-908
    • /
    • 2001
  • A web-based client/server program, MOVIDIK(Motor-Operated-Valve Integrated Database Information of KEPCO) has been developed to perform a design basis safety evaluation for a motor-operated-valve(MOV) in the nuclear power plant. The MOVIDIK consists of seven analysis modules and one administrative module. The analysis module calculates a differential pressure on the valve disk, thrust/torque acting at a valve stem, maximum allowable stress, thermal-overload-relay selection, voltage degradation, actuator output and margin. In addition, the administrative module manages user information, approval system and code information. MOVIDIK controls a huge amount of evaluation data and piles up the safety information of safety-related MOV. The MOVIDIK will improve the efficiency of safety evaluation work and standardize the analysis process for the MOV.

  • PDF

An OpenFlow User-Switch Remapping Approach for DDoS Defense

  • Wei, Qiang;Wu, Zehui;Ren, Kalei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4529-4548
    • /
    • 2016
  • DDoS attacks have had a devastating effect on the Internet, which can cause millions of dollars of damage within hours or even minutes. In this paper we propose a practical dynamic defense approach that overcomes the shortage of static defense mechanisms. Our approach employs a group of SDN-based proxy switches to relay data flow between users and servers. By substituting backup proxy switches for attacked ones and reassigning suspect users onto the new proxy switches, innocent users are isolated and saved from malicious attackers through a sequence of remapping process. In order to improve the speed of attacker segregation, we have designed and implemented an efficient greedy algorithm which has been demonstrated to have little influence on legitimate traffic. Simulations, which were then performed with the open source controller Ryu, show that our approach is effective in alleviating DDoS attacks and quarantining the attackers by numerable remapping process. The simulations also demonstrate that our dynamic defense imposes little effect on legitimate users, and the overhead introduced by remapping procedure is acceptable.

A Study on Programmable Logic-based Smart Peak Power Control System (프로그램 로직 기반의 스마트 최대 전력 관리 시스템에 관한 연구)

  • Lee, Woo-Cheol;Kwon, Sung-Hyun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.2
    • /
    • pp.92-99
    • /
    • 2014
  • The paper is related to smart maximum power system based on program logic. Especially, this system compares the total demand power with the target power by using the signal from the digital kilo watt meter. Based on the power information by the maximum power control equipment the consumed future power is anticipated. In addition, through consumed future power the controllable target power is set, and it applies on the maximum power control equipment. User or manager would control the load efficiently through the simple programming which could control load based on the control sequence and relay. To begin with the conventional maximum power control algorithm is surveyed, and the smart maximum power control system based on program logic is used, and the new algorithm from full load to proportion shut down is proposed by using PLC program. the validity of the proposed control scheme is investigated by both simulation results.

Resource Allocation for Multiuser Two-Way OFDMA Relay Networks with Fairness Constraints (다중사용자 OFDMA 시스템에서 양방향 중계를 위한 자원 할당 기법)

  • Shin, Han-Mok;Lee, Pan-Hyung;Lee, Jae-Hong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.11a
    • /
    • pp.11-14
    • /
    • 2009
  • 기존의 반이중방식 단방향 중계 네트워크는 하나의 정보를 두 개의 시간 슬롯 동안에 보내므로 주파수 효율에서 감소가 생기게 된다. 이러한 주파수 효율의 감소를 막기 위해 제안된 양방향 중계 네트워크는 중계기에 중첩 부호화 또는 네트워크 부호화를 적용함으로써 단방향 중계 네트워크에 비해 향상된 주파수 효율을 제공한다. 한편, OFDMA 네트워크는 사용자에게 부반송파, 전력 등의 자원을 적응적으로 할당하여 네트워크의 성능 향상을 얻을 수 있다. 본 논문에서는 다중사용자 다중중계기 양방향 OFDMA 중계 네트워크를 위한 새로운 적응적 부반송파 할당 알고리듬을 제안한다. 먼저 모든 사용자 쌍에 대한 달성 합 전송속도(achievable sum-rate over all user pairs)를 최대화하기 위한 최적화 문제를 정형화한다. 시스템의 수명을 늘이고 각 사용자의 최소 전송속도를 보장하기 위해 공정성 제한을 고려한다. 그리고 이로부터 새로운 적응적 부반송파 할당 알고리듬을 제안한다. 모의실험을 통해 제안된 알고리듬이 정적 알고리듬과 그리디 알고리듬, 두 알고리듬 모두 보다 훨씬 낮은 불능확률을 얻음을 확인한다.

  • PDF

THE DEVELOPMENT OF THE SILK ROAD: THE POSTAL RELAY ROUTE OF MONGOL AND GORYEO

  • KIM, TSCHUNG-SUN
    • Acta Via Serica
    • /
    • v.1 no.1
    • /
    • pp.105-117
    • /
    • 2016
  • The Silk Road named by Ferdinand von Richthofen was not designated as a specific route. A lot of East-West trade routes had already existed across the continent and the geographical scope and definition of the Silk Road is still expanding. In particular, the claim that the Eastern end of the Silk Road reaches Gyeongju is an example of this expansion. Burial treasures from tombs on the Korean Peninsula have already been identified as products from the Sassanian Dynasty of Persia, and various archaeological and epical evidences support this finding. However, the specific route where these exchanges were made, around the 6th-8th centuries, has yet to be identified. Maritime as well as inland routes can easily be hypothesized. The Silk Road was largely activated by the Yam postal system with the expansion of the Mongol Empire. It not only served as an effective pathway for the Yuan to rule over the Goryeo, but also connected the Eastern end of the Silk Road to Gyeongju. This can explain the situation since the 13th century. Therefore, this paper claims that the Yeokcham system had been operating on the Korean Peninsula since the Unified Silla Kingdom, the previous period of Goryeo, or perhaps even before then. The Yeokcham should thus be regarded as a prototype of the Mongolian Yam, and the Korean peninsula should be recognized as another route which contributed specifically to the development of the Silk Road, not just as a user or a beneficiary.

Joint Buying P2P System for User Convenient Social Network (사용자 편의적 소셜 네트워크 공동구매 P2P 시스템)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.915-920
    • /
    • 2011
  • P2P technology is the concept to share resources efficiently in distributed environments that a lot of research is underway. a lot. In these P2P systems, the server to support the contents-information have less overloads than the composed system as the server to have resources generally. In this paper, we suggest a P2P system to support conveniences to choice time for users that were connected with the information of joint-buying based on social network. Social networks based on co-purchasing information and price alerts using the P2P system is provided by the peer, this relay information is provided by the P2P server.

A Scalable VoD Service Scheme Based on Overlay Multicast Approach (오버레이 멀티캐스트를 적용한 확장성 있는 VoD 서비스 모델)

  • Kim Kyung-Hoon;Son Seung-Chul;Nam Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.784-791
    • /
    • 2005
  • To provide VoD Service on the Internet VoD server is required to have a large amount of system resource and network bandwidth. Therefore, overlay Multicast schemes are considered as suitable alternatives but they also have some drawbacks to support on-demand media services. In this paper, we propose an overlay multicast based on-demand media service scheme which could exploit server's system resource and its network bandwidth efficiently. Proposed scheme uses shared buffer of clients involving the relay of traffic and Patching while it gives no restrictions to this scheme compared with unicast. Our simulation results show that proposed scheme can support more user than unicast and improve the network performance at the same time.

A New Physical Layer Transmission Scheme for LPI and High Throughput in the Cooperative SC-FDMA System

  • Li, Yingshan;Wu, Chao;Sun, Dongyan;Xia, Junli;Ryu, Heung-Gyoon
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.457-463
    • /
    • 2013
  • In recent days, cooperative diversity and communication security become important research issues for wireless communications. In this paper, to achieve low probability of interception (LPI) and high throughput in the cooperative single-carrier frequency division multiple access (SC-FDMA) system, a new physical layer transmission scheme is proposed, where a new encryption algorithm is applied and adaptive modulation is further considered based on channel state information (CSI). By doing so, neither relay node nor eavesdropper can intercept the information signals transmitted from user terminal (UT). Simulation results show above new physical layer transmission scheme brings in high transmission safety and secrecy rate. Furthermore, by applying adaptive modulation and coding (AMC) technique according to CSI, transmission throughput can be increased significantly. Additionally, low peak-to-average power ratio (PAPR) characteristic can still be remained due to the uniform distribution of random coefficients used for encryption algorithm.