• Title/Summary/Keyword: virtual network

Search Result 1,548, Processing Time 0.027 seconds

Distributed Control of DC Servo Motor on LonWorks-IP Virtual Device Network for Predictive and Preventive Maintenance (LonWorks-IP 가상 디바이스 네트워크상에서 예지 및 예방보전을 위한 DC 서보모터의 분산제어)

  • Song, Ki-Won
    • Journal of the Korean Society of Safety
    • /
    • v.21 no.4 s.76
    • /
    • pp.25-32
    • /
    • 2006
  • LonWorks over IP(LonWorks-IP) virtual device network(VDN) is an integrated form of LonWorks device network and IP data network. In especially real-time distributed servo applications on the factory floor, timely response is essential for predictive and preventive maintenance. The time delay in servo control on LonWorks-IP based VDN has highly stochastic nature. LonWorks-IP based VDN induced transmission delay deteriorates the performance and stability of the real-time distributed control system and can't give an effective preventive and predictive maintenance. In order to guarantee the stability and performance of the system, and give an effective preventive and predictive maintenance, LonWorks-IP based VDN induced time-varying uncertain time delay needs to be predicted and compensated. In this paper new Pill control scheme based on Smith predictor, disturbance observer and band pass filter is proposed and tested through computer simulation about position control of DC servo motor. It is shown that how can the proposed control scheme be designed to minimize the effects of uncertain varying time delay and model uncertainties. The validity of the proposed control scheme is compared and demonstrated with the comparison of internal model controllers(IMC) based on Smith predictor with and without disturbance observer.

Graph Neural Network and Reinforcement Learning based Optimal VNE Method in 5G and B5G Networks (5G 및 B5G 네트워크에서 그래프 신경망 및 강화학습 기반 최적의 VNE 기법)

  • Seok-Woo Park;Kang-Hyun Moon;Kyung-Taek Chung;In-Ho Ra
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.113-124
    • /
    • 2023
  • With the advent of 5G and B5G (Beyond 5G) networks, network virtualization technology that can overcome the limitations of existing networks is attracting attention. The purpose of network virtualization is to provide solutions for efficient network resource utilization and various services. Existing heuristic-based VNE (Virtual Network Embedding) techniques have been studied, but the flexibility is limited. Therefore, in this paper, we propose a GNN-based network slicing classification scheme to meet various service requirements and a RL-based VNE scheme for optimal resource allocation. The proposed method performs optimal VNE using an Actor-Critic network. Finally, to evaluate the performance of the proposed technique, we compare it with Node Rank, MCST-VNE, and GCN-VNE techniques. Through performance analysis, it was shown that the GNN and RL-based VNE techniques are better than the existing techniques in terms of acceptance rate and resource efficiency.

Design and Implementation of a Device Virtualization Framework to control Virtual Desktop (가상데스크탑 제어를 위한 디바이스 가상화 프레임워크의 설계 및 구현)

  • Kang, Sang-Woo;Park, Se-Jin;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.702-706
    • /
    • 2010
  • In this paper, we propose a framework to change local devices to networked devices by using web browser. Network devices will be used in the virtual desktop. Management software maintains a pool of devices to manage network devices. Whenever user's request is occured, virtual desktop s/w which manages desktop's I/O access device pool. Then virtual desktop s/w selects proper device and forwards I/O to desktop. In this paper, we choose RIA solution for install-free environment. Consequently, user easily enrolls and revokes their devices. User easily commands virtual desktop s/w. In the second half of this paper, we explain usage scenario and evaluate our framework to show efficiency and flexibility of the framework.

Effectiveness of using Cognitive Virtual Tours based on Marzano Model to Develop the Achievement and Historical Research Skills for Secondary School Students

  • Abdalla, Atef Mohamed Saied
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.292-298
    • /
    • 2022
  • The study aimed to measure the effectiveness of using Cognitive virtual tours based on Marzano model to develop the achievement and some of historical research Skills for secondary school students. To achieve the objectives of the study, the experimental method was used and two study groups consisted of (60) students were divided into two groups, one is Control (30) students and the other is in experimental (30) students at Alsalam secondary in Ismailia Governorate. The study used several tools: The experimental processing tool of Cognitive Virtual tours based on Marzano model, Cognitive achievement test for the first unit of Secondary first grade history Course. Historical research skills. The finding of the study showed the effectiveness of using cognitive virtual tours based on Marzano model in developing the achievement and some of historical research skills for first grade secondary students which there are Statistically differences at level (0.01) between the average scores of the students in (experimental and Control) groups in post application for Cognitive achievement test. Practical application of the study can contribute to clarify how to use Cognitive virtual tours based on Marzano model in teaching history, and Draw the attention of history developers to the development of historical research skills.

Digital Twin and Visual Object Tracking using Deep Reinforcement Learning (심층 강화학습을 이용한 디지털트윈 및 시각적 객체 추적)

  • Park, Jin Hyeok;Farkhodov, Khurshedjon;Choi, Piljoo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.145-156
    • /
    • 2022
  • Nowadays, the complexity of object tracking models among hardware applications has become a more in-demand duty to complete in various indeterminable environment tracking situations with multifunctional algorithm skills. In this paper, we propose a virtual city environment using AirSim (Aerial Informatics and Robotics Simulation - AirSim, CityEnvironment) and use the DQN (Deep Q-Learning) model of deep reinforcement learning model in the virtual environment. The proposed object tracking DQN network observes the environment using a deep reinforcement learning model that receives continuous images taken by a virtual environment simulation system as input to control the operation of a virtual drone. The deep reinforcement learning model is pre-trained using various existing continuous image sets. Since the existing various continuous image sets are image data of real environments and objects, it is implemented in 3D to track virtual environments and moving objects in them.

An Enterprise Network Configuration Method using BGP/MPLS VPN and Virtual Router VPN (BGP/MPLS VPN 과 가상 라우터 VPN 을 이용한 기업 네트워크 구성 방안)

  • Jun, Jung-Hoon;Woo, Miae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1589-1592
    • /
    • 2005
  • VPN(Virtual Private Network)은 물리적인 장비나 회선을 논리적으로 구분하여 기존 전용회선을 기반으로 하는 사설 네트워크에 비해 상대적으로 적은 구축 비용, 융통성 있는 확장성, 저렴한 운용비용의 장점을 보유한 별도의 사설 네트워크를 구성하는 기술이다. 다양한 VPN 기술 중에서도 MPLS VPN 은 확장성, QoS 제공을 용이하게 해주는 장점을 가지고 있어 차세대 네트워크 기술로 부각되고 있다. 일반적으로 MPLS VPN 은 ISP 에서 제공하는 서비스로 인식되나 규모가 크고 다양한 사설 네트워크를 필요로 하는 기업의 네트워크 모델로도 적합하다. 또한 Virtual Router VPN 은 Customer Edge(CE) 장비로서 활용성이 큰 Switch 장비에 적용하여, CE 를 MPLS VPN 과 쉽게 연동하게 한다. 본 논문에서는 MPLS VPN 및 Virtual Router VPN 을 이용하여 기업 네트워크를 효과적으로 구성하는 방안을 기술한다.

  • PDF

Implementation of Metaverse User-Avatar Interaction using Real-time Motion Data (실시간 모션 데이터를 활용한 메타버스 사용자-아바타 상호작용 구현)

  • Gang In Lee;Eun Hye Noh;Young Jae Jo;Yong-Hwan Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.4
    • /
    • pp.172-178
    • /
    • 2023
  • With the expansion of metaverse content and hardware platforms, various interactions in the virtual world have been built, raising expectations for an increase in immersion which is a major element of the metaverse. However, among hardware platforms that increase virtual immersion elements, the typical HMD platform can be a barrier to new user inflows due to its high cost. Thus, this paper focused on improving virtual-to-real interactions by extracting motion data using relatively inexpensive webcam equipment in PC environments, utilizing Unity game engines, Photon unity network, multi-platform implementations, and Barracuda neural network inference libraries.

  • PDF

Formal Analysis of Distributed Shared Memory Algorithms

  • Muhammad Atif;Muhammad Adnan Hashmi;Mudassar Naseer;Ahmad Salman Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.192-196
    • /
    • 2024
  • The memory coherence problem occurs while mapping shared virtual memory in a loosely coupled multiprocessors setup. Memory is considered coherent if a read operation provides same data written in the last write operation. The problem is addressed in the literature using different algorithms. The big question is on the correctness of such a distributed algorithm. Formal verification is the principal term for a group of techniques that routinely use an analysis that is established on mathematical transformations to conclude the rightness of hardware or software behavior in divergence to dynamic verification techniques. This paper uses UPPAAL model checker to model the dynamic distributed algorithm for shared virtual memory given by K.Li and P.Hudak. We analyse the mechanism to keep the coherence of memory in every read and write operation by using a dynamic distributed algorithm. Our results show that the dynamic distributed algorithm for shared virtual memory partially fulfils its functional requirements.

LISP based IP Address Virtualization Technique for Resource Utilization on Virtualized SDN (가상화된 SDN에서 효과적인 자원 활용을 위한 LISP 기반 IP 주소 가상화 기법)

  • Go, Youngkeun;Yang, Gyeongsik;Yu, Bong-yeol;Yoo, Chuck
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1404-1411
    • /
    • 2016
  • Network virtualization is a technique that abstracts the physical network to provide multiple virtual networks to users. Virtualized network has the advantage to offer flexible services and improve resource utilization. In SDN architecture, network hypervisor serves to virtualize the network through address virtualization, topology virtualization and policy virtualization. Among them, address virtualization refers to the technique that provides an independent address space for each virtual network. Previous work divided the physical address space, and assigned an individual division to each virtual network. Each virtual address is then mapped one-to-one to a physical address. However, this approach requires a lot of flow entries, thus making it disadvantageous. Since SDN switches use TCAM (Ternary Contents Addressable Memory) for the flow table, it is very important to reduce the number of flow entries in the aspect of cost and scalability. In this paper, we propose a LISP based address virtualization, which separates address spaces for the physical and virtual addresses and transmits packet through tunneling, in order to resolve the limitation of the previous studies. By implementing a prototype, we show that the proposed scheme provides better scalability.

A Study on Applying Genetic Algorithm for Optimum Virtual Path Network Design in ATM Network (ATM 망에서 최적 가상 경로망 설계를 위한 유전자 알고리즘 응용에 관한 연구)

  • 강주락;권기호
    • Proceedings of the IEEK Conference
    • /
    • 2000.06c
    • /
    • pp.31-34
    • /
    • 2000
  • Genetic Algorithm is well known as the efficient algorithm which can solve a difficult optimization problem. Recently, there has been increasing interest in applying genetic algorithm to problem related to network design. In this paper, we propose a two-step genetic algorithm for designing a optimum virtual path network(VPN) for a given physical network and traffic demand. The first step is a routing step in which a route is found between every node pair in the network. In the second step, paths are assigned as VPs so as to minimize the total number of VPs configured, the number of VPs carried by a link, and the VP hopcount. We study the performance of the propose algorithm through simulation. The result shows that the VPN generated by the proposed algorithm is good in minimizing the number of VPs configured, the load on a link, and the VP hopcount.

  • PDF