• Title/Summary/Keyword: 네트워크 모니터링

Search Result 1,392, Processing Time 0.025 seconds

On Flexibility Analysis of Real-Time Control System Using Processor Utilization Function (프로세서 활용도 함수를 이용한 실시간 제어시스템 유연성 분석)

  • Chae Jung-Wha;Yoo Cheol-Jung
    • The KIPS Transactions:PartA
    • /
    • v.12A no.1 s.91
    • /
    • pp.53-58
    • /
    • 2005
  • The use of computers for control and monitoring of industrial process has expanded greatly in recent years. The computer used in such applications is shared between a certain number of time-critical control and monitor function and non time-critical batch processing job stream. Embedded systems encompass a variety of hardware and software components which perform specific function in host computer. Many embedded system must respond to external events under certain timing constraints. Failure to respond to certain events on time may either seriously degrade system performance or even result in a catastrophe. In the design of real-time embedded system, decisions made at the architectural design phase greatly affect the final implementation and performance of the system. Flexibility indicates how well a particular system architecture can tolerate with respect to satisfying real-time requirements. The degree of flexibility of real-time system architecture indicates the capability of the system to tolerate perturbations in timing related specifications. Given degree of flexibility, one may compare and rank different implementations. A system with a higher degree of flexibility is more desirable. Flexibility is also an important factor in the trade-off studies between cost and performance. In this paper, it is identified the need for flexibility function and shows that the existing real-time analysis result can be effective. This paper motivated the need for a flexibility for the efficient analysis of potential design candidates in the architectural design exploration or real time embedded system.

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.

Serviceability Evaluation of ZigBee Technology for Construction Applications (설문조사를 통한 ZigBee 무선통신기술의 건설산업 사용성평가에 관한 연구)

  • Shin, Young Shik;Cao, Shang;Jang, Won-Suk
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.3D
    • /
    • pp.247-258
    • /
    • 2012
  • This research evaluates the serviceability of ZigBee device that provides a potential technology to realizing the ubiquitous computing by improving the productivity and effectiveness in construction and data acquisition. Literature review was conducted in various application areas such as bridge monitoring, slope management, road management, highway traffic control. In addition characteristics and challenges in various wireless technologies are described to identify their adoptability to construction environment. Among them, ZigBee technology was selected to introduce the functionality on hardware, network, and security. Then, questionnaire survey was implemented by four different group, construction engineers, students, hardware developers, and researchers to explore the success and failure factors of ZigBee technology in construction area. The results proposes a guideline of the applicability of ZigBee technology in the area of serviceability, application area, considerations, and future direction. This paper would provide valuable information for future researches and technology development in designing the wireless sensor network applications.

A Case Study on Commercialization of Appropriate Technology in Lao PDR: Focusing on Lao-Korea Science and Technology Center (라오스 적정기술 사업화 사례연구: 라오스-한국 적정과학기술거점센터를 중심으로)

  • Baek, Doo-Joo;Yun, Chi-Young;Oh, Yong-Jun
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.225-234
    • /
    • 2021
  • The purpose of this paper is to examine commercialization model of appropriate technology through the case of the Lao-Korea Science and Technology Center (LKSTC). LKSTC has developed washing, water treatment, and sterilization technology in the agrifood sector and three types of pico-hydro generator, Pico-solar hybrid system, and energy remote monitoring technology in the renewable energy sector. Commercialization of appropriate technology was successfully carried out through the establishment of Kaipan community business, school enterprises, and social enterprise. The policy implications are as follows. First, the commercialization of appropriate technology in developing countries should enhance the linkage with the regional development policies of the recipient countries. Second, in order to minimize market risk, innovative technology development and local startup networks should be properly established. Finally, the mid and long term efforts are needed to increase the sustainability of the business.

Development of Gas Sensor Modules and Sensor Calibration Systems (가스 센서모듈 및 센서보정시스템 개발)

  • Park, Cheol-Young;Lim, Byung-Hun;Ryu, Jeong-Tak
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.83-90
    • /
    • 2010
  • Sensor is a key element in various fields of applications such as sensor networks. However, they could not be easily developed because of several factors such as temperature dependence of output characteristics and/or nonlinearity. Calibration of sensor is also needed to solve these problems. Conventional calibration process required a lot of time and expenses. Therefore, it is important to develop sensor systems which can shorten development time and minimize expense. In this paper, we develop CO and $CO_2$ Sensor modules and propose a multiple sensor calibration system to resolve problems of conventional calibration process. A proposed system is composed of sensor module, system board and monitor program. Regression analysis method based on the least mean squares is used for calibration. We introduced the structure of calibration systems and experimental results. Calibration results can be used to confirm the effectiveness of the proposed system.

Smart Browser based on Semantic Web using RFID Technology (RFID 기술을 이용한 시맨틱 웹 기반 스마트 브라우저)

  • Song, Chang-Woo;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.37-44
    • /
    • 2008
  • Data entered into RFID tags are used for saving costs and enhancing competitiveness in the development of applications in various industrial areas. RFID readers perform the identification and search of hundreds of objects, which are tags. RFID technology that identifies objects on request of dynamic linking and tracking is composed of application components supporting information infrastructure. Despite their many advantages, existing applications, which do not consider elements related to real.time data communication among remote RFID devices, cannot support connections among heterogeneous devices effectively. As different network devices are installed in applications separately and go through different query analysis processes, there happen the delays of monitoring or errors in data conversion. The present study implements a RFID database handling system in semantic Web environment for integrated management of information extracted from RFID tags regardless of application. Users’ RFID tags are identified by a RFID reader mounted on an application, and the data are sent to the RFID database processing system, and then the process converts the information into a semantic Web language. Data transmitted on the standardized semantic Web base are translated by a smart browser and displayed on the screen. The use of a semantic Web language enables reasoning on meaningful relations and this, in turn, makes it easy to expand the functions by adding modules.

A USN Based Mobile Object Tracking System for the Prevention of Missing Child (미아방지를 위한 USN 기반 보호대상 이동체 위치확인 시스템)

  • Cha, Maeng-Q;Jung, Dae-Kyo;Kim, Yoon-Kee;Chong, Hak-Jin
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.453-463
    • /
    • 2008
  • The missing child problem is no more a personal problem. It became a social problem that all parents must consider. To this, this study applies USN/RFID technology integrated with GIS for the prevention of missing child. Although RFID is not designed for location sensing, but now it is regarded as a device to facilitate real time location awareness. Such advantages of RFID can be integrated with 4S(GIS/GPS/LBS/GNSS) achieving much synergy effects. In order to prevent kidnapping and missing child, it is necessary to provide a missing child preventing system using a ubiquitous computing system. Therefore, the missing child preventing system has been developed using high-tech such as RFID, GPS network, CCTV, and mobile communication. The effectiveness of the missing child prevention system can be improved through an accurate location tracking technology. This study propose and test a location sensing system using the active RFID tags. This study verifies technical applied service, and presents a system configuration model. Finally, this paper confirms missing child prevention system utilization possibility.

A Study on the Service Status of the Spatial Open Platform based on the Analysis of Web Server User Log: 2014.5.20.~2014.6.2. Log Data (웹 사용자 로그 분석 기반 공간정보 오픈플랫폼 서비스 사용현황 연구: 2014.5.20.~2014.6.2. 수집자료 대상)

  • Lee, Seung Han;Cho, Tae Hyun;Kim, Min Soo
    • Spatial Information Research
    • /
    • v.22 no.4
    • /
    • pp.67-76
    • /
    • 2014
  • Recently, through the development of IT and mobile technology, spatial information plays a role of infrastructure of the people life and the national economy. Many kinds of applications including SNS and social commerce is to leverage the spatial information for their services. In the case of domestic, spatial open platform that can provide national spatial data infrastructure services in a stable manner has been released. And many people have been interested to the open platform services. However, the open platform currently has many difficulties to analyze its service status and load in real time, because it does not hold a real-time monitoring system. Therefore, we propose a method that can analyze the real-time service status of the open platform using the analysis of the web server log information. In particular, we propose the results of the analysis as follows: amount of data transferred, network bandwidth, number of visitors, hit count, contents usage, and connection path. We think the results presented in this study is insufficient to understand the perfect service status of the open platform. However, it is expected to be utilized as the basic data for understanding of the service status and for system expansion of the open platform, every year.

Transition of Service Paradigm from Service Recovery to Proactive Service (사후 서비스에서 선제적 서비스로 서비스 패러다임의 전환)

  • Rhee, Hyunjung;Kim, Hyangmi;Rhee, Chang Seop
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.396-405
    • /
    • 2020
  • In this study, we used the big data of Voice of Customer (VOC) related to high-speed Internet products to look at the causes of perceived quality and the possibility of proactive service. In order to verify the possibility of proactive service, we collected VOC data from 13 facilities and equipment of a mobile communication service company, and then conducted 𝒙2 test to verify that there was a statistically significant difference between the actual VOC observation values and expected values. We found statistical evidence that proactive service is possible through real-time monitoring for the six disability alarms among the 13 facilities and equipment, which are FTTH-R Equipment ON/OFF, FTTH-EV Line Error Detection, Port Faulty, FTTH-R Line Error Detection, Network Loop Detection, and Abnormal Limiting Traffic. Companies are able to adopt the proactive service to improve their market share and to reduce customer service costs. The results of this study are expected to contribute to the actual application of industry in that it has diagnosed the possibility of proactive service in the telecommunication service sector and further suggested suggestions on how to provide effective proactive service.

A Study on Complexity Analysis of Extensible Profile Verification Software for Energy Storage System (에너지저장장치용 확장성 프로파일 검증 소프트웨어 복잡도 분석에 관한 연구)

  • Kwon, Hyeokyoung;Ryu, Youngsu;Park, Jaehong;Kwon, Kiwon
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.59-65
    • /
    • 2016
  • Recently, a study has been progressed about the energy storage system for resolving energy shortage problems in the world. The energy storage system can maximize energy storage system's energy usage by monitoring and controlling about all energy infrastructures on energy network. However, compatibility problems among main components or devices of the energy storage system are obstacles to development of energy storage system products. An extensible profile and extensible profile verification software being able to verify the extensible profile have been required in order to resolve compatibility problems. In this paper, the study on complexity analysis for the extensible profile verification software for the energy storage system is performed. A XML based profile and C language structure based profile are used for analysis of the profile verification software. The complexity of complex verification structure that parses the XML based profile several times and simple verification structure that parses the C language structure based profile are analyzed and compared. Time complexity, space complexity, and cyclomatic complexity are used for complexity analysis. By using these complexity analysis, the study result that compares and analyzes the complexity of XML based and C language structure based profile verification software is presented.