• Title/Summary/Keyword: 추상화 계층

Search Result 80, Processing Time 0.025 seconds

Design of Machine Learning based Smart Service Abstraction Layer for Future Network Provisioning (미래 네트워크 제공을 위한 기계 학습 기반 스마트 서비스 추상화 계층 설계)

  • Vu, Duc Tiep;N., Gde Dharma;Kim, Kyungbaek;Choi, Deokjai
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.114-116
    • /
    • 2016
  • Recently, SDN and NFV technology have been developed actively and provide enormous flexibility of network provisioning. The future network services would generally involve many different types of services such as hologram games, social network live streaming videos and cloud-computing services, which have dynamic service requirements. To provision networks for future services dynamically and efficiently, SDN/NFV orchestrators must clearly understand the service requirements. Currently, network provisioning relies heavily on QoS parameters such as bandwidth, delay, jitter and throughput, and those parameters are necessary to describe the network requirements of a service. However it is often difficult for users to understand and use them proficiently. Therefore, in order to maintain interoperability and homogeneity, it is required to have a service abstraction layer between users and orchestrators. The service abstraction layer analyzes ambiguous user's requirements for the desired services, and this layer generates corresponding refined services requirements. In this paper, we present our initial effort to design a Smart Service Abstraction Layer (SmSAL) for future network architecture, which takes advantage of machine learning method to analyze ambiguous and abstracted user-friendly input parameters and generate corresponding network parameters of the desired service for better network provisioning. As an initial proof-of-concept implementation for providing viability of the proposed idea, we implemented SmSAL with a decision tree model created by learning process with previous service requests in order to generate network parameters related to various audio and video services, and showed that the parameters are generated successfully.

Portable and Extensible ARINC 653 for Drones (드론을 위한 이식성과 확장성을 지원하는 ARINC 653)

  • Kim, Jooho;Jo, Hyun-Chul;Jin, Hyun-Wook;Lee, Sangil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1884-1891
    • /
    • 2016
  • With the various usage of civil drones, such as hobby, filmmaking and surveillance, the need for technology that safely reconstructs software for target application domains has been increasingly rising. In order to support a reliable software integration of avionic systems, the ARINC 653 standard has been proposed and adapted mainly on manned aircrafts. Therefore, applying ARINC 653 on civil drones could be desirable. Though, various researches on implementing ARINC 653 has been conducted, there are still additional requirements to apply ARINC 653 to civil drones that use various platforms and have a wide range of use. In this paper, taking account of these requirements, we implement a portable and extensible ARINC 653 and analyze its performance. We offer the portability with the OS abstraction layer that reduces dependency on a specific operating system, and provide the design that can extend internal functions, such as partition scheduler and process scheduler.

An Attribute-Based Naming Architecture for Wireless Sensor Networks (무선 센서 네트워크를 위한 속성 기반 네이밍 구조)

  • Jung, Eui-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.95-102
    • /
    • 2007
  • Recently, a lot of researchers focus on the sensor middleware that hide the complexity of application developments and provide the abstraction of functions to upper application layer. Although there we several factors to design sensor middleware, the attribute-based naming is considered to be an essential factor among them. However, most existing researches were not designed to reflect the characteristics of sensor networks and have the limitation of attribute-based query extension. This study adopts the concept of Virtual Counterpart to suggest the structure there attribute-based naming is supported by virtual sensor nodes of the middleware on the sink node. Unlike traditional data-centric middleware in which individual sensor nodes process attribute-based query, virtual sensor nodes mapped to physical sensor nodes are running on the middleware of the sink node and process attribute-based query as a proxy of the physical sensor. This approach enables attribute-based naming independent of physical infrastructure and easy extensibility.

  • PDF

Hierarchical Specification and Verification of Requirements using An Object-Oriented Petri Net (객체지향 페트리 넷을 이용한 계층적인 요구사항의 명세 및 검증)

  • Hong, Jang-Eui;Yoon, Il-Cheol;Bae, Doo-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.2
    • /
    • pp.157-167
    • /
    • 2000
  • As the requirements of a software system become large and complex, it causes some problems such that requirements specification using formal methods becomes larger in its size and less understandable. In order to solve such problems, the concepts of modularity and object are adopted to specify the requirements. In addition, top-down and compositional approach to handle such requirements are also adopted. In our paper, we suggest an object-oriented Petri net, called HOONet, to hierarchically specify and verify the complex requirements by incorporating the concepts of modularity, object, abstraction and refinement into a formal method. Our HOONet method supports the incremental specification and verification of partially described or not yet fully analyzed requirements. We also show the applicability of our method by modeling and verifying the requirements of a reactor safety control system.

  • PDF

An Analytical Traffic Model of Control Plane and Application Plane in Software-Defined Networking based on Queuing Theory (대기행렬 이론 기반 SDN 제어 평면 및 응용 평면의 트래픽 성능 분석 모델)

  • Lee, Seungwoon;Roh, Byeong-hee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.4
    • /
    • pp.80-88
    • /
    • 2019
  • Software Defined Networking (SDN) is the future network paradigm of decoupling control and data functions. In SDN structure, it is hard to address scalability in case of large-scale networks because single controller managed thousands of switches in a centralized fashion. Most of previous studies have focused on horizontal scalability, where distributed controllers are assigned to network devices. However, they have abstracted the control plane and the application plane into a single controller. The layer of the common SDN architecture is divided into data plane, control plane, and application plane, but the control plane and application plane have been modeled as a single controller although they are logically separated. In this paper, we propose a analytical traffic model considering the both application plane and control plane based on queuing theory. This model can be used to address scalability issues such as controller placement problem without complicated simulations.

An Access Control Security Architecture for Secure Operating System supporting Flexible Access Control (유연한 접근통제를 제공하는 보안 운영체제를 위한 접근통제 보안구조)

  • Kim Jung-Sun;Kim Min-Soo;No Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.55-70
    • /
    • 2006
  • In this paper, we propose a new access control security architecture for supporting flexibility in Secure Operating Systems. By adding virtual access control system layer to the proposed security architecture, various access control models such as MAC, DAC, and RBAC can be applied to Secure Operating Systems easily. The proposed security architecture is designed to overcome the problem of Linux system's base access control system. A policy manager can compose various security models flexibly and apply them to Operating Systems dynamically. Also, the proposed architecture is composed of 3 modules such as access control enforcement, access control decision, and security control. And access control models are abstracted to hierarchy structure by virtual access control system. And, we present the notation of policy conflict and its resolution method by applying various access control model.

Analysis of the effect of non-face-to-face online SW education program on the computational thinking ability of students from the underprivileged class (비대면 온라인 SW 교육 프로그램이 소외계층 학생의 컴퓨팅 사고력에 미치는 영향 분석)

  • Lee, Jaeho;Lee, Seunghoon
    • Journal of Creative Information Culture
    • /
    • v.7 no.4
    • /
    • pp.207-215
    • /
    • 2021
  • As computational thinking has been noted as an important competency worldwide, SW education was introduced in the 2015 revised curriculum, and SW education has been applied to the curriculum from 2018. However, in a poor educational environment, the educationally underprivileged class is in the blind spot of SW education and is not receiving systematic SW education. Therefore, this study analyzed the effect of conducting a non-face-to-face SW online education program for 267 underprivileged elementary school students in education at a time when non-face-to-face online education was being conducted through the COVID-19 mass infectious disease. As a result of conducting the computational thinking ability test, which abstraction, problem decomposition, algorithm, automation, and data processing, before and after education, the overall score of computational thinking and the score of all five factors were statistically significantly increased(p<0.001). Among the five factors, there was the highest score improvement in data processing score. These results suggest that the non-face-to-face SW online education program is effective in improving the computational thinking ability of elementary school students from the educational underprivileged class.

Blockchain Interoperability Mechanism (블록체인 상호호환성 메커니즘)

  • Zhou, Qing;Lee, Young-seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1676-1686
    • /
    • 2021
  • In this paper, we propose a general cross-chain solution based on the idea of modularity, abstraction, and layering, which decoupling the cross-chain function from the consensus algorithm and specific application logic, and utilize a Merkle proof to ensure the validity and legality of cross-chain operations. Since the underlying implementations of homogeneous and heterogeneous blockchains are different, we treat them separately. For homogeneous blockchains, we suggest a TCP-like cross-chain transport protocol (CCTP). While for heterogeneous blockchains, we present a method to construct the relay chain to realize the cross-chain function. The proposed scheme can enable the correct, effective, reliable, orderly, and timely transmission of cross-chain data. However, the essential difference between the operations within a single blockchain and the interoperability between different blockchains is that the trust domain is different. Cross-chain interoperation itself breaks the completeness of the blockchain, therefore, some efficiency and safety must sacrifice to trade-off.

A Design and Implementation of A Robot Client Middleware for Network-based Intelligent Robot based on Service-Oriented (지능형 네트워크 로봇을 위한 서비스 지향적인 로봇 클라이언트 미들웨어 설계와 구현)

  • Kwak, Dong-Gyu;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Network-based intelligent robot is connected with network system, provides interactions with humans, and carries out its own roles on ubiquitous computing environments. URC (Ubiquitous Robot Companion) robot has been proposed to develop network-based robot by applying distributed computing techniques. On URC robot, it is possible to save the computing power of robot client by environments, has been proposed to develop robot software using service-oriented architecture on server-client computing environments. The SOMAR client robot consists of two layers - device service layer and robot service layer. The device service controls physical devices, and the robot service abstracts robot's services, which are newly defined and generated by combining many device services. RSEL (Robot Service Executing Language) is defined in this paper to represent relations and connections between device services and robot services. A RESL document, including robot services by combining several device services, is translated to a programming language for robot client system using RSEL translator, then the translated source program is compiled and uploaded to robot client system with RPC (Remote Procedure Call) command. A SOMAR client system is easy to be applied to embedded systems of host/target architecture. Moreover it is possible to produce a light-weight URC client robot by reducing workload of RSEL processing engine.

Semantic Access Path Generation in Web Information Management (웹 정보의 관리에 있어서 의미적 접근경로의 형성에 관한 연구)

  • Lee, Wookey
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.51-56
    • /
    • 2003
  • The structuring of Web information supports a strong user side viewpoint that a user wants his/her own needs on snooping a specific Web site. Not only the depth first algorithm or the breadth-first algorithm, but also the Web information is abstracted to a hierarchical structure. A prototype system is suggested in order to visualize and to represent a semantic significance. As a motivating example, the Web test site is suggested and analyzed with respect to several keywords. As a future research, the Web site model should be extended to the whole WWW and an accurate assessment function needs to be devised by which several suggested models should be evaluated.

  • PDF