• Title/Summary/Keyword: 통신 신뢰도

Search Result 3,388, Processing Time 0.035 seconds

Scrubbing Scheme for Advanced Computer Memories for Multibit Soft Errors (다중 비트 소프트 에러 대응 메모리 소자를 위한 스크러빙 방안)

  • Ryu, Sang-Moon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.701-704
    • /
    • 2011
  • The reliability of a computer system largely depends on that of its memory systems, which are vulnerable to soft errors. Soft errors can be coped with a combination of an Error Detection & Correction circuit and scrubbing operation. Smaller geometries and lower voltage of advanced memories makes them more prone to suffer multibit soft errors. A memory structure against multibit soft errors and a suitable scrubbing scheme for it were proposed. This paper introduces a key issue for the scrubbing of the memories with protection against multibit soft errors and the result of the performance analysis from a reliability point of view.

  • PDF

Boundary Match and Block Reliability Based Error Concealment Algorithm (블록 신뢰도와 경계면 매칭 기반의 잡음 은닉 알고리즘)

  • Kim, Do Hyun;Choi, Kyoung Ho
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.9-14
    • /
    • 2017
  • A packet loss in wireless environments causes a severe degradation of video quality in video communications. In this paper, a novel video error concealment algorithm is presented by combining boundary errors and a block reliability measure. The block reliability measure decides the reliability of a block by checking residual errors of a block. In the proposed approach, a motion vector of a missing unreliable block in an inter coded frame is obtained initially based on the motion vector of the same block in the reference frame. Furthermore, if the block in the reference frame is unreliable according to the reliability measure, a new motion vector is decided based on block boundary errors around the initial motion vector. According to our simulations, the proposed approach shows promising results for error concealment in error-prone wireless environments.

Operation Reliability Improvement of Digital Control System for Nuclear Power Plants (디지털 제어설비 운전 신뢰도 증진방안)

  • Lee, Kwang-Dae;Lim, Hee Taek;Kim, Min Seok
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.1308-1309
    • /
    • 2015
  • 자력발전소 계측제어시스템은 과거의 아날로그 설비에서 디지털설비로 개선되고 있으며, 신규로 건설되는 발전소에서는 모든 시스템이 디지털화 되었다. 디지털설비는 하드웨어와 소프트웨어, 통신기능이 통합된 매우 복잡한 설비이며, 기존 하드웨어를 중심으로한 신뢰도 분석방법으로는 신뢰도를 확인하는데 한계가 있다. 따라서 본 논문에서는 기존의 신뢰도 분석방법의 한계를 극복하기 위하여 신뢰도 검증설비를 구성하여 다양한 시나리오에 의한 장기 종합시험을 수행하는 방식으로 신뢰도를 보증할 수 있는 방법과 구성들을 제시한다.

  • PDF

Test Method of Communication Reliability based on HPGP between PEV and EVSE (전기차와 충전기 간 HPGP 기반 통신 신뢰성 테스트 방안)

  • Choi, Byeong-Gon;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.111-119
    • /
    • 2015
  • Smart Grid is a next-generation intelligent grid to optimize energy efficiency by integrating information and communication technologies to the existing power grid as a two-way exchange of information. HPGP communication standard for smart grid implementation has been developed for the emerging smart energy, home automation, electric vehicle communications applications. HPGP communication standard has the advantage of reducing cost and power consumption. Also, it can be interoperated with the previous HPAV communication standard. For the introduction of a new communication standard, the analysis of the reliability and interoperability verification is required. In this paper, we present sniffer test method as reliability test method about power line communication between PEV(Plug-in Electric Vehicle) and EVSE(Electric Vehicle Supply Equipment). Power line communication between PEV and EVSE is one of the most important Smart Gird applications. Also, we analyzed sniffer test results about power line communication based on HPGP between PEV and EVSE by using QCA7000 device, AVitar and Tool kit.

The estimation of the number of spare parts & the changing time about DSRC Road Side Equipment (단거리전용통신방식 노변기지국의 예비부품수 및 교체시기 산정)

  • Han, Dae-Hui;Lee, Cheong-Won
    • 한국ITS학회:학술대회논문집
    • /
    • v.2007 no.10
    • /
    • pp.196-201
    • /
    • 2007
  • 현재 국내 ITS는 현장장비 유지관리에 대한 연구 및 고장관련 DB가 부족하여 예비부품수 및 교체시기 산정에 대한 규정이 없는 실정이다. 이에 본 연구는 실제 고장이력자료를 갖고 신뢰성 분석을 실시하여 단거리전용통신(DSRC)방식 노변기지국(RSE)의 예비부품수 및 교체시기를 산정하였다. 전체 수집기간동안의 고장자료는 욕조곡선의 형상을 나타내어 우발고장기간의 자료로 신뢰성 분석을 실시하였으나 고장 수명 분포 중 적합되는 분포가 없었다. 따라서, i)장비가동률과 ii)경험적(empirical) 누적분포함수(CDF) 곡선을 이용한 장비의 고장률(건/일)을 감안하여 예비부품수를 산정한 결과 16.22개 이상의 노변기지국(완제품)을 확보하여야 하는 것으로 분석되었다. 하자보수기간(2년)이 지난후 일정기간($2{\sim}3$년)이 지난 시점에서 향후 10년간에 대하여 수리하면서 사용하는 경우와 신품구입시의 총비용을 비교하여 산정한 교체시기는 10.67건/40개월 이상이다. 본 연구 수행결과 첫째, 비모수적 방법으로 적합도 검정을 실시하지 못하였다는 한계와, 둘째, 초기에 고장이 많이 발생하는 장비는 향후에도 고장이 많이 발생한다는 가정에 기반하여 향후 10년의 운영비용을 분석하였으나 이러한 가정을 입증하지는 못하였다. 따라서, 향후엔 본 연구에 사용된 자료가 고장 수명분포도 적합 되지 않은 원인을 분석하는 것과 분석대상 기간 이후의 자료를 추가하여 적합도 검정 및 신뢰성 분석을 실시하는 것이 필요하다.

  • PDF

A study on Management Mechanism of Malicious Node in Ad-hoc Networks (Ad-hoc 네트워크에서 악의적 노드 관리기법에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.605-608
    • /
    • 2010
  • An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network conisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities

  • PDF

Design and Implementation of ECTP for Reliable Group Communications (신뢰적 그룹통신을 위한 ECTP 설계 및 구현)

  • 박주영;정옥조;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.916-919
    • /
    • 2003
  • Reliable multicast data transmission in a 1:N environment needs more sophisticated error control mechanism than that of in 1:1 environment due to ACK implosion and duplicated retransmission. Although there have been many related research on error control in reliable multicast, real implemented protocols are rare. As one of the reliable multicast transport protocols, ECTP is selected as an international standard reliable multicast protocol by ITU-T and ISO and implemented on RedHat 7.2 machine by us. In this paper, we evaluate the performance of the error control mechanism in the respect of throughput and generated control packet numbers with a real implementation code. From the results, it is concluded that the suitable values of error control parameters can be obtained from the local group size and network environments.

  • PDF

A study on Management Mechanism of Malicious Node in Ad-hoc Networks (Ad-hoc 네트워크에서 악의적 노드 관리기법에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2716-2723
    • /
    • 2010
  • An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network consisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities

Hardware and Software Dependability Analysis of Embedded AVTMR(All Voting Triple Modular Redundancy) System (내장형 AVTMR 시스템의 하드웨어 및 소프트웨어 신뢰성 분석)

  • Kim, Hyun-Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7B
    • /
    • pp.744-750
    • /
    • 2009
  • In this paper, the unified Markov modeling of hardware and software for AVTMR(AlI Voting Triple Modular Redundancy) system is proposed and the dependability is analyzed. In hardware case, a failure rate is fixed to no time varying parameter. But, in software case, failure rate is applied with time varying parameter. Especially, the dependability(Reliability, Availability, Maintainability, Safety) of software is analyzed with G-O/NHPP for Markov modeling. The dependability of single and AVTMR system is analyzed and simulated with a unified Markov modeling method, and the characteristic of each system is compared accroding to failure rate. This kind of fault tolerat system can be applied to an airplane and life critical system to meet the requirement for a specific requirement.

An Edge Removal Algorithm for the Reliability Evaluation of Directed Communication Networks (방향성 통신망의 신뢰도 계정에 관한 에지제거 알고리즘)

  • 임윤구;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.1
    • /
    • pp.63-73
    • /
    • 1988
  • In this paper, an algorithm is proposed to evaluate the source-to-terminal reliability, the probability that a source node can communicate with a terminal node, in a probabilistic derected graph. By using Satyanaratana's factoring $theorem^{(7)}$, the original graph can be partitioned into two reduced graphs obtained by contracting and deleting the edge connected to the source node in the probabilistic directed graph. The edge removal proposed in this paper and the general series-parallel reduction can then be applied to the reduced graph. This edge reduction can be applied recursively to the reduced graphs until a source node can be connected to a terminal node by one edge. A computer program which can be applied to evaluating the source-to-terminal reliability in a complex and large network has also been developed.

  • PDF