• Title/Summary/Keyword: 트래픽 DB

Search Result 18, Processing Time 0.022 seconds

A Restoration Schemes using Source Routing based on Topology DB on ATM Network (ATM망에서 토폴로지 DB기반 소스라우팅을 이용한 장애복구 방안)

  • 김형철;곽윤식;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.8B
    • /
    • pp.1421-1425
    • /
    • 1999
  • A restoration scheme is presented when a failure occurs at nodes or links on the ATM network. Each node on the network contains the same topology information for resources on the network by Exchanging NSE(Network State Element) which has the network state information through RCC(Routing Control Channel). We also propose a new establishing algorithm that set up a new alternate path reflecting the state of the network changed dynamically at the source node. In the result of applying our scheme, the rates of restoration can be improved and the number of messages decreased so that fast recovering could be possible by reducing traffics on the network by lowering the rates of the call-setup failure at the stage of CAC(Connection Admission Control).

  • PDF

A study on the VMS building and data traffic in fishery communication (어업통신의 VMS 구축 및 데이터통신에 운용에 대한 연구)

  • 윤재준;최조천;김갑기
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.81-85
    • /
    • 2003
  • For the structure of VMS by converting on digital the position reporting of departure fishery ship in the fishery communication that be required the management & operation of information in organizational. In particular, Must be made the regional & concentrational of the position reporting information. The division of region is considered to the circumstance of radio wave, fishing area, quantity of fishery ship and communication traffic etc., which is capable to the DB of VMS by be concentrated in oeadquarters, which is acquisition the position reporting information of respective region. In this study have designed for building of fishery information network and automatic transmission of the position reporting information from a fishery ship.

  • PDF

A study on the digitalization and VMS building of fishery communication (어업통신의 디지탈화 및 VMS 구축에 대한 연구)

  • 윤재준;최조천
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1387-1392
    • /
    • 2003
  • For the structure of VMS by converting on digital the position reporting of departure fishery ship in the fishery communication that be required the management & operation of information in organizational. In particular, Must be made the regional & concentrational of the position reporting information. The division of region is considered to the circumstance of radio wave, fishing area, quantity of fishery ship and communication traffic etc.. It is capable to the DB of VMS by concentrate in head quarters, which is acquisition the position reporting information of respective region. In this study have designed for building of fishery information network and automatic transmission of the position reporting information from a fishery ship.

A Study on User Behavior of University Library Website based Big Data: Focusing on the Library of C University (빅데이터 기반 대학도서관 웹사이트 이용행태에 관한 연구: C대학교 도서관을 중심으로)

  • Lee, Sun Woo;Chang, Woo Kwon
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.3
    • /
    • pp.149-174
    • /
    • 2019
  • This study analyzes the actual use data of the websites of university libraries, analyzes the users' usage behavior, and proposes improvement measures for the websites. The study analyzed users' traffic and analyzed their usage behavior from January 2018 to December 2018 on the C University website. The website's analysis tool used 'Google Analytics'. The web traffic variables were analyzed in five categories: user general characteristics, user environment analysis, visit analysis, inflow analysis, site analysis, and site analysis based on the metrics of sessions, users, page views, pages per session, average session time, and bounce rate. As a result, 1) In the analysis results of general characteristics of users, there was some access to the website not only in Korea but also in China. 2) In the user experience analysis, the main browser type appeared as Internet Explorer. The next place was Chrome, with a bounce rate of Safari, third and fourth, double that of the Explore or Chrome. In terms of screen resolution, 1920x1080 resolution accounted for the largest percentage, with access in a variety of other environments. 3) Direct inflow was the highest in the inflow media analysis. 4) The site analysis showed the most page views out of 4,534,084 pages, followed by the main page, followed by the lending/extension/history/booking page, the academic DB page, and the collection page.

A Study on SCADA Message Exchange using Generic Interface Definition (GID 표준인터페이스를 이용한 SCADA 메시지 교환에 관한 연구)

  • Oh, Do-Eun;Jung, Nam-Jun;Song, Jae-Joo;Yang, Il-Kwon;Kim, Hyeon-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1861-1862
    • /
    • 2008
  • 전력계통 SCADA시스템은 그 목적상 실시간의 대규모 측정정보 취득을 목적으로 한다. 취득정보는 RTU(Remote Terminal Unit)를 통해서 SCADA시스템에 전해진 후, 필요에 따라 상위 시스템으로 다시 전송된다. 이때 RTU에서 SCADA 시스템에 취득 포인트 정보는 DNP(Distribute Network Protocol) 프로토콜을 이용해서 전송하며, RTU는 측정값의 변동에 상관없이 데이터를 SCADA 시스템에 전송한다. SCADA 시스템을 구축하기 위해서는 우선 RTU에 감시 선로 정보를 입력하고 이 정보를 다시 SCADA 시스템의 DB에 포인트 정보와 매핑을 수행해야한다. 따라서 SCADA 시스템을 구축하는데 비용과 시간이 많이 소요되고 운영 시에는 불필요한 데이터 요청과 응답이 발생하여 네트워크 트래픽을 유발한다. IEC에서 제안하는 GID 표준인터페이스를 사용할 경우에는 좀더 효과적인 데이터 교환이 가능하다. 본 논문은 GID 표준인터페이스를 이용한 효과적인 SCADA 메시지 교환에 관해 기술하였다.

  • PDF

Active Node and Active Network Modeling For Network Traffic Progress (네트워크 트래픽 성능 향상을 위한 액티브 노드 및 액티브 네트워크 설계)

  • Choi Byung-Sun;Hwang Young-Chul;Lee Seong-Hyun;Lee Won-Goo;Lee Jae-Kwang
    • 한국컴퓨터산업교육학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.119-126
    • /
    • 2003
  • Computer simulation has used to a area of military training from about several years ago. War game model(or computer simulation) endow a military man with field training such as combat experience without operating combat strength or capabilities. To samely construct simulation environment against actual combat environment is to well construct DB to operate war game model, associate among federates on network. Thus, we construct virtual combat environment enabling to efficiently manage network traffic among federates(or active nodes) on active network that construct virtual military training space such as urgent combat field needed to rapidly transfer combat information including image and video.

  • PDF

A study of DDS Middleware based Multimedia PACS Data Transmission Scheme for QoS in Hospital Network (병원 전산망에서 QoS보장을 위한 DDS 미들웨어 기반 멀티미디어 PACS 데이터 전송 기법 연구)

  • Kim, Nam-Ho;Seung, Teak-Young;Lee, Suk-Hwan;Lee, Jong-Keuk;Kwon, Ki-Ryong
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.462-463
    • /
    • 2012
  • 팍스시스템은 의료 영상을 디지탈화한 시스템이다. PACS데이터는 초창기 CR(Computed Radiography)의 경우 10MB내외의 데이터를 발생하였으나 의료장비의 발전으로 인해 DB(Digital Radiography)는 20MB이상의 데이터를 발생하였다. 또 CT(Computed Tomography)의 경우 0.5MB데이터를 100Slice내외의 데이터를 발생하였으나, 현재는 Cardiac/PET 등의 CT는 Multi Frame을 지원하며 300~5000Slice이상의 데이터를 발생하게 됨에 따라 네트워크에 상당한 트래픽이 발생하여 병원 진료 환경에 심각한 영향을 초래한다. 또한, 스마트 폰, 태블릿 pc등의 발전으로 인해 많은 사용자들은 실시간 또는 멀티미디어와 같은 데이터 표현 방식으로 팍스 데이터를 보길 원할 것이며, 팍스 시스템 또한 그러한 요구조건을 만족시키기 위해 발전하고 있다. 병원에서 사용하는 네트워크는 인터넷 서비스의 모토인 best effort방법을 일반적으로 사용한다. 이러한 데이터 전송방식은 진료에 직접적인 영향을 미치는 팍스 데이터의 전송에 영향을 미칠 수 있다. 특히 네트워크의 트래픽이 제한적인 환경에서 높은 대역폭을 요구하는 멀티미디어 팍스 데이터를 다수의 사용자들이 전송받기 원하면 지연시간으로 인해 원활한 진료진행을 방해 받을 수 있다. 이러한 문제를 해결하기 위해 네트워크 개발자들은 QoS라는 개념을 도입하였고, 여러 계층에서 QoS를 보장하기 위한 연구가 진행되였다. 일반적으로, 네트워크에서 QoS를 지원하기 위한 여러가지 형태의 연구들을 조사하고, 분산 시스템을 제어하기 위한 DDS 미들웨어에 대한 연구를 기반으로 병원 네트워크에서 적용 방안을 설계하고 시뮬레이션을 통해 검증함으로써 새로운 형태의 병원 네트워크를 제안하고자 한다.

  • PDF

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.