• Title/Summary/Keyword: Backup Method

Search Result 139, Processing Time 0.023 seconds

Research on Backup Protective Coordination for Distribution Network (네트워크 배전계통용 백업 보호협조에 관한 연구)

  • Kim, WooHyun;Chae, WooKyu;Hwang, SungWook;Kim, JuYong
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.8 no.1
    • /
    • pp.15-19
    • /
    • 2022
  • The radial distribution systems (RDS) commonly used around the world has the following disadvantages. First, when the DL is operated on a radial system, the line utilization rate is usually kept low. Second, if a fault occurs in the radial DL, a power outage of 3 to 5 minutes is occurring depending on the operator's proficiency and fault situation until the fault section is separated and the normal section is replaced. To solve this problem, Various methods have been proposed at domestic and foreign to solve this problem, and in Korea, research is underway on the advanced system of operating multiple linked DL always. A system that is electrically linked always, and that is built to enable high-speed communication during the protection coordination is named networked distribution system (NDS). Because the load shares the DL, the line utilization rate can be improved, and even if the line faults, the normal section does not need to be cut off, so the normal section does not experience a power outage. However, since it is impossible to predict in which direction the fault current will flow when a failure occurs in the NDS, a communication-based protection coordination is used, but there is no backup protection coordination method in case of communication failure. Therefore, in this paper, we propose a protective cooperation method to apply as a backup method when communication fails in NDS. The new method is to change TCC by location of CB using voltage drop in case of fault.

Performance Enhancement Architecture for HLR System Based on Distributed Mobile Embedded System (분산 모바일 임베디드 시스템 기반의 새로운 위치정보 관리 시스템)

  • Kim Jang Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12B
    • /
    • pp.1022-1036
    • /
    • 2004
  • In mobile cellular network the ever-changing location of a mobile host necessitates the continuous tracking of its current position and efficient management of location information. A database called Home Location Register(HLR) plays a major role in location management in this distributed environment, providing table management, index management, and backup management facilities. The objectives of this paper are to identify the p개blems of the current HLR system through rigorous analysis, to suggest solutions to them, and to propose a new architecture for the HLR system. In the HLR system, a main memory database system is used to provide real-time accesses and updates of subscriber's information. Thus it is suggested that the improvement bemade to support better real-time facilities, to manage subscriber's information more reliably, and to accommodate more subscribers. In this paper, I propose an efficient backup method that takes into account the characteristics of HLR database transactions. The retrieval speed and the memory usage of the two-level index method are better than those of the T-tree index method. Insertion md deletion overhead of the chained bucket hashing method is less than that of modified linear hashing method. In the proposed backup method, I use two kinds of dirty flags in order to solve the performance degradation problem caused by frequent registration-location operations. Performance analysis has been performed to evaluate the proposed techniques based on a system with subscribers. The results show that, in comparison with the current techniques, the memory requirement is reduced by more than 62%,directory operations, and backup operation by more than 80%.

On the study of depulication method of communication and Backup device for an Electric Car using Flash Disk and Ethernet (Flash DISK와 Ethernet을 이용한 전동차의 통신 이중화 및 백업장치에 관한 연구)

  • Seo, Won-Yong;Yeon, Jun-Sang;Yang, Oh
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.472-475
    • /
    • 2002
  • This paper presents a high speed ethernet communication and depulication method of communication to prevent decrease of reliability that was generated by high speed communication. Thus communication reliability was improved and this paper was considered that if any physical breakdown of line of communication occurred, other line of communication could operate collect. This paper used Flash memory for setting storage of backup data at Electric Car that have an humidity and a temperature and an impact. also improved reliability and besides matching data format to windows data format realized to confirm application program at PC or note book computer.

  • PDF

A Study for Detection of the Kernel Backdoor Attack and Design of the restoration system (커널 백도어 공격 탐지 및 복구시스템 설계에 관한 연구)

  • Jeon, Wan-Keun;Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.104-115
    • /
    • 2007
  • As soon as an intrusion is detected by kernel backdoor, the proposed method can be preserve secure and trustworthy evidence even in a damaged system. As an experimental tool, we implement a backup and analysis system, which can be response quickly, to minimize the damages. In this paper, we propose a method, which can restore the deleted log file and analyze the image of a hard disk, to be able to expose the location of a intruder.

  • PDF

Efficient Mechanism for receiver and sink node in Wireless Sensor Networks (무선 센서 네트워크에서 수신 및 싱크 노드를 위한 효율적인 데이터 전송 방법)

  • Jeon, JunHeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.23 no.3
    • /
    • pp.65-70
    • /
    • 2020
  • In wireless sensor networks, data packets are send to the sink node. So traffic increases near the sink node. This causes delay and collision. To solve this problem, the proposed mechanism used half rotation antenna. By using a half rotation antenna, the delay of data packets can be reduced. Also we propose a method to efficiently use the energy of the node using BRN(backup receiver node) and increase the lifetime of the entire networks. Our numerical analysis and simulation results show that our mechanism outperforms RI-MAC protocol in terms of energy consumption and transmission delay.

A Path Restoration Method Independent of Failure Location in All-Optical Networks (전광 통신망에서 장애 위치에 독립적인 경로 복구 방법)

  • 이명문;유진태;김용범;박진우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.85-93
    • /
    • 2001
  • In this paper, a path restoration method independent of failure location in all-optical networks is proposed and its wavelength requirements are calculated. In the proposed method, since a single backup wavelength is used for any link failure, a node can consist of only fixed wavelength transmitters, resulting in the levels node cost. Hence, restoration process can be triggered just after the failure detection, if combined with edge-disjoint path restoration method. This feature and the parallel cross-connection message transfer technique proposed in this paper make the restoration process faster. Also, it is shown the wavelength requirements in the proposed method are similar to the ones in the method using tunable backup wavelength, resulting in little increment for transmission cost.

  • PDF

A Study on Protection of Generator Asynchronization by Impedance Relaying (임피던스 계전기를 이용한 발전기 비동기 투입 보호 연구)

  • Lee, Jong-Hweon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.11
    • /
    • pp.2000-2006
    • /
    • 2011
  • Asynchronous phenomenon occurs on the synchronous generators under power system when a generator's amplitude of electromagnetic force, phase angle, frequency and waveform etc become different from those of other synchronous generators which can follow instantly varying speed of turbine. Because the amplitude of electromagnetic force, phase frequency and waveform differ from those of other generators with which are to be put into parallel operation due to the change of excitation condition for load sharing and the sharing load change, if reactive current in the internal circuit circulates among generators, the efficiency varies and the stator winding of generators are overheated by resistance loss. Where calculation method of protection settings and Logic for Protection of Generator Asynchronization will be recommended, A distance relay scheme is commonly used for backup protection. This scheme, called a step distance protection, is comprised of 3 steps for graded zones having different operating time. As for the conventional step distance protection scheme, Zone 2 can exceed the ordinary coverage excessively in case of a transformer protection relay especially. In this case, there can be overlapped protection area from a backup protection relay and, therefore, malfunctions can occur when any fault occurs in the overlapped protection area. Distance relays and overcurrent relays are used for backup protection generally, and both relays have normally this problem, the maloperation, caused by a fault in the overlapped protection area. Corresponding to an IEEE standard, this problem can be solved with the modification of the operating time. On the other hand, in Korea, zones are modified to cope with this problem in some specific conditions. These two methods may not be obvious to handle this problem correctly because these methods, modifying the common rules, can cause another coordination problem. To overcome asynchronizing protection this paper describes an improved backup protection coordination scheme using a new Logic that will be suggested.

Effective Backup and Real-Time Replication Techniques for HSS System in All-IP Mobile Networks (All-IP 이동 통신망에서 HSS 시스템의 효과적인 백업과 실시간 이중화 기법)

  • Park, Seong-Jin;Park, Hyung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.795-804
    • /
    • 2009
  • An HSS(Home Subscriber Server) system requires a main-memory database on main-memory unit for the real-tine management of the subscriber information in the mobile communication service, in that the system controls not only basic data for handling calls of users, but also additional service data related to user authentication and operational data. Nonetheless, HSS-DBS system, requiring the reliability and stability, need more secure data store method and a back-up technique because the system have a long startup time and the big problem on the failures of main-memory. This paper proposes an efficient back-up replication technique, on the basis of enhancing the stability and performance of HSS system. The proposed shadowing back-up technique adopting the delayed recovery process, can help minimize the real-time back-up overloads by location registration, while the proposed backup replication method enables more stable system operations with replicating the data to remote server in real time.

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module (Mobile Trusted Module 기반 단말에서의 안전한 키 백업 및 복구 방안에 대한 연구)

  • Kang, Dong-Wan;Jun, Sung-Ik;Lee, Im-Yeoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.335-346
    • /
    • 2009
  • Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.

Multi-body Dynamic Structural Dynamic Analysis of a Canopy System for Supersonic Fighter Considering Backup Emergency Egress Conditions (대체 비상탈출 조건을 고려한 초음속 전투기용 캐노피 작동부 구조해석)

  • Kim, Dong-Hyun;Kim, Dong-Man;Kim, Young-Woo;Yang, Jian-Ming
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.4
    • /
    • pp.81-87
    • /
    • 2007
  • In this study, analysis of structural design criteria for the canopy actuating device has been conducted considering the aerodynamic breakaway capabilities of jettisonable canopy system. Unsteady aerodynamic loads for the opened canopy configuration at passively controlled jettision mode were computed using CFD method. The general purpose multi-body finite element code, SAMCEF Mecano, is used in the implemented analyses for the passive jettision condition. The recommended altitude and speed of aircraft was suggested as design criteria of aerodynamic breakaway capability of jettisonable canopy system as a bakup egress method when normal canopy jettison sequence malfunctioned. Aerodynamic breakaway condition of jettisonable canopy was also simulated and the fracture load conditions of canopy actuator were investigated.