• Title/Summary/Keyword: Bypass scheme

Search Result 40, Processing Time 0.027 seconds

Performance of Fault-tolerant Ethernet System with Link-bypass scheme for Airbone Databus (항공 데이터버스용 링크 우회방식을 가진 고장감내 이더넷 시스템의 성능 분석)

  • Song, Dae-Yoen;Yoon, Chong-Ho;Jung, Han-Gyun;Kim, Seung-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.9
    • /
    • pp.46-53
    • /
    • 2007
  • The link-fault recovery in the normal Ethernet bridged networks has relied on the Spanning Tree Protocol(STP) or Rapid STP. However, STP can not offer fast error recovery which is needed real-time services such as aircraft. In this paper, we compare automatic protection switching(APS) providing fault-tolerant function in the BcN back bone system with Avionic Full Duplex Switched Ethernet(AFDX) which is recently equipped in the A380 for Airbone Databuses. Also, we propose a link-bypass scheme for improving fault-tolerant performance of the AFDX by connecting switches and bypass fault section when a fault is originated on the link. For comparing and verifying the performance of proposed scheme, we simulated Ethernet, AFDX, APS and proposed AFDX with link-bypass scheme using NS-2. The proposed AFDX with link-bypass scheme can be applied to aircrafts, BcN backbone networks and industrial automatic networks.

The Performance of Banyan Type ATM Switch using Monotonic Buffering Scheme (단조 버퍼링 방식을 이용한 Banyan형 ATM 스위치의 성능평가)

  • 김범식;우찬일;신인철
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.11a
    • /
    • pp.147-161
    • /
    • 1997
  • In the future, the performance of B-lSDN offering the multimedia and a various service depends on the performance of switch that is the important factor consisting of network. Bufferless banyan network consisted of MIN(multistage interconnection network) selected for- the fabric of ATM switch and has a limitation of performance because of blocking. Input buffered banyan networks with FIFO(first-in first-out) buffering scheme for the reduction of blocking and the cell bypass queueing theory for the reduction of HOL(head of line) blocking were seperately compared of the performance of switch. Specially input buffered banyan networks were applied monotonic buffering scheme that was proposed. As a result of simulation, Buffered Banyan Network with cell bypass queueing theory showed better performance than FIFO type input buffered Banyan network. Monotonic increase buffering scheme showed better performance than Monotonic decrease buffering scheme.

  • PDF

Modeling and Simulation for PIG with Bypass Flow Control in Natural Gas Pipeline

  • Nguyen, Tan-Tien;Kim, Sang-Bong;Yoo, Hui-Ryong;Park, Yong-Woo
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.9
    • /
    • pp.1302-1310
    • /
    • 2001
  • This paper introduces modeling and simulation results for pipeline inspection gauge (PIG) with bypass flow control in natural gas pipeline. The dynamic behaviour of the PIG depends on the different pressure across its body and the bypass flow through it. The system dynamics includes: dynamics of driving gas flow behind the PIG, dynamics of expelled gas in front of the PIG, dynamics of bypass flow, and dynamics of the PIG. The bypass flow across the PIG is treated as incompressible flow with the assumption of its Mach number smaller than 0.45. The governing nonlinear hyperbolic partial differential equations for unsteady gas flows are solved by method of characteristics (MOC) with the regular rectangular grid under appropriate initial and boundary conditions. The Runge-Kuta method is used for solving the steady flow equations to get initial flow values and the dynamic equation of the PIG. The sampling time and distance are chosen under Courant-Friedrich-Lewy (CFL) restriction. The simulation is performed with a pipeline segment in the Korea Gas Corporation (KOGAS) low pressure system, Ueijungboo-Sangye line. Simulation results show us that the derived mathematical model and the proposed computational scheme are effective for estimating the position and velocity of the PIG with bypass flow under given operational conditions of pipeline.

  • PDF

A Bypass Scheme for INVITE Messages With Priority in SIP Proxies (SIP 프록시에서 우선순위를 가지는 INVITE 메시지의 우회 방법)

  • Kwon, Oh-Jun;Jang, Hee-Suk;Lee, Jong-Min
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.51-58
    • /
    • 2010
  • SIP is a flexible and extensible call setup protocol that may be combined with other protocols used in the Internet to make various services like voice communication. Voice communication can be classified into normal calls used for communication between common users and emergency calls for 112, 119 and other services through public safety networks. It is required to research to process effectively these normal calls and emergency calls through public networks such as the Internet. In this paper, we propose a bypass scheme for emergency calls by giving priority to INVITE messages for them and processing them with priority in the SIP proxy queue. We perform simulation studies using the network simulator ns-2 for the performance evaluation. Simulation results show that the proposed scheme processes emergency calls faster than normal calls and thus it is expected to make a special purpose network like the national disaster network efficiently by using the existing Internet.

Power Conditioning Inverter Controlled by Sinewave Tracking Boost Chopper without DC Smoothing Capacitor Stage

  • Ahmed, Nabil A.;Miyatake, Masafumi;Kang, Tae-Kyung;Lee, Hyun-Woo;Nakaoka, Mutsuo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.179-185
    • /
    • 2005
  • This paper presents a novel circuit topology of a high efficiency single-phase power conditioner. This power conditioner is composed of time-sharing sinewave absolute pulse width modulated boost chopper with a bypass diode in the first power processing stage and time-sharing sinewave pulse width modulated full-bridge inverter in the second power processing stage operated by time-sharing dual mode pulse pattern control scheme. The unique operating principle of the two power processing stage with time-sharing dual mode sinewave modulation scheme is described with a design example. This paper proposes also a sinewave tracking voltage controlled soft switching PWM boost chopper with a passive auxiliary edge-resonant snubber. The new conceptual operating principle of this novel power conditioner related to new energy utilization system is presented and discussed through the experimental results.

  • PDF

Performance Analysis of Mode Switching Scheme for Reduction of Phase Distortion in GPS Anti-jamming Equipment Based on STAP Algorithm

  • Jung, Junwoo;Yang, Gi-Jung;Park, Sungyeol;Kang, Haengik;Kwon, Seungbok;Kim, Kap Jin
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.8 no.3
    • /
    • pp.95-105
    • /
    • 2019
  • A method that applies space-time adaptive signal processing (STAP) algorithm based on an array antenna consisting of multiple antenna elements has been known to be effective to remove wide-band jamming signals in GPS receivers. However, the occurrence of phase distortion in navigation signals has been a problem when navigation signals, from which jamming signals are removed using STAP, are supplied to global positioning system (GPS) receivers. This paper verified the navigation performance degradation as a result of phase distortion. To mitigate this phenomenon, this paper proposes a mode switching scheme, in which a bypass mode is adopted to make the best use of the tracking performance of receivers without performing signal processing when jamming signals are not present or weak, and a STAP mode is employed when jamming signals exceed the threshold value. In this paper, the mode switching scheme is proposed for two environments: when receivers are stationary, and when receivers are moving. This paper confirmed that the performance of position error improved because phase distortion could be excluded due to STAP if the bypass mode was adopted under a condition where the jamming signal power level was below the threshold value in an environment where receivers were stationary. However, this paper also observed that the navigation failed due to the instability of tracking performance of receivers due to phase distortion that occurred at the switching time, although the number of switching could be reduced dramatically by proposing a dual threshold scheme of on- and off-thresholds that switched a mode due to the array antenna characteristics of varying gains according to the jamming signal incident direction in an environment where receivers were moving. The analysis results verified that running the STAP algorithm at all times is more efficient than the mode switching, in terms of maintaining stable navigation and ensuring position error performance, to remove jamming signals in an environment where receivers were moving.

The design and implementation of pin plugin tool to bypass anti-debugging techniques (Pin을 이용한 안티디버깅 우회 설계 및 구현)

  • Hong, Soohwa;Park, Yongsu
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.33-42
    • /
    • 2016
  • Pin is a framework that creates dynamic program analysis tools and can be used to perform program analysis on user space in Linux and Windows. It is hard to analyze the program such as Anti-reversing program or malware using anti-debugging by Pin. In this paper, we will suggest the implementation of scheme bypassing anti-debugging with Pin. Each pin code is written to bypass anti-debugging detecting Pin. And Pin creates a pin tool combined with Pin codes that bypass anti-debugging methods. The pin tool are tested with files created by anti-debugging protector. The technique in the paper is expected to be a reference of code bypassing anti-debugging and be applied to bypass newly discovered anti-debugging through code modification in the future.

Hole Modeling and Detour Scheme for Geographic Routing in Wireless Sensor Networks

  • Yu, Fucai;Park, Soo-Chang;Lee, Eui-Sin;Kim, Sang-Ha
    • Journal of Communications and Networks
    • /
    • v.11 no.4
    • /
    • pp.327-336
    • /
    • 2009
  • Geographic routing has been considered as an attractive approach in wireless sensor networks, since it routes data packets by using location information rather than global topology information. In geographic routing schemes, packets are usually sent along the boundary of a hole by face routing to detour the hole. As result, all data flows which need to detour the hole are concentrated on the boundary of the hole. This hole detour scheme results in much more energy consumption for nodes at the hole boundary, and the energy exhaustion of hole boundary nodes enlarges the holes. This is referred to as a hole diffusion problem. The perimeter mode may also lead to data collisions on the hole boundary nodes if multiple data flows need to bypass a hole simultaneously. In this paper, we propose a hole modeling and detour scheme for geographic routing in wire-less sensor networks. Our hole modeling and detour scheme can efficiently prevent hole diffusion, avoid the local minimum problem faced by geographic routing protocols, and reduce data collisions on the hole boundary nodes. Simulation results show that the proposed scheme is superior to the other protocols in terms of control overhead, average delivery delay and energy consumption.

A study on the development of motor-driven artificial heart and its control (인공심장의 자동제어)

  • 민병구;김희찬;권성일
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1986.10a
    • /
    • pp.643-647
    • /
    • 1986
  • A new type of motor-driven Total Artificial Heart (TAH) system with rolling-ball mechanism has been developed. To test its performance as a Left Ventricular Assist Device (LVAD), LVAD is controlled to bypass blood for impaired heart triggered by the R-wave in ECG. Results of the test with a Mock Circulation System (MCS) and an animal experiment with a dog are also included. More powerful system using a brushless DC motor has been developed and its control scheme is represented.

  • PDF

Detecting scheme against bypass Denial of Service Attack (우회 DoS 공격을 탐지하기 위한 모델 설계)

  • 김용석;전준철;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.709-711
    • /
    • 2003
  • 현재 사용되어지는 컴퓨터 통신 프로토콜(OSI 7 layer reference model)은 구조적인 문제점을 들어내고 있다. 이런 문제점 때문에, 해커들은 수많은 패킷들을 생성시키는 Denial of Service(DoS) 공격과 Distributed Denial of Service(DDoS) 공격을 사용하여 한 호스트나 한 네트워크 자원에 치명적인 악영향을 미친다. 특정한 TCP 포트나 UDP 포트에 공격을 가하는 경우에는 룰 기반의 침입탐지 시스템(IDS)이 탐지 해낼 수 있지만 다른 임의의 포트에 공격을 가하게 되연 IDS는 이것을 탐지하지 못한다. 따라서 우리는 잉의의 포트에 DoS나 DDoS 공격들이 일어났을 때 이 공격들을 탐지할 수 있는 모델을 설계하였다.

  • PDF