• Title/Summary/Keyword: Link recovery

Search Result 162, Processing Time 0.026 seconds

Design and Performance Analysis of Burst Structure for TDMA-based Next Generation Satellite Return Link Transmission (TDMA 기반의 차세대 위성리턴링크 버스트 구조 설계 및 성능 분석)

  • Han, Jae-Hee;Kim, Pan-Soo;Chang, Dae-Ig
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.2
    • /
    • pp.34-38
    • /
    • 2009
  • This paper is related with optimum burst structure design for high efficient TDMA satellite return link transmission. In general, some typical burst structure for data transmission is composed of a pair of preamble and traffic data in the DVB-RCS (Digital Video Broadcasting. Return Channel via Satellite) and IPOS (IP over Satellite) standard. This structure has some difficulties to increase spectral efficiency that it requires a large of preamble length, high SNR environment, or receiver complexity. To cope with them, burst structure with distributed pilot symbol can be used to alleviate the residual frequency offset effect by calculating accurate frequency offset than conventional one. In particular, we investigate some relevant to proposed distributed pilot structure, previously and analyze their strong points/drawbacks in terms of synchronization to draw the most appropriate one.

  • PDF

A mediating role of social capital between corporate social responsibility and corporate reputation: Perception of local university on CSR of KHNP

  • JOO, Jae-Hun
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.3
    • /
    • pp.63-71
    • /
    • 2020
  • Purpose: Most of all studies regarding corporate social responsibility have been dealing with its direct performance. Many previous studies provided the evidence that corporate social responsibility activities directly affect firms' competitiveness or corporate reputation. However, there are no studies regarding the role of social capital between corporate social responsibility and firms' competitiveness. The present study aims to examine a mediating role of social capital between corporate social responsibility and corporate reputation. Research design, data and methodology: The structural equation model integrating corporate social responsibility, social capital, and corporate reputation was proposed with three hypotheses. Questionnaire including 15 question items for three concepts was designed. Data for testing hypotheses were collected from students and staff who had experienced the social responsibility activities of Korea Hydro & Nuclear Co. Ltd. SPSS and SmartPLS were used to analyze data. Results: All three hypotheses were supported at the significance level of 0.01. Corporate social responsibility have a significant influence on social capital as well as corporate reputation. Social capital plays a mediating role in the relationship between corporate social responsibility and corporate reputation. Conclusions: The present paper identified a missing link between corporate social responsibility and corporate reputation by validating an indirect effect of corporate social responsibility on corporate reputation through social capital. The present study contributes to finding the indirect link between corporate social responsibility and corporate reputation. Implications for academics and practitioners. The research model can be extended to analyze the relationship between corporate social responsibility and its performance. The present study sheds light on identification of a new role of social capital. Managers of firms have the opportunity to recognize the fact that investment recovery of corporate social responsibility results from social capital and corporate reputation in long-term rather than short-term. The results of this study offers an insight that managers can enhance customer loyalty. The process linking corporate social responsibility to corporate reputation through social capital implies that firms can realize spiritual marketing delivering authentic storytelling through corporate social responsibility. The present study has a limitation for generalizing of research results because the sampling came from a case of firm.

An Adaptive FEC Algorithm for Sensor Networks with High Propagation Errors (전파 오류가 높은 센서 네트워크를 위한 적응적 FEC 알고리즘)

  • 안종석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.755-763
    • /
    • 2003
  • To improve performance over noisy wireless channels, mobile wireless networks employ forward error correction(FEC) techniques. The performance of static FEC algorithms, however, degrades by poorly matching the overhead of their correction code to the degree of the fluctuating underlying channel error. This paper proposes an adaptive FEC technique called FECA(FEC-level Adaptation), which dynamically tunes FEC strength to the currently estimated channel error rate at the data link layer. FECA is suitable for wireless networks whose error rate is high and slowly changing compared to the round-trip time between two communicating nodes. One such example network would be a sensor network in which the average bit error rate is higher than $10^{-6}$ and the detected error rate at one time lasts a few hundred milliseconds on average. Our experiments show that FECA performs 15% in simulations with theoretically modeled wireless channels and in trace-driven simulations based on the data collected from real sensor networks better than any other static FEC algorithms.

Cross-Layer Service Discovery Scheme for Hybrid Ad-hoc Networks (하이브리드 애드-혹 네트워크를 위한 크로스-레이어 서비스 검색 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.223-228
    • /
    • 2009
  • Efficient service discovery mechanism is a crucial feature for a hybrid ad-hoc network supporting extension of a wireless ad-hoc network to the Internet. We propose an efficient cross-layer service discovery mechanism using non-disjoint multi-path source routing protocol for hybrid ad-hoc networks. Our scheme has advantages of multi-path routing protocol and cross-layer service discovery. Intuitively, it is not difficult to imagine that the cross-layer service discovery mechanism could result in a decreased number of messages compared to the traditional approach for handling routing independently from service discovery. By simulation, we show that faster route recovery is possible by maintaining multiple routing paths in each node, and the route maintenance overhead can be reduced by limiting the number of multiple routing paths and by maintaining link/node non-disjoint multi-path.

Service Discovery Scheme for Wireless Ad-hoc Networks (무선 애드-혹 네트워크를 위한 효율적인 서비스 검색 기법)

  • Kim, Moon-Jeong;Lee, Dong-Hoon
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.245-250
    • /
    • 2008
  • Efficient service discovery mechanism is a crucial feature for the usability of a wireless ad-hoc network. A wireless ad-hoc network is a temporal network formed by a collection of wireless mobile nodes without the aid of any existing network infrastructure or centralized administration. We propose an efficient service discovery mechanism using non-disjoint multi-path routing protocol for a wireless ad-hoc network. Our scheme has advantages of not only multi-path routing protocol but also cross-layer service discovery. By simulation, we showed that faster route recovery is possible by maintaining multiple routing paths in each node, and the route maintenance overhead can be reduced by limiting the number of multiple routing paths and by maintaining link/node non-disjoint multi-path.

Study on UxNB Network Deployment Method toward Mobile IAB

  • Keewon Kim;Jonghyun Kim;Kyungmin Park;Tae-Keun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.105-114
    • /
    • 2023
  • In this paper, we propose a deployment and operation scheme of UxNB network toward mobile IAB. By operating a UxNB network based on SDN(Software Defined Network), UxNBs are deployed in areas where mobile communication services are desired. After deploying UxNB in the service area, IAB can be set up to perform mobile communication services. For this purpose, this paper first proposes a UxNB Network Controller consisting of a UAV Controller and an SDN Controller, and proposes the necessary functions. Next, we present a scenario in which a UxNB network can be deployed and operated in detail step by step. We also discuss the location of the UxNB network controller, how to deliver control commands from the UAV controller to the UxNB, how to apply IAB for UxNB networks, optimization of UxNB networks, RLF(radio link failure) recovery in UxNB networks, and future research on security in UxNB networks. It is expected that the proposed UxNB Network Controller architecture and UxNB network deployment and operation will enable seamless integration of UxNB networks into Mobile IAB.

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

Development of FCC Redundancy System for Tiltrotor UAV (틸트로터 무인기 비행제어컴퓨터 이중화 시스템 개발)

  • Park, Bum-Jin;Kang, Young-Shin;Yoo, Chang-Sun;Cho, Am
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.2
    • /
    • pp.133-139
    • /
    • 2017
  • Flight control computer of tiltrotor UAV was designed by redundancy system with primary and secondary channels to improve reliability. The redundancy functions consist of channel switching and data recovery. The channel switching function consists of software method by using cross channel data link and hardware method by using watchdog timer. The data recovery is the function to maintain flight condition when the flight control computer is restarted exceptionally in operation. The redundancy system was verified by flight control computer bench test, system integration test and HILS test. This paper describes the redundancy function of tiltrotor UAV flight control computer and test-verification method.

Tier-based Proactive Path Selection Mode for Wireless Mesh Networks

  • Fu-Quan, Zhang;Joe, In-Whee;Park, Yong-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1303-1315
    • /
    • 2012
  • In the draft of the IEEE 802.11s standard, a tree topology is established by the proactive tree-building mode of the Hybrid Wireless Mesh Protocol (HWMP). It is used for cases in which the root station (e.g., gateway) is an end point of the majority of the data connections. In the tree topology, the root or central stations (e.g., parent stations) are connected to the other stations (e.g., leaves) that are one level lower than the central station. Such mesh stations are likely to suffer heavily from contention in bottleneck links when the network has a high traffic load. Moreover, the dependence of the network on such stations is a point of vulnerability. A failure of the central station (e.g., a crash or simply going into sleep mode to save energy) can cripple the whole network in the tree topology. This causes performance degradation for end-to-end transmissions. In a connected mesh topology where the stations having two or more radio links between them are connected in such a way that if a failure subsists in any of the links, the other link could provide the redundancy to the network. We propose a scheme to utilize this characteristic by organizing the network into concentric tiers around the root mesh station. The tier structure facilitates path recovery and congestion control. The resulting mode is referred to as Tier-based Proactive Path Selection Mode (TPPSM). The performance of TPPSM is compared with the proactive tree mode of HWMP. Simulation results show that TPPSM has better performance.

A Design of Receiver Modem That Can Be Applied to Real-Time Target Change Guided Weapon (실시간 목표물 변경 유도무기에 적용 가능한 수신 모뎀 설계)

  • Maeng, Sung-jae;Lee, Jong-hyuk;Kim, Kang-san
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.97-103
    • /
    • 2019
  • In this paper, we designed and fabricated a receiving modem that can be applied to guided weapons can change real-time targets with little effect of fading. The designed modem consists of synchronous detector, timing error estimator, timing recovery, differential decoder and viterbi decoder, and it's implemented in FPGA so that it can be redesigned and modified according to requirements. The modem board was directly converted from IF frequency to baseband and converted into digital data through ADC. It is confirmed that it is applicable to the guided weapons that changing real-time targets through simulations, measurements and test.