• Title/Summary/Keyword: Logical network

Search Result 310, Processing Time 0.033 seconds

A study on the implementation of MMS in Mini-MAP (Mini-MAP에서의 MMS 구현에 관한 연구)

  • Kim, H.;Kang, M. S.;Park, M.;Lee, S. B.;Kong, H. T.;Choi, M. S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.745-748
    • /
    • 1990
  • MMS (Manufacturing Message Specification) is a communications standard of MAP (Manufacturing Automation Protocol), which is a Network Protocol for Industrial Automation. In the environment of Mini-MAP, MMS is situated in the application layer and on the LLC (Logical Link Control) layer. In this paper, MMS software is implemented on the basis of ISO DIS 9506. The implemented software was tested with Token Passing Bus Network Interface Unit, which was designed in our laboratory and performs the actions of layer 1 and 2.

  • PDF

A Cable Layout Plan for a CATV System

  • 차동완;윤문길
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1991.10a
    • /
    • pp.464-464
    • /
    • 1991
  • We address the problem of designing a physical CATV network with switched-star topology in which the broadband interactive service is provided. There are two types of decision variables: One is where to place conduit paths, and the other is how many cable units to be installed on each link traversed by an established conduit path. Due to the serious drawback of the conventional approach partitioning the problem into two subproblems, the unified approach handled in one setting is used here to attack the whole problem without dividing into two ones. In this paper, we present a mathematical design model and propose an efficient solution method exploiting the nice structure of it. In addition to this physical design, some results on logical network configuration have also been made. Finally, computaional experiments are conducted to illustrate the efficiency of our design approach.

  • PDF

An Implementation of Cyber View schema tool for Ubiquitous Data Integration and Management (유비쿼터스 데이터 관리를 위한 Cyber View 명세화 도구개발)

  • Park, Sang-Hyun;Min, Soo-Young;Ko, Jae-Jin;Ju, Hyun-Tae
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.763-764
    • /
    • 2006
  • The rapid growth of Hardware technologies and Network fitted to us Ubiquitous Computing Life[1]. Ubiquitous Computing integrates computation into the environment, rather than having computers which are distinct objects. There are many computational things like a Sensor Network, RFID, GPS, Mobile devices, and so on. Ubiquitous Data Integration and Management are new paradigms. The goals of UDI Service Platform are data protection for the distributed data on pervasive computing devices and data distribution to appropriate users with best distribution policies. To implement the idea we evaluate the logical schema Cyber View that is a management tool.

  • PDF

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.

Failure Detection and Resilience in HRing Overlay Network (HRing 오버레이 네트워크에서 실패 탐지 및 회복)

  • Gu, Tae-Wan;Lee, Kwang-Mo
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.21-33
    • /
    • 2007
  • An overlay network is a virtual network which is constructed on top of a physical computer network. A node in the overlay network is connected through virtual or logical links, where each link corresponds to a path of the links in the underlying physical network. Overlay networks are suitable for sharing heterogeneous resources in distributed environments, However, overlay networks are limited for achieving reliable communication that failure detection in overlay networks is a very important issue. In this paper, we review conditions of conventional failure detection and propose a new approach to failure detection and resilience which can be applied to HRing (Hierarchical Ring) overlay networks. The proposed method consists of the failure detection and the failure resilience phases. Because it utilizes the characteristics of the HRing overlay network for failure detection, it can reduce unnecessary network traffic and provide better scalability and flexibility. We also analyzed and evaluated the performance of the proposed approach through simulations.

  • PDF

Design of Advanced Metering Infrastructure Network Based on Multi-Channel Cluster (다중채널 클러스터 기반의 AMI 네트워크 설계)

  • Choi, Seok-Jun;Shim, Byoung-Sup;Chae, Soo-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.207-215
    • /
    • 2013
  • This paper is channel assignment and scheduling techniques for efficient wireless AMI network. In AMI system, the multi-channel cluster network to be proposed defines the communication channel between NC (Network Coordinator) and CDA (Clustered Data Aggregator) as the network channel. CDA and OMD(Out Meter display) and communication channel between SMD(Smart Meter Device) are defined as the group channel. AMI network of the multi-channel cluster based in which the network channel and group channel is mixed increases the administration efficiency through the physical/logical consumer channel clustering. The reliability of inspection data through the channel use distinguished between the adjacent cluster is enhanced. In addition, the fast aggregation of data is possible and the size of a metering network is increased through the channel allocation of the multichannel cluster based.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

DNA (Data, Network, AI) Based Intelligent Information Technology (DNA (Data, Network, AI) 기반 지능형 정보 기술)

  • Youn, Joosang;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.247-249
    • /
    • 2020
  • In the era of the 4th industrial revolution, the demand for convergence between ICT technologies is increasing in various fields. Accordingly, a new term that combines data, network, and artificial intelligence technology, DNA (Data, Network, AI) is in use. and has recently become a hot topic. DNA has various potential technology to be able to develop intelligent application in the real world. Therefore, this paper introduces the reviewed papers on the service image placement mechanism based on the logical fog network, the mobility support scheme based on machine learning for Industrial wireless sensor network, the prediction of the following BCI performance by means of spectral EEG characteristics, the warning classification method based on artificial neural network using topics of source code and natural language processing model for data visualization interaction with chatbot, related on DNA technology.

A Study on the Effects of Operating Systems Platform Characteristics on the Network Effect and Intention to Use Operating Systems (운영체제 플랫폼 특성이 네트워크 효과와 운영체제 사용의도에 미치는 영향에 관한 연구)

  • Jeong, Tae-Seok;Lee, Sang-Hyun;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.37-50
    • /
    • 2014
  • The purpose of this research is to look upon the smartphone market from the perspective of business ecosystems and to extract the critical success factors of OS platforms. Furthermore, this research aims to verify the effect of those factors on increasing utility resulting from the rising number of users as well as on intention of use. In order to do this, OS compatibility and OS upgradability were presented as the major characteristics of OS platforms and a logical causal relationship between network effect and intention to use which shows the increase of utility according to the number of users was established which was then followed by an empirical analysis. The results of the research showed that OS compatibility and OS upgradability both had positive effects on network effect and intention to use. By presenting the characteristics of OS platforms, a subject which has lacked pervious empirical studies, and establishing a logical causal relationship for the role platform characteristics play in the formation of business ecosystem in the smartphone market, it is expected that the findings of this research will contribute greatly not only academically but also in practical applications.

UPC Schemes on the Frame Relay/ATM Interworking in ATM Networks (FR/ATM 연동에서의 UPC 방식)

  • Nam, Yun-Seok;Park, Won-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3108-3115
    • /
    • 1999
  • Frame relay needs UPC function for the multiplexed logical connections to prevent malicious user traffic from incoming to network, to guarantee the QoS of conformed user traffic, and to protect the normal operation of network system. On the FR/ATM interworking in ATM networks, the UPC may be conducted either by cell-based ATM UPC or frame-based FR UPC. Frames come into and traverse ATm networks by segmentation to ATM cells. Of course, FR QoS should be guaranteed in spite of segmentation and reassembly in ATM networks. In this paper, we compared the QoS of cell-based ATM UPC and frame-based FR UPC in terms of analysis and simulation in case of ingress of excess traffic over negotiated traffic parameters at user-to-network interface. Also we studied frame-based UPC schemes including window-based FR UPC and frame-based VSA which is an ATM UPC algorithm recommended by ITU-T. We described introductions to frame relay including frame structure and FR/ATM interworking, FR traffic parameters and their relationship, comparison of FR QoS between frame-based FR UPC and cell-based ATM UPC, comparison of FR UPC schemes, necessities of egress traffic control, and conclusions.

  • PDF