• Title/Summary/Keyword: Mission-Critical Computer

Search Result 34, Processing Time 0.026 seconds

The design of bandwidth sharing queueing algorithm to guarantee realtime of specific traffic (특정 트래픽의 실시간 보장을 위한 대역폭 공유 큐잉 알고리즘의 설계)

  • Youn, Yeo-Hoon;Jang, Gyeong-A;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1103-1106
    • /
    • 2000
  • 정체(congestion)가 발생한 네트워크에서 자원관리 시스템은 정체를 제어하고 프레임 상실(loss)을 최소화함으로써 리얼타임 트래픽에 대한 요구를 충족시키기 위해 절대적으로 요구된다. 그에 따라 본 논문에서는 외부출력 인터페이스(Outgoing Interface)를 통과한 각종 멀티미디어 프레임들의 정체나 상실을 최소화하는 것을 기본 목적으로 하여 임계작업(mission critical)의 애플리케이션이 요청한 트래픽이 삽입되는 큐에 프레임이 존재하는 한, 부 스케줄러(Child Scheduler)를 생성하여 연속적으로 처리를 해주는 한편, 다른 트래픽들은 주 스케줄러(Parent Scheduler)가 할당된 대역폭만큼 Round-Robin 방식으로 계속 처리를 해주도록 하여 기아(starvation)가 일어나지 않도록 하는 CQ(Custom Queuing) 기반의 대역폭 공유 큐잉 알고리즘을 설계하였다.

  • PDF

Supporting Situation Awareness in Mission Critical Systems (중대 핵심 시스템 상에서 상황인지 적용)

  • Park, Ji-Yong;Kim, Sang-Soo;In, Hoh
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.172-175
    • /
    • 2006
  • 중대 핵심 시스템은 변화하는 상황에 대해서 정보를 빠르게 획득하고, 대처하는 것이 매우 중요하다. 임무 수행 중에 시스템의 환경이나 예상하지 못한 상황이 발생하였을 경우, 임무를 효율적으로 처리하는 데 문제가 발생한다. 이를 해결하기 위해 상황 인지를 중대 핵심 시스템에 적용하여 환경의 변화와 상황에 대해서 유연하게 대응할 수 있게 한다. 이는 시스템 주변 환경과 상황을 인지하여서 적절한 판단을 내릴 수 있도록 하여 임무에 도움을 준다. 본 논문에서는 상황 인지를 적용한 시스템의 아키텍처를 제안하고 이를 검증하기 위해서 공중 방어 시스템 시뮬레이션에 적용한 실험 결과를 통해서 유효성을 검증한다.

  • PDF

Implementation of Intelligent Web Service Access Management for Supporting High Ava ilability and Business Continuity (고 가용성과 업무의 연속성 보장을 위한 지능적 웹 서비스 접속관리의 구현 방안에 관한 연구)

  • Joong Kang-Itrun;Lee Kwang-Eooung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.151-160
    • /
    • 2005
  • High availability and business continuity in the mission critical enterprise environment have been a matter of primary concern. It is desirable to implement replicated servers, duplicated devices and disaster recovery sites so that these issues are accomplished. When that happens, web browser's users may be accessed web server through a specific Uniform Resource Locator. A critical issue arises if web browser's users recklessly change the URL and access into other site. In this case, data integrity between duplicated sites may not be guaranteed. In this paper, we introduce the method of integrating the technologies of user authentication, certificate authority and business continuity and Propose the design and implementation of intelligent service access management.

  • PDF

A Network QoS Model for Joint Integrated C4I Structure (합동지휘통제 통합망 구조 QoS 모델(안))

  • Park, Dongsuk;Oh, Donghan;Choi, Eunho;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.106-114
    • /
    • 2020
  • NCW which is shaping favorable conditions with obtaining initiative through superiority in C2 and information sharing is critical to the result of the war in a modern warfare. An important requirement to attain superiority through an effective networking in a war-environment is to apply QoS to ensure priority in supporting critical mission and services. In order to obtain an effective NCOE through JCS-led QoS support, standard doucments have been reviewed and analyzed to understand the current level of technology and development. In addition, QoS-related policy documents which is currently being applied by the ROK armed forces have been analyzed to substantiated the JCS-led QoS model and propose the directions of development and enhancement required in the realm of technology, policy and system.

신 개념 저장장치인 Storage Area Network (SAN)의 활용 및 도입시 고려사항

  • 홍순구;이상식;김종원
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.128-131
    • /
    • 2001
  • With the advent of the Internet, data centric computing applications, and e-business applications, virtually all network-stored data has become mission critical in nature. This increasing reliance on the access to enterprise data is challenging the limitations of traditional server-storage solutions. As a result, the ongoing need to add more storage, serve more users and back up more data has given rise to the concept of a SAN(Storage Area Network), “a network whose primary purpose is the transfer of data between computer systems and storage elements and among storage elements.” The purpose of this article is to help the managers and researchers make the understanding of a SAN as the possibility of new data repository in e-business era. This paper provides a thorough literature review on this new concept including its structure, its benefits and disadvantages, and its underlying issues.

  • PDF

Spaceborne High Speed Data Link Design for Multi-Mode SAR Image Data Transmission

  • Kwag, Young-Kil
    • Journal of electromagnetic engineering and science
    • /
    • v.2 no.1
    • /
    • pp.39-44
    • /
    • 2002
  • A high speed data link capability is one of the critical factors in determining the performance of the spaceborne SAR system with high resolution because of the strict requirement far the real-time data transmission of the massive SAR data in a limited time of mission. In this paper, based on the data lint model characterized by the spaceborne small SAR system, the high rate multi-channel data link module is designed including link storage, link processor, transmitter, and wide-angle antenna. The design results are presented with the performance analysis on the data link budget as well as the multi-mode data rate in association with the SAR imaging mode of operation from high resolution to the wide swath.

Performance Analysis of the Satellite Monopropellant Hydrazine Thruster (인공위성 단일추진제 하이드라진 추력기 성능 해석)

  • Han C. Y.;Park T. S.;Lee K. H.;Yu M. J.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2004.10a
    • /
    • pp.137-139
    • /
    • 2004
  • The monopropellant hydrazine thrusters are widely used for the satellite on-board propulsion system fulfilling various missions in space. They have outstanding features caused by the nearly unlimited restart capability and the very high credibility. The sole monopropellant thruster used at precent in nation is MRE-1 that is a standard component of NASA. It can produce 4.45 N of nominal thrust. Due to the glowing complexity with a satellite mission, the needs for thrusters of the diverse performance are being increased. The numerical simulation could give useful information to develop a new type thruster instead of the experiments performed previously. Therefore it is critical to make a reliable computer code to prepare design change of a thruster. In this paper, the performance analysis and validation of the satellite monopropellant hydrazine thruster currently used is accomplished as the preliminary study to serve valuable data for future design change.

  • PDF

Development and Flight Result of Inertial Navigation System for KSR-III Rocket (KSR-III 로켓의 관성항법시스템 개발과 비행시험 결과)

  • 노웅래;조현철;안재명;박정주;최형돈
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.6
    • /
    • pp.557-565
    • /
    • 2004
  • The Korean space program was marked by the successful launching of a KSR-III liquid propelled sounding rocket. The Inertial Navigation System (INS) which carries out critical mission functions of navigation, guidance and control was domestically developed and perfectly certified through the flight test. The system consists of a strapdown inertial measurement, an onboard computer and flight software. This paper will describes the development works of the inertial navigation system, including top level system design, hardware and software. And it summarizes flight results.

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).