• Title/Summary/Keyword: Network

Search Result 58,574, Processing Time 0.059 seconds

Measures to Activate the Community Network of Community Child Centers Based on the Systems Thinking (시스템사고에 근거한 지역아동센터의 지역사회 연계 활성화방안)

  • Cho, Sungsook
    • Korean System Dynamics Review
    • /
    • v.16 no.2
    • /
    • pp.33-52
    • /
    • 2015
  • This study aims to comprehensively understand the dynamics of the community network of Community Child Centers and further find out the measures to activate its community network based on the Systems Thinking. The contents of the study are as follows. Firstly, it examines the existing studies on the community network of Community Child Centers and presents the major variables to understand the situation of its community network. Secondly, it analyzes the structure of its causation in order to understand the dynamics of its community network. Lastly, it concludes with the suggestions to activate its community network based on its feedback structure presented in the causal loop diagrams. This study is expected to make a useful and basic material as the first research to dynamically understand the community network issue of the Community Child Centers.

Design Process of BcN Control Network and a Case Study Using a Network Design System (BcN 제어망의 설계 프로세스 및 설계툴을 활용한 설계 예제)

  • Choi, Jung-Yul;Lee, Jae-Bong;Woo, Shin-Jung;Shim, Byoung-Kwon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.341-345
    • /
    • 2007
  • Broadband Convergence Network (BcN) can provide a range of quality guaranteed broadband multimedia services through packet-based converged transport network. For providing new emerging application services in due season over BcN, it is important for network designers or planners to develop a new design methodology for BcN, which differs from legacy design processes applied to a single service network. This paper thus introduces a new design concept and detailed design processes for KT-BcN. We also present a design example of BcN control network using a design system that we have developed.

  • PDF

The Access Network Architecture for BcN Adapted (BcN 적합형 액세스네트워크 구조)

  • Lee, Sang-Moon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.121-124
    • /
    • 2007
  • This article describes a function and structure of access network equipment under BcN environment. Access network until now have constructed separately to offer voice, data service. However, simplifies network structure, function that can do traffic concentration, subscriber certification, individual charging, QoS according to service and routing is required in BcN. In this paper, compare method offering by separate system with existing access network and method that offer integrating function inside system for structure of suitable access network to BcN and search structure of access network equipment for desirable access network of hereafter. Composition of this paper is as following. In Chapter 2, establishment history and structure of access network until present. In Chaprte 3, define suitable requirement and functions to BcN. And compare structure for access net work that is new with present. Last Chapter 4, suggests direction of structure of BcN access network and concludes conclusion.

  • PDF

Network Representation Schemes for U-TURN and Implementation in the Vine-Based Dijkstra Shortest Path Algorithm (U-TURN을 포함한 가로망 표현 및 최단경로의 구현)

  • 최기주
    • Journal of Korean Society of Transportation
    • /
    • v.13 no.3
    • /
    • pp.35-52
    • /
    • 1995
  • This paper reviews both network representation schemes of transportation network and algorithms for findings the shortest path between two points in the network. Two types of network representation schmes for considering U-Turn have been proposed along with some modifications of the vine-based Dijkstra shoretest path algorithm. The traditional Sioux-Fall network has been chosen and modified with the introduction of left-turn prohibitions and U-Turns for the purpose of evaluating the peroformance of two modified algorithms and network representation schemes(NA1 an d NA2 ). This type of modification in both network representation scheme (including network data) and algorithms is not only supposed to be needed for route guidance but supposed to contribute to finding more realistic path and estimating more accurate traffic voulume thorughout the entire network.

  • PDF

An implementation of network optimaization system using GIS (GIS를 이용한 네트워트 최적화 시스템 구축)

  • 박찬규;이상욱;박순달;성기석;진희채
    • Korean Management Science Review
    • /
    • v.17 no.1
    • /
    • pp.55-64
    • /
    • 2000
  • By managing not only geographical information but also various kinds of attribute data. GIS presents useful information for decision-makings. Most of decision-making problems using GIS can be formulated into network-optimization problems. In this study we deal with the implementation of network optimization system that extracts data from the database in GIS. solves a network optimization problem and present optimal solutions through GIS' graphical user interface. We design a nitwork optimization system and present some implementation techniques by showing a prototype of the network optimization system. Our network optimization system consists of three components : the interface module for user and GIS the basic network the program module the advanced network optimization program module. To handle large-scale networks the program module including various techniques for large sparse networks is also considered, For the implementation of the network optimization system we consider two approaches : the method using script languages supported by GIS and the method using client tools of GIS. Finally some execution results displayed by the prototype version of network optimization system are given.

  • PDF

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF

The Study of Measuring Method for Signal Processing Delay to Dual Mode Signal Transmission for Satellite DMB System (위성 DMB Dual Mode 신호전송에 따른 신호변환 Delay 측정 방법에 관한 연구)

  • Lee Young-Su;Choi Gyeong-Ho;Lee Byung-Suk;Cho Sung-Min;Ihm Tae-Jong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.31-34
    • /
    • 2004
  • 본 논문에서는 현재 위성 DMB 국내 표준으로 채택되어 있는 System E 방식의 Dual Mode 신호 전송에 따른 신호변환시 Time Delay측정 방법에 대해서 제안을 하였다. 제안된 방식의 경우 아날로그 방식이 아닌 디지털 방식으로 정확한 Time Delay 측정이 가능하다. 그리고 위성 DMB Gap Filler System의 입 출력 단자를 통하여 측정이 가능함으로 측정값에 대한 신뢰성 확보가 가능하며 자동측정 방식임으로 측정시 발생될 수 있는 Human Error를 최소화 할 수 있다는 장점을 가지고 있다.

  • PDF

Prevention of DDoS Attacks for Enterprise Network Based on Traceback and Network Traffic Analysis

  • Ma, Yun-Ji;Baek, Hyun-Chul;Kim, Chang-Geun;Kim, Sang-Bok
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2009
  • With the wide usage of internet in many fields, networks are being exposed to many security threats, such as DDoS attack and worm/virus. For enterprise network, prevention failure of network security causes the revealing of commercial information or interruption of network services. In this paper, we propose a method of prevention of DDoS attacks for enterprise network based on traceback and network traffic analysis. The model of traceback implements the detection of IP spoofing attacks by the cooperation of trusted adjacent host, and the method of network traffic analysis implements the detection of DDoS attacks by analyzing the traffic characteristic. Moreover, we present the result of the experiments, and compare the method with other methods. The result demonstrates that the method can effectively detect and block DDoS attacks and IP spoofing attacks.

In-Vehicle Network Technologies (차량 내 네트워크 기술)

  • Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.22 no.2
    • /
    • pp.518-521
    • /
    • 2018
  • IVN (in-vehicle network) connects various electronic modules in the vehicles. It requires real-time, low noise, high reliability, and high flexibility. It includes CAN (controller area network), CAN-FD (CAN flexible data rate), FlexRay, LIN (local interconnect network), SENT (single edge nibble transmission), and PSI5 (peripheral sensor interface 5). In this paper, their operation priciples, target applications, and pros and cons are explained.

Application of Percolation Model for Network Analysis

  • Kiuchi, Yasuhiko;Tanaka, Masaru;Mishima, Taketoshi
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1101-1104
    • /
    • 2002
  • In order to send the information certainly via the network against the packet lost caused by hardware troubles or limitation of packet transferring, we must construct reliable network infrastructure. However, it is difficult to construct comfortable network early if we construct rely on the prediction or the experience through a lot of troubles. In this paper, we propose the method to construct reliable network infrastructure based on the computer network simulation. This simulation is based on the percolation model. Percolation model is known as the model that represents connections. We gave some simulations for the various network topologies: the square lattice network, the cubic lattice network, and the full connection type network.

  • PDF