• Title/Summary/Keyword: Network operator

Search Result 393, Processing Time 0.025 seconds

A Study on MEC Network Application Functions for Autonomous Driving (자율주행을 위한 MEC 적용 기능의 연구)

  • Kang-Hyun Nam
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.427-432
    • /
    • 2023
  • In this study, MEC (: Multi-access Edge Computing) proposes a cloud service network configuration for various tests of autonomous vehicles to which V2X (: Vehicle to Everything) is applied in Wave, LTE, and 5G networks and MEC App (: Application) applied V2X service function test verification of two domains (operator (KT, SKT, LG U+), network type (Wave, LTE (including 3G), 5G)) in a specific region. In 4G networks of domestic operators (SKT, KT, LG U+ and Wave), MEC summarized the improvement effects through V2X function blocks and traffic offloading for the purpose of bringing independent network functions. And with a high level of QoS value in the V2X VNF of the 5G network, the traffic steering function scenario was demonstrated on the destination-specific traffic path.

An Analysis on Global Terminal Operator's Selection of Container Terminal -Focusing on the Chinese Container Ports- (GTO의 신규터미널 후보지 선택에 관한 연구 -중국 컨테이너 항만을 중심으로-)

  • Yeo, Gi-Tae;Jung, Hyun-Jae;Pak, Ji-Young
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.1
    • /
    • pp.159-178
    • /
    • 2012
  • Recently, Global network expansion strategy of GTOs(Global Terminal Operator) coupled with each country's port policy, plays huge role for the evolution of modern container port. The Chinese ports can be regarded as the major markets to the GTOs. However, there are scant of researches for finding the key success factors of GTOs' strategies when they consider to invest in overseas. In this respect, the aims of this study were to draw out the evaluation variables for successful investment strategies of GTOs, and to calculate the selected target ports. The 14 variables are selected including the variable named 'development potentiality of a port' through literature reviews. Using the Factor Analysis (FA) based on selected variables, four principal factors were extracted such as 'ability for port operating and cargo generating', 'the trade route and volume', 'the calling potentiality for large vessels' and 'the possibility of utilization of existing infrastructure'. In addition, the weights of factors and variables are evaluated through Fuzzy AHP method. As a result, 'ability for port operating and cargo generating' is chosen as the most important factor among principal factors as scored 0.343, and 'the development potentiality of a port' (0.107) is represented as the most important variable among 14 detailed variables. In overall, from the Global Terminal Operator's point of view, Shanghai is ranked as most suitable port for operating new terminal among the top 5 Chinese ports.

An Outage Evaluation Model for Wireless Telecommunication Network (무선통신망의 장애영향 평가 모델)

  • Lee, Dong-Hoon;Chong, Il-Young
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.111-118
    • /
    • 2003
  • Network reliability means network ability which perform normal operation of network components within defined time period, on the other hand, network survivability is the index of normal operation in nerwork failure. In occurrence of network failure, network operator is interested in the measurement of network survivability, but, in a view of subscribers, it is more interested in how many subscribers are out of service and how long the out of service state lasts. In this paper, a service outage evaluation model fitted for telecommunication network in Korea is proposed, which measures the impacts of subscribers in case of network failure which induces a service outage. The outage evaluation result of "Mobile to Land" service outage which has 30.000 subscribers affected for 30 minutes is 2.5. This value is 5 times larger than that of the same service outage which has 10,000 subscribers affected for 30 minutes, i.e, the impact of subscribers in the former case is 5 times larger than that of the latter case. If 30,000 subscribers have isolated in "Mobile to Land," "Local Mobile to Mobile" service for 30 minutes by the exchange out of order in PCS network, then the evaluation result of this service outage will be 3.75.

Network Management Architecture using Mobile Agent technology (Mobile Agent 기술을 이용한 네트워크 관리 구조)

  • 오양훈;송왕철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.4
    • /
    • pp.747-754
    • /
    • 1999
  • Mobile Agent is a movable software program that autonomously runs on behalf of its operator in a network environment. It has been widely applied to various kinds of computer engineering. In this paper, a network management architecture using the mobile agent technology in the distributed network environment is proposed. After manager system creates the mobile agent, it searches a proxy, a distributed object that acts as the substitute for a SNMP agent. In order to get the management information that manager requires, the mobile agent goes to the proxy and does operations on it. So, only the concise results from the operation are sent to the managing system. The proposed architecture is based on CORBA that provides several transparent characteristics in the distributed environment. In additional, the proxy object that represents the SNMP agent enables the mobile agent and the SNMP agent to converse with themselves. In this architecture, the mobile agent can carry out an automated management function, easily change and modify management functions. Therefore, it can provide an efficient management way.

  • PDF

Planetary Long-Range Deep 2D Global Localization Using Generative Adversarial Network (생성적 적대 신경망을 이용한 행성의 장거리 2차원 깊이 광역 위치 추정 방법)

  • Ahmed, M.Naguib;Nguyen, Tuan Anh;Islam, Naeem Ul;Kim, Jaewoong;Lee, Sukhan
    • The Journal of Korea Robotics Society
    • /
    • v.13 no.1
    • /
    • pp.26-30
    • /
    • 2018
  • Planetary global localization is necessary for long-range rover missions in which communication with command center operator is throttled due to the long distance. There has been number of researches that address this problem by exploiting and matching rover surroundings with global digital elevation maps (DEM). Using conventional methods for matching, however, is challenging due to artifacts in both DEM rendered images, and/or rover 2D images caused by DEM low resolution, rover image illumination variations and small terrain features. In this work, we use train CNN discriminator to match rover 2D image with DEM rendered images using conditional Generative Adversarial Network architecture (cGAN). We then use this discriminator to search an uncertainty bound given by visual odometry (VO) error bound to estimate rover optimal location and orientation. We demonstrate our network capability to learn to translate rover image into DEM simulated image and match them using Devon Island dataset. The experimental results show that our proposed approach achieves ~74% mean average precision.

Teleoperatoin System Control using a Robust State Estimation in Networked Environment (네트웍 환경에서의 강건상태추정을 이용한 원격조작시스템 제어)

  • Jin, Tae-Seok;Kim, Hyun-Sik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.746-753
    • /
    • 2008
  • In this paper, we introduce the improved control method are communicated between a master and a slave robot in the teleoperation systems. When the master and slave robots are located in different places, time delay is unavoidable under the network environment and it is well known that the system can become unstable when even a small time delay exists in the communication channel. The time delay may cause instability in teleoperation systems especially if those systems include haptic feedback. This paper presents a control scheme based on the estimator with virtual master model in teleoperation systems over the network. As the behavior of virtual model is tracking the one of master model, the operator can control real master robot by manipulating the virtual robot. And LQG/LTR scheme was adopted for the compensation of un-modeled dynamics. The approach is based on virtual master model, which has been implemented on a robot over the network. Its performance is verified by the computer simulation and the experiment.

The analysis of technology of the connected car (커넥티드 카의 기술 분석)

  • Shim, Hyun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.211-215
    • /
    • 2015
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving. The intelligent vehicle network is comprised for the driving information offering changing rapidly of the communication(V2V: Vehicle to Vehicle) between the car and the car, communication(V2I : Vehicle to Infrastructure) between the infrastructure and the car, and V2X (Vehicle to Nomadic).

  • PDF

Design and Implementation of Visual/Control Communication Protocol for Home Automated Robot Interaction and Control (홈오토메이션을 위한 영상/로봇제어 시스템의 설계와 구현)

  • Cho, Myung-Ji;Kim, Seong-Whan
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.27-36
    • /
    • 2009
  • PSTN (public switched telephone network) provides voice communication service, whereas IP network provides data oriented service, and we can use IP network for multimedia transport service (e.g. voice over IP service) with economic price. In this paper, we propose RoIP (robot on IP) service scenario, signaling call flow, and implementation to provide home automation and monitoring service for remote site users. In our scheme, we used a extended SIP (session initiation protocol) for signaling protocol between remote site users and home robots. For our bearer transport control, we implemented H.263 video codec over RTP (real-time transport protocol) and additionally DTMF (dual tone multi-frequency) transport for robot actuator control. We implemented our scheme on home robots and experimented with KTF operator network, and it shows good communication quality (average MOS = 9.15) and flexible robot controls.

  • PDF

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

A New Green Clustering Algorithm for Energy Efficiency in High-Density WLANs

  • Lu, Yang;Tan, Xuezhi;Mo, Yun;Ma, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.326-354
    • /
    • 2014
  • In this paper, a new green clustering algorithm is proposed to be as a first approach in the framework of an energy efficient strategy for centralized enterprise high-density WLANs. Traditionally, in order to maintain the network coverage, all the APs within the WLAN have to be powered-on. Nevertheless, the new algorithm can power-off a large proportion of APs while the coverage is maintained as its always-on counterpart. The two main components of the new approach are the faster procedure based on K-means and the more accurate procedure based on Evolutionary Algorithm (EA), respectively. The two procedures are processes in parallel for different designed requirements and there is information interaction in between. In order to implement the new algorithm, EA is applied to handle the optimization of multiple objectives. Moreover, we adapt the method for selection and recombination, and then introduce a new operator for mutation. This paper also presents simulations in scenarios modeled with ray-tracing method and FDTD technique, and the results show that about 67% to 90% of energy consumption can be saved while it is able to maintain the original network coverage during periods when few users are online or the traffic load is low.