• Title/Summary/Keyword: Open network

Search Result 1,727, Processing Time 0.031 seconds

QoS-enabled Next Generation Local Area Network for IP-based Convergence Services (IP 기반 통합서비스를 위한 QoS 가능 차세대 LAN)

  • Lee, Kyou-Ho;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2166-2172
    • /
    • 2006
  • This paper presents a quality-of-service-enabled next generation local area network architecture which can provide efficiently convergence services over the Internet protocol. The basic concept of the architecture is to combine such three principle technologies as programmable switched network quality-of-service resource management and Internet protocol based network convergence. We discuss system entities and technologies development, which constitute the proposed network. The architecture of the network is then described. Implementation of systems verifies the proposed technologies. The network as a next generation local area network can provide quality-of-service-enabled real-time communication services as well as existing data traffic, and the open programmable interface can facilitates to adopt cost-effectively emerging new services or functionalities.

Understanding and Development of Software-based Open Architecture Controller (소프트웨어 기반의 개방형 제어기에 대한 이해와 개발)

  • Yun Won-Soo;Kim Chan-Bong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.4
    • /
    • pp.136-143
    • /
    • 2005
  • Open architecture controller (OAC) is well known technology in factory automation. To better understand the requirements of OAC, authors have discussed the OAC related topics with a number of control experts who represents different segments of the machining industry. There is no common concept that is accepted or used, however, the common ideas for OAC is the control system that is hardware independent, interchangeable, and easily scalable. This paper presents summary of the understaning and requirements of OAC. Based on the requirements of OAC, authors developed the software based PC-CNC. The main focus of the PC-CNC was on the user customization capability and open interface between control networks in manufacturing system. This paper introduces the developed PC-CNC briefly. In addition to introduction of the PC-CNC, to fill the gap between end users and vendors of OAC, this paper presents two applications using OAC. One is a remote monitoring system. The OPC (Ole for Process Control) standard interface was used to monitor the status of open architecture CNC across network. The other is the remote production management module for machine tools using standard database interface.

Trend analysis of open source distribution related to installation (오픈 소스 배포판의 설치 관련 동향 분석)

  • Jung, Sung-Jae;Bae, Yu-Mi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1932-1938
    • /
    • 2011
  • Public source code distribution form is done by mainly by limited class user and it was too hard to install. But companies are increasing who distribute software as open source, mass of people's interest also became high and it is coming about installation related methods have been changing. Not only traditional compile based installation, it is entrance on the stage of user friendly technique that is package installation, network based install, file execution after uncompression and cmake method to give easily to developer various platform support. This paper will analyze open source operating system Linux based public open source distributed application installation trend.

Design and Implementation of Lightweight Encryption Algorithm on OpenSSL (OpenSSL 상에서 LEA 설계 및 구현)

  • Park, Gi-Tae;Han, Hyo-Joon;Lee, Jae-Hwoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.822-830
    • /
    • 2014
  • Recently, A Security service in Internet environments has been more important and the use of SSL & TLS is increasing for the personel homepage as well as administrative institutions. Also, IETF suggests using DTLS, which can provide a security service to constrained devices with lower CPU power and limited memory space under IoT environments. In this paper, we implement LEA(Lightweight Encryption Algorithm) algorithm and apply it to OpenSSL. The implemented algorithm is compared with other symmetric encryption algorithms such as AES etc, and it shows the superior performance in calculation speed.

A Novel Framework for Resource Orchestration in OpenStack Cloud Platform

  • Muhammad, Afaq;Song, Wang-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5404-5424
    • /
    • 2018
  • This work is mainly focused on two major topics in cloud platforms by using OpenStack as a case study: management and provisioning of resources to meet the requirements of a service demanded by remote end-user and relocation of virtual machines (VMs) requests to offload the encumbered compute nodes. The general framework architecture contains two subsystems: 1) An orchestrator that allows to systematize provisioning and resource management in OpenStack, and 2) A resource utilization based subsystem for vibrant VM relocation in OpenStack. The suggested orchestrator provisions and manages resources by: 1) manipulating application program interfaces (APIs) delivered by the cloud supplier in order to allocate/control/manage storage and compute resources; 2) interrelating with software-defined networking (SDN) controller to acquire the details of the accessible resources, and training the variations/rules to manage the network based on the requirements of cloud service. For resource provisioning, an algorithm is suggested, which provisions resources on the basis of unused resources in a pool of VMs. A sub-system is suggested for VM relocation in a cloud computing platform. The framework decides the proposed overload recognition, VM allocation algorithms for VM relocation in clouds and VM selection.

A Parasitic Elements Extraction of the Distributed Elements and an Application of the BPF Using the Short-Open Calibration Method (단락 개방 Calibration 방법을 이용한 분포 정수 소자의 기생 소자 추출 및 대역 통과 필터에의 응용)

  • Kim, Yu-Seon;Nam, Hun;Lim, Yeong-Seog
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.2
    • /
    • pp.115-123
    • /
    • 2009
  • In this paper, we extract the parasitic elements of the transmission line with the defected ground structure(DGS) and the short-circuited comb line section using the Short-Open Calibration(SOC). The scattering matrixes of short, open and the distributed elements in microstrip line are measured by full electro-magnetic(EM) simulator and Vector Network Analyser(VNA). The electro-magnetic effects of the proposed structures are considered by the II and T equivalent circuits with frequency independent elements, and the relations between the measured scattering parameters and the elements in the circuits are shown by performing 2 port network analysis. Moreover, to design the 2.4 GHz bandpass filter with second order butterworth prototype, the proposed methods are applied. As results, the measured $S_{11}$ and $S_{21}$ indicate -20 dB and -1.3 dB at center frequency, and these are shown within 5 % error compare to the predicted results at $0.5{\sim}5\;GHz$.

Implementation of Home Monitoring System Using a Vacuum Robot with Wireless Router (유무선공유기와 청소로봇을 이용한 홈 모니터링 시스템의 구현)

  • Jeon, Byung-Chan;Choi, Gyoo-Seok;Kang, Jeong-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.73-80
    • /
    • 2008
  • The recent trend in home network system includes intelligent home environments that remote monitoring and control service is achieved without restrictions by device types, time, and place. Also the use of a vacuum robot in homes is gradually generalized on account of the convenience of the use. In this paper, we proposed and realized new home-monitoring system with the employment of an self-movement robot as one trial for realizing an intelligent home under home network environment. The proposed system can freely monitor every where in home, because the system effectively overcame the surveillance limitations of the existing monitoring system by attaching a Wireless Router and WebCam to a commercial vacuum robot. The outdoor users of this system can readily monitor any place which they want to supervise by controlling a vacuum robot with mobile telecommunication devices such as PDA. The wireless router installed with Linux operation system "OpenWrt" made it possible for the system users to transmit images and to control a vacuum robot with RS-232 communication.

  • PDF

Implementation of SNS based on an Open Wi-Fi & APPosition Information (Open Wi-Fi와 AP 정보를 이용한 소셜네트워크서비스)

  • Seo, Chang-Jin;Kang, Hee-Won;Jang, Yong-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.257-263
    • /
    • 2012
  • Smart phones become popular all over the world recently. At the same time, demand of various additional services, such as SNS by utilizing low-cost reliable Wi-Fi network and position information, is expected to keep growing. In this paper, Implementation of SNS based on an Open Wi-Fi & Position Information was proposed. This service is achieved by constructing an Open Wi-Fi network based on a built AP access information database. And in order to provide durable connection in mobile environment, RSS detect AP switching module and mobile IP are utilized in the proposed service. Furthermore, with the utilization of GPS information of AP, AP providers could delivery various information such as advertisements, promotion events. In addition, it is possible for AP users to communicate with each other, thus a position information based SNS was also proposed in this paper.

CNN-based Online Sign Language Translation Counseling System (CNN기반의 온라인 수어통역 상담 시스템에 관한 연구)

  • Park, Won-Cheol;Park, Koo-Rack
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.17-22
    • /
    • 2021
  • It is difficult for the hearing impaired to use the counseling service without sign language interpretation. Due to the shortage of sign language interpreters, it takes a lot of time to connect to sign language interpreters, or there are many cases where the connection is not available. Therefore, in this paper, we propose a system that captures sign language as an image using OpenCV and CNN (Convolutional Neural Network), recognizes sign language motion, and converts the meaning of sign language into textual data and provides it to users. The counselor can conduct counseling by reading the stored sign language translation counseling contents. Consultation is possible without a professional sign language interpreter, reducing the burden of waiting for a sign language interpreter. If the proposed system is applied to counseling services for the hearing impaired, it is expected to improve the effectiveness of counseling and promote academic research on counseling for the hearing impaired in the future.

Comparison of SIEM Solutions for Network Security (네트워크 보안을 위한 SIEM 솔루션 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • As technology develops, the latest security threats on the network applied to users are increasing. By attacking industrial or corporate systems with malicious purposes, hackers cause many social problems such as confidential information leakage, cyber terrorism, infringement of information assets, and financial damage. Due to the complex and diversified threats, the current security personnel alone are not enough to detect and analyze all threats. In particular, the Supervisory Control And Data Acquisition (SCADA) used in industrial infrastructures that collect, analyze, and return static data 24 hours a day, 265 days a year, is very vulnerable to real-time security threats. This paper introduces security information and event management (SIEM), a powerful integrated security management system that can monitor the state of the system in real time and detect security threats. Next, we compare SIEM solutions from various companies with the open source SIEM (OSSIM) from AlienVault, which is distributed as an open source, and present cases using the OSSIM and how to utilize it.