• 제목/요약/키워드: Physical Network

검색결과 1,850건 처리시간 0.025초

분산 제어 시스템의 제어 통신망을 위한 토큰 전달 버스 접근 방식과 IEEE 802.3 물리 계층의 결합 (Token-passing Bus Access Method on IEEE 802.3 Physical Layer for Control Networks of a Distributed Control System)

  • 이재영;문홍주;문상용;권욱현;이성우;박익수
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1998년도 추계학술대회 논문집 학회본부 B
    • /
    • pp.609-611
    • /
    • 1998
  • In this paper, a method for the efficient implementation of the control network for a distributed control system (DCS) is proposed. The proposed method focuses on the real-time property and the low networking cost of a control network. It suggests a new network architecture combining the IEEE 802.4 token-passing bus access method and the IEEE 802.3 physical layer. For this purpose, a new interface, a physical layer service translator is introduced. A control network using this method is implemented and applied to a DCS.

  • PDF

입출력 가상화 기반 가상 데스크탑 서비스를 이용한 물리적 네트워크 망분리 시스템 설계 및 구현 (Design and Implementation of a Physical Network Separation System using Virtual Desktop Service based on I/O Virtualization)

  • 김선욱;김성운;김학영;정성권;이숙영
    • 정보과학회 컴퓨팅의 실제 논문지
    • /
    • 제21권7호
    • /
    • pp.506-511
    • /
    • 2015
  • 입출력 가상화는 하나의 물리적 입출력 장치를 하나 이상의 가상 데스크탑들이 공유해서 사용 할 수 있도록 하는 기술로서 일반적으로 가상화 소프트웨어가 소프트웨어적으로 에뮬레이션하여 제공하는 가상 I/O 장치들을 가상 데스크탑에서 사용한다. 소프트웨어 에뮬레이션 기반 I/O 장치들을 사용하는 가상 데스크탑들은 성능이 떨어지고 고사양의 응용 프로그램을 지원할 수 없는 문제점을 가지고 있다. 본 논문에서는 이러한 서비스의 품질 및 성능 저하를 극복하기 위해 PCI기반 하드웨어 직접 할당기술을 이용한 망분리 가상 데스크탑 시스템을 제안한다. 제안하는 시스템은 하나의 물리적 데스크탑 컴퓨터에 서버 가상화 기술을 이용하여 사용자에게 인터넷 등의 외부망과 인트라넷 등의 업무망 접속을 위한 독립적인 데스크탑을 제공한다. 이를 통해 물리적 망분리를 위한 별도의 데스크탑 설치 및 논리적 망분리를 위한 네트워크 패킷의 검사에 따른 성능의 저하 없이 가상 데스크탑 서비스를 이용한 물리적 네트워크 망분리 시스템을 제공한다.

Job Stress of Mobile Communication Network Construction Workers

  • Lee, Dong-Gu;Yoon, Hoon-Yong
    • 대한인간공학회지
    • /
    • 제34권6호
    • /
    • pp.549-561
    • /
    • 2015
  • Objective: The purpose of this study was to investigate the job stress factors of mobile communication network construction workers using survey based on 'Job stress factors evaluation tool for Koreans' that was developed by KOSHA in 2003. Background: Due to the rapid growth of penetration rate of smartphone, the necessity of LTE service changing from 3G network was brought up. The demand of LTE network construction in a short period of time leads to the aggravation of the job stress of mobile communication network construction workers. Method: Two hundred and fifty workers who were in the mobile communication network industry participated in this study, and among them 206 responses were analyzed for this study due to the unreliability and insincerity of responses. The eight job stress factors which are physical environment, job demand, job autonomy, relation conflict, job instability, organizational system, inadequate compensation, workplace culture were analyzed. Results: The job stress factors of mobile communication network construction workers were compared to those of other industry workers, and other work related characteristics were analyzed. The results showed that the stress level of a physical environment and job requirement were relatively higher than those of manufacturing industry workers, meaning that mobile communication network construction workers have rough working conditions and increased amount of work due to the demand of LTE network construction. The stress level of physical environment for outdoor job workers was relatively higher than that of indoor job workers. With the analytical result for level of job satisfaction, significant difference was observed (p <0.05) with every factor, and the job stress was found the highest with those not satisfied with every factor Conclusion: From the results of this study, the work loss due to the job stress could be prevented, and accurate stress factors could be removed at the workplace. Application: The results of this study may not represent the whole mobile network construction workers, the effort for job stress management is needed to improve the work efficiency and the workers' quality of life.

무선 센서 네트워크 기반의 빌딩 조명 제어 시스템 (Intelligent building light control system based on wireless sensor network)

  • 장정훈;유준재;윤명현;이명수;임호정;이민구;장동설
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.174-176
    • /
    • 2006
  • Sensor network supports data delivery from Physical world to cyber space. Sensors get physical events then wireless network transfers sensor data to service server. We use sensor network technology to light control system for intelligent building. In ubiquitous computing environment. wireless sensor network is basic tool for intelligent service. In this paper, we propose intelligent building light control system based on wireless sensor network. It is implemented using previous light control product, can be adopted to present building light system.

  • PDF

A Layered Network Flow Algorithm for the Tunnel Design Problem in Virtual Private Networks with QoS Guarantee

  • Song, Sang-Hwa;Sung, Chang-Sup
    • Management Science and Financial Engineering
    • /
    • 제12권2호
    • /
    • pp.37-62
    • /
    • 2006
  • This paper considers the problem of designing logical tunnels in virtual private networks considering QoS guarantee which restricts the number of tunnel hops for each traffic routing. The previous researches focused on the design of logical tunnel itself and Steiner-tree based solution algorithms were proposed. However, we show that for some objective settings it is not sufficient and is necessary to consider both physical and logical connectivity at the same time. Thereupon, the concept of the layered network is applied to the logical tunnel design problem in virtual private networks. The layered network approach considers the design of logical tunnel as well as its physical routing and we propose a modified branch-and-price algorithm which is known to solve layered network design problems effectively. To show the performance of the proposed algorithm, computational experiments have been done and the results show that the proposed algorithm solves the given problem efficiently and effectively.

Cell Virtualization with Network Partition for Initial User Association in Software Defined Small-cell Networks

  • Sun, Guolin;Lu, Li;Ayepah-Mensah, Daniel;Fang, Xiufen;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권10호
    • /
    • pp.4703-4723
    • /
    • 2018
  • In recent years, dense small cell network has been deployed to address the challenge that has resulted from the unprecendented growth of mobile data traffic and users. It has proven to be a cost efficeient solution to offload traffic from macro-cells. Software defined heterogeneous wireless network can decouple the control plane from the data plane. The control signal goes through the macro-cell while the data traffic can be offloaded by small cells. In this paper, we propose a framework for cell virtualization and user association in order to satisfy versatile requirements of multiple tenants. In the proposed framework, we propose an interference graph partioning based virtual-cell association and customized physical-cell association for multi-homed users in a software defined small cell network. The proposed user association scheme includes 3 steps: initialization, virtual-cell association and physical-cell association. Simulation results show that the proposed virtual-cell association outperforms the other schemes. For physical-cell association, the results on resource utilization and user fairness are examined for mobile users and infrastructure providers.

Cyber-Physical-Social 시스템과 OAuth를 이용한 IoT 인증 기법 (An Authentication Scheme Using OAuth and Cyber Physical Social System)

  • 조정우;이국영;이기영
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 춘계학술대회
    • /
    • pp.348-351
    • /
    • 2016
  • 최근 IoT 환경에서 많은 디바이스들의 등장과 더불어 특정 사용자만 접근 가능한 보호된 네트워크가 필요하게 되었다. IoT 네트워크 환경에 OAuth 프로토콜을 적용하여 인증하게 되면 보다 쉽게 네트워크 인증 체계를 구축할 수 있으나 OAuth는 공격자가 Token을 가로채게 되면 쉽게 공격에 노출되는 단점이 있어 2차 인증이 필수적이라고 할 수 있다. 궁극적인 IoT는 Fog Computing이 필수적이다. Fog Computing은 Cloud를 확장시켜 network Core에서 뿐만 아니라 Edge에서도 Computing이 가능하게 하고, node간의 통신을 가능하게 하는 플랫폼이다. Fog Computing의 장점으로는 Location awareness나 Support for mobility 등을 들 수 있다. Fog Computing내에서 사용할 인증이 이런 Fog Computing의 장점을 살린다면, 더 IoT에 걸맞은 인증을 할 수 있을 것이다. 이에 2차 인증에 기존의 인증서나 id/password, 또는 group key같은 번거로운 것을 이용하지 않고 Cyber-Physical-Social System을 사용한다면 user의 편리성을 더 증가시킬 수 있을 것이다. 본 연구에서는 Cyber-Physical-Social System기반의 인증에 관한 연구를 진행하려 한다.

  • PDF

Comparison of Chlorophyll Algorithms in the Bohai Sea of China

  • Xiu, Peng;Liu, Yuguang;Rong, Zengrui;Zong, Haibo;Li, Gang;Xing, Xinogang;Cheng, Yongcun
    • Ocean Science Journal
    • /
    • 제42권4호
    • /
    • pp.199-209
    • /
    • 2007
  • Empirical band-ratio algorithms and artificial neural network techniques to retrieve sea surface chlorophyll concentrations were evaluated in the Bohai Sea of China by using an extensive field observation data set. Bohai Sea represents an example of optically complex case II waters with high concentrations of colored dissolved organic mattei (CDOM). The data set includes coincident measurements of radiometric quantities and chlorophyll a concentration (Chl), which were taken on 8 cruises between 2003 and 2005, The data covers a range of variability in Chl in surface waters from 0.3 to 6.5 mg $m^{-3}$. The comparison results showed that these empirical algorithms developed for case I and case II waters can not be applied directly to the Bohai Sea of china, because of significant biases. For example, the mean normalized bias (MNB) for OC4V4 product was 1.85 and the root mean square (RMS) error is 2.26.

The Viability of the Malaysian Penal Code in Handling Physical Damage Caused by Malware

  • Rahman, Rizal;Zakaria, Mohd Sophian
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.52-56
    • /
    • 2021
  • There is no assurance that malware could only cause virtual damage to computer programs and data as its potential is endless. However, legal provisions were earlier developed to cater to either a physical damage caused by a physical action or a virtual damage caused by a virtual action. When crossovers occur, it becomes quite uncertain as to how viable the current laws are in handling this matter. The author seeks to address the issue from the perspective of the laws of Malaysia.

QA/QC Techniques for the Automated Hydrocarbon Monitoring Natwork in the UK

  • Rod Robinson;Tony andrews;David Butterfield;Paul Quincey
    • Journal of Korean Society for Atmospheric Environment
    • /
    • 제17권E1호
    • /
    • pp.25-33
    • /
    • 2001
  • This paper presents an overview of the UK Hydrocarbon Monitoring Network and summarises some of the lessons learnt from running and automated VOC monitoring network in th UK. The paper will describe the operation of the network and the Quality Control and Quality Assurance (QA/QC) procedures used to ensure that the data qality objectives are met. The provision of accurate measurements of ambient air pollutant concentrations is a valuable and high-profile service of Governments, assisting policy decisions and allowing members of the public to be well-informed. The need for such measurements has been increased in the UK by the National Air Quality Strategy and European Air Quality Directives, with the National Networks playing a central role in delivering the information. The Hydrocarbon Network provides measurements directly in support of monitoring requirements for benzene and 1,3-butadiene, and of 23 other hydrocarbon species important for their role in ozone and secondary particulate formation.