• Title/Summary/Keyword: Recovery Scheme

Search Result 477, Processing Time 0.032 seconds

Timer-based Buffer Management for Reliable Multicast (신뢰적 멀티캐스트를 위한 타이머 기반 버퍼 관리)

  • 안상현;김영민;권영호
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.513-519
    • /
    • 2003
  • In order to deliver multicast traffic efficiently, multicast routing and reliable transmission mechanisms are required. The reliable delivery implies that lost packets must be retransmitted, which in turn requires that transmitted packets be stored in a retransmission buffer. Therefore how to manage a retransmission buffer is important and, in this paper, we try to solve the problem of how many packets should be maintained in the buffer. Our proposed scheme, the timer-based buffer management (TBM), maintains only necessary amount of buffer based on the timer value calculated from the NAKs between the replier and receivers on a multicast tree and can adjust to the dynamic network conditions. By performing simulations, we show that TBM manages the buffer efficiently regardless of the error situation, network size, and so on.

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation

  • Eom, Jung-Ho;Park, Seon-Ho;Kim, Tae-Kyung;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.79-85
    • /
    • 2005
  • In this paper, we dealt with substantial asset analysis methodology applied to two-dimensional asset classification and qualitative evaluation method according to the business process. Most of the existent risk analysis methodology and tools presented classification by asset type and physical evaluation by a quantitative method. We focused our research on qualitative evaluation with 2-dimensional asset classification. It converts from quantitative asset value with purchase cost, recovery and exchange cost, etc. to qualitative evaluation considering specific factors related to the business process. In the first phase, we classified the IT assets into tangible and intangible assets, including human and information data asset, and evaluated their value. Then, we converted the quantitative asset value to the qualitative asset value using a conversion standard table. In the second phase, we reclassified the assets using 2-dimensional classification factors reflecting the business process, and applied weight to the first evaluation results. This method is to consider the organization characteristics, IT asset structure scheme and business process. Therefore, we can evaluate the concrete and substantial asset value corresponding to the organization business process, even if they are the same asset type.

Characteristic Analysis of Flyback Type ZVS PWM DC-DC Converter Using Passive Resonant Snubber (패시브 공진 스너버를 이용한 플라이백형 ZVS PWM DC-DC 컨버터의 특성해석)

  • Kim, Jung-Do;Mun, Sang-Pil;Park, Han-Seok
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.3
    • /
    • pp.158-164
    • /
    • 2016
  • In this paper, a high frequency flyback type zero voltage soft switching PWM DC-DC converter using IGBTs is proposed. Effective applications for this power converter can be found in auxiliary power supplies of rolling stock transportation and electric vehicles. This power converter is basically composed of active power switches and a flyback high frequency transformer. In addition to these, passive lossless snubbers with power regeneration loops for energy recovery, consisting of a three winding auxiliary high frequency transformer, auxiliary capacitors and diodes are introduced to achieve zero voltage soft switching from light to full load conditions. Furthermore, this power converter has some advantages such as low cost circuit configuration, simple control scheme and high efficiency. Its operating principle is described and to determine circuit parameters, some practical design considerations are discussed. The effectiveness of the proposed power converter is evaluated and compared with the hard switching PWM DC-DC converter from an experimental point of view and the comparative electromagnetic conduction and radiation noise characteristics of both DC-DC power converter circuits are also depicted.

A New Blind Equalization Algorithm with A Stop-and-Go Flag (Stop-and-Go 플래그를 가지는 새로운 블라인드 등화 알고리즘)

  • Jeong, Young-Hwa
    • The Journal of Information Technology
    • /
    • v.8 no.3
    • /
    • pp.105-115
    • /
    • 2005
  • The CMA and MMA blind equalization algorithm has the inevitable large residual error caused by mismatching between the symbol constellation at a steady state after convergence. Stop-and-Go algorithm has a very superior residual error characteristics at a steady state but a relatively slow convergence characteristics. In this paper, we propose a SAG-Flagged MMA as a new adaptive blind equalization algorithm with a Stop-and-Go flag which follows a flagged MMA in update scheme of tap weights as appling the flag obtaining from Stop-and-Go algorithm to MMA. Using computer simulation, it is confirmed that the proposed algorithm has an enhancing performance from the viewpoint of residual ISI, residual error and convergence speed in comparison with MMA and Stop-and-Go algorithm. Algorithm has a new error function using the decided original constellation instead of the reduced constellation. By computer simulation, it is confirmed that the proposed algorithm has the performance superiority in terms of residual ISI and convergence speed compared with the adaptive blind equalization algorithm of CMA family, Constant Modulus Algorithm with Carrier Phase Recovery and Modified CMA(MCMA).

  • PDF

Development of Algorithm for 2-D Automatic Mesh Generation and Remeshing Technique Using Bubble Packing Method (I) -Linear Analysis- (버블패킹방법을 이용한 2차원 자동격자 생성 및 재구성 알고리듬 개발(I) -선형 해석-)

  • Jeong, Sun-Wan;Kim, Seung-Jo
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.25 no.6
    • /
    • pp.1004-1014
    • /
    • 2001
  • The fully automatic algorithm from initial finite element mesh generation to remeshing in two dimensional geometry is introduced using bubble packing method (BPM) for finite element analysis. BPM determines the node placement by force-balancing configuration of bubbles and the triangular meshes are made by Delaunay triangulation with advancing front concept. In BPM, we suggest two node-search algorithms and the adaptive/recursive bubble controls to search the optimal nodal position. To use the automatically generated mesh information in FEA, the new enhanced bandwidth minimization scheme with high efficiency in CPU time is developed. In the remeshing stage, the mesh refinement is incorporated by the control of bubble size using two parameters. And Superconvergent Patch Recovery (SPR) technique is used for error estimation. To verify the capability of this algorithm, we consider two elasticity problems, one is the bending problem of short cantilever beam and the tension problem of infinite plate with hole. The numerical results indicate that the algorithm by BPM is able to refine the mesh based on a posteriori error and control the mesh size easily by two parameters.

Adaptive Tree-based Recovery Scheme for Large-Scale Reliable Multicast Sessions (대규모 신뢰적 멀티캐스트 세션을 위한 적응형 트리 기반 복구 기법)

  • Yun, Won-Yong;Lee, Dong-Man
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.3
    • /
    • pp.360-369
    • /
    • 2000
  • 통신의 규모가 사용자 수와 지리적 범위 두 가지 측면에서 커짐에 따라 신뢰적인 멀티캐스트 프로토콜의 implosion 및 exposure 문제는 더욱 심각해진다. 본 논문은 트리 기반 신뢰적 멀티캐스트를 위한 효율적이고 확장성 있는 손실 복구 기법을 제안한다. 먼저 에러 비트맵 정보를 통하여 멀티캐스트 라우팅 트리와 유시한 논리적 트리를 구성함으로써 멀티캐스트 라우팅 트리에서 상위에 위치하는 수신자들이 재전송을 요청한 수신자의 신뢰성을 책임지도록 하고 또한 효율적인 복구를 위해 구성된 트리 상에 독립된 멀티캐스트 주소를 가지는 지역 그룹을 형성한다. 논리적 트리는 세션 멤버쉽이나 멀티캐스트 경로의 변화에 따라 적응적으로 재구성되는데 이는 멀티캐스트 세션의 진행 동안 논리적 트리와 멀티캐스트 라우팅 트리 사이에 불일치를 최소화함으로써 멤버쉽과 경로가 변하는 상황에서도 implosion과 exposure를 감소시키는 강점을 지닌다. 제안한 기법과 정적 트리기반의 신뢰적 멀티캐스트 프로토콜과의 시뮬레이션을 통한 비교는 세션의 크기가 증가할수록 제안한 적응형 트리 기반의 복구방식이 더욱 효율적임을 보여준다.

  • PDF

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

Dual Sink Nodes for Sink Node Failure in Wireless Sensor Networks (무선 센서 네트워크에서의 싱크노드 실패에 대비한 이중 싱크노드 장치)

  • Kim, Dae-Il;Park, Lae-Jeong;Park, Sung-Wook;Lee, Hyung-Bong;Moon, Jung-Ho;Chung, Tae-Yun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.6
    • /
    • pp.369-376
    • /
    • 2011
  • Since wireless sensor networks generally have the capability of network recovery, malfunction of a few sensor nodes in a sensor network does not cause a crucial problem paralyzing the sensor network. The malfunction of the sink node, however, is critical. If the sink node of a sensor network stops working, the data collected by sensor nodes cannot be delivered to the gateway because no other sensor nodes can take the place of the sink node. This paper proposes a TDMA-based wireless sensor network equipped with dual sink nodes, with a view to preventing data loss in the case of malfunction of a sink node. A secondary sink node, which synchronizes with a primary sink node and receives data from other sensor nodes in normal situations, takes the role of the primary sink node in the case of malfunction of the primary sink, thereby eliminating the possibility of data loss. The effectiveness of the proposed scheme is demonstrated through experiments.

Design of resource efficient network reprogramming protocol (자원 효율적인 네트워크 리프로그래밍 프로토콜 설계)

  • Choi, Rock-Hyun;Hong, Won-Kee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.67-75
    • /
    • 2010
  • Network reprogramming is a technology that allows several sensor nodes deployed in sensor field to be repaired remotely. Unlike general communication in sensor network where small amount of data is transferred, network reprogramming requires reliable transfer of large amount of data. The existing network reprogramming techniques suffers high cost and large energy consumption to recover data loss in node communication. In this paper, a cluster based network reporgramming scheme is proposed for sensor network. It divides sensor field into several clusters and chooses a cluster header in charge of data relay to minimize duplicated transmission and unnecessary competition. It increases reliability by effective error recovery through status table.

Digital Watermarking on Image for View-point Change and Malicious Attacks (영상의 시점변화와 악의적 공격에 대한 디지털 워터마킹)

  • Kim, Bo-Ra;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.19 no.3
    • /
    • pp.342-354
    • /
    • 2014
  • This paper deals with digital watermarking methods to protect ownership of image with targeting the ultra-high multi-view or free-view image service in which an arbitrary viewpoint image should be rendered at the user side. The main purpose of it is not to propose a superior method to the previous methods but to show how difficult to construct a watermarking scheme to overcome the viewpoint translation attack. Therefore we target the images with various attacks including viewpoint translation. This paper first shows how high the error rate of the extracted watermark data from viewpoint-translated image by basic schemes of the method using 2DDCT(2D discrete cosine transform) and the one using 2DDWT(2D discrete wavelet transform), which are for 2D image. Because the difficulty in watermarking for the viewpoint-translated image comes from the fact that we don't know the translated viewpoint, we propose a scheme to find the translated viewpoint, which uses the image and the corresponding depth information at the original viewpoint. This method is used to construct the two non-blind watermarking methods to be proposed. They are used to show that recovery of the viewpoint affect a great deal of the error rate of the extracted watermark. Also by comparing the performances of the proposed methods and the previous ones, we show that the proposed ones are better in invisibility and robustness, even if they are non-blind.