• 제목/요약/키워드: Research Network

검색결과 14,886건 처리시간 0.047초

원격검침 설비의 네트워크 상태감시를 위한 SNMP 기반의 저압 AMI 망관리시스템 개발 (Development of AMI NMS (Network Management System) using SNMP for Network Monitoring of Meter Reading Devices)

  • 김영일;박소정;김영준;정남준;최문석;박병석
    • KEPCO Journal on Electric Power and Energy
    • /
    • 제2권2호
    • /
    • pp.259-268
    • /
    • 2016
  • 한국전력공사는 200년부터 저압 고객에 대한 AMI (Advanced Metering Infrastructure) 기반의 검침시스템을 구축하여 운영하고 있다. 한전의 AMI 검침시스템은 현재 255만호에 설치되어 운영되고 있으며 2020년까지 2200만호를 설치하여 운영할 예정이다. 본 연구에서는 원활한 AMI 검침망 운영을 위해 DCU (Data Concentration Unit) 및 모뎀에 대한 네트워크 동작상태를 감시할 수 있는 AMI 망관리시스템을 개발하였다. AMI 망관리시스템은 네트워크 장비에 대한 속성 데이터 및 네트워크 토플로지 정보, 통신성능 정보, 장애정보 등을 수집하고, 데이터 분석을 통해 장애내역을 생성하며, 원격에서 장비를 제어하는 등의 기능을 제공하고 있다. AMI 망관리시스템은 전력선 통신망에서 네트워크 장비에 대한 약 370여개의 MIB (Management Information Base) 정보를 SNMP (Simple Network Management Protocol)를 이용하여 수집과 제어를 수행하고 있다. 본 논문에서는 AMI 망관리시스템에 대한 주요 기능과 설계내용, 구현된 서비스 화면을 소개하고자 한다.

Distributed memory access architecture and control for fully disaggregated datacenter network

  • Kyeong-Eun Han;Ji Wook Youn;Jongtae Song;Dae-Ub Kim;Joon Ki Lee
    • ETRI Journal
    • /
    • 제44권6호
    • /
    • pp.1020-1033
    • /
    • 2022
  • In this paper, we propose novel disaggregated memory module (dMM) architecture and memory access control schemes to solve the collision and contention problems of memory disaggregation, reducing the average memory access time to less than 1 ㎲. In the schemes, the distributed scheduler in each dMM determines the order of memory read/write access based on delay-sensitive priority requests in the disaggregated memory access frame (dMAF). We used the memory-intensive first (MIF) algorithm and priority-based MIF (p-MIF) algorithm that prioritize delay-sensitive and/or memory-intensive (MI) traffic over CPU-intensive (CI) traffic. We evaluated the performance of the proposed schemes through simulation using OPNET and hardware implementation. Our results showed that when the offered load was below 0.7 and the payload of dMAF was 256 bytes, the average round trip time (RTT) was the lowest, ~0.676 ㎲. The dMM scheduling algorithms, MIF and p-MIF, achieved delay less than 1 ㎲ for all MI traffic with less than 10% of transmission overhead.

SNS에서 사회연결망 기반 추천과 협업필터링 기반 추천의 비교 (Comparison of Recommendation Using Social Network Analysis with Collaborative Filtering in Social Network Sites)

  • 박상언
    • 한국IT서비스학회지
    • /
    • 제13권2호
    • /
    • pp.173-184
    • /
    • 2014
  • As social network services has become one of the most successful web-based business, recommendation in social network sites that assist people to choose various products and services is also widely adopted. Collaborative Filtering is one of the most widely adopted recommendation approaches, but recommendation technique that use explicit or implicit social network information from social networks has become proposed in recent research works. In this paper, we reviewed and compared research works about recommendation using social network analysis and collaborative filtering in social network sites. As the results of the analysis, we suggested the trends and implications for future research of recommendation in SNSs. It is expected that graph-based analysis on the semantic social network and systematic comparative analysis on the performances of social filtering and collaborative filtering are required.

An Efficient Network Attack Visualization Using Security Quad and Cube

  • Chang, Beom-Hwan;Jeong, Chi-Yoon
    • ETRI Journal
    • /
    • 제33권5호
    • /
    • pp.770-779
    • /
    • 2011
  • Security quad and cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated in the security devices; however, it takes a lot of time to inspect and analyze them because the security devices generate an overwhelming amount of logs and security events. In this paper, we propose SQC, an efficient method for analyzing network security through visualization. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacks. In addition, by providing a detailed analysis of network attacks, this method can more precisely detect and distinguish them from normal events.

Remote Monitoring with Hierarchical Network Architectures for Large-Scale Wind Power Farms

  • Ahmed, Mohamed A.;Song, Minho;Pan, Jae-Kyung;Kim, Young-Chon
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권3호
    • /
    • pp.1319-1327
    • /
    • 2015
  • As wind power farm (WPF) installations continue to grow, monitoring and controlling large-scale WPFs presents new challenges. In this paper, a hierarchical network architecture is proposed in order to provide remote monitoring and control of large-scale WPFs. The network architecture consists of three levels, including the WPF comprised of wind turbines and meteorological towers, local control center (LCC) responsible for remote monitoring and control of wind turbines, and a central control center (CCC) that offers data collection and aggregation of many WPFs. Different scenarios are considered in order to evaluate the performance of the WPF communications network with its hierarchical architecture. The communications network within the WPF is regarded as the local area network (LAN) while the communication among the LCCs and the CCC happens through a wide area network (WAN). We develop a communications network model based on an OPNET modeler, and the network performance is evaluated with respect to the link bandwidth and the end-to-end delay measured for various applications. As a result, this work contributes to the design of communications networks for large-scale WPFs.

User Information Collection of Weibo Network Public Opinion under Python

  • Changhua Liu;Yanlin Han
    • Journal of Information Processing Systems
    • /
    • 제19권3호
    • /
    • pp.310-322
    • /
    • 2023
  • Although the network environment is gradually improving, the virtual nature of the network is still the same fact, which has brought a great influence on the supervision of Weibo network public opinion dissemination. In order to reduce this influence, the user information of Weibo network public opinion dissemination is studied by using Python technology. Specifically, the 2019 "Ethiopian air crash" event was taken as the research subject, the relevant data were collected by using Python technology, and the data from March 10, 2019 to June 20, 2019 were constructed by using the implicit Dirichlet distribution topic model and the naive Bayes classifier. The Weibo network public opinion user identity graph model under the "Ethiopian air crash" on June 20 found that the public opinion users of ordinary netizens accounted for the highest proportion and were easily influenced by media public opinion users. This influence is not limited to ordinary netizens. Public opinion users have an influence on other types of public opinion users. That is to say, in the network public opinion space of the "Ethiopian air crash," media public opinion users play an important role in the dissemination of network public opinion information. This research can lay a foundation for the classification and identification of user identity information types under different public opinion life cycles. Future research can start from the supervision of public opinion and the type of user identity to improve the scientific management and control of user information dissemination through Weibo network public opinion.

Design of Multiband Maritime Network for Ships and its Applications

  • Yun, Chang-Ho;Cho, A-Ra;Kim, Seung-Geun;Park, Jong-Won;Lim, Yong-Kon
    • Journal of information and communication convergence engineering
    • /
    • 제7권3호
    • /
    • pp.314-322
    • /
    • 2009
  • Nowadays, maritime communication systems need high data rate, reliability, and consistency in order to equivalently provide navigating ships with diverse multimedia services as in terrestrial communication systems. For this purpose, we conceptualize and design the maritime network for ships equipped with a multiband communication system which cost-effectively supports multimedia services according to several radiofrequency bands, such as HF, VHF, and satellite frequencies. We also introduce two service scenarios targeted for the maritime network; ship multimedia service (SMS) and real-time maritime logistics location tracking (RML2T). In addition, we specify related works according to three lower network layers (i.e., physical, data-link, and network layers) upon designing the network.

보안정책모델을 적용한 네트워크보안제어서버 구조 (Architecture of Network Security Control Server for applying Security Policy Model)

  • 방효찬;김기영;김건량;장종수
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2001년도 추계학술발표논문집 (하)
    • /
    • pp.993-996
    • /
    • 2001
  • 본 논문에서는 정책기반 네트워크보안 프레임워크의 전체적인 구조와 주요 아키텍쳐에 대해서 논하고 특히 보안정책 서버의 역할을 담당하는 네트워크보안제어서버의 구조와 메커니즘에 대해 구체적으로 기술한다.

  • PDF

Multiple Reward Reinforcement learning control of a mobile robot in home network environment

  • Kang, Dong-Oh;Lee, Jeun-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1300-1304
    • /
    • 2003
  • The following paper deals with a control problem of a mobile robot in home network environment. The home network causes the mobile robot to communicate with sensors to get the sensor measurements and to be adapted to the environment changes. To get the improved performance of control of a mobile robot in spite of the change in home network environment, we use the fuzzy inference system with multiple reward reinforcement learning. The multiple reward reinforcement learning enables the mobile robot to consider the multiple control objectives and adapt itself to the change in home network environment. Multiple reward fuzzy Q-learning method is proposed for the multiple reward reinforcement learning. Multiple Q-values are considered and max-min optimization is applied to get the improved fuzzy rule. To show the effectiveness of the proposed method, some simulation results are given, which are performed in home network environment, i.e., LAN, wireless LAN, etc.

  • PDF