• Title/Summary/Keyword: Separate Networks

Search Result 158, Processing Time 0.027 seconds

On the QoS Support in Medium Access Control for Medical Sensor Networks (의료용 센서 네트워크에서 QoS 지원의 매체접속제어)

  • Ashrafuzzaman, Kazi;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.151-158
    • /
    • 2010
  • In line with the requirement of appropriate protocol support for such mission-critical wireless sensor network (WSN) applications as patient monitoring, we investigate the framework for designing medium access control (MAC) schemes. The data traffic in medical systems comes with inherent traffic heterogeneity as well as strict requirement of reliability according to the varied extents of devise-wise criticality in separate cases. This implies that the quality-of-Service (QoS) issues are very distinctly delicate requiring specialized consideration. Besides, there are features in such systems that can be exploited during the design of a MAC scheme. In a monitoring or routine surveillance application, there are degrees of regularity or predictability in traffic as coordinated from a node of central control. The coordinator thus takes on the role of marshaling the resources in a neighborhood of nodes deployed mostly for upstream traffic; in a collision-free scheme, it schedules the time slots for each superframe based on the QoS specifications. In this preliminary study, we identify the key artifacts of such a MAC scheme. We also present basic performance issues like the impact of superframe length on delay incurred, energy efficiency achieved in the network operation as obtained in a typical simulation setup based on this framework.

A MAC Parameter Optimization Scheme for IEEE 802.11e-based Multimedia Networks (IEEE 802.11e 기반 멀티미디어 네트워크를 위한 MAC 매개 변수 최적화 방법)

  • Sung, Min-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.455-461
    • /
    • 2008
  • Enhanced Distributed Channel Access (EDCA) is a channel access scheme adopted by the IEEE 802.11e draft standard for QoS-enabled wireless local area networks. It classifies traffic into separate Access Categories (ACs) and achieves service differentiation by allowing each AC to have its own values of channel access parameters. This paper proposes a scheme to dynamically adapt the EDCA parameters to traffic environment so that they both maximize the throughput of non real-time traffics and meet the delay and throughput constraints of real-time traffics. For this purpose, we develop a design algorithm for efficient exploration of the EDCA parameter space. Using the algorithm, we derive a Pareto curve fur delay-throughput trade-off in each anticipated traffic environment. The Pareto database can then be used to optimally adjust the parameter according to the traffic environment and administrative policies. Simulation results show that compared with the default parameter configuration, the proposed scheme is better for delay, throughput guarantee and can improve the throughput of non real-time traffics by 12% on average.

Suggestions for the Sustainability of Social Cooperatives (사회적 협동조합의 지속가능성을 위한 제언)

  • Lee, DeokSoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.5
    • /
    • pp.135-144
    • /
    • 2018
  • Recently, discussions about social economy have been actively promoted, and the establishment of social cooperatives, which is an axis of social economy, is being activated. However, because of the economic slowdown, social cooperative activities are often shrinking, and a case study is conducted on how to make social cooperatives sustainable. The results are as follows. In order for social cooperatives to cope with social change adaptation and market diversity, it is necessary to organize networks or participate in existing networks. It is also necessary that social cooperatives form different types of social cooperatives into separate organizational forms as needed. In addition, social cooperatives should make efforts to improve the quality of services and goods provided by each organization, and focus on attracting local people's empathy and participation to change the culture and atmosphere of the region. If such efforts are made, it will be possible for social cooperatives to become a sustainable economic organization.

Improvement of High-Availability Seamless Redundancy (HSR) Traffic Performance for Smart Grid Communications

  • Nsaif, Saad Allawi;Rhee, Jong Myung
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.653-661
    • /
    • 2012
  • High-availability seamless redundancy (HSR) is a redundancy protocol for Ethernet networks that provides two frame copies for each frame sent. Each copy will pass through separate physical paths, pursuing zero fault recovery time. This means that even in the case of a node or a link failure, there is no stoppage of network operations whatsoever. HSR is a potential candidate for the communications of a smart grid, but its main drawback is the unnecessary traffic created due to the duplicated copies of each sent frame, which are generated and circulated inside the network. This downside will degrade network performance and might cause network congestion or even stoppage. In this paper, we present two approaches to solve the above-mentioned problem. The first approach is called quick removing (QR), and is suited to ring or connected ring topologies. The idea is to remove the duplicated frame copies from the network when all the nodes have received one copy of the sent frame and begin to receive the second copy. Therefore, the forwarding of those frame copies until they reach the source node, as occurs in standard HSR, is not needed in QR. Our example shows a traffic reduction of 37.5%compared to the standard HSR protocol. The second approach is called the virtual ring (VRing), which divides any closed-loop HSR network into several VRings. Each VRing will circulate the traffic of a corresponding group of nodes within it. Therefore, the traffic in that group will not affect any of the other network links or nodes, which results in an enhancement of traffic performance. For our sample network, the VRing approach shows a network traffic reduction in the range of 67.7 to 48.4%in a healthy network case and 89.7 to 44.8%in a faulty network case, compared to standard HSR.

Efficient Fixed-Point Representation for ResNet-50 Convolutional Neural Network (ResNet-50 합성곱 신경망을 위한 고정 소수점 표현 방법)

  • Kang, Hyeong-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.1-8
    • /
    • 2018
  • Recently, the convolutional neural network shows high performance in many computer vision tasks. However, convolutional neural networks require enormous amount of operation, so it is difficult to adopt them in the embedded environments. To solve this problem, many studies are performed on the ASIC or FPGA implementation, where an efficient representation method is required. The fixed-point representation is adequate for the ASIC or FPGA implementation but causes a performance degradation. This paper proposes a separate optimization of representations for the convolutional layers and the batch normalization layers. With the proposed method, the required bit width for the convolutional layers is reduced from 16 bits to 10 bits for the ResNet-50 neural network. Since the computation amount of the convolutional layers occupies the most of the entire computation, the bit width reduction in the convolutional layers enables the efficient implementation of the convolutional neural networks.

The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) (VM(Virtual Machine) 을 이용한 분리된 가상화 침해유형 학습 데이터베이스 관리와 보안방안)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.947-953
    • /
    • 2011
  • These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

A Study on Face Recognition using Neural Networks and Characteristics Extraction based on Differential Image and DCT (차영상과 DCT 기반 특징 추출과 신경망을 이용한 얼굴 인식에 관한 연구)

  • 임춘환;고낙용;박종안
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.8B
    • /
    • pp.1549-1557
    • /
    • 1999
  • In this paper, we propose a face recognition algorithm based on the differential image method-DCT This algorithm uses neural networks which is flexible for noise. Using the same condition (same luminous intensity and same distance from the fixed CCD camera to human face), we have captured two images. One doesn't contain human face. The other contains human face. Differential image method is used to separate the second image into face region and background region. After that, we have extracted square area from the face region, which is based on the edge distribution. This square region is used as the characteristics region of human face. It contains the eye bows, the eyes, the nose, and the mouth. After executing DCT for this square region, we have extracted the feature vectors. The feature vectors were normalized and used as the input vectors of the neural network. Simulation results show 100% recognition rate when face images were learned and 92.25% recognition rate when face images weren't learned for 30 persons.

  • PDF

Performance Analysis of Flow Control Method Using Virtual Switchs on ATM (ATM에서 가상 스위치를 이용한 흐름 제어 방식의 성능 분석)

  • 조미령;양성현;이상훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.1
    • /
    • pp.85-94
    • /
    • 2002
  • EMRCA(Explicit Max_min Rate Control Algorithm) switch, which has been proposed in the ATM(Asychronous Transfer Mode) standard, controls the ABR(Available Bit Rate) service traffic in the ATM networks. The ABR service class of ATM networks uses a feedback control mechanism to adapt to varying link capacities. The VS/VD(Virtual Source/Virtual Destination) technique offers the possibility to segment the otherwise end-to-end ABR control loop into separate loops. The improved feedback delay and the control of ABR traffic inside closed segments provide a better performance and QoS(Quality of Service) for ABR connections with respect to throughput, delay, and jitter. This paper is study of an ABR VS/VD flow control method. Linear control theory offers the means to derive correct choices of parameters and to assess performance issues, like stability of the system, during the design phase. The performance goals are a high link utilization, fair bandwidth distribution and robust operation in various environments, which are verified by discrete event simulations. The major contribution of this work is the use of linear control theory to model and design an ABR flow control method tailored for the special layout of a VS/VD switch, the simulation shows that this techniques better than conventional method.

  • PDF

A Strong Address Generation and Verification Scheme using Hash Functions in the IPv6 Environments (IPv6 환경에서 해쉬 함수 기반 강건한 주소 생성 및 검증 기법)

  • Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.115-119
    • /
    • 2007
  • The IPv6 protocol provides the method to automatically generate an address of a node without additional operations of administrators, Before the generated address is used, the duplicate address detection (DAD) mechanism is required in order to verify the address. However, during the process of verification of the address, it is possible for a malicious node to send a message with the address which is identical with the generated address, so the address can be considered as previously used one; although the node properly generates an address, the address cannot be used. In this paper, we present a strong scheme to perform the DAD mechanism based on hash functions in IPv6 networks. Using this scheme, many nodes, which frequently join or separate from wireless networks in public domains like airports, terminals, and conference rooms, can effectively generate and verify an address more than the secure neighbor discovery (SEND) mechanism.

Network separation construction method using network virtualization (네트워크 가상화를 이용한 망 분리 구축 방법)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1071-1076
    • /
    • 2020
  • The importance of network separation is due to the use of the Internet with existing business PCs, resulting in an internal information leakage event, and an environment configured to allow servers to access the Internet, which causes service failures with malicious code. In order to overcome this problem, it is necessary to use network virtualization to separate networks and network interconnection systems. Therefore, in this study, the construction area was constructed into the network area for the Internet and the server farm area for the virtualization system, and then classified and constructed into the security system area and the data link system area between networks. In order to prove the excellence of the proposed method, a network separation construction study using network virtualization was conducted based on the basis of VM Density's conservative estimates of program loads and LOBs.