• Title/Summary/Keyword: Well-network system

Search Result 2,219, Processing Time 0.027 seconds

Petersen-Torus(PT) Network for Multicomputing System (멀티컴퓨팅 시스템을 위한 피터슨-토러스(PT) 네트워크)

  • Seo, Jung-Hyun;Lee, Hyeong-Ok;Jang, Moon-Suk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.6
    • /
    • pp.263-272
    • /
    • 2008
  • We propose and analyze a new interconnection network, called petersen-torus(PT) network based on well-known petersen graph. PT network has a smaller diameter and a smaller network cost than honeycomb torus with same number of nodes. In this paper, we propose optimal routing algorithm and hamiltonian cycle algorithm. We derive diameter, network cost and bisection width.

Optimal Stochastic Policies in a network coding capable Ad Hoc Networks

  • Oh, Hayoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4389-4410
    • /
    • 2014
  • Network coding is a promising technology that increases system throughput by reducing the number of packet transmissions from the source node to the destination node in a saturated traffic scenario. Nevertheless, some packets can suffer from end-to-end delay, because of a queuing delay in an intermediate node waiting for other packets to be encoded with exclusive or (XOR). In this paper, we analyze the delay according to packet arrival rate and propose two network coding schemes, iXOR (Intelligent XOR) and oXOR (Optimal XOR) with Markov Decision Process (MDP). They reduce the average delay, even under an unsaturated traffic load, through the Holding-${\chi}$ strategy. In particular, we are interested in the unsaturated network scenario. The unsaturated network is more practical because, in a real wireless network, nodes do not always have packets waiting to be sent. Through analysis and extensive simulations, we show that iXOR and oXOR are better than the Distributed Coordination Function (DCF) without XOR (the general forwarding scheme) and XOR with DCF with respect to average delay as well as delivery ratio.

A Network Capacity Model for Multimodal Freight Transportation Systems

  • Park, Min-Young;Kim, Yong-Jin
    • Journal of Korea Port Economic Association
    • /
    • v.22 no.1
    • /
    • pp.175-198
    • /
    • 2006
  • This paper presents a network capacity model that can be used as an analytical tool for strategic planning and resource allocation for multimodal transportation systems. In the context of freight transportation, the multimodal network capacity problem (MNCP) is formulated as a mathematical model of nonlinear bi-level optimization problem. Given network configuration and freight demand for multiple origin-destination pairs, the MNCP model is designed to determine the maximum flow that the network can accommodate. To solve the MNCP, a heuristic solution algorithm is developed on the basis of a linear approximation method. A hypothetical exercise shows that the MNCP model and solution algorithm can be successfully implemented and applied to not only estimate the capacity of multimodal network, but also to identify the capacity gaps over all individual facilities in the network, including intermodal facilities. Transportation agencies and planners would benefit from the MNCP model in identifying investment priorities and thus developing sustainable transportation systems in a manner that considers all feasible modes as well as low-cost capacity improvements.

  • PDF

Radio Resource Scheduling Approach For Femtocell Networks

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.394-400
    • /
    • 2022
  • The radio resources available in a wireless network system are limited. Therefor, job of managing resources is not easy task. Because the resources are shared among the UEs that are connected, the process of assigning resources must be carefully controlled. The packet scheduler in an LTE network is in charge of allocating resources to the user equipment (UE). Femtocells networks are being considered as a promising solution for poor channel performance for mulitple environments. The implementation of femtocells into a macrocell (traditional base station) would boost the capacities of the cellular network. To increase femtocells network capacity, a reliable Packet Scheduler mechanism should be implemented. The Packet Scheduler technique is introduced in this paper to maximize capacity of the network while maintaining fairness among UEs. The proposed solution operates in a manner consistent with this principle. An analysis of the proposed scheme's performance is conducted using a computer simulation. The results reveal that it outperforms the well-known PF scheduler in terms of cell throughput and average throughput of UEs.

Implementation of MIB/MIT in CORBA based Network Management System (CORBA 기반 네트워크 관리 시스템에서 MIB/MIT 구현)

  • Cho, Haeng-Rae;Kim, Chung-Su;Kim, Young-Tak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.2B
    • /
    • pp.117-128
    • /
    • 2003
  • The network management becomes more complicated due to the growth of network technology and introduction of a large number of new multimedia services. TINA has appeared as a concept for the advanced network management system platform using the information technology such as distributed processing and object oriented modeling. Since TINA is on the basis of DPE (Distributed Processing Environment), it can manage networks and services for open telecommunications. In this paper, we propose an implementation strategy of the MIB/MIT to federate various CORBA objects in CORBA based network management system implementing TINA DPE. The proposed strategy is novel in the sense that it can support the distribution of MIB/MIT that is well matched with the distributed component architecture of TINA DPE, and it can also support the scoping and filtering services on the MIT using CORBA Naming Service.

Design and Implementation of Web-based Hierarchical Network Management System using SSL (SSL을 이용한 웹기반 계층적 네트워크 관리 시스템의 설계 및 구현)

  • 황일선;이명선;유기성;김종근;조강홍;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.1-15
    • /
    • 2002
  • Network management system exchanges information between management servers to manage other network as well as local network for MSP(Management Service Provider) business. Because communication line that is used here is communication line that several users use, other user can steal a important information that are passed through communication line. For these information include important information of administrator or equipments, These information should be protected. Usually it is use much SSL to security of communication and it wish to protect information using SSL in communication between management servers' or communication between server and client at network management system to use much SSL for security of communication.

  • PDF

Real-time MPEG-4 Video Encoder for Live Video Service over CDMA network (CDMA 망에서의 실시간 동영상 서비스를 위한 MPEG-4 비디오 인코더)

  • Lee Yong-Hee;Song Joon-Ho;Kim In-Kwon;Shin Heon-Shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8B
    • /
    • pp.707-715
    • /
    • 2006
  • One of the most promising services on the wireless network is multimedia data service. With recently emerged wireless communication technologies which conventionally were devoted to mobile phone services, pre-encoded contents as well as live video data can be transmitted via the same network. As there is enough room in the improvement of data transmission bandwidth in wireless network, video data service is likely to be more demanding. In this paper, real time MPEG-4 video encoder is described as apart of a whole system for live video services over wireless networks. As there are minimal assumptions on the underlying networks, presented system and service can be easily supported by different network system.

The Defect Detection and Evaluation of Austenitic Stainless Steel 304 Weld Zone using Ultrasonic Wave and Neuro (초음파와 신경망을 이용한 오스테나이트계 스테인리스강 304 용접부의 결함 검출 및 평가)

  • Yi, Won;Yun, In-Sik
    • Journal of Welding and Joining
    • /
    • v.16 no.3
    • /
    • pp.64-73
    • /
    • 1998
  • This paper is concerned with defects detection and evaluation of heat affected zone (HAZ) in austenitic stainless steel type 304 by ultrasonic wave and neural network. In experiment, the reflected ultrasonic defect signals from artificial defects (side hole, vertical hole, notch) of HAZ appears as beam distance of prove-defect, distance of probe-surface, depth of defect-surface on CRT. For defect classification simulation, neural network system was organized using total results of ultrasonic experiment. The organized neural network system was learned with the accuracy of 99%. Also it could be classified with the accuracy of 80% in side hole, and 100% in vertical hole, 90% in notch about ultrasonic pattern recognition. Simulation results of neural network agree fairly well with results of ultrasonic experiment. Thus were think that the constructed system (ultrasonic wave - neural network) in this work is useful for defects dection and classification such as holes and notches in HAZ of austenitic stainless steel 304.

  • PDF

Real-time Camera and Video Streaming Through Optimized Settings of Ethernet AVB in Vehicle Network System

  • An, Byoungman;Kim, Youngseop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.3025-3047
    • /
    • 2021
  • This paper presents the latest Ethernet standardization of in-vehicle network and the future trends of automotive Ethernet technology. The proposed system provides design and optimization algorithms for automotive networking technology related to AVB (Audio Video Bridge) technology. We present a design of in-vehicle network system as well as the optimization of AVB for automotive. A proposal of Reduced Latency of Machine to Machine (RLMM) plays an outstanding role in reducing the latency among devices. RLMM's approach to real-world experimental cases indicates a reduction in latency of around 41.2%. The setup optimized for the automotive network environment is expected to significantly reduce the time in the development and design process. The results obtained in the study of image transmission latency are trustworthy because average values were collected over a long period of time. It is necessary to analyze a latency between multimedia devices within limited time which will be of considerable benefit to the industry. Furthermore, the proposed reliable camera and video streaming through optimized AVB device settings would provide a high level of support in the real-time comprehension and analysis of images with AI (Artificial Intelligence) algorithms in autonomous driving.

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.