• Title/Summary/Keyword: flexible memory

Search Result 139, Processing Time 0.026 seconds

Development of the Home Location Register/Authentication Center in the CDMA Mobile System

  • Lim, Sun-Bae;Shin, Kyeong-Suk;Kim, Hyun-Gon
    • ETRI Journal
    • /
    • v.19 no.3
    • /
    • pp.186-201
    • /
    • 1997
  • In this paper, a home location register (HLR) for CDMA mobile communication system (CMS) is introduced. It stores the mobile station (MS) subscribers locations and supplementary service information. Call processing procedures for HLR are developed to receive and store subscriber's location coming from mobile exchange (MX) during the location registration, and to transfer subscriber's location and supplementary service information to the MX during the mobile-terminated call setup. For fast call processing by increasing database access speed, a memory-resident database management system is devised. For Easy and secure HLR operation, administration and maintenance functions and overload control mechanisms are implemented. Designed HLR hardware platform is expandable and flexible enough to reallocated software blocks to any subsystems within the platform. It is configurable according to the size of subscribers. An authentication center (AC) is developed on the same platform. It screens the qualified MS from the unqualified. The calls to and from the unqualified MS are rejected in CMS. To authenticate the MS, the AC generates a new authentication parameter called "AUTHR" using shared secret data (SSD) and compared it with the other AUTHR received from the MS. The MC also generates and stores seed keys called "A-keys" which are used to generate SSDs. The HLR requirements, the AC requirements, software architecture, hardware platform, and test results are discussed.

  • PDF

Hardware implementation of Petri net-based controller with matrix-based look-up tables (행렬구조 메모리 참조표를 사용한 페트리네트 제어기의 하드웨어 구현)

  • Chang, Nae-Hyuck;Jeong, Seung-Kweon;Kwon, Wook-Hyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.4 no.2
    • /
    • pp.194-202
    • /
    • 1998
  • This paper describes a hardware implementation method of a Petri Net-based controller. A flexible and systematic implementation method, based on look-up tables, is suggested, which enables to build high speed Petri net-based controllers. The suggested method overcomes the inherent speed limit that arises from the microprocessors by using of matrix-based look-up tables. Based on the matrix framework, this paper suggests various specific data path structures as well as a basic data path structure, accompanied by evolution algorithms, for sub-class Petri nets. A new sub-class Petri net, named Biarced Petri Net, resolves memory explosion problem that usually comes with matrix-based look-up tables. The suggested matrix-based method based on the Biarced Petri net has as good efficiency and expendability as the list-based methods. This paper shows the usefulness of the suggested method, evaluating the size of the look-up tables and introducing an architecture of the signal processing unit of a programmable controller. The suggested implementation method is supported by an automatic design support program.

  • PDF

A JTAG Protection Method for Mobile Application Processors (모바일 애플리케이션 프로세서의 JTAG 보안 기법)

  • Lim, Min-Soo;Park, Bong-Il;Won, Dong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.4
    • /
    • pp.706-714
    • /
    • 2008
  • In this paper, we suggest a practical and flexible system architecture for JTAG(Joint Test Action Group) protection of application processors. From the view point of security, the debugging function through JTAG port can be abused by malicious users, so the internal structures and important information of application processors, and the sensitive information of devices connected to an application processor can be leak. This paper suggests a system architecture that disables computing power of computers used to attack processors to reveal important information. For this, a user authentication method is used to improve security strength by checking the integrity of boot code that is stored at boot memory, on booting time. Moreover for user authorization, we share hard wired secret key cryptography modules designed for functional operation instead of hardwired public key cryptography modules designed for only JTAG protection; this methodology allows developers to design application processors in a cost and power effective way. Our experiment shows that the security strength can be improved up to $2^{160}{\times}0.6$second when using 160-bit secure hash algorithm.

A Study on a Distributed Data Fabric-based Platform in a Multi-Cloud Environment

  • Moon, Seok-Jae;Kang, Seong-Beom;Park, Byung-Joon
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.321-326
    • /
    • 2021
  • In a multi-cloud environment, it is necessary to minimize physical movement for efficient interoperability of distributed source data without building a data warehouse or data lake. And there is a need for a data platform that can easily access data anywhere in a multi-cloud environment. In this paper, we propose a new platform based on data fabric centered on a distributed platform suitable for cloud environments that overcomes the limitations of legacy systems. This platform applies the knowledge graph database technique to the physical linkage of source data for interoperability of distributed data. And by integrating all data into one scalable platform in a multi-cloud environment, it uses the holochain technique so that companies can easily access and move data with security and authority guaranteed regardless of where the data is stored. The knowledge graph database mitigates the problem of heterogeneous conflicts of data interoperability in a decentralized environment, and Holochain accelerates the memory and security processing process on traditional blockchains. In this way, data access and sharing of more distributed data interoperability becomes flexible, and metadata matching flexibility is effectively handled.

Analysis of Components Performance for Programmable Video Decoder (프로그래머블 비디오 복호화기를 위한 구성요소의 성능 분석)

  • Kim, Jaehyun;Park, Gooman
    • Journal of Broadcast Engineering
    • /
    • v.24 no.1
    • /
    • pp.182-185
    • /
    • 2019
  • This paper analyzes performances of modules in implementing a programmable multi-format video decoder. The goal of the proposed platform is the high-end Full High Definition (FHD) video decoder. The proposed multi-format video decoder consists of a reconfigurable processor, dedicated bit-stream co-processor, memory controller, cache for motion compensation, and flexible hardware accelerators. The experiments suggest performance baseline of modules for the proposed architecture operating at 300 MHz clock with capability of decoding HEVC bit-streams of FHD 30 frames per second.

Development of Big-data Management Platform Considering Docker Based Real Time Data Connecting and Processing Environments (도커 기반의 실시간 데이터 연계 및 처리 환경을 고려한 빅데이터 관리 플랫폼 개발)

  • Kim, Dong Gil;Park, Yong-Soon;Chung, Tae-Yun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.4
    • /
    • pp.153-161
    • /
    • 2021
  • Real-time access is required to handle continuous and unstructured data and should be flexible in management under dynamic state. Platform can be built to allow data collection, storage, and processing from local-server or multi-server. Although the former centralize method is easy to control, it creates an overload problem because it proceeds all the processing in one unit, and the latter distributed method performs parallel processing, so it is fast to respond and can easily scale system capacity, but the design is complex. This paper provides data collection and processing on one platform to derive significant insights from various data held by an enterprise or agency in the latter manner, which is intuitively available on dashboards and utilizes Spark to improve distributed processing performance. All service utilize dockers to distribute and management. The data used in this study was 100% collected from Kafka, showing that when the file size is 4.4 gigabytes, the data processing speed in spark cluster mode is 2 minute 15 seconds, about 3 minutes 19 seconds faster than the local mode.

Conflicts and Resolutions due to the Expansion of Urban Heritage - Focusing on Historic Sites and Hanok Areas in Seoul -

  • Hyun Chul Youn;Seong Lyong Ryoo
    • Architectural research
    • /
    • v.25 no.2
    • /
    • pp.29-40
    • /
    • 2023
  • The purpose of this study is to analyze the conflicts caused by the spatial expansion in two types of urban heritage in Seoul. To explain the national and professional orientation found in each spatial transformation, the study brought the concept of 'historic state' and 'epitome,' thereby examining the operating system of the conflicts. Field observations and stakeholder interviews were performed based on literature and historical research. The study results are as follows. ①In the case of Gwanghwamun and Donuimun, the spatial expansion is to find the historic state of the sites. Gwanghwamun with high national status and substance, conflicts show a pattern that spreads to memory conflicts. Donuimun is relatively unknown and has no substance so that a flexible method of digital restoration was applied. ② In the case of Ikseon-dong and Bukchon hanok, they show heterogeneous spatial expansion. The conflicts in relation to this is caused by the epitome of hanok. In Ikseon-dong, illegal installation of structures(non-epitome) is prevalent, while in Bukchon, there was a process of transferring the new basement(non-epitome) as part of the hanok. ③Conflicts in Gwanghwamun can be coordinated by referring to the digital restoration of Donuimun, and conflicts in Ikseon-dong can be resolved by taking Bukchon as a precedent.

Secure SLA Management Using Smart Contracts for SDN-Enabled WSN

  • Emre Karakoc;Celal Ceken
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3003-3029
    • /
    • 2023
  • The rapid evolution of the IoT has paved the way for new opportunities in smart city domains, including e-health, smart homes, and precision agriculture. However, this proliferation of services demands effective SLAs between customers and service providers, especially for critical services. Difficulties arise in maintaining the integrity of such agreements, especially in vulnerable wireless environments. This study proposes a novel SLA management model that uses an SDN-Enabled WSN consisting of wireless nodes to interact with smart contracts in a straightforward manner. The proposed model ensures the persistence of network metrics and SLA provisions through smart contracts, eliminating the need for intermediaries to audit payment and compensation procedures. The reliability and verifiability of the data prevents doubts from the contracting parties. To meet the high-performance requirements of the blockchain in the proposed model, low-cost algorithms have been developed for implementing blockchain technology in wireless sensor networks with low-energy and low-capacity nodes. Furthermore, a cryptographic signature control code is generated by wireless nodes using the in-memory private key and the dynamic random key from the smart contract at runtime to prevent tampering with data transmitted over the network. This control code enables the verification of end-to-end data signatures. The efficient generation of dynamic keys at runtime is ensured by the flexible and high-performance infrastructure of the SDN architecture.

LISP based IP Address Virtualization Technique for Resource Utilization on Virtualized SDN (가상화된 SDN에서 효과적인 자원 활용을 위한 LISP 기반 IP 주소 가상화 기법)

  • Go, Youngkeun;Yang, Gyeongsik;Yu, Bong-yeol;Yoo, Chuck
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1404-1411
    • /
    • 2016
  • Network virtualization is a technique that abstracts the physical network to provide multiple virtual networks to users. Virtualized network has the advantage to offer flexible services and improve resource utilization. In SDN architecture, network hypervisor serves to virtualize the network through address virtualization, topology virtualization and policy virtualization. Among them, address virtualization refers to the technique that provides an independent address space for each virtual network. Previous work divided the physical address space, and assigned an individual division to each virtual network. Each virtual address is then mapped one-to-one to a physical address. However, this approach requires a lot of flow entries, thus making it disadvantageous. Since SDN switches use TCAM (Ternary Contents Addressable Memory) for the flow table, it is very important to reduce the number of flow entries in the aspect of cost and scalability. In this paper, we propose a LISP based address virtualization, which separates address spaces for the physical and virtual addresses and transmits packet through tunneling, in order to resolve the limitation of the previous studies. By implementing a prototype, we show that the proposed scheme provides better scalability.

Seismic Behavior and Estimation for Base Isolator Bearings with Self-centering and Reinforcing Systems (자동복원 및 보강 시스템과 결합된 면진받침의 지진거동과 평가)

  • Hu, Jong Wan
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.5
    • /
    • pp.1025-1037
    • /
    • 2015
  • Flexible base isolation bearings that separate superstructure from ground have been widely used in the construction field because they make a significant contribution to increasing the fundamental period of the structure, thereby decreasing response acceleration transmitted into the superstructure. However, the established bearing devices installed to uphold the whole building give rise to some problems involved with failure and collapse due to lack of the capacity as modern structures are getting more massive and higher. Therefore, this study suggests new isolation bearings assembled with additional restrainers enabled to reinforcing and recentering, and then evaluates their performance to withstand the seismic load. The superelastic shape memory alloy (SMA) bars are installed into the conventional lead-rubber bearing (LRB) devices in order to provide recentering forces. These new systems are modeled as component spring models for the purpose of conducting nonlinear dynamic analyses with near fault ground motion data. The LRB devices with steel bars are also designed and analyzed to compare their responses with those of new systems. After numerical analyses, ultimate strength, maximum displacement, permanent deformation, and recentering ratio are compared to each model with an aim to investigate which base isolation models are superior. It can be shown that LRB models with superelastic SMA bars are superior to other models compared to each other in terms of seismic resistance and recentering effect.