• Title/Summary/Keyword: 멀티캐스트 그룹

Search Result 379, Processing Time 0.024 seconds

Hybrid Video on Demand Using Dynamic Channel Allocation (동적인 채널할당을 이용한 결합형 주문형 비디오 서비스)

  • Lee Suk Won;Park Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1A
    • /
    • pp.91-103
    • /
    • 2005
  • In designing a video-on-demand (VoD) system, the major challenge may be how to reduce the channels concurrently used maintaining the client's waiting time. For this reason, the various architectures which integrate the multicast streams with the unicast streams were suggested in order to improve channel efficiency in recent years. In combining multicast with unicast, the ways to group the unicast channels together are important so that clients can share the multicast transmission channels. This paper proposes a hybrid video-on-demand system which gathers the unicast channels in new ways and shares multicast transmission channels efficiently by using dynamic channel allocation architecture. The numerical results demonstrate that the proposed architecture in some case achieves performance gain of $551{\%}$ compared to existing architecture. This paper presents procedure of channel release and reuse, performance analysis, and simulation results of the dynamic channel allocation architecture.

Extended Information Pool and Indirect Meeting Mechanism for Inter-agent Communications (이동에이전트간 통신을 지원하는 확장된 정보 저장소와 간접 미팅 기법)

  • Jeon, Byung-Kook;Yi, Keun-Sang;Choi, Yung-Keun
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.131-137
    • /
    • 2000
  • The communication and collaboration of mobile agents are efficient in doing information processing in the Internet. Therefore, this paper proposes an efficient communication mechanism that support to inter-agent communications and collaborations. For the remark mentioned above, a mobile agent system provides an indirect meeting mechanism as well as an extended information pool, which has an effect on decreasing network bandwidth. In addition, some proposed communication methods can support to message multicasting so that those are effectively adapted for a model of group agent. Finally, the proposed mechanism is implemented and analyzed in the MAS, a mobile agent system model developed by the Java language.

  • PDF

An Efficient P2P Based Proxy Patching Scheme for Large Scale VOD Systems (대규모 VOD 시스템을 위한 효율적인 P2P 기반의 프록시 패칭 기법)

  • Kwon, Chun-Ja;Choi, Hwang-Kyu
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.341-354
    • /
    • 2005
  • The main bottleneck for large scale VOD systems is bandwidth of storage or network I/O due to the large number of client requests simultaneously, and then efficient techniques are required to solve the bottleneck problem of the VOD system. Patching is one of the most efficient techniques to overcome the bottleneck of the VOD system through the use of multicast scheme. In this paper, we propose a new patching scheme, called P2P proxy patching, for improving the typical patching technique by jointly using the prefix caching and P2P proxy. In our proposed scheme, each client plays a role in a proxy to multicast a regular stream to other clients that request the same video stream. Due to the use of the P2P proxy and the prefix caching, the client requests that ive out of the patching window range can receive the regular stream from other clients in the previous patching group without allocating the new regular channels from the VOD server to the clients. In the performance study, we show that our patching scheme can reduce the server bandwidth requirement about $33\%$ less than that of the existing patching technique with respect to prefix size and request interval.

Introduction of IPv6 Autoconfiguration technology and Standardization trends (IPv6 자동네트워킹 기술 및 표준화 동향)

  • 홍용근;인민교;박정수;김용진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.97-100
    • /
    • 2001
  • For the auto-configuration of diverse hosts and automation of network management as many electronic machines and industrial components are becoming connected to Internet, it is possible to use autoconfiguration using DHCP and network management protocol such as SNMP, CMIP. But these technologies are not developed maturely and lack various standardizations yet because these are designed for restrictive purposes in the past. The new working group "Zeroconf" is made in IETF at March, 2000, it is aimed for making standards of autoconfiguration which is applied to impromptu ad-hoc networks in automobiles, trains, planes and home network or mobile networks. In this paper, we introduce the IPv6 based autoconfiguration technologies such as IP interface configuration, translation between host name and IP address, IP multicast address allocation and service discovery. Finally, trends of standardization in Zeroconf working group will be shown. be shown.

  • PDF

Peer-to-Peer Transfer Scheme for Multimedia Partial Stream using Client Initiated with Prefetching (멀티미디어 데이터를 위한 피어-투-피어 전송모델)

  • 신광식;윤완오;정진하;최상방
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.598-612
    • /
    • 2004
  • Client requests have increased with the improvement of network resources at client side, whereas network resources at server side could not keep pace with the increased client request. Therefore, it is primary factor of the Qos that efficiently utilize network resources at server side. In this paper, we proposed a new model that peer-to-peer transfer scheme for partial multimedia stream based on CIWP which it decrease server network bandwidth by utilizing client disk resources saves additional server network resources. Especially, adapting Threshold_Based Multicast scheme guarantees to do that data transfer within clients never exceed service time of previous peer by restriction of which data size transferring from previous peer less than data size transferring from server. Peer-to-peer transfer within clients is limited in same group classified as ISPs. Our analytical result shows that proposed scheme reduces appling network resources at server side as utilizing additional client disk resource. furthermore, we perform various simulation study demonstrating the performance gain through comparing delay time and proportion of waiting requesters. As a result, when we compared to Threshold_Based Multicast scheme, the proposed scheme reduces server network bandwidth by 35%.

Multicast Model and Application of Group Communication System using Trigger (트리거를 이용한 그룹통신시스템의 멀티캐스트모델 및 응용)

  • Ryu Kwon-Yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1222-1228
    • /
    • 2006
  • In this paper, I propose a video watermaking method using adaptive threshold value and half-cell motion vector. Conventional method cause a lot of change of motion vectors and bring about a falling-off in invisibility, because it search embedding condition about whole macroblocks and watermarks are embedded in arbitrary motion vectors. Proposed method improve invisibility and decrease in number of change of motion vectors, because it create threshold value by using power of motion vector(PMV), and watermarks are embedded in motion vectors which greater than threshold value. Consequently, proposed method improve invisibility with on an average 5.4 dB ~9.3dB according to video bit-stream.

Implementation of policy-based Virtual LAN over ATM-LAN Switched network using SDL (SDL을 이용한 ATM-LAN 스위치 망에서의 정책 기반 가상랜 구현)

  • Kim, Hee-Jung;Seo, Ju-Yeon;Chae, Ki-Joon;Lee, Mee-Jung;Kang, Hun;Choi, Kil-Young;Kim, Sung-Hei
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.387-389
    • /
    • 1999
  • 사용자의 물리적 위치에 상관없이 워크그룹을 구성할 수 있어 논리적인 브로드캐스트 도메인 서비스를 제공하는 가상랜을 멀티미디어 트래픽 지원이 가능한 ATM-LAN 스위치 망에서 구현하기 위한 방법으로는 ATM Forum의 LAN Emulation을 이용할 수 있다. 그러나, 기존의 LANE에서는 구성단계동안 LECS가 ATM 망에서의 가상랜인 ELAN을 할당하는 방법이 구체적으로 정의되어 있지 않아, 가상랜 사용자들의 초기 설정, 진행 중인 사용자의 위치이동이나 변경 등을 원활하게 해 주는 본래의 가상랜의 장점을 충분히 지원하지 못하고 있다. 본 논문에서는 가상랜을 설정하고 관리하기 위한 정책을 도출하고, 도출된 정책을 기반으로 하여 가상랜 구성을 동적으로 처리할 수 있는 기능을 LECS에 추가하여 통신 시스템 개발용 명세 언어인 SDL을 이용하여 구현하였다.

  • PDF

An arbitration approach to resolve conflict to quality requirements in the level of the media service for multi-party collaboration environments (다자간 협업 환경을 위한 미디어 서비스 수준에서의 품질 요구사항 갈등 중재방법)

  • Han, Sang-Woo;Kim, Jong-Won
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.601-606
    • /
    • 2008
  • When sharing real-time media in the ubiquitous computing environments, due to heterogeneous performance of devices, conflict to users' media service requirements might be occurred. To address the problems, there are extensive researches about media streaming QoS control schemes in the aspects of network or application. However, their deployment has met with difficulty because of critical reasons such as high development cost and system complexity. In this paper, in the level of media services, we propose a negotiation approach to offer improved quality of media services. The proposed approach Constructs video distribution group between producer and consumer services, which target to globally minimize the concession of users' quality requirements Consequently, users can be provided video services in the level of conformation to the users' expectation.

  • PDF

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.