• Title/Summary/Keyword: 서비스 제공량

Search Result 1,148, Processing Time 0.027 seconds

An Energy-Efficient Mobile P2P Streaming Structure Using Agent Peers (에이전트 피어를 이용한 에너지 효율적인 모바일 P2P 스트리밍 구조)

  • Kim, Sang-Jin;Kim, Eun-Sam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.121-129
    • /
    • 2011
  • With advances in wireless networks and advent of powerful mobile devices such as smart phones, the demand for mobile IPTV services has been increasing. It is essential to minimize the energy consumption of mobile devices because their battery capacity is limited. In this paper, we therefore propose a new streaming structure in P2P-based mobile IPTV systems to minimize the energy consumption of mobile peers using agent peers. Agent peers can decrease the energy consumption of mobile peers significantly by performing streaming functionality and exchanging control messages for joining and leaving overlay networks in place of corresponding mobile peers. Finally, by simulation experiments using an energy model, we show that our proposed streaming structure can increase the lifetime of mobile peers using agent peers.

Improvement of the Data Authentication of CCN (CCN 데이터 인증 기술의 성능 개선 연구)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.341-349
    • /
    • 2017
  • CCN proposes that intermediate network nodes on a network path for a transmitted data-packet cache the data-packet. If the nodes receive request packets for the cached data, the nodes can directly respond to the request-packets using the cached data. Since a request-packet can be responded by one of the intermediate nodes on a path of the request-packet, both faster response time and decreased data transmission amount are expected comparing to the existing host centric networking. However, CCN is vulnerable against forgery attacks because data-packet receivers cannot identify a data provider. Hence, a data authentication scheme is essentially needed to make CCN more secure. But such a data authentication process is one of the main causes of CCN-based service delays. This paper first analyzes the problems of a CCN data authentication scheme, then proposes an improved authentication operation scheme for efficiently authenticating data, and finally evaluates its performance.

Performance Analysis of TCP Variants using AQM and ECN (AQM과 ECN을 사용한 TCP 변종의 성능 분석)

  • Matten, Ahmad;Anwar, Adnan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.129-137
    • /
    • 2016
  • Transmission Control Protocol as a transport layer protocol provides steady data transfer service. There are some serious concerns about the performance of TCP over diverse networks. The vital concern in TCP network environment is congestion which may occur due to quick transmission rates or because of large number of new connections entering the network at the same time. Size of queues in routers grows thus resulting in packet drops. Retransmission of the dropped packets, and reduced throughput can prove costly. Explicit Congestion Notification (ECN) in conjunction with Active Queue Management mechanisms (AQM) such as Random early detection (RED) is used for packet marking rather than dropping. In IP packet header ECN bits can be added as a sign of congestion thus avoiding needless packet drops. The proposed ECN and AQM mechanism can be implemented with help of ns2 simulator and the performance can be tested on different TCP variants.

Fabrication of Optical Network Monitoring Systems for Ship Using Combinations of Chained Branches Method and Dark Fiber Method (Chained Branches와 Dark Fiber 병합 방식을 이용한 선박용 광 네트워크 감시 시스템 제작)

  • Lee, Seong-Real;Kwak, Jae-Min;Ryu, Kwang-Su;Hwang, Eui-Chang;Hwang, Nam-Suk
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.278-286
    • /
    • 2012
  • Hardware and software of optical network monitoring system for optical network installed in ship for providing massive information are designed and fabricated. And, we investigated whether the fabricated system will accurately monitoring three events of optical cable extension, macrobanding and ferrule dust, which are related with special situation of ship, or not through the experiment. We used the combined method of chained branch and dark fiber for designing and fabricating hardware of optical network monitoring system for optimal corresponding with network configuration in ship. And, we confirmed that the proposed system excellently trace within 5 m range of event point in all three cases by investigating each event experiments.

Neighbor Discovery Scheme based on Spatial Correlation of Wireless Channel (무선채널의 공간적 연관성을 이용한 주변단말 탐색방안)

  • Lee, Woongsup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2256-2262
    • /
    • 2015
  • Recently, device-to-device (D2D) communication has been considered as key technology for future cellular system, because it can solve the problem of excessive data traffic increment and can also provide new communication services. Herein, we propose new neighbor discovery for D2D communication and examine its performance. Our proposed scheme is proximity beacon based discovery in which wireless resource for pilot transmission is assigned based on the spatial correlation of wireless channel and sensing period is adjusted according to target accuracy such that power consumption can be reduced. The performance of our propose scheme is analyzed mathematically and verified through computer simulations.

An Intelligent Media Player for Guaranteeing QoS Streaming Media on Thin-Client Computing (씬클라이언트 컴퓨팅에서 스트리밍 미디어의 QoS를 보장하는 지능형 미디어 플레이어)

  • Kim, Byeong-Gil;Lee, Joa-Hyoung;Jung, In-Bum
    • The KIPS Transactions:PartB
    • /
    • v.12B no.5 s.101
    • /
    • pp.607-616
    • /
    • 2005
  • Due to the limited resources in thin-client and the large amount of computation for decoding MPEG media, it is not easy to support the QoS stream media to clients. To solve the problems, the terminal servers would be charged for decoding the MPEG media and thin-clients have a role to update only the changed areas in their screen. However, these previous approaches cause severely low video quality. In addition, since servers perform all procedures to decode MPEG media, they are easily saturated even under a small number of clients. In this paper, the sources of the low video duality are investigated in the previous thin-clients' solutions working in wireless and wired environments. From the detailed experiments, an intelligent media player is proposed to achieve the QoS streams by supporting both the enhanced video duality and the audio synchronized with video frames.

A Distributed Power Control Algorithm for Data Load Balancing with Coverage in Dynamic Femtocell Networks (다이나믹 펨토셀 네트워크에서 커버리지와 데이터 부하 균형을 고려한 기지국의 파워 조절 분산 알고리즘)

  • Shin, Donghoon;Choi, Sunghee
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.2
    • /
    • pp.101-106
    • /
    • 2016
  • A femtocell network has been attracting attention as a promising solution for providing high data rate transmission over the conventional cellular network in an indoor environment. In this paper, we propose a distributed power control algorithm considering both indoor coverage and data load balancing in the femtocell network. As data traffic varies by time and location according to user distribution, each femto base station suffers from an unbalanced data load, which may degrade network performance. To distribute the data load, the base stations are required to adjust their transmission power dynamically. Since there are a number of base stations in practice, we propose a distributed power control algorithm. In addition, we propose the simple algorithm to detect the faulty base station and to recover coverage. We also explain how to insert a new base station into a deployed network. We present the simulation results to evaluate the proposed algorithms.

Design of Ring Topology for Local Access Computer Networks with mean delay time constraint (평균 지연 시간의 제약조건을 갖는 로컬 액세스 컴퓨터 네트워크에서의 링 토폴로지 설계)

  • 이용진;김태윤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.7
    • /
    • pp.1390-1406
    • /
    • 1994
  • This study deals with the DMCLP(Delay constrained Minimum Cost Loop Problem)-one of problems arising in the design of local access computer networks. The problem consists of finding a set of rings to satisfy the traffic requirements of end user terminals. In the problem, the objective is to minimize the total link cost. This paper presents heuristic algorithm which consists of two phases for this problem, under the constraints that the number of nodes served by a single ring is limited and network mean delay is dropped within the desired time. The algorithm is derived using the clusters obtained by the existing MCLP(Minimum Cost Loop Problem) algorithm and a trade-off criterion explained in the paper. Actually, simulation results in that the proposed algorithm in this paper produces better solution than the existing MCLP algorithm modified. In addition, the algorithm has the relatively short running time.

  • PDF

Delay Analysis of Small-scale Roundabouts Using VISSIM (VISSIM을 활용한 소규모 회전교차로의 지체 분석)

  • CHO, Ah Hae;PARK, Byung Ho
    • Journal of Korean Society of Transportation
    • /
    • v.35 no.5
    • /
    • pp.385-395
    • /
    • 2017
  • This study deals with the small-scale roundabout. The purpose of this study is to analyze the average delay of vehicle in roundabout, and suggest the efficient planning and design standard. In pursuing the above, this study gives particular attentions to analyzing the average delay time according to the inscribed circle diameter, speed of circulatory roadway lane and traffic volume. The operational efficiencies of 96 scenarios (3 sizes of inscribed circle diameter ${\times}$ 4 types of circulatory roadway speed ${\times}$ traffic volume) are analyzed using VISSIM (Verkehr In $St{\ddot{a}}dten$-SIMulationsmodell). The main results are as follows. First, the optimal design speed of small-scale roundabout are derived from the above scenario analysis. Second, the traffic volume of LOS D is estimated to be 2,180-2,740pcph. Third, the traffic volume of LOS F that is required to improve is above 2.780pcph. The results might be expected to give some implications to providing the countermeasures for the operational efficiency of roundabout.

A Cluster-Header Selecting Method for more Secure and Energy-Efficient in Wireless Sensor Network (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 헤더 선출 기법)

  • Kim, Jin-Mook;Lee, Pung-Ho;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.107-118
    • /
    • 2007
  • Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network. In this paper, first each node transmit residual electric power and authentication message to BS (Base-Station). BS reflects "Validity Authentication Rate" and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates "Validity Authentication Rate" of former round. Finally, BS can select more secure cluster header.

  • PDF