• Title/Summary/Keyword: 전송계층

Search Result 1,285, Processing Time 0.027 seconds

Implementation of UDP-Tunneling Based Multicast Connectivity Solution for Multi-Party Collaborative Environments (다자간 협업 환경을 위한 UDP 터널링 기반의 멀티캐스트 연결성 솔루션의 구현)

  • Kim, Nam-Gon;Kim, Jong-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.3
    • /
    • pp.153-164
    • /
    • 2007
  • The Access Grid (AG) provides collaboration environments over the IP multicast networks by enabling efficient exchange of multimedia contents among remote users; however, since lots of current networks are still multicast-disabled, it is not easy to deploy this multicast-based multi-party AG. For this problem, the AG provides multicast bridges as a solution by putting a relay server into the multicast networks. Multicast-disabled clients make UDP connections with this relay server and receive forwarded multicast traffics in unicast UDP packets. This solution is facing several limitations since it requires duplicate forwarding of the same packet for each unicast peer. Thus, in this paper, we propose an alternate solution for the multicast connectivity problem of the AG based on the UMTP (UDP multicast tunneling protocol). By taking advantage of flexibilities of UMTP, the proposed solution is designed to improve the efficiency of network and system utilization, to allow reuse of multicast-based AG applications without modification, and to partially address the NAT/firewall traversal issues. To verify the feasibility of proposed solution, we have implemented a prototype AG connectivity tool based on the UMTP, named as the AG Connector.

On Supporting Internet Integrated Servies over Token Ring and Ethernet (토큰링과 이더넷에서의 인터넷 통합서비스지원)

  • Kim, So-Yeon;Lee, Mi-Jeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.6
    • /
    • pp.644-661
    • /
    • 1999
  • 인터넷에서 통합서비스를 제공하기 위해서는 종단간 다양한 QoS를 지원해야 하는데 이를 위해서는 인터넷뿐 아니라 종단 사용자와 인터넷을 연결하는 랜에서의 QoS 지원이 필요하다. 이에, IETF는 특정 링크 계층으로 구성되는 서브넷에서 QoS 지원을 위한 기본 골격을 제안하였다. 그런데 , 매체 접근방식에 따라 서브넷이 제공할 수 있는 서비스의 정도가 크게 달라지기 때문에 실제로 IS802 모델을 특정서브넷에 구현하기 위해서는 이에 대한 고려가 필요하다. 본 논문에서는 통합서비스를 지원하기 위한 기반이 되는 서브넷 차원에서의 우선순위 지원을 목표로 IS802 모델을 전통적인 이더넷과 토큰링에 적용하여 보았다. 먼저, IS802 모델의 대역폭관리자를 적용한 이더넷 IS모델과 토큰링_IS 모델의 구현을 제안하고 특별히, 이더넷의 경우 매체 접근 방식의 특성상 IS802 모델의 적용만으로는 서브넷차원에서의 우선순위에 따른 전송을 지원할 수 없기 때문에 이를 보완하기 위한 페이즈 모델을 추가로 제안하였다. 시뮬레이션을 통해 기존의 전통적인 이더넷과 토큰링 및 새롭게 표준화된 IS802 모델을 적용한 이더넷 _IS와 토큰링 _IS, 그리고 페이즈 모델간의 성능을 비교하였다. 시뮬레이션결과 토큰링의 경우 단순한 입장 제어에 의해서도 QoS 지원 정도가 크게 향상될수 있음을 볼 수 있었다. 또한 , 페이즈 모델의 경우 이더넷의 매체 접근 방식을 상당히 보완함으로써 QoS 지원 정도가 크게 향상될 수 있음을 볼 수 있었다. 또한, 페이즈 모델의 경우 이더넷의 매체 접근 방식을 상당히 보완함으로써 QoS 지원을 요구하는 플로우에대해서는 전통적인 이더넷이나 이더넷_IS 비해 훨씬 안정적인 서브넷 차원의 우선순위지원 서비스를 제공할 수 있음을 확인할 수 있었다.제공하는 멀티미디어 동기화 편집기와 변환기 및 상영기를 ScriptX를 이용하여 Windows95 상에 구현하였다.기 위한 간단한 例를 들어 봄으로써 이 글을 쓰는 동기으 일면을 대신하고자 한다.置함으로 이것을 Multi-Drop(points) system으로 swiching System을 利用 Mini-Network을 構成할 수도 있다.크 구성 관리 서버 시스템 개발에 대한 비용을 줄일 수 있다. 기대된다.e 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重) $3.50{\sim}3.99kg$사이의 아이에서 그 주산기사망률(周産基死亡率)이 각각 가장 낮았다. 2. 사산(死産)과 초생아사망(初生兒死亡)을 구분(區分)하여 고려해 볼때 사산(死産)은 모성(母性)의 임신력(姙娠歷)

An Adaptive Information Hiding Technique of JPEG2000-based Image using Chaotic System (카오스 시스템을 이용한 JPEG2000-기반 영상의 적응적 정보 은닉 기술)

  • 김수민;서영호;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.4
    • /
    • pp.9-21
    • /
    • 2004
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method and the random changing method using the chaotic system. For ciphering the quantization index we use a novel image encryption algerian of cyclically shifted in the right or left direction and encrypts two quantization assignment method (Top-down/Reflection code), made change of data less. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the proposed methods implemented in software for about 500 images. consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

ADPSS Channel Interpolation and Prediction Scheme in V2I Communication System (V2I 통신 시스템에서 ADPSS 채널 보간과 예측 기법)

  • Chu, Myeonghun;Moon, Sangmi;Kwon, Soonho;Lee, Jihye;Bae, Sara;Kim, Hanjong;Kim, Cheolsung;Kim, Daejin;Hwang, Intae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.8
    • /
    • pp.34-41
    • /
    • 2017
  • Vehicle to Infrastructure(V2I) communication means the technology between the vehicle and the roadside unit to provide the Intelligent Transportation Systems(ITS) and Telematic services. The vehicle collects information about the probe data through the evolved Node B(eNodeB) and after that eNodeB provides road conditions or traffic information to the vehicle. To provide these V2I communication services, we need a link adaptation technology that enables reliable and higher transmission rate. The receiver transmits the estimated Channel State Information(CSI) to transmitter, which uses this information to enable the link adaptation. However, due to the rapid channel variation caused by vehicle speed and the processing delay between the layers, the estimated CSI quickly becomes outdated. For this reason, channel interpolation and prediction scheme are needed to achieve link adaptation in V2I communication system. We propose the Advanced Discrete Prolate Spheroidal Sequence(ADPSS) channel interpolation and prediction scheme. The proposed scheme creates an orthonomal basis, and uses a correlation matrix to interpolate and predict channel. Also, smoothing is applied to frequency domain for noise removal. Simulation results show that the proposed scheme outperforms conventional schemes with the high speed and low speed vehicle in the freeway and urban environment.

A New Upper Layer Decoding Algorithm for a Hybrid Satellite and Terrestrial Delivery System (혼합된 위성 및 지상 전송 시스템에서 새로운 상위 계층 복호 알고리즘)

  • Kim, Min-Hyuk;Park, Tae-Doo;Kim, Nam-Soo;Kim, Chul-Seung;Jung, Ji-Won;Chun, Seung-Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.9
    • /
    • pp.835-842
    • /
    • 2009
  • DVB-SSP is a new broadcasting system for hybrid satellite communications, which supports mobile handheld systems and fixed terrestrial systems. However, a critical factor must be considered in upper layer decoding which including erasure Reed-Solomon error correction combined with cyclic redundancy check. If there is only one bit error in an IP packet, the entire IP packet is considered as unreliable bytes, even if it contains correct bytes. IF, for example, there is one real byte error, in an If packet of 512 bytes, 511 correct bytes are erased from the frame. Therefore, this paper proposed two kinds of upper layer decoding methods; LLR-based decoding and hybrid decoding. By means of simulation we show that the performance of the proposed decoding algorithm is superior to that of the conventional one.

A Mobile Multicast Mechanism for End-to-End QoS Delivery (End-to-End QoS를 지원하기 위한 이동 멀티캐스트 기법)

  • Kim Tae-Soo;Lee Kwang-Hui
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5B
    • /
    • pp.253-263
    • /
    • 2005
  • This paper proposed a mobile multicast technique to satisfy end-to-end QoS for various user requirements in mobile network environment. In order to provide seamless mobility, fast handoff technique was applied. By using L2 mobile trigger, it was possible to minimize remarkable amount of packet loss by delay occurred during handoff. To provide efficient multicast, concept of hierarchy was introduced to Xcast++, which results in a creation of HXcast++. HXcast++ optimized transfer path of multicast and reduced expensive multicast maintenance costs caused by frequent handoff. Suggestion of GMA (Group Management Agent) mechanism allows joining to group immediately without waiting IGMP Membership query during handoff. GMA mechanism will minimize the delay for group registration process and the resource usage due to delay of withdrawal process. And also use of buffering & forwarding technique minimized packet loss during generation of multicast tree. IntServ/RSVP was used to provide End-to-End QoS in local domain and DiffServ was used in global domain. To minimize reestablishment of RSVP session delay, extended HXcast++ control messages ware designed to require PATH message. HXcast++ proposed in this thesis is defined as multicast technique to provide end-to-end QoS and also to satisfy various user requirements in mobile network environment.

Adaptation of SVC to Packet Loss and its Performance Analysis (패킷 손실에 대한 스케일러블 비디오(SVC) 적응기법 및 성능분석)

  • Jang, Euy-Doc;Kim, Jae-Gon;Thang, Truong Cong;Kang, Jung-Won
    • Journal of Broadcast Engineering
    • /
    • v.14 no.6
    • /
    • pp.796-806
    • /
    • 2009
  • SVC (Scalable Video Coding) is a new video coding standard to provide convergence media service in heterogeneous environments with different networks and diverse terminals through spatial-temporal-quality combined flexible scalabilities. This paper presents the performance analysis on packet loss in the delivery of SVC over IP networks and an efficient adaptation method to packet loss caused by buffer overflow. In particular, SVC with MGS (Medium Grained Scalability) as well as spatial and temporal scalabilities is addressed in the consideration of packet-based adaptation since finer adaptation is possible with a sufficient numbers of quality layers in MGS. The effect on spatio-temporal quality due to the packet loss of SVC with MGS is evaluated. In order to minimize quality degradation resulted by packet loss, the proposed adaptation of MGS based SVC first sets adaptation unit of AU (Access Unit) or GOP corresponding to allowed delay and then selectively discards packets in order of importance in terms of layer dependency. In the experiment, the effects of packet loss on quantitative qualities are analyzed and the effectiveness of the proposed adaptation to packet loss is shown.

Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 생체 정보 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.147-153
    • /
    • 2014
  • The numerous improved schemes of remote user authentication based on password have been proposed in order to overcome the security weakness in user authentication process. Recently, some of biometric-based user authentication schemes to use personal biometric information have been introduced and they have shown the relatively higher security and the enhanced convenience as compared to traditional password-based schemes. These days wireless sensor network is a fundamental technology in face of the ubiquitous era. The wireless sensor networks to collect and process the data from sensor nodes in increasing high-tech applications require important security issues to prevent the data access from the unauthorized person. Accordingly, the research to apply to the user authentication to the wireless sensor networks has been under the progress. In 2010, Yuan et al. proposed a biometric-based user authentication scheme to be applicable for wireless sensor networks. Yuan et al. claimed that their scheme is effectively secure against the various security flaws including the stolen verifier attack. In this paper, author will prove that Yuan et al.'s scheme is still vulnerable to the password guessing attack, user impersonation attack and the replay attack, by analyzing their security weakness.

Fault Tolerance for IEEE 1588 Based on Network Bonding (네트워크 본딩 기술을 기반한 IEEE 1588의 고장 허용 기술 연구)

  • Altaha, Mustafa;Rhee, Jong Myung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.331-339
    • /
    • 2018
  • The IEEE 1588, commonly known as a precision time protocol (PTP), is a standard for precise clock synchronization that maintains networked measurements and control systems. The best master clock (BMC) algorithm is currently used to establish the master-slave hierarchy for PTP. The BMC allows a slave clock to automatically take over the duties of the master when the slave is disconnected due to a link failure and loses its synchronization; the slave clock depends on a timer to compensate for the failure of the master. However, the BMC algorithm does not provide a fast recovery mechanism in the case of a master failure. In this paper, we propose a technique that combines the IEEE 1588 with network bonding to provide a faster recovery mechanism in the case of a master failure. This technique is implemented by utilizing a pre-existing library PTP daemon (Ptpd) in Linux system, with a specific profile of the IEEE 1588 and it's controlled through bonding modes. Network bonding is a process of combining or joining two or more network interfaces together into a single interface. Network bonding offers performance improvements and redundancy. If one link fails, the other link will work immediately. It can be used in situations where fault tolerance, redundancy, or load balancing networks are needed. The results show combining IEEE 1588 with network bonding enables an incredible shorter recovery time than simply just relying on the IEEE 1588 recovery method alone.

Web Traffic Analysis according to the Link-down Duration of TCP and SCTP (링크다운 시간에 따른 TCP와 SCTP의 웹 트래픽 분석)

  • Choi, Yong-Woon;Cho, Kwang-Moon;Lee, Yong-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.44-52
    • /
    • 2010
  • The most popular world wide web traffic in the Internet uses TCP as the transport layer protocol. Since TCP utilizes the single path, it can not communicate with the correspondent host during the link-down. On the other hand, SCTP can still communicate with the other SCTP entity by using alternate path even while the primary path is down. Most of previous studies have conducted the performance comparison research between TCP and SCTP by using typical file transfer. Since web traffic with self-similarity is characterized by the packet inter-arrival times and shape parameter affecting the size of web file in the Pareto distribution, it is necessary to perform the experiments considering these parameters. This paper aims to compare the throughput between TCP and SCTP while varying parameters reflecting the web traffic characteristics in link-down environment. Experimental results for web traffic using NS-2 simulator show that the throughput of SCTP using multi-homing is better than that of TCP. Simulation also shows that TCP is more affected than SCTP by mean inter-arrival and shape parameters with regard to the web traffic. These results can be applied to estimate the performance variation of web traffic due to the duration of link-down.