• Title/Summary/Keyword: 전송 복구

Search Result 367, Processing Time 0.02 seconds

Proposal and Simulation of Flow Control and Error Recovery in EAP for Performance Improvement (EAP 성능 향상을 위한 흐름 제어 및 오류 복구 방식의 제안과 시뮬레이션)

  • Cha, Eun-Chul;Han, Chan-Kyu;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.299-306
    • /
    • 2009
  • Followed by the popularity of the Internet, a number of access technologies to the Internet have been developed. EAP is an authentication framework. It is designed to provide the authentication functionality in the access network. Because of its flexibility and extensibility EAP poses a global solution for the authentication supported by many access networks. However, EAP has critical weaknesses in the protocol which may, in turn, decrease the EAP performance. Some of the weaknesses are caused by the "lock-step" flow control which only supports a single packet in flight. Considering the weaknesses, we propose a solution for the flow control. Using simulation we prove that our solutions improve the EAP performance.

Design of resource efficient network reprogramming protocol (자원 효율적인 네트워크 리프로그래밍 프로토콜 설계)

  • Choi, Rock-Hyun;Hong, Won-Kee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.67-75
    • /
    • 2010
  • Network reprogramming is a technology that allows several sensor nodes deployed in sensor field to be repaired remotely. Unlike general communication in sensor network where small amount of data is transferred, network reprogramming requires reliable transfer of large amount of data. The existing network reprogramming techniques suffers high cost and large energy consumption to recover data loss in node communication. In this paper, a cluster based network reporgramming scheme is proposed for sensor network. It divides sensor field into several clusters and chooses a cluster header in charge of data relay to minimize duplicated transmission and unnecessary competition. It increases reliability by effective error recovery through status table.

Preceding Error Recovery Algorithm for Multimedia Stream in the Tree-based Multicast Environments (트리기반 멀티캐스트 환경에서 멀티미디어 스트림을 위한 선행에러복구 방안)

  • Kim, Ki-Young;Yoon, Mi-Youn;Shin, Young-Tae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.345-354
    • /
    • 2003
  • IP Multicast is required of more little network resources than one in unicast. Furthermore, reliable multicast has been researched for supporting reliability at IP Multicast mechanism. Although these studies are carried out, they only have focused on general data. In other words, in case that realtime packet, they can not support reliability since they do not consider realtime properties such as dependency of interframe and playback in time. Besides, we also request to support scalability because we are based on Mobile IP network together with internet. Thus, we need a mechanism to guarantee reliability and scalability of realtime stream data. In this paper, we propose PER (Preceding Error Recovery) that reflect characteristics of the realtime data, especially for H.323. PER provides scalable reliability because it is based on tree-based multicast basically and helps to support scalable relibility as reducing control packet and recovers stream buffer space from underflow status as soon as possible. PER shows much better scalable and reliable than existing works.

Region-Based Error Concealment of Depth Map in Multiview Video (영역 구분을 통한 다시점 영상의 깊이맵 손상 복구 기법)

  • Kim, Wooyeun;Shin, Jitae;Oh, Byung Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2530-2538
    • /
    • 2015
  • The pixel value of depth image is depth value so that different objects which are placed on nearby position have similar pixel value. Moreover, the pixels of depth image have distinct pixel values compared to adjacent pixels while those of color image has very similar values. Accordingly distorted depth image of multiview video plus depth (MVD) needs proper error concealment methods considering the characteristics of depth image when transmission errors are happened. In this paper, classifying regions of depth image to consider edge directions and then applying adaptive error concealment methods to each region are proposed. Recovered depth images utilize with multiview video data to synthesize intermediate-view point video. The synthesized view is evaluated by objective quality metrics to demonstrate proposed method performance.

Performance of Fault-tolerant Ethernet System with Link-bypass scheme for Airbone Databus (항공 데이터버스용 링크 우회방식을 가진 고장감내 이더넷 시스템의 성능 분석)

  • Song, Dae-Yoen;Yoon, Chong-Ho;Jung, Han-Gyun;Kim, Seung-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.9
    • /
    • pp.46-53
    • /
    • 2007
  • The link-fault recovery in the normal Ethernet bridged networks has relied on the Spanning Tree Protocol(STP) or Rapid STP. However, STP can not offer fast error recovery which is needed real-time services such as aircraft. In this paper, we compare automatic protection switching(APS) providing fault-tolerant function in the BcN back bone system with Avionic Full Duplex Switched Ethernet(AFDX) which is recently equipped in the A380 for Airbone Databuses. Also, we propose a link-bypass scheme for improving fault-tolerant performance of the AFDX by connecting switches and bypass fault section when a fault is originated on the link. For comparing and verifying the performance of proposed scheme, we simulated Ethernet, AFDX, APS and proposed AFDX with link-bypass scheme using NS-2. The proposed AFDX with link-bypass scheme can be applied to aircrafts, BcN backbone networks and industrial automatic networks.

Performance Evaluation on Journaling File Systems using Iozone Tool in the Linux : Focus on read, write (리눅스에서 Iozone 도구를 이용한 저널링 파일 시스템 성능 평가 : read, write 중심으로)

  • Park, Hong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.39-46
    • /
    • 2013
  • If a file system is damaged because of the unusual system close, the system performs the consistency test using fsch and it takes long time. Especially, if it is a big file system, it will take a lot of time. The journaling file system that uses journaling technique, can reduce the restoring time because it uses meta data and it may increase the chance of restoration when restoring. The goal of this paper compared performance evaluation journaling file systems focused on the reading and writing using Iozone tool which is the kernel based benchmarking tool in linux operating system. In this paper, Ex4 which is the current basic Linux file system. is 1.28x faster than XFS file system in terms of file read performance and 1.22x faster than Ext3 file system in terms of file write performance.

On Improving Reliability of E-ODMRP (E-ODMRP의 신뢰성 향상에 관한 연구)

  • Jung, Young-Woo;Park, Joon-Sang
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.465-470
    • /
    • 2010
  • In this paper we propose a method which can be used to enhance the reliability of E-ODMRP (Enhanced On-Demand Multicast Routing Protocol). E-ODMRP has low overhead compared to its predecessors since it performs periodic refresh at a rate dynamically adapted to the nodes' mobility and adopts the local recovery. Upon detecting a broken route, a node performs a local search to graft to the forwarding mesh proactively. However in E-ODMRP there is no packet recovery mechanism. A receiver may lose some packets when it is detached from the multicast tree. We propose a simple packet recovery mechanism that can be incorporated into E-ODMRP for enhanced reliability. We show via simulation that our mechanism effectively enhances the reliability of E-ODMRP.

Development of Electronic Documents and Management System for Transfer of Disaster Damage and Recovery Information (재난피해복구정보 전자문서 및 관리시스템 개발)

  • Yoon, Hyuk-Jin;Kim, Joo-Sung;Park, Jung-Jun;Chang, Tai-Woo
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.15-26
    • /
    • 2015
  • To prevent the spread of damage, initial reaction and emergency repair are important. But up to now they depend on some guidelines and man power owing to the lack of technical support. In this paper, we described the development process of several electronic documents and information management system of them to rapidly acquire and share damage information of the infrastructure. The damage information, which is acquired by the computer and smart phone, is transformed to the electronic documents and connected to data management system through the damage information acquisition network. These systems could readily be used for preparing a countermeasure of the disaster and disaster recovery.

An Adaptive FEC based Error Control Algorithm for VoIP (VoIP를 위한 적응적 FEC 기반 에러 제어 알고리즘)

  • Choe, Tae-Uk;Jeong, Gi-Dong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.375-384
    • /
    • 2002
  • In the current Internet, the QoS of interactive applications is hardly guaranteed because of variable bandwidth, packet loss and delay. Moreover, VoIP which is becoming an important part of the information infra-structure in these days, is susceptible to network packet loss and end-to-end delay. Therefore, it needs error control mechanisms in network level or application level. The FEC-based error control mechanisms are used for interactive audio application such as VoIP. The FEC sends a main information along with redundant information to recover the lost packets and adjusts redundant information depending on network conditions to reduce the bandwidth overhead. However, because most of the error control mechanisms do not consider end-to-end delay but packet loss rate, their performances are poor. In this paper, we propose a new error control algorithm, SCCRP, considering packet loss rate as well as end-to-end delay. Through experiments, we confirm that the SCCRP has a lower packet loss rate and a lower end-to-end delay after reconstruction.

A Voice Coding Technique for Application to the IEEE 802.15.4 Standard (IEEE 802.15.4 표준에 적용을 위한 음성부호화 기술)

  • Chen, Zhenxing;Kang, Seog-Geun
    • Journal of Broadcast Engineering
    • /
    • v.13 no.5
    • /
    • pp.612-621
    • /
    • 2008
  • Due to the various constraints such as feasible size of data payload and low transmission power, no technical specifications on the voice communication are included in the Zigbee standard. In this paper, a voice coding technique for application to the IEEE 802.15.4 standard, which is the basis of Zigbee communication, is presented. Here, both high compression and good waveform recovery are essential. To meet those requirements, a multi-stage discrete wavelet transform (DWT) block and a binary coding block consisting of two different pulse-code modulations are exploited. Theoretical analysis and simulation results in an indoor wireless channel show that the voice coder with 2-stage DWT is most appropriate from the viewpoint of compression and waveform recovery. When the line-of-sight component is dominant, the voice coding scheme has good recovery capability even in the moderate signal-to-noise power ratios. Hence, it is considered that the presented scheme will be a technical reference for the future recommendation of voice communication exploiting Zigbee.