• 제목/요약/키워드: 전송 복구

검색결과 366건 처리시간 0.02초

Speech Packet Transmission Using the AMR-WB Coder with FEC (FEC기능을 추가한 AMR-WB 음성 부호화기를 이용한 음성 패킷 전송)

  • 황정준;이인성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제40권11호
    • /
    • pp.63-71
    • /
    • 2003
  • This paper suggests the packet loss recovery method to communicate in real time in the Internet. To reduce the effects of packet loss, Forward Error Correction (FEC) that adds redundant information to voice packets can be used. Adaptive Multi Rate Wideband(AMR-WB) codec which is recently selected by the Third Generation Partnership Project(3GPP) for GSM and the third generation mobile communication WCDMA system and has also been standardized in ITU-T for providing wideband speech services is used. The major cause for speech qualitly degradation in IP-networks is packet loss. So, We recovered single lossy packet by using FEC method and concealed continued errors. The proposed scheme if evaluated in the Gilbert Internet channel model. The high quality of audio maintained up to 30% packet loss.

An Energy-Efficient Multiple Path Data Routing Scheme Using Virtual Label in Sensor Network (센서 네트워크 환경에서 가상 식별자를 이용한 에너지 효율적인 다중 경로 데이터 라우팅 기법)

  • Park, Jun-Ho;Yeo, Myung-Ho;Seong, Dong-Ook;Kwon, Hyun-Ho;Lee, Hyun-Jung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • 제11권7호
    • /
    • pp.70-79
    • /
    • 2011
  • The multi-path routing schemes that assigns labels to sensor nodes for the reliability of data transmission and the accuracy of an aggregation query over the sensor networks where data transfer is prone to defect have been proposed. However, the existing schemes have high costs for reassigning labels to nodes when the network topology is changed. In this paper, we propose a novel routing method that avoids duplicated data and reduces the update cost of a sensor node. In order to show the superiority of the proposed scheme, we compare it with the existing scheme through the various experiments. Our experimental results show that our proposed method reduces about 95% the amount of the transmitted data for restoration to node failure and about 220% the amount of the transmitted data for query processing over the existing method on average.

Hybrid Down-Sampling Method of Depth Map Based on Moving Objects (움직임 객체 기반의 하이브리드 깊이 맵 다운샘플링 기법)

  • Kim, Tae-Woo;Kim, Jung Hun;Park, Myung Woo;Shin, Jitae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제37A권11호
    • /
    • pp.918-926
    • /
    • 2012
  • In 3D video transmission, a depth map being used for depth image based rendering (DIBR) is generally compressed by reducing resolution for coding efficiency. Errors in resolution reduction are recovered by an appropriate up-sampling method after decoding. However, most previous works only focus on up-sampling techniques to reduce errors. In this paper, we propose a novel down-sampling technique of depth map that applies different down-sampling rates on moving objects and background in order to enhance human perceptual quality. Experimental results demonstrate that the proposed scheme provides both higher visual quality and peak signal-to-noise ratio (PSNR). Also, our method is compatible with other up-sampling techniques.

Improved Soft-Decision Technique with Channel State Information in MB-OFDM System with DCM (DCM을 사용하는 MB-OFDM 시스템에서 채널 정보를 이용한 향상된 연판정 복조 기법)

  • Koo, Bon-Wook;Kang, Byung-Su;Song, Hyoung-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제32권5A호
    • /
    • pp.467-474
    • /
    • 2007
  • MB-OFDM (Multiband-orthogonal frequency division multiplexing) UWB (ultra wide band) system uses DCM (dual carrier modulation) scheme to achieve high-data rate transmission. The basic idea of DCM is that to transmit the 4 bits more reliably two 16-QAM (quadrature amplitude modulation) symbols are used and the two 16-QAM sysmbols are allocated to each subcarrier of OFDM with maximum-distance. In the case of using the DCM, if one 16-QAM symbol is broken by deep fadding channel, a receiver can detect the transmitted signal by using another 16-QAM symbol. In the conventional ML(maximum likelihood) decision scheme, since the receiver does not use the CSI (channel state information), loss in diversity can not be reduced. In this paper, we propose improved soft-decision scheme with CSI for higher performance of MB-OFDM UWB systemn.

Conference Supporting System Using Multicast in WLANs (무선 랜 환경에서 멀티캐스트를 이용한 회의 지원 시스템)

  • Jeong, Jae-Chul;Cha, Joon-Hyuk;Shin, Kun-Woo;Kim, Sun-Myeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2011년도 춘계학술대회
    • /
    • pp.515-518
    • /
    • 2011
  • Recently we all agree with the fact that conference is the most important communication method in industrial fields. With improvement of information technology, the conference using computer-aided system has been increased. Therefore, software, which can support the conference, is highly needed. In our work, we implemented the display sharing system in WLANs that sends the presenter's display to all audience in real-time manner. In order to share the display, we used multicast transmission which shows good performance in one to many communications. And also, to solve the data error and loss problem, which are weak points of multicast transmission, we used Reed-Solomon coding scheme.

  • PDF

Transmission Methods Using RS Codes to Improve Spatial Relationship of Images in Reversible Data Hiding Systems (가역적 데이터 은닉 시스템에서 RS 부호를 사용한 이미지 공간상관 관계 향상을 위한 전송 기법)

  • Kim, Taesoo;Jang, Min-Ho;Kim, Sunghwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제40권8호
    • /
    • pp.1477-1484
    • /
    • 2015
  • In this paper, a novel reversible data hiding by using Reed-Solomon (RS) code is proposed for efficient transmission in encryption image. To increase the recovery of data from encrypted image, RS codes are used to encode messages, and then the codewords can be embedded into encrypted image according to encryption key. After receiving encrypted image which embeds the codewords, the receiver firstly decryptes the encrypted image using the encryption key and get metric about codewords containing messages. According to recovery capability of RS codes, better estimation of message is done in data hiding system. Simulation results about two images and two RS codes show that the performances of the proposed schemes are better than ones of the reference scheme.

Automatic Recovery Network Design for the Efficient Costs (효율적인 비용을 갖는 자동장애극복 네트워크의 설계방안)

  • Song, Myeong-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제14권11호
    • /
    • pp.5885-5889
    • /
    • 2013
  • In general, the network survivability means that The user do not know the network faults and the recovery of those. For this, we use the dual(multi) routes between each two nodes. It is important that the each dual routes have efficient costs(or minimum). Even if one route is the minimum cost in case of no fault, another route of dual may be very large cost in case of fault case. Therefore we need the dual routes of each two nodes having the efficient(or minimum) costs. In this paper we find the network design method for the dual routes of each two node having the efficient costs. Although the design method is very simple and heuristic and it may be not useful for some networks, we will use it in various network environment.. Because this design method can be used very easy. A sample design will proof this usefulness.

Congestion Control Scheme for Efficient Multimedia Transmission in Broadband Wireless Networks (광대역 무선 네트워크에서 효율적인 멀티미디어 전송을 위한 혼잡 제어 기법)

  • Lee, Eunjae;Chung, Kwangsue
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제18권7호
    • /
    • pp.1599-1609
    • /
    • 2014
  • TCP does not ensure the bandwidth and delay bound required for multimedia streaming services in broadband wireless network environments. In this paper, we propose a new congestion control scheme for efficient multimedia transmission, called COLO TCP (Concave Increase Slow Start Logarithmic Increase Congestion Avoidance TCP). The COLO TCP prevents the burst packet loss by applying the concave increase algorithm in slow start phase. In the congestion avoidance phase, COLO TCP uses the logarithmic increase algorithm that quickly recovers congestion window after packet loss. To highly utilize network bandwidth and reduce packet loss ratio, COLO TCP uses additive increase algorithm and adaptive decrease algorithm. Through simulation results, we prove that our COLO TCP is more robust for random loss. It is also possible for efficient multimedia transmission.

An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer (EPON MAC 계층의 안전한 데이터 전송을 위한 인증 및 키관리 프로토콜)

  • Kang, In-kon;Lee, Do-Hoon;Lee, Bong-Ju;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제28권1B호
    • /
    • pp.1-10
    • /
    • 2003
  • An EPON which is going on standardization in IEEE 802.3ah, is tree topology consists of a OLT and multiple ONU using passive optical components, so this network is susceptible to variable security threats - eavesdropping, masquerading, denial of service and so on. In this paper, we design a security protocol supporting authentication and confidentiality services in MAC layer in order to prevent these security threats and to guarantee secure data exchange The designed security protocol introduce public-key based authentication and key management protocols for efficient key management, and choose Rijndael algorithm, which is recent standard of AES, to provide the confidentiality of EPON Proposed authentication and key management protocols perform authentication and public-key exchange at a time, and are secure protocols using derived common cipher key by exchanging public random number To implement the designed security protocol, we propose the procedures of authentication and public-key exchange, session key update, key recovery. This proposed protocol is verified using unknown session key, forward secrecy, unknown key-share, key-compromise impersonation.

광 인터넷 표준화 동향

  • 최준균;이규명
    • Information and Communications Magazine
    • /
    • 제18권11호
    • /
    • pp.33-43
    • /
    • 2001
  • 본 고에서는 광인터넷에 대하여 현재까지 IETE, ITU-T 및 OIF(Optical Internet Forum)을 중심으로 최근에 활발하게 추진되고 있는 표준화 동향을 살펴본다. 특히 광을 기반으로 MPLS(Milti-Protocol Label Switching) 기술을 적용하려는 Generalized MPLS 기술을 중심으로 분석한다. 먼저 IETE에서 MPLS 기술을 중심으로 분석하다 먼저 IETF에서 MPLS WG에서 기본 MPLS 기술에 대한 표준을 지속적으로 작업하고 있으며 여기에서의얻은 기술을 바탕으로 IPO Wg과 CCAMP WG 등에서 광 네트워크 구조를 제안하고 있으며 여기에 새로운 시그널링과 계층적 경로 설정 메커니즘 및 신뢰성 있는 보호/복구 등의 부가적이 기능들을 추가하기 위한 작업을 하고 있다 또한 OIF 에서는 UNI 신호 규격을 정하고 있으며 ITU-T에서 광 전달 네트워크 (OTN)와 관련하여 ASTN/ASON(Automatic Switched Transport Network/Automatic Switched Optical Network)을 포함하여 광 네트워크에 대한 구조적 측면뿐만 아니라 전송 및 망 관리 측면에 대학 규격을 제정 중에 있다.

  • PDF