• Title/Summary/Keyword: 전송 복구

Search Result 366, Processing Time 0.025 seconds

Monitoring-based Coordination of Network-adaptive FEC for Wireless Multi-hop Video Streaming (무선 멀티 홉 비디오 스트리밍을 위한 모니터링 기반의 네트워크 적응적 FEC 코디네이션)

  • Choi, Koh;Yoo, Jae-Yong;Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2A
    • /
    • pp.114-126
    • /
    • 2011
  • Video streaming over wireless multi-hop networks(WMNs) contains the following challenges from channel fading and variable bandwidth of wireless channel, and it cause degradation of video streaming performance. To overcome the challenges, currently, WMNs can use Forward Error Correction (FEC) mechanism. In WMNs, traditional FEC schemes, E2E-FEC and HbH-FEC, for video streaming are applied, but it has long transmission delay, high computational complexity and inefficient usage of resource. Also, to distinguish network status in streaming path, it has limitation. In this paper, we propose monitoring-based coordination of network-adaptive hop-to-end(H2E) FEC scheme. To enable proposed scheme, we apply a centralized coordinator. The coordinator has observing overall monitoring information and coordinating H2E-FEC mechanism. Main points of H2E-FEC is distinguishing operation range as well as selecting FEC starting node and redundancy from monitored results in coordination. To verify the proposed scheme, we perform extensive experiment over the OMF(Orbit Measurement Framework) and IEEE 802.1la-based multi-hop WMN testbed, and we carry out performance improvement, 17%, from performance comparison by existing FEC scheme.

An Efficient Congestion Control Mechanism for Tree-based Many-to-many Reliable Multicast (트리 기반의 다대다 신뢰적 멀티캐스트를 위한 효율적인 혼잡 제어 기법)

  • 유제영;강경란;이동만
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.656-667
    • /
    • 2003
  • Congestion control is a key task in reliable multicast along with error control. However, existing tree-based congestion control schemes such as MTCP and TRAMCC are designed for one-to-many reliable multicast and have some drawbacks when they are used for many-to-many reliable multicast. We propose an efficient congestion control mechanism, TMRCC, for tree-based many-to-many reliable multicast protocols. The proposed scheme is based on the congestion windowing mechanism and a rate controller is used in addition. The feedback for error recovery is exploited for congestion control as well to minimize the overhead at the receivers. The ACK timer and the NACK timers are set dynamically reflecting the network condition changes. The rate regulation algorithm in the proposed scheme is designed to help the flows sharing the same link to achieve the fair share quickly The performance of the proposed scheme is evaluated using ns-2. The simulation results show that the proposed scheme outperforms TRAMCC in terms of intra- session fairness and shows good level of responsiveness, TCP-friendliness, and scalability. In addition, we implemented the proposed scheme by integrating with GAM that is one of many-to-many reliable multicast protocols and evaluated the performance in a laboratory-wide testbed.

Fault Tolerance for IEEE 1588 Based on Network Bonding (네트워크 본딩 기술을 기반한 IEEE 1588의 고장 허용 기술 연구)

  • Altaha, Mustafa;Rhee, Jong Myung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.331-339
    • /
    • 2018
  • The IEEE 1588, commonly known as a precision time protocol (PTP), is a standard for precise clock synchronization that maintains networked measurements and control systems. The best master clock (BMC) algorithm is currently used to establish the master-slave hierarchy for PTP. The BMC allows a slave clock to automatically take over the duties of the master when the slave is disconnected due to a link failure and loses its synchronization; the slave clock depends on a timer to compensate for the failure of the master. However, the BMC algorithm does not provide a fast recovery mechanism in the case of a master failure. In this paper, we propose a technique that combines the IEEE 1588 with network bonding to provide a faster recovery mechanism in the case of a master failure. This technique is implemented by utilizing a pre-existing library PTP daemon (Ptpd) in Linux system, with a specific profile of the IEEE 1588 and it's controlled through bonding modes. Network bonding is a process of combining or joining two or more network interfaces together into a single interface. Network bonding offers performance improvements and redundancy. If one link fails, the other link will work immediately. It can be used in situations where fault tolerance, redundancy, or load balancing networks are needed. The results show combining IEEE 1588 with network bonding enables an incredible shorter recovery time than simply just relying on the IEEE 1588 recovery method alone.

1-2-1 Coded Cooperative Communication Using STBC and ARQ (STBC와 ARQ를 이용한 1-2-1 부호화 협력 통신)

  • Hong, Seong-Wook;Kong, Hyung-Yun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.5
    • /
    • pp.421-427
    • /
    • 2009
  • This paper has proposed 1-2-1 coded cooperative communication that is a combination of STBC and ARQ. Coded cooperative communication is a protocol that integrates channel coding with cooperative communication. In this paper consider convolution encoder. ARQ method can increase the spectral efficiency than conventional cooperative communication because if the received signal from source node is satisfied by the destination preferentially, the destination transmits ACK message to both relay node and source node and then recovers the received signal. Where each relay 1, 2 forwards a punctured portion of receive data. When relay transmit to destination apply STBC the reliability to increase. Moreover this protocol can get better BER performance of receiver using simple comparator. We verified BER performance for the proposed protocol through Monte-Carlo simulation over Rayleigh fading plus AWGN.

Implementation of the Man-made Disaster Prevention and Localization Information Monitoring System based on PLC (PLC 기반 인적 재난 방지 및 위치 정보 모니터링 시스템 구현)

  • Yoon, Seon-Tae;Park, Ki-Won;Ko, Bong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.384-390
    • /
    • 2010
  • Since many accidents have been constantly occurring in the workplace, requirements of Industrial Safety Management have also been increasing. In order to meet the needs and prevent the problems in advance, we designed wireless sensor network system based on PLC. This system is set with amain node including PLC Modem and Zigbee in the every workplace and each wireless sensor node is attached to every worker in the workplace. The main node is supposed to transmit and receive sensor data, and the data which is from a wireless sensor node to the main node is delivered to monitoring PC through PLC. In this paper, it is expected that, by perceiving the realtime situation of the work place through this system, we could prevent the problems in advance and reduce damages by accidents.

Error Concealment Method for MPEG-4 Video in Wireless Environment (무선환경에서 MPEG-4 영상의 오류은닉 방법)

  • Park, Sun-Young;Song, Joon-Ho;Moon, Joo-Hee
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.6
    • /
    • pp.641-651
    • /
    • 2002
  • Recently, many advanced video application services over the mobile wireless networks have required a transcoder which can efficiently reduce the size of compressed video bitstreams. The transcoder can be worked in either the spatial domain or the DCT domain. In this paper, we propose a new fast hybrid-type transcoder which can efficiently reduce the frame size with keeping the visual quality. The proposed scheme consists of two major processes: a transform domain process and a spatial domain process. We also propose a scheme for coding mode selection and motion vector refinement. Experimental results show that our approach can reduce the computational complexity more than any other conventional spatial-domain transcoder with keeping the visual quality.

System Design of IDS for DDoS Detect and Defense (DDoS공격감지 및 방어를 위한 침입방지 시스템의 설계)

  • Hong, Seong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6845-6848
    • /
    • 2014
  • This paper proposes a system design of IDS for detecting and defending against DDoS attacks on a network. The proposed system has three parts; the Alert, Attack Analyzer and Defense agent. When the server resource was reduced too much by incoming traffic, the Alert Agent sends message and traffic information to the Attack Analyzer. The message and traffic to the Attack analyzer include only the sender & receiver address and packet numbers for minimizing the overload of Attack Analyzer. Message Received Attack Analyzer investigates the Message. If the pattern of traffic is the same as the DDoS Style, the Analyzer sends a message to the Defense Agent to block that traffic. In this system, at the serious state of the server-down, the Attack analyzer uncovers the DDoS Attacker and send a message to the Defense Agent to block that traffic. This works for server reactivation as soon as possible.

Extended ROHC Compression Algorithm for The Efficient Data Traffic Transmission in the IPv6 (차세대 IP체계에서 효율적인 데이터 전송을 위한 확장된 ROHC 알고리즘)

  • Kim Kyung-shin;Kang Moon-sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.187-198
    • /
    • 2005
  • In this paper, we propose the enhanced header compression scheme for the efficient data traffic transmission in Ipv6 networks. The bandwidth of wireless links and IP networks will probably be limited due to properties of the physical medium and regulatory limits on the use of frequencies for radio communications. That is major cause of user throughput reduction. Therefore, We discuss the IPHC(RFC2507) and ROHC(RFC3095) scheme. IPHC is simple header compression scheme and ROHC is enhanced header compression that have fast optimal recovery scheme. We have studied the enhanced header compression scheme in ROHC. We will show that indication of compression context values preventing from packet losses can provide the fast recovery of compression state. Computer simulations show that the proposed scheme has better performance than the previous one.

  • PDF

Resource Share Mechanism for the Balanced Backcup Path Establishment in Optical Networks (광 통신망에서 보호 패스 설정을 위한 분산 자원 공유 메카니즘)

  • Park Hyeon;Lee Dong-Hun;Yae Byung-Ho;Kim Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12A
    • /
    • pp.1111-1119
    • /
    • 2005
  • A single fiber cut can potentially influence a total of 1.6 Tbps of traffic and is surprisingly frequent and results in significant loss of traffic. The survivability as we as the resource utilization of the connection in optical networks is important. Existing protection mechanisms to rapidly recover the failures allocate the backup path just SRLG-disjointed with working path. Those did not consider the unbalanced resource share of backup paths. The backup paths can be centralized on the specific link so that the idle resource is not used. As a result, as those do not efficiently use the resource the whole resource utilization is not so good. So we propose the mechanism to enhance the resources utilization as settling down the unbalanced resource share. Our purpose is to improve the link utilization as distributing the maximum link load.

Construction of Symmetrical Reversible Variable-Length Codes from the Huffman Code (Huffman 부호에 기초한 대칭적 양방향 가변길이 부호의 설계 방법)

  • Jeong Wook-Hyun;Ho Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.1
    • /
    • pp.57-68
    • /
    • 2004
  • Although variable-length codes (VLCs) increase coding efficiency using the statistical characteristics of the source data, they have catastrophic effects from bit errors in noisy transmission environments. In order to overcome this problem with VLCs, reversible variable-length codes (RVLCS) have recently been proposed owing to their data recovering capability. RVLCS can be divided into two categories: symmetrical and asymmetrical RVLCs. Although the symmetrical RVLC has generally more overheads than the asymmetrical RVLC, it has some advantages of simpler design and more efficient memory usage. However, existing symmetrical RVLCs still have high complexity in their code design and some room for improvement in coding efficiency. In this paper, we propose a new algorithm for constructing a symmetrical RVLC from the optimal Huffman code table. The proposed algorithm has a simpler design process and also demonstrates improved performance in terms of the average codeword length relative to the existing symmetrical RVLC algorithms.